Using Secure4Audit in an IRIX 6.5 Environment
|
|
- Cameron Hawkins
- 7 years ago
- Views:
Transcription
1 Using Secure4Audit in an IRIX 6.5 Environment Overview... 3 Icons... 3 Installation Reminders... 4 A Very Brief Overview of IRIX System auditing... 5 Installing System Auditing... 5 The System Audit Directories... 6 Additional Reading... 6 Secure4Audit in an IRIX environment... 7 Notes on Secure4Audit Usage... 8 What to Do in Case of System Panic... 8 Restoring the Audit State... 9 Recovering from Single-User Mode... 9 Trusted IRIX/B Menu Program Hints Menu Program Security Start auditing at bootup Monitoring Audit Events Switch System Audit Files Behavior Auditing Users Configuration Options auditguard Users... 15
2 NOTICE As Secure4Audit is a software product which is subject to change, S4Software, Inc. reserves the right to make changes in the specifications and other information contained in this document, without prior notice. While S4Software, Inc. has made every effort to ensure the accuracy and completeness of this document, S4Software, Inc. cannot be held liable for any errors or omissions. No information contained in this document shall be deemed to be a warranty for any purpose whatsoever. Copyright (c) S4Software, Inc Secure4Audit is a trademark of S4Software, Inc. Unix is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company Ltd. The X Window System is a trademark of Massachusetts Institute of Technology. RESTRICTED RIGHTS LEGEND Use, duplication or disclosure by the Government is subject to restrictions as set forth in subprogram (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at subparagraph DFARS S4Software, Inc Convoy Ct. San Diego, CA Phone: (858) Fax: (858) support@s4software.com
3 Secure4Audit for Irix Overview The intent of this document is to specify how Secure4Audit works in an IRIX 6.5 environment. However, because Secure4Audit requires IRIX system auditing to be installed, it is necessary to understand how IRIX 6.5 auditing works before it is possible to understand how Secure4Audit interacts in that environment. For this reason, the basics of system auditing on an IRIX system are discussed, followed with suggestions on finding additional information. This section can be skipped if the reader is familiar with initializing and configuring auditing on an IRIX system. Icons Important This symbol is placed in the margin with important information, cautions, and warnings Note This symbol is placed in the margin with additional, but non-imperative information on that function. OS Specific This symbol is used to highlight features that are specific to particular Operating Systems. The notation will include the particular operating systems affected. Secure4Access This symbol is used to highlight information that is pertinent to Secure4Access users. Next Page This symbol is placed in the bottom margin to indicate more information can be found on the following page. Documentation This symbol is placed in the margin when a reference is made to either another section of the current Secure4Audit document or another document.
4 4 Secure4Audit for Irix 6.5 Installation Reminders It is important to read the OS specific section of the installation instructions (S4Audit_Install_2.2.pdf) to insure all steps have been taken and that you are aware of changes that were made on your system.
5 Secure4Audit for Irix A Very Brief Overview of IRIX 6.5 System Auditing Installing System Auditing IRIX system auditing is not installed by default. This must be completed prior to installing the Secure4Audit software. Refer to Enabling Auditing in the IRIX Administration Manual Backup, Security and Accounting. Once the IRIX auditing package has been installed IRIX requires that the system be re-booted. If Secure4Audit will be installed on this system it is NOT necessary to perform any of the other tasks described in the Enabling Auditing document. The System Audit Daemon satd, the IRIX system audit daemon, starts on system boot when the command /etc/chkconfig audit indicates that auditing is on. To check this setting use the command /sbin/chkconfig grep audit. satd may also be started by calling the /etc/init.d/audit start command. satd is started by the user auditor. When auditing is on, satd reads the contents of the file /etc/config/sat_select.options to determine what events are to be audited (events are such occurrences as user logins, file accesses, process execution and many more). If /etc/config/sat_select.options does not exist, a default set of audit events are loaded by the audit initialization script (/etc/init.d/audit). Secure4Audit sets these options for the system administrator, so it is not necessary to edit this