Big Data Analytics. Using Splunk. Peter Zadrozny. Raghu Kodali. Apress"

Size: px
Start display at page:

Download "Big Data Analytics. Using Splunk. Peter Zadrozny. Raghu Kodali. Apress""

Transcription

1 Big Data Analytics Using Splunk Peter Zadrozny Raghu Kodali Apress"

2 Contents at a Glance About the Authors About the Technical Reviewer Acknowledgments xv xvii xix Chapter 1: Big Data and Splunk 1 ^Chapter 2: Getting Data into Splunk 9 Chapter 3: Processing and Analyzing the Data 31 I Chapter 4: Visualizing the Results 63 HChapter 5: Defining Alerts 97 Chapter 6: Web Site Monitoring 109 Chapter 7: Using Log Files To Create Advanced Analytics 127 a Chapter 8: The Airline On-Time Performance Project 139 Chapter 9: Getting the Flight Data into Splunk 143 Chapter 10: Analyzing Airlines, Airports, Flights, and Delays 161 Chapter 11: Analyzing a Specific Flight Over the Years 195 mchapter 12: Analyzing Tweets 211 a Chapter 13: Analyzing Foursquare Check-Ins 231 a Chapter 14: Sentiment Analysis 255 V

3 ATA GLANCE MChapter 15: Remote Data Collection 283 Chapter 16: Scaling and High Availability 295 Appendix A: The Performance of Splunk 307 Appendix B: Useful Splunk Apps 323 Index 345 vi

4 Contents About the Authors About the Technical Reviewer Acknowledgments xv xvii xix Chapter 1: Big Data and Splunk 1 What Is Big Data? 1 Alternate Data Processing Techniques 4 What Is Splunk? 5 About This Book 6 Chapter 2: Getting Data into Splunk 9 Variety of Data 9 How Splunk deals with a variety of data 10 Files & Directories 11 Data Generator 17 Generate Sample Data 18 Network Sources 22 Windows data 23 Other Sources 23 Apps and Add-ons 23 Forwarders 29 Summary 30 vii

5 HChapter 3: Processing and Analyzing the Data 31 Getting to Know Combined Access Log Data 31 Searching and Analyzing Indexed Data 33 Reporting 41 Which Are the Top Browsers? 41 Top Five IP Addresses 44 Which Are the Top Referral Web Sites? 45 How Many Events Have HTTP 404 Status? 47 How Many Events Have Purchase Action? 49 List of Products That Are Part of a Purchase 50 Sorting 52 Filtering 53 Adding and Evaluating Fields 54 Grouping 56 Summary 62 A Chapter 4: Visualizing the Results 63 Data Visualization 63 How Splunk Deals with Visualization 63 Chart 70 Chart the Number of GET and POST for Each Host 70 Chart the Purchases and Views for Each Product Category 72 Which Product Categories Are Affected by HTTP 404 Errors? 73 Purchasing Trend for MyGizmoStore. com 74 Duration of Transactions 76 Timechart 77 Top Purchases by Product 77 Page Views and Purchases 79 Visualization Using Google Maps App 80 viii

6 Globe 83 Dashboards 86 Summary 96 BChapter 5: Defining Alerts 97 What Are Alerts? 97 How Splunk Provides Alerts 97 Alert based on product sales 98 Alert on failed logins 102 Alerts on critical errors in log files 105 Summary 108 SChapter 6: Web Site Monitoring 109 Monitoring web sites 109 IT Operations 110 Hits by host 110 Hits by host without internal access 111 Traffic with good HTTP status 112 Traffic with bad HTTP status 113 Top pages by bad HTTP status 115 Business User demographics by region Bounce rate Unique visitors 120 Summary 125 SChapter 7: Using Log Files To Create Advanced Analytics 127 Traditional Analytics 127 A Paradigm Change Semantic Logging Logging Best Practices 137 Summary 138 ix

7 Chapter 8: The Airline On-Time Performance Project 139 Summary 141 Chapter 9: Getting the Flight Data into Splunk 143 Working with CSV Files 143 The Flight Data 143 Downloading the Data 144 Getting to Know the Flight Data 145 Timestamp Considerations 147 Mapping Fields to a Timestamp 148 Indexing All the Flight Data 155 Indexing Data from a Relational Database 156 Defining a New Database Connection 156 Database Monitoring 158 Summary 160 Chapter 10: Analyzing Airlines, Airports, Flights, and Delays 161 Analyzing Airlines 161 Counting Airlines 162 Visualizing Results 165 Analyzing Airports 168 Analyzing Flights 172 Analyzing Delays 177 Delays by Airline 177 Causes of Delays by Airport 179 Winter versus Summer Delays 181 Creating and Using Macros 183 Report Acceleration 185 Accelerating Statistics 188 Summary 193 X