file directly if Secure4Audit is in use. NOTE: To stop system auditing use the /etc/init.d/audit stop command. NEVER kill satd. If satd is inadvertently stopped the system will switch to Single-User Mode immediately. See the Secure4Audit Notes section later in this document for advice on handling system panic and recovery from Single-User Mode. The System Audit Files When satd detects that a selected event has occurred, it writes a record (which includes the event, the date and time of event, the process ID and any other applicable information) to its audit log. By default the audit logs are created in the /var/adm/sat directory and are named sat_<4 digit year><2 digit month><day of month><24 hour time>. For example, an audit file created by satd on March 22, 2005 at 4:38 in the afternoon would be named sat_ These files are owned by auditor, the account which starts the auditing process. The auditing system on IRIX provides a utility for viewing these raw audit files called
6 6 Secure4Audit for Irix 6.5 sat_select. If Secure4Audit is in use, this utility is not needed. The System Audit Directories The audit directories specified must be owned by auditor, the account which starts the auditing process. Once an audit file reaches a size internally defined by IRIX, the current audit file is closed and a new file created in the same directory. It is possible to configure IRIX to recognize alternate directories to which audit files may be written. Normally alternate directories reside on separate filesystems. This provides a method to continue auditing if the current filesystem is full. IMPORTANT: There are several conditions related to system auditing which cause IRIX to switch to Single-User Mode. One of those conditions is the absence of available filesystem space. It is VERY IMPORTANT to monitor filesystem space usage and move or delete audit files as required, to maintain adequate filesystem space. If Secure4Audit is in use, it monitors filesystem space usage and STOPS auditing before it reaches a critical level to prevent IRIX from switching to Single-User Mode. For information on what to do if IRIX threatens system panic (a message something like the following: panic 13 Sep 5 10:11:39 <hostname> satd Satd recovery failure! System will probably hang soon.) see the What to Do in Case of System Panic section later in this document. Additional Reading For additional information on IRIX system auditing, refer to the IRIX System Administration Manual Backup, Security and Accounting called Administering the System Audit Trail. Also, the following system man pages may be helpful: audit audit_filters satd
7 Secure4Audit for Irix Secure4Audit in an IRIX environment Secure4Audit must be run on IRIX or above due to some auditing limitations with versions before In environments that use Secure4Audit, once IRIX auditing has been installed it is not necessary for the administrator to be concerned with the IRIX configuration files and tools. Secure4Audit acts as an interface for not only setting the requirements for configuring, running and monitoring system auditing, but as a filter, real-time alert mechanism, archiver and reporting tool as well. removefile storeall The administrator creates an Secure4Audit profile using the Secure4Audit GUI or Character-Based menu program. Auditing is started using this menu program or via an Secure4Audit initialization script. The audit profile is used to load the necessary configurations for satd and the Secure4Audit daemons. The Secure4Audit monitor daemon (s4auditmon) reads the information written to the IRIX raw audit file (satd_<date/time stamp>) and writes it s own records to the Secure4Audit combined log file (secure4.clg.<date/time stamp>). It is this methodology that allows greater flexibility in the filtration of audit records. Only those records which were deemed important enough in the Secure4Audit audit profile are written to the Secure4Audit combined log file. If a satd file is closed and a new one started, Secure4Audit deletes the old satd file. This helps maintain the necessary filesystem space required by IRIX If a security policy prohibits deletion of raw audit files, it is possible to configure Secure4Audit to leave old copies intact (see the Trusted IRIX/B section later in this document). Secure4Audit provides a method to instruct satd to close its current file and start a new one. In this version of Secure4Audit, if alternate raw audit directories are specified in the Secure4Audit audit profile, this causes satd to start the new raw audit log in the next available alternate directory. Requests of this type cause the files to be opened in the alternate directories in a rotation-like manner.
8 8 Secure4Audit for Irix 6.5 Notes on Secure4Audit Usage This section provides helpful information on Secure4Audit behavior on an IRIX system and tips for use in that environment. For more general information on Secure4Audit, refer to S4Audit_Manual_2.2.pdf. What to Do in Case of System Panic If Secure4Audit is in use on the system, this situation should not occur, however, if satd or its files are manually changed certain conditions (listed below) can cause system panic. When the system panics, IRIX sends a message to the console and any terminal windows warning users of the impending switch: panic 13 Sep 5 10:11:39 <hostname> satd Satd recovery failure! System will probably hang soon Using Secure4Audit to Stop Auditing If Secure4Audit is in use on the system, use Secure4Audit to stop system auditing immediately. /bin/secure4/s4audit -audit -stop Auditing can also be stopped from the Secure4Audit menu program if it is available. Use System --> Disable Auditing. This will stop satd if it is running and place auditing in an off state. Using System Commands to Stop Auditing If Secure4Audit is not in use, use the system audit start/stop script to halt auditing immediately. /etc/init.d/audit stop AND instruct the system to turn auditing off until the cause for the panic is found and corrected: /etc/chkconfig audit off It is important to act on the system panic message immediately. IRIX only provides approximately 10 seconds warning before switching into Single-User Mode. Halting auditing quickly and correctly should be sufficient to prevent the system from switching into Single-User Mode.
9 Secure4Audit for Irix Restoring the Audit State Once auditing has been disabled and the panic stopped, the administrator should determine what caused the panic before attempting to restart auditing. If Secure4Audit is in use, most likely the panic was caused by an inadvertent termination of satd, since Secure4Audit attempts to protect against other possible causes. It may not be possible to prove this to be the case, but other causes can be ruled out. No available filesystem space Secure4Audit monitors filesystem space and terminates auditing before satd can panic. By default, Secure4Audit also removes old raw audit files after they have been closed and Secure4Audit has finished scanning them. However, filesystem space checks should be done. If filesystem space is limited, remove old raw audit files if permitted (The possible locations for these files is specified in the audit profile in the Primary audit directory, Second Audit Directory and Third Audit Directory fields) and tar and compress old secure4.clg files if not needed. Also, any /sat/satd/emergency.<n> file(s) should be removed. Non-existent or unreachable raw audit file path(s) If satd cannot determine where to write audit records it panics. Secure4Audit verifies all path information before passing it to satd. However, the system file /etc/config/satd.options may have been manually changed. If auditing will be restarted using Secure4Audit, this is not a concern, Secure4Audit overwrites the contents of this file. If system auditing is to be restarted manually, validate path or filenames listed in this file. The paths must exist and be accessible by the auditor account. In addition, the filesystem on which they reside must have adequate space. Recovering from Single-User Mode In the event the system panics and enters Single-User Mode, the administrator needs to determine what caused the system to panic before auditing can be restarted. Unfortunately, auditing is normally configured to start on boot, and once the administrator exits Single-User Mode all the system boot scripts are executed. Secure4Audit provides an easy way to change the state of auditing without having to mount filesystems. Note that this is only available if the system /etc/init.d/audit script was altered to use Secure4Audit. Changing the audit state prior to exiting Single-User Mode will prevent any pre-configured Secure4Audit start-up script from being executed. This way the administrator can quickly return the system to multi-user mode and then determine what caused the
10 10 Secure4Audit for Irix 6.5 system to panic. If Secure4Audit is in use on the system, then the following command should be executed prior to exiting Single-User Mode: /etc/chkconfig s4audit off Once this has been done, it should be safe to exit Single-User Mode. Upon return to multi-user, the administrator should determine the cause of system panic prior to attempting to restart auditing. Suggestions on items to investigate are listed in the previous section, Restoring Auditing. Specific information on operating in Single-User Mode can be found in the IRIX Administration Manual in the System Configuration and Operations chapter. Trusted IRIX/B Secure4Audit does not collect Mandatory Access Control Label events (i.e. MAC labels) in an IRIX Trusted environment. The uname -a command indicates whether Trusted Mode is enabled. Menu Program Security To run the Secure4Audit menu program the system administrator must have an effective UID of 0 and the Security Manager privilege set in their account profile. In order to allow the user to run the menu program for the first time, S4Software supplies an account profile for the root with the Security Manager privilege set. To assign the Security manager privilege to non-root administrators, an account profile must be created for them using the Secure4Audit menu program. If you are unable to log in directly as root to run the menu program, contact your S4Software representative for assistance. From the Accounts menu, select Create an account profile. Click on the user accounts. button to view a list of Select the administrator account name from the list. Note the account information is automatically displayed. Click on the box next to Security manager to change the value to Yes.