8 Chapter 11: Analyzing a Specific Flight Over the Years 195 Airline Names 195 Automating Field Lookups 202 Creating Lookup Tables from Searches 203 United Flight Summary 209 Chapter 12: Analyzing Tweets 211 Tapping the Sample Stream 212 Loading the Tweets into Splunk 215 A Day in Twitter 217 Most Popular Words 220 Real-Time Twitter Trends 223 Summary 229 Chapter 13: Analyzing Foursquare Check-Ins 231 The Check-In Format 232 Reverse Geocoding 234 Time Zone Considerations 235 Loading the Check-Ins 236 Analyzing the Check-Ins 239 The Sunday Brunch Search 239 Google Maps and the Top Venue 244 Check-Ins Patterns of a Venue 246 Venues by Number of Check-Ins 247 Analyzing Gender Activities 250 Summary 253 Chapter 14: Sentiment Analysis 255 Opinions, Views, Beliefs, Convictions 255 Commercial Uses 256 The Technical Side of Sentiment Analysis 257 xi

9 The Sentiment Analysis App 259 Globally Enabling Commands 260 Finding Sentiments 261 Training and Testing Data 265 The World Sentiment Indicator Project 269 Collecting the RSS Feeds 271 Indexing the Headlines into Splunk 272 Defining the Sentiment Corpus 276 Visualizing the Results 278 Summary 282 Chapter 15: Remote Data Collection 283 Forwarders 283 Popular Topologies 284 Installing a Forwarder 286 Deployment Server 289 Configuring the Deployment Server 291 Configuring the Forwarders 292 Deployment Monitor 292 Summary 294 HChapter 16: Scaling and High Availability 295 Scaling Splunk 295 Clustering 301 Setting up a Cluster 303 Summary 306 BAppendix A: The Performance of Splunk 307 Types of Searches 307 Search Performance Profiles 308 Needle in the Haystack 310 Distributed Searches 311 xii

10 Indexing Performance 315 Disk Speed and Searches 316 Understanding your Splunk Environment 318 Most Expensive Searches 318 Historic RunTimes 319 Categorizing Searches 320 Search Head Performance 321 Summary 322 Appendix B: Useful Splunk Apps 323 Splunk Apps 323 Splunk for Oracle WebLogic Server 325 Splunk Hadoop Connect 326 Splunk App for Microsoft Exchange 327 Technology Add-on for Microsoft SQLServer 2012 and 2008r2 328 Splunk App for AWS usage tracking 329 Splunk for FISMA 330 Splunk App for PCI Compliance 331 Splunk App for Enterprise Security 332 Splunk for RSA SecurlD Appliances 333 Splunk App for VMWare 334 Splunk App for HadoopOps 335 Splunk App for Active Directory 336 Splunk on Splunk (S.o.S) 337 Splunk for Nagios 338 Splunk App for Snort 339 Cisco Security Suite 340 Splunk for Palo Alto Networks 341 Splunk for Juniper Firewalls 342 Splunk for Barracuda Networks Web Application Firewall 343 Index 345 xiii

Expert Oracle Application. Express Security. Scott Spendolini. Apress"

Expert Oracle Application. Express Security. Scott Spendolini. Apress Expert Oracle Application Express Security Scott Spendolini Apress" Contents Foreword About the Author About the Technical Reviewer Acknowledgments Introduction xv xvii xix xxi xxiii BChapter 1: Threat

More information

Office and SharePoint

Office and SharePoint Office and SharePoint 2010 User's Guide Integrating SharePoint with Excel, Outlook, Access and Word Michael P. Antonovich Apress About the Author About the Technical Reviewer Acknowledgments xvi xvii xviii

More information

Training Guide: Configuring Windows8 8

Training Guide: Configuring Windows8 8 Training Guide: Configuring Windows8 8 Scott D. Lowe Derek Schauland Rick W. Vanover Introduction System requirements Practice setup instructions Acknowledgments Errata & book support We want to hear from

More information

"Charting the Course... MOC 20409 B Server Virtualization with Windows Hyper-V and System Center. Course Summary

Charting the Course... MOC 20409 B Server Virtualization with Windows Hyper-V and System Center. Course Summary Description Course Summary This five day course will provide you with the knowledge and skills required to design and implement Microsoft Server solutions using Hyper-V and System. Objectives At the end

More information

NetFlow Analytics for Splunk

NetFlow Analytics for Splunk NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...