11 Secure4Audit for Irix Click OK to save the profile. The administrator may now log in as themselves, su (su -) to root, and run the Secure4Audit menu program. Refer to chapter 6C (GUI) or 8C (character-based menu) of the Secure4Audit reference manual for more information on creating an account profile. Menu Program Hints guitips Full on-line help is available with the GUI version. Chapter 5 of the Secure4Audit reference manual (S4Audit_Manual_2.2.pdf) describes the use of the F1 key to access the context sensitive help. On some keyboards it may be necessary to use the Help key instead of the F1 key. The Secure4Audit menu program also includes pop-up help by default that allow you to see help text simply by placing the cursor in a text field. Start auditing at bootup To allow Secure4Audit to start auditing at bootup, there are a few system files that will need to be modified. Please read the following instructions carefully and contact your S4Software representative if you have any questions. An audit profile must be created before auditing may be enabled at bootup on the system. Refer to the S4Audit_GettingStarted document f and the Secure4Audit reference manual or helpful hints on creating an audit profile. auditguard users refer to section labeled auditguard Users for instruction on modifying the audit startup script if it was modified when auditguard was installed. 1) Replace the system audit startup script: USE COPY TO PRESERVE THE LINKS TO OTHER SYSTEM SCRIPTS! % cd /etc/init.d % cp -p audit audit.pre_s4 % cp -p /bin/secure4/scripts/audit.s4.irix./audit
12 12 Secure4Audit for Irix 6.5 2) Edit s4audit.cfg to add the defaultprofile configuration option to specify which audit profile should be loaded at bootup. Format is defaultprofile=<profile name>. % cd /bin/secure4 % vi s4audit.cfg % defaultprofile=profile name Example: defaultprofile=sys_audit 3) Ensure the /etc/inittab file contains an entry for the Secure4Audit monitor (s4auditmon) to allow it to be started during bootup and to respawn if it terminates. % cd /etc % grep s4md inittab If the /etc/inittab file already contains a valid entry for s4auditmon, the above command will return: s4md:1234:respawn:/bin/secure4/s4audit.dir/s4auditon >/bin/secure4/s4auditmon.err 2>&1 Otherwise, add the entry using the text file included with the Secure4Audit release: % cd /etc % cp -p inittab inittab.pre_s4 % cat /bin/secure4/s4audit.dir/install/s4am.inittab.txt >> inittab If the system cannot be rebooted at this time, the inetd process must be notified of the change to the /etc/inittab file to start the s4auditmon process: % init q 4) Verify the monitor process is now running: % cd /bin/secure4 % s4audit -monitor -status
13 Secure4Audit for Irix If the monitor was started correctly, the above command will return: logdirprm logdiralt Audit monitor active since: date time (dd-mmm-yy hh:mm) Current audit profile: audit profile Primary audit log directory: /usr/secure4/secure4.clg Current audit log file: /usr/secure4/secure4.clg/secure4.clg.datetime Current raw audit file: path to raw audit trail file Audit record archiving status Level for Store/Fail/Alarm: 5/10/15 /bin/secure4/documents: S4Audit_GettingStarted.pdf S4Audit_Manual_2.2.pdf 5) If the system is not going to be rebooted at this time, enable auditing using Secure4Audit to begin monitoring events. With the defaultprofile defined in the Secure4Audit configuration file you can use the command line arguments to start auditing without needing to specify an audit profile. % cd /bin/secure4 %./s4audit -audit -start You may also use the GUI or character-based menu to enable auditing. Refer to the S4Audit_GettingStarted document or the Secure4Audit reference manual for more information on enabling auditing. Monitoring Audit Events Because it is not possible to prevent self-auditing on IRIX systems if any of the events under the Object Events tab or the Process Control Events tab of the Secure4Audit profile are selected, there will be a tremendous amount of data generated which will cause excessive CPU usage. As noted in the section of this document on IRIX auditing, this can be a condition that will lead to IRIX switching to Single-User Mode. Secure4Audit attempts to protect against this be preventing auditing of File write and File read events and only allowing unsuccessful File open events from being monitored. The Secure4Audit monitor (s4auditmon) will also eliminate all audit events which are generated by itself, which prevents that data from being reported to its audit trail file (secure4.clg). This does not, however, prevent the data from being written to the system audit files which means there is still a large risk of running out of filesystem space.
14 14 Secure4Audit for Irix 6.5 It is therefore recommended that the items under the Object Events and Process Control Events tabs of the Secure4Audit profile not be selected for auditing. To monitor password change events you must select the Modify Account event under the Account and group events tab. The level must be set equal to or greater than the appropriate threshold level. Switch System Audit Files Behavior The Secure4Audit menu program option, Switch System Audit Files causes a directory change. The current file is closed and a new file started in the next available directory (listed in the Secure4Audit audit profile as the Secondary audit directory or Third audit directory). Auditing Users IRIX audits all users. It is not necessary (or possible) to instruct IRIX to only audit specific users. Therefore, the Audit account profile option in the Secure4Audit account profile is not relevant on IRIX systems.
15 Secure4Audit for Irix Secure4Access users with invalid login checking enabled should set removefile to n to prevent any issues that could occur with the server process not being able to read the audit trail file. Caution should be used, however, to monitor the file system space. Configuration Options The following options should be considered when configuring Secure4Audit on an Irix system. defaultprofile=<audit profile name> This option specifies the default profile name that may be used when enabling auditing from the command line (/bin/secure4/s4audit -audit -start), or if using a script during bootup that executes the command line -start switch. There is no default value for this option. logout=y or n By default, (n), no event script is executed for log out events when access methods are being monitored. Setting this option to y will allow the event script for the corresponding login event to be executed when the logout occurs removefile=y or n By default, (y), to prevent the system audit trail files from filling up system disk space, s4auditmon will remove the system audit trail file when it has finished processing the information and is ready to process the next file. To prevent the removal of system audit trail files, set this option to n. Please refer to Appendix A of the Secure4Audit Reference Manual for more information on configuration options. auditguard users As noted in the installation instructions, if auditguard was configured to start auditing at system bootup, the Secure4Audit installation will rename the /etc/config/dlxaudit file to /etc/config/s4audit. The audit start up script that is included with the Secure4Audit release was available with auditguard on a per-request basis. If you did not install the modified version of the /etc/init.d/audit start script with auditguard, then follow the steps outlined in the section labeled Start auditing at bootup. If there is a modified version of the audit script that was used for auditguard, no further action needs to be taken to allow Secure4Audit to now start auditing. The files are the same.
16 THIS PAGE INTENTIONALLY LEFT BLANK
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationAttix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
More informationNetBackup Backup, Archive, and Restore Getting Started Guide
NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.
More informationNovaBACKUP Network User s Guide
NovaBACKUP Network User s Guide NovaStor / January 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change
More informationVERITAS NetBackup 6.0
VERITAS NetBackup 6.0 Backup, Archive, and Restore Getting Started Guide for UNIX, Windows, and Linux N15278C September 2005 Disclaimer The information contained in this publication is subject to change
More informationYosemite Server Backup User s Guide
Yosemite Server Backup User s Guide Part number: First edition: October 2010 Legal and notice information Copyright 2004, 2012 Barracuda Networks, Inc. Under copyright laws, the contents of this document
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationThe safer, easier way to help you pass any IT exams. Exam : 9L0-518. OS X Server Essentials 10.8 Exam. Title : Version : Demo 1 / 6
Exam : 9L0-518 Title : OS X Server Essentials 10.8 Exam Version : Demo 1 / 6 1.In Server app, which procedure will configure OS X Server to let members of a specific group use the Messages service? A.
More informationIBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
More informationChapter 25 Backup and Restore
System 800xA Training Chapter 25 Backup and Restore TABLE OF CONTENTS Chapter 25 Backup and Restore... 1 25.1 General Information... 2 25.1.1 Objectives... 2 25.1.2 Legend... 2 25.1.3 Reference Documentation...
More informationTime Stamp. Instruction Booklet
Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used
More informationYosemite Server Backup User s Guide
Yosemite Server Backup User s Guide Part number: First edition: October 2010 Legal and notice information Copyright 2004, 2012 Barracuda Networks, Inc. Under copyright laws, the contents of this document
More informationEmbarcadero Performance Center 2.7 Installation Guide
Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.