More information

Pro SQL Server 2008 Pol icy-based. Management. Ken Simmons. Colin Stasiuk. Jorge Segarra. Apress8

Pro SQL Server 2008 Pol icy-based. Management. Ken Simmons. Colin Stasiuk. Jorge Segarra. Apress8 Pro SQL Server 2008 Pol icy-based Management Ken Simmons Colin Stasiuk Jorge Segarra Apress8 Contents Contents at a Glance Contents About the Authors About the Technical Reviewers Acknowledgments Introduction

More information

Practical Hadoop. Security. Bhushan Lakhe

Practical Hadoop. Security. Bhushan Lakhe Practical Hadoop Security Bhushan Lakhe Contents J About the Author About the Technical Reviewer Acknowledgments Introduction xiii xv xvii xix Part I: Introducing Hadoop and Its Security 1 Chapter 1: Understanding

More information

Windows PowerShell Cookbook

Windows PowerShell Cookbook Windows PowerShell Cookbook Lee Holmes O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Foreword Preface xvii xxi Part I. Tour A Guided Tour of Windows PowerShell

More information

This document details the procedure for installing Layer8 software agents and reporting dashboards.

This document details the procedure for installing Layer8 software agents and reporting dashboards. Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via

More information

Introduction. Chapter 1 Why Understanding Your Web Traffic Is Important to Your Business 3

Introduction. Chapter 1 Why Understanding Your Web Traffic Is Important to Your Business 3 Contents Foreword Introduction xix xxi Part I Measuring Success 1 Chapter 1 Why Understanding Your Web Traffic Is Important to Your Business 3 Website Measurement Why Do This?... 4 Information Web Analytics

More information

Building a Data Warehouse

Building a Data Warehouse Building a Data Warehouse With Examples in SQL Server EiD Vincent Rainardi BROCHSCHULE LIECHTENSTEIN Bibliothek Apress Contents About the Author. ; xiij Preface xv ^CHAPTER 1 Introduction to Data Warehousing

More information

Beginning Windows 8. Mike Halsey Microsoft MVP for Windows. Apress*

Beginning Windows 8. Mike Halsey Microsoft MVP for Windows. Apress* Beginning Windows 8 Mike Halsey Microsoft MVP for Windows Apress* Contents at a Glance About the Author About the Technical Reviewers Acknowledgments Introduction xxi xxiii xxv xxvii Chapter 1: Introducing

More information

Release 6.2.1 System Administrator s Guide

Release 6.2.1 System Administrator s Guide IBM Maximo Release 6.2.1 System Administrator s Guide Note Before using this information and the product it supports, read the information in Notices on page Notices-1. First Edition (January 2007) This

More information

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment

More information

Expert Oracle Enterprise

Expert Oracle Enterprise Expert Oracle Enterprise Manager 12c Kellyn Pot'vin Anand Akela Gokhan Atil Bobby Curtis Alex Gorbachev Niall Litchfield Leighton Nelson Pete Sharman Apress' Contents J About the Authors About the Technical

More information

System Administration of Windchill 10.2

System Administration of Windchill 10.2 System Administration of Windchill 10.2 Overview Course Code Course Length TRN-4340-T 3 Days In this course, you will gain an understanding of how to perform routine Windchill system administration tasks,

More information

HAROLD CAMPING i ii iii iv v vi vii viii ix x xi xii 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,

More information

Splunk: Using Big Data for Cybersecurity

Splunk: Using Big Data for Cybersecurity Next Session Begins at 14:40 Splunk: Using Big Data for Cybersecurity Joe Goldberg Splunk Splunk: Using Big Data for Cybersecurity Joseph Goldberg Splunk Advanced Threats in the Headlines Cyber Criminals

More information

Understanding the Digital Audience

Understanding the Digital Audience Understanding the Digital Audience How Splunk Software is Used to Find the Needle and See the Whole Haystack CUSTOMER profile Splunk customer profiles are a collection of innovative, in-depth use cases