More informationUsing Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
More informationAvaya Network Configuration Manager User Guide
Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information
More informationCA arcserve Unified Data Protection Agent for Linux
CA arcserve Unified Data Protection Agent for Linux User Guide Version 5.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as
More informationChromQuest 5.0 Chromatography Data System
ChromQuest 5.0 Chromatography Data System Administrator Guide CHROM-97251 Revision A March 2008 2008 Thermo Fisher Scientific Inc. All rights reserved. Surveyor is a registered trademark of Thermo Fisher
More informationXcalibur. Foundation. Administrator Guide. Software Version 3.0
Xcalibur Foundation Administrator Guide Software Version 3.0 XCALI-97520 Revision A May 2013 2013 Thermo Fisher Scientific Inc. All rights reserved. LCquan, Watson LIMS, and Web Access are trademarks,
More informationBrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Serverless Backup Option Guide r11.5 D01182-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the
More informationSymantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5
Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished
More informationFileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
More informationYosemite Server Backup Installation Guide
Yosemite Server Backup Installation Guide Part number: First edition: October, 2010 Legal and notice information Copyright 2004, 2012 Barracuda Networks, Inc. Under copyright laws, the contents of this
More informationCA XOsoft Replication for Windows
CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the
More informationSIOS Protection Suite for Linux v8.3.0. Postfix Recovery Kit Administration Guide
SIOS Protection Suite for Linux v8.3.0 Postfix Recovery Kit Administration Guide July 2014 This document and the information herein is the property of SIOS Technology Corp. (previously known as SteelEye
More informationPortions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
More informationAcronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
More informationSophos Anti-Virus for Mac OS X: Home Edition Help
Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
More informationStarWind iscsi SAN Software: Using an existing SAN for configuring High Availability storage with Windows Server 2003 and 2008
StarWind iscsi SAN Software: Using an existing SAN for configuring High Availability storage with Windows Server 2003 and 2008 www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT
More informationStarWind iscsi SAN Software: Using StarWind with VMware ESX Server
StarWind iscsi SAN Software: Using StarWind with VMware ESX Server www.starwindsoftware.com Copyright 2008-2010. All rights reserved. COPYRIGHT Copyright 2008-2010. All rights reserved. No part of this
More informationInstalling F-Secure Anti-Virus (FSAV) Table of Contents. FSAV 8.x and FSLS 7.x End of Life. FSAV 9.x and FSLS 9.x End of Life
Installing F-Secure Anti-Virus (FSAV) Last update: 15 Jul 2015 Please see also the LISTSERV/F-Secure FAQ for further information. Table of Contents FSAV 4.x, 5.x and 7.x End of Life FSAV 8.x and FSLS 7.x
More informationAcronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
More informationShutting down / Rebooting Small Business Server 2003 Version 1.00
Shutting down / Rebooting Small Business Server 2003 Version 1.00 Need to Know TM It may be necessary at some stage of the life of Small Business Server 2003 that it be shutdown or rebooted. In many cases
More informationBackup and Recovery Procedures
CHAPTER 10 This chapter provides Content Distribution Manager database backup and ACNS software recovery procedures. This chapter contains the following sections: Performing Backup and Restore Operations
More informationSAM Server Utility User s Guide
SAM Server Utility User s Guide Updated May 2012 Copyright 2010, 2012 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. PDF0157 (PDF) SCHOLASTIC, READ 180, SYSTEM 44, SCHOLASTIC EXPERT
More informationSophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
More informationStarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection
StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright
More informationfor the VaultDR Online Plugin for Linux-based Operating Systems
Redefining Data Protection Title Page User s Guide for the VaultDR Online Plugin for Linux-based Operating Systems NVE 7009-36B 01/19-07 Copyrights NetVault:Backup - User s Guide for the VaultDR Online
More informationCommon SofTest Troubleshooting Techniques
Black Screen and Internet Restoration (Windows) On the rare occasion that SofTest Windows experiences an abnormality either during or immediately following an exam, it may not be capable of automatically
More informationIntroduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
More informationBackup Agent Plug-in. Installation Manual. Theater Management Suite
Backup Agent Plug-in Installation Manual Theater Management Suite R59770810/00 06/11/2012 Barco nv Entertainment Division Noordlaan 5, B-8520 Kuurne Phone: +32 56.36.82.11 Fax: +32 56.36.883.86 Support:
More informationDell NetVault Bare Metal Recovery for Dell NetVault Backup Server 10.5. User s Guide
Dell NetVault Bare Metal Recovery for Dell NetVault Backup Server 10.5 User s Guide Copyright 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
More informationCA VPN Client. User Guide for Windows 1.0.2.2
CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
More informationMac OS X Server Migration Guide
Mac OS X Server Migration Guide Includes detailed instructions for upgrading to Mac OS X Server from AppleShare IP, Macintosh Manager, and Mac OS X Server 1.2 K Apple Computer, Inc. 2001 Apple Computer,
More informationCA ARCserve Replication and High Availability for Windows
CA ARCserve Replication and High Availability for Windows Microsoft SQL Server Operation Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation")
More informationAdministering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012
Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that
More informationDocument Management System
Document Management System User's Manual for Administrator www.microtek.com Preface Copyright Copyright 2013, Microtek International, Inc., all rights reserved. This document may not be reproduced or copied
More informationREADYNAS INSTANT STORAGE. Quick Installation Guide
READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux
More informationBacking up and restoring HP Systems Insight Manager 6.0 or greater data files in a Windows environment
Technical white paper Backing up and restoring HP Systems Insight Manager 6.0 or greater data files in a Windows environment Table of contents Abstract 2 Introduction 2 Saving and restoring data files
More informationAttix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks
More informationStarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No
More informationMatisse Installation Guide for MS Windows. 10th Edition
Matisse Installation Guide for MS Windows 10th Edition April 2004 Matisse Installation Guide for MS Windows Copyright 1992 2004 Matisse Software Inc. All Rights Reserved. Matisse Software Inc. 433 Airport
More informationSophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X version 10.4 or later Product version: 8 Document date: April 2012 Contents 1 About Sophos Anti-Virus...3 2 Scanning
More informationHow To Backup a SmartCenter
How To Backup a SmartCenter 6 April 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing
More informationVMware vcenter Configuration Manager Backup and Disaster Recovery Guide vcenter Configuration Manager 5.4.1
VMware vcenter Configuration Manager Backup and Disaster Recovery Guide vcenter Configuration Manager 5.4.1 This document supports the version of each product listed and supports all subsequent versions
More informationQACenter Installation and Configuration Guide. Release 4.4.2
QACenter Installation and Configuration Guide Release 4.4.2 ii Please direct questions about QACenter or comments on this document to: QACenter Technical Support Compuware Corporation 31440 Northwestern
More informationYubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015
YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,
More information4013779 Rev C. DBDS Backup and Restore Procedures For System Release 2.2 Through 4.3
4013779 Rev C DBDS Backup and Restore Procedures For System Release 2.2 Through 4.3 Please Read Important Please read this entire guide. If this guide provides installation or operation instructions,
More information4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
More informationAutomated Database Backup. Procedure to create an automated database backup using SQL management tools
Automated Database Backup Procedure to create an automated database backup using SQL management tools Genetec Technical Support 6/29/2009 Notice This manual, and the software that it describes, is provided
More informationGetting Started. Backup Repositories. Getting Started 1/6
Getting Started 1/6 Getting Started The Server Backup application enables you to backup and restore data that is stored on the OmniVista server. You can specify that a backup be performed immediately,
More informationSupport Document: Microsoft SQL Server - LiveVault 7.6X
Contents Preparing to create a Microsoft SQL backup policy... 2 Adjusting the SQL max worker threads option... 2 Preparing for Log truncation... 3 Best Practices... 3 Microsoft SQL Server 2005, 2008, or
More informationInstalling LearningBay Enterprise Part 2
Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay
More informationMANAGED SOFTWARE CENTER USER S GUIDE
U N I V E R S I T Y O F S O U T H E R N C A L I F O R N I A MANAGED SOFTWARE CENTER USER S GUIDE JANUARY 2015 U N I V E R S I T Y O F S O U T H E R N C A L I F O R N I A 2015 UNIVERSITY OF SOUTHERN CALIFORNIA.