More information

disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM

disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM INTRODUCTION Snort is an open source network Intrusion Detection and Prevention Systems (IDS/IPS) developed by Martin Roesch capable

More information

Data Warehousing in the Age of Big Data

Data Warehousing in the Age of Big Data Data Warehousing in the Age of Big Data Krish Krishnan AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD * PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of Elsevier

More information

SAS. 9.4 Guide to Software Updates. SAS Documentation

SAS. 9.4 Guide to Software Updates. SAS Documentation SAS 9.4 Guide to Software Updates SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2013. SAS 9.4 Guide to Software Updates. Cary, NC: SAS Institute

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

Introduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1

Introduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1 Introduction Acknowledgments Support & Feedback Preparing for the Exam xv xvi xvii xviii Chapter 1 Plan and deploy a server infrastructure 1 Objective 1.1: Design an automated server installation strategy...1

More information

AppFabric. Pro Windows Server. Stephen Kaufman. Danny Garber. Apress. INFORMATIONSBIBLIOTHbK TECHNISCHE. U N! V En SIT AT S R!

AppFabric. Pro Windows Server. Stephen Kaufman. Danny Garber. Apress. INFORMATIONSBIBLIOTHbK TECHNISCHE. U N! V En SIT AT S R! Pro Windows Server AppFabric Stephen Kaufman Danny Garber Apress TECHNISCHE INFORMATIONSBIBLIOTHbK T1B/UB Hannover 133 294 706 U N! V En SIT AT S R! B L' OT H E K HANNOVER Contents it Contents at a Glance

More information

Ignify ecommerce. Item Requirements Notes

Ignify ecommerce. Item Requirements Notes wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor

More information

Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction

Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction Acknowledgments xv About the Author xvii Introduction xix Part 1 SSH Basics 1 Chapter 1 Overview of SSH 3 Differences between SSH1 and SSH2 4 Various Uses of SSH 5 Security 5 Remote Command Line Execution

More information

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0 GMS SonicWALL Global Management System 5.0 Contents Platform Compatibility...1 New Features and Enhancements...2 Known Issues...6 Resolved Issues...6 Installation Procedure...7 Related Technical Documentation...8

More information

Pro Puppet. Jeffrey McCune. James TurnbuII. Apress* m in

Pro Puppet. Jeffrey McCune. James TurnbuII. Apress* m in Pro Puppet m in James TurnbuII Jeffrey McCune Apress* About the Authors About the Technical Reviewer Acknowledgments Introduction Chapter 1: Getting Started with Puppet What Is Puppet? Deployment Configuration

More information

For Splunk Universal Forwarder and Splunk Cloud

For Splunk Universal Forwarder and Splunk Cloud Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise

More information

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with

More information

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

Contents. iii. ix xi xi xi xiii xiii xiii xiv xv xvi xvii xix

Contents. iii. ix xi xi xi xiii xiii xiii xiv xv xvi xvii xix What s New in Microsoft Office Project 2003 Getting Help Getting Help with This Book and Its CD-ROM Getting Help with Microsoft Office Project 2003 Using the Book s CD-ROM What s on the CD-ROM System Requirements

More information

ZTE Australia Help Guides MF91

ZTE Australia Help Guides MF91 MF91 Gaming & IP Services Configuration Guides Introduction The purpose of this document is to walk you through the setup of your MF91 for Gaming or any other usage that requires transparency of data traffic

More information

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite

More information

Nasuni Management Console Guide

Nasuni Management Console Guide Nasuni Management Console Guide Version 5.5 April 2014 2014 Nasuni Corporation All Rights Reserved Document Information Nasuni Management Console Guide Version 5.5 April 2014 Copyright Copyright 2010-2014

More information

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts DETAILED REPORT LIST Track which users, when and for how long they used an application on Remote Desktop Services (formerly Terminal Services) and Citrix XenApp (known as Citrix Presentation Server). These

More information

Apple Pro Training Series. OS X Server. Essentials. Arek Dreyer. and Ben Greisler

Apple Pro Training Series. OS X Server. Essentials. Arek Dreyer. and Ben Greisler Apple Pro Training Series OS X Server Essentials Arek Dreyer and Ben Greisler Table of Contents Configuring and Monitoring OS X Server Lesson 1 About This Guide 3 Learning Methodology 4 Lesson Structure

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Foreword p. xvii Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Information to Management p. 5 Example of an