More informationAdministration and Business Collaboration. User Manual
Administration and Business Collaboration User Manual Copyright 2007 by Eurekify Ltd., 8 Hasadna Street Raanana 43651, ISRAEL. All Rights Reserved. This document maybe used in its complete form only and
More informationShellshock Security Patch for X86
Shellshock Security Patch for X86 Guide for Using the FFPS Update Manager October 2014 Version 1.0. Page 1 Page 2 This page is intentionally blank Table of Contents 1.0 OVERVIEW - SHELLSHOCK/BASH SHELL
More informationInstallation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
More informationDiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
More informationUse QNAP NAS for Backup
Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information
More informationDell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationBSDI Advanced Fitness & Wellness Software
BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the
More informationPersonal Call Manager User Guide. BCM Business Communications Manager
Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008
More informationTable of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
More informationSQL Server Setup for Assistant/Pro applications Compliance Information Systems
SQL Server Setup for Assistant/Pro applications Compliance Information Systems The following document covers the process of setting up the SQL Server databases for the Assistant/PRO software products form
More informationSystem 800xA Tools. System Version 5.1. Power and productivity for a better world TM
System 800xA Tools System Version 5.1 Power and productivity for a better world TM System 800xA Tools System Version 5.1 NOTICE This document contains information about one or more ABB products and may
More informationConfigure Cisco Emergency Responder Disaster Recovery System
Configure Cisco Emergency Responder Disaster Recovery System Disaster Recovery System overview, page 1 Backup and restore procedures, page 2 Supported features and components, page 4 System requirements,
More informationMonitor Print Popup for Mac. Product Manual. www.monitorbm.com
Monitor Print Popup for Mac Product Manual www.monitorbm.com Monitor Print Popup for Mac Product Manual Copyright 2013 Monitor Business Machines Ltd The software contains proprietary information of Monitor
More informationSynthetic Monitoring Scripting Framework. User Guide
Synthetic Monitoring Scripting Framework User Guide Please direct questions about {Compuware Product} or comments on this document to: APM Customer Support FrontLine Support Login Page: http://go.compuware.com
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationCA Nimsoft Monitor. Probe Guide for CA ServiceDesk Gateway. casdgtw v2.4 series
CA Nimsoft Monitor Probe Guide for CA ServiceDesk Gateway casdgtw v2.4 series Copyright Notice This online help system (the "System") is for your informational purposes only and is subject to change or
More informationVirtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
More informationUSER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
More informationUser Bulletin. 8200 Cellular Detection System Analysis Software v4.0. Introduction. 21 CFR Part 11 Software Console - Administrators Guide
. User Bulletin 8200 Cellular Detection System Analysis Software v4.0 August 14, 2007 SUBJECT: 21 CFR Part 11 Software Console - Administrators Guide In This User Bulletin This user bulletin covers: Introduction.......................................................
More informationBackup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationSymantec System Recovery 2013 Management Solution Administrator's Guide
Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a
More informationHP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide
HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management
More informationIBM Sterling Control Center
IBM Sterling Control Center System Administration Guide Version 5.3 This edition applies to the 5.3 Version of IBM Sterling Control Center and to all subsequent releases and modifications until otherwise
More informationVess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.
Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before
More informationORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01
ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part
More informationCA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Sybase Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationFileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Disaster Recovery Guide Table of contents Overview... 2 General recovery process... 2 Recovering the HPDM Server... 5 Backing up the data... 5 Installing the
More informationInstallation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L
Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L Introduction: This guide is written to help any person with little knowledge in AIX V5.3L to prepare the P Server
More informationCA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Sybase Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationCA ARCserve D2D for Linux
CA ARCserve D2D for Linux User Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
More informationFalconStor Recovery Agents User Guide
FalconStor Recovery Agents User Guide FalconStor Software, Inc. 2 Huntington Quadrangle Melville, NY 11747 Phone: 631-777-5188 Fax: 631-501-7633 Web site: www.falconstor.com Copyright 2007-2009 FalconStor
More informationBrightStor ARCserve Backup for Linux
BrightStor ARCserve Backup for Linux Agent for MySQL Guide r11.5 D01213-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's
More informationRealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
More informationWANSync SQL Server. Operations Guide
WANSync SQL Server Operations Guide This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational purposes only
More information