More information

Pro SQL Server 2012. Reporting Services. Third Edition. mm m. Brian McDonald. Shawn McGehee. Rodney Landrum. Apress*

Pro SQL Server 2012. Reporting Services. Third Edition. mm m. Brian McDonald. Shawn McGehee. Rodney Landrum. Apress* Pro SQL Server 2012 Reporting Services Third Edition mm m Brian McDonald Shawn McGehee Rodney Landrum Apress* Contents About the Authors About the Technical Reviewers Acknowledgments m Introduction xvn

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Contents. Intended Audience for This Book How This Book Is Structured. Acknowledgements

Contents. Intended Audience for This Book How This Book Is Structured. Acknowledgements Preface Intended Audience for This Book How This Book Is Structured xvii xviii xix Acknowledgements xxi 1 Open Source Software: Definitions and History 1 1.1 Definition of Terms 1 1.1.1 What Is Free Software?

More information

Oracle Web Cache 11g Overview

<Insert Picture Here> Oracle Web Cache 11g Overview Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content

More information

WebEOC Product Suite Comparison

WebEOC Product Suite Comparison WebEC Product Suite Comparison WebEC is a robust incident management tool with offerings available to support organizations of every size. Use the chart below to compare availability of user functions,

More information

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks _Firewall Palo Alto Networks is the next-generation firewalls that enhance your network security and enable any enterprises to look beyond IP addresses and packets. These innovative firewalls let you see

More information

"Charting the Course to Your Success!" Citrix NetScaler 11 Essentials and Networking CNS 205 Course Summary

Charting the Course to Your Success! Citrix NetScaler 11 Essentials and Networking CNS 205 Course Summary Course Summary Description The objective of the Citrix NetScaler 11 Essentials and Networking course is to provide the foundational concepts and skills necessary to implement, configure, secure, monitor,

More information

WHITE PAPER Closing the Loop on Social Leads. A Hootsuite & 2DiALOG HubSpot White Paper

WHITE PAPER Closing the Loop on Social Leads. A Hootsuite & 2DiALOG HubSpot White Paper WHITE PAPER Closing the Loop on Social Leads A Hootsuite & 2DiALOG HubSpot White Paper Closing the Loop on Social Leads A Guide to Measuring Social Media Lead Generation Social media has outgrown its infancy

More information

DocuShare User Guide

DocuShare User Guide DocuShare User Guide Publication date: April 2011 This document supports DocuShare Release 6.6.1 Prepared by: erox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California 94304 USA

More information

Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.

Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved. Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

Beginning SQL Server. 2012 Administration. Apress. Rob Walters Grant Fritchey

Beginning SQL Server. 2012 Administration. Apress. Rob Walters Grant Fritchey Beginning SQL Server 2012 Administration Rob Walters Grant Fritchey Apress Contents at a Glance About the Authors About the Technical Reviewer Acknowledgments Introduction xv xvi xvii xviii Chapter 1:

More information

Intelligence Using Excel

Intelligence Using Excel PowerPivot for Business Intelligence Using Excel and SharePoint Barry Ralston Apress* About the Author About the Technical Reviewer xi xii Acknowledgments Chapter 1: Getting Started with PowerPivot for

More information

Web Load Stress Testing

Web Load Stress Testing Web Load Stress Testing Overview A Web load stress test is a diagnostic tool that helps predict how a website will respond to various traffic levels. This test can answer critical questions such as: How

More information

Monitoring System Status

Monitoring System Status CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,

More information

TIBCO Rendezvous Administration. Software Release 8.3.0 July 2010

TIBCO Rendezvous Administration. Software Release 8.3.0 July 2010 TIBCO Rendezvous Administration Software Release 8.3.0 July 2010 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY

More information

Elevated Privileges and User ID in Active Directory Environments

Elevated Privileges and User ID in Active Directory Environments Elevated Privileges and User ID in Active Directory Environments Nick Piagentini Palo Alto Networks 3300 Olcott Street Santa Clara, CA 95054 www.paloaltonetworks.com Table of Contents Background... 3 Objections...

More information

Our Systems Experience, Specifically:

Our Systems Experience, Specifically: Our Systems Experience, Specifically: This list is not all encompassing; if you are looking for something in particular that is not listed, we hope you please call or email. Windows Server 2003/XP/Vista

More information

Introduction to Web Analytics Terms

Introduction to Web Analytics Terms Introduction to Web Analytics Terms N10014 Introduction N40002 This glossary provides definitions for common web analytics terms and discusses their use in Unica Web Analytics. The definitions are arranged

More information

VMware Virtual Desktop Manager User Authentication Guide

VMware Virtual Desktop Manager User Authentication Guide Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Guide to Analyzing Feedback from Web Trends

Guide to Analyzing Feedback from Web Trends Guide to Analyzing Feedback from Web Trends Where to find the figures to include in the report How many times was the site visited? (General Statistics) What dates and times had peak amounts of traffic?

More information

9/26/2013. Installer.ps1 will validate all settings before deployment. Define your deployment. Define your deployment Run PDT Downloader

9/26/2013. Installer.ps1 will validate all settings before deployment. Define your deployment. Define your deployment Run PDT Downloader 1 Server Roles and Features.NET Framework 3.51.NET Framework 4.5 IIS Web Server IIS Default Document IIS Directory Browsing IIS HTTP Errors IIS Static Content IIS HTTP Redirection IIS HTTP Logging IIS

More information

Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c

Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c This document describes how to set up Oracle Enterprise Manager 12c to monitor

More information

MassTransit vs. FTP Comparison

MassTransit vs. FTP Comparison MassTransit vs. Comparison If you think is an optimal solution for delivering digital files and assets important to the strategic business process, think again. is designed to be a simple utility for remote

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

Table of Contents. Introduction

Table of Contents. Introduction viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification

More information

GlobalProtect Features

GlobalProtect Features GlobalProtect Features Palo Alto Networks PAN-OS New Features Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Hosting topology SMS PASSCODE 2015

Hosting topology SMS PASSCODE 2015 Hosting topology SMS PASSCODE 2015 Hosting Topology In a hosting environment, you have a backend and a several front end (clients). In the example below, there is a backend at the right side. At the left

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk

More information

15 Organisation/ICT/02/01/15 Back- up

15 Organisation/ICT/02/01/15 Back- up 15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional

More information

ETPG6 Five Low-Cost Security Takeaways 8/21 (Thursday) @ 3:30pm Governor s Ballroom CD. Presented by Jerry Askew, Eric Richards & Kevin Svec

ETPG6 Five Low-Cost Security Takeaways 8/21 (Thursday) @ 3:30pm Governor s Ballroom CD. Presented by Jerry Askew, Eric Richards & Kevin Svec ETPG6 Five Low-Cost Security Takeaways 8/21 (Thursday) @ 3:30pm Governor s Ballroom CD Presented by Jerry Askew, Eric Richards & Kevin Svec Presenters: Jerry Askew, Eric Richards & Kevin Svec Five Low-Cost

More information

Technology Partners. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009.

Technology Partners. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009. We create innovative software solutions for SharePoint, Office 365, MS Windows Remote Desktop Services, and

More information

Implementing and Administering an Enterprise SharePoint Environment

Implementing and Administering an Enterprise SharePoint Environment Implementing and Administering an Enterprise SharePoint Environment There are numerous planning and management issues that your team needs to address when deploying SharePoint. This process can be simplified

More information

GOOGLE MOBILE ANALYTICS INTEGRATION. JANUARY 2013 (App version 3.0.8 onwards)

GOOGLE MOBILE ANALYTICS INTEGRATION. JANUARY 2013 (App version 3.0.8 onwards) GOOGLE MOBILE ANALYTICS INTEGRATION JANUARY 2013 (App version 3.0.8 onwards) What is Google Mobile Analytics? Google Mobile Analytics is a service to show how users interact with their websites and mobile

More information

Verizon Firewall. 1 Introduction. 2 Firewall Home Page

Verizon Firewall. 1 Introduction. 2 Firewall Home Page Verizon Firewall 1 Introduction Verizon Firewall monitors all traffic to and from a computer to block unauthorized access and protect personal information. It provides users with control over all outgoing

More information

Transparent Inline Filter (Recommended) - Figure 1 - -

Transparent Inline Filter (Recommended) - Figure 1 - - ently identify the user using their Active Directory credentials. Transparent Inline Filter (Recommended) Figure 1 FailSafe Bypass Interfaces are available. (Optional FailSafe and Fiber available) Figure

More information

Oracle BI Discoverer Administrator 11g: Develop an EUL

Oracle BI Discoverer Administrator 11g: Develop an EUL Oracle BI Discoverer Administrator 11g: Develop an EUL Volume I Student Guide D60283GC10 Edition 1.0 February 2010 D65281 Author Lea Shaw Technical Contributors and Reviewers Praveen Deshpande Kumar Dhanagopal

More information

Security. AAA Identity Management. Premdeep Banga, CCIE #21713. Cisco Press. Vivek Santuka, CCIE #17621. Brandon J. Carroll, CCIE #23837

Security. AAA Identity Management. Premdeep Banga, CCIE #21713. Cisco Press. Vivek Santuka, CCIE #17621. Brandon J. Carroll, CCIE #23837 AAA Identity Management Security Vivek Santuka, CCIE #17621 Premdeep Banga, CCIE #21713 Brandon J. Carroll, CCIE #23837 Cisco Press 800 East 96th Street Indianapolis, IN 46240 ix Contents Introduction

More information

WebEx Meeting Center User Guide

WebEx Meeting Center User Guide WebEx Meeting Center User Guide For Hosts, Presenters, and Attendees 8.17 Copyright 1997 2010 Cisco and/or its affiliates. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the Cisco

More information

Experian Secure Transport Service

Experian Secure Transport Service Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport

More information

Junos WebApp Secure 5.0.0-10 (formerly Mykonos)

Junos WebApp Secure 5.0.0-10 (formerly Mykonos) Junos WebApp Secure 5.0.0-10 (formerly Mykonos) Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net April, 2013 Juniper Networks, Inc.

More information

Advanced Install & Configuration Guide

Advanced Install & Configuration Guide Advanced Install & Configuration Guide This document details advanced installation and configuration options for Layer8 software agents. Delivered as standard MSI packages, Layer8 deployment can be made

More information

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Websense Support Webinar April 2013 TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 Presenter Greg

More information

vcenter Lifecycle Manager

vcenter Lifecycle Manager vcenter Lifecycle Manager USER MANUAL for LCM Tech Requester Computer Services Centre, IIT Delhi OVERVIEW VMware vcenter Lifecycle Manager (LCM) automates the process of creating virtual machines and removing

More information

Security Information/Event Management Security Development Life Cycle Version 5

Security Information/Event Management Security Development Life Cycle Version 5 Security Information/Event Management Security Development Life Cycle Version 5 If your enterprise is like most, you are collecting logs from most every device with security relevance. The flood of events

More information

Social Network for Monitoring Behavior Change

Social Network for Monitoring Behavior Change Social Network for Monitoring Behavior Change Senior Design Group 11 Client: Yolanda Coil Advisor: Simanta Mitra Team #11: Gavin Monroe Nicholas Schramm Davendra Jayasingam Executive Summary This project

More information

Office 365. Migrating and Managing Your. Business in the Cloud. Matthew Katzer. Don Crawford

Office 365. Migrating and Managing Your. Business in the Cloud. Matthew Katzer. Don Crawford Office 365 Migrating and Managing Your Business in the Cloud Matthew Katzer Don Crawford Contents About the Authors About the Technical Reviewers Acknowledgments Introduction xxi xxiii xxv xxvii Chapter

More information

To learn more about this book, visit Microsoft Learning

To learn more about this book, visit Microsoft Learning To learn more about this book, visit Microsoft Learning http://www.microsoft.com/mspress/books/9804.aspx Table of Contents Acknowledgments..............................................................

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks

More information

inet Enterprise Features Fact Sheet

inet Enterprise Features Fact Sheet 2007 inet Enterprise Features Fact Sheet inetmon Sdn. Bhd. 1010 & 1011, Tingkat 10 Blok D, Dataran Usahawan Kelana,17, Jalan SS 7/26, Kelana Jaya, 47301 Petaling Jaya, Selangor Darul Ehsan Tel: 603-7880

More information

DOCUMENTATION FILE RESTORE

DOCUMENTATION FILE RESTORE DOCUMENTATION Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication may be reproduced, transmitted, transcribed,

More information

Dashboard. Leading from the front in social wifi.

Dashboard. Leading from the front in social wifi. Analytics by Dashboard WiFi users past 30 days Gender breakdown for WiFi users Users online Average usage duration of user Repeat vs. new user Users timeline Users age breakdown User demographics Social

More information

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access [ W H I T E P A P E R ] Written by e-dmz Security, LLC April 2007 Achieving PCI Compliance A White Paper by e-dmz Security,

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information