Hackproofing Lotus Domino Web Server
|
|
|
- Geoffrey Scott
- 9 years ago
- Views:
Transcription
1 A NGSSoftware Insight Security Research Publication Hackproofing Lotus Domino Web Server David Litchfield 21st October
2 Introduction Brief This document describes how to secure the web service that comes with Lotus Domino. It is written to show Lotus Domino administrators how an attacker would attempt to subvert the security of a Domino Web server and provide insight into the mind and modus operandi of a Domino hacker. The attacks are explained in detail to aid understanding and include information on how to prevent these attacks. Some of the preventative measures explained here may require upgrades or the application of security patches, whereas others simply require a modification in the Domino Directory or tightening of access control lists What is Lotus Domino and what are Notes Databases Lotus Domino is an Application server designed to aid workgroups and collaboration on projects. It provides services such as SMTP, POP3, IMAP, LDAP, HTTP and a Notes database server. All information is stored in Lotus Notes databases. For example when a mail is sent to a Notes user it is stored in a Notes database. When users use Domino's web service they navigate through Notes databases. These databases are not of the relational type such as Oracle or Microsoft's SQL server, but rather it is document based. Documents are grouped into views and are edited and created through the use of forms. The logical structure of a Notes Database could be described as in Figure 1: On the left hand side there are views, folders, forms and agents. Folders group views together and views contain documents. As we can see in the diagram View1 can see documents 1 through 3*, View 5 can see documents 4 through 6*, whereas View3 can see all the documents. Views and folders can be considered as high level database objects and documents as low level 2
3 database objects. Forms and agents are more high level objects and are used to manipulate the low level documents. * As we will see later on in this document this is not strictly speaking true. Just because a document is not listed as being in a view it can still be accessed through that view which opens up a security hole. Notes databases are given the file extension.nsf and examples are names.nsf, the Domino Directory and log.nsf, the Notes Log. Notes databases can also have a.box file extension, and these usually indicate that they are mailboxes. When Domino is installed databases are stored in the lotus\domino\data directory. Non-database data such as HTML files are stored in the lotus\domino\data\domino\html directory. Further to Notes databases there are Notes template files that have a.ntf file extension and these are stored in the directory same directory as the Notes databases. (This has some relevance to the Domino web server s security discussed further on into this document.) Notes Databases and the Domino Web Server Users interact with a Notes database over the web using commands in the query string of a URL. For example to open a database a user would request It is important to note that query strings can be denoted with an exclamation mark (!) in Domino. For example is equivalent to Anyone setting up IDS systems for Domino should be aware of this feature. Besides the OpenDatabase command there are many more: OpenServer, OpenNavigator, ReadEntries, OpenView, ReadViewEntries, OpenDocument, EditDocument, CreateDocument, DeleteDocument, SaveDocument, ReadDesign, OpenForm, ReadForm, OpenAgent, SearchView, OpenIcon, OpenAbout and OpenHelp are some of the more common ones. Some of these have a major impact of the applications security, some only if the databases Access Control Lists are set improperly. We will examine these commands and describe what they do and why they can offer an avenue of attack by a potential hacker. Throughout this document we'll be using the Statistics Reporting database, statrep.nsf, as an example. We choose this database as, by default, there are no ACLs set on this database. In other words the default access is set to manager meaning that anonymous web users have complete control over this database - in itself a security risk. Application attacks Commands which act on the server as a whole The OpenServer command Example: This command will list the databases on a Domino Server. This has security implications because being able to list the databases on the system could alert an attacker to the presence of more sensitive databases on the system - for example "customers.nsf". By default database browsing is not allowed and a request for the OpenServer command will elicit a 403 Forbidden response from the server. If the command is successful and you want to disable it open names.nsf and edit the Servers document in the Server view. From the Internet Protocols tab set "Allow HTTP 3
4 Clients to browse databases" to No. This command doesn't affect a single database - it is a server-wide issue. Commands which act on a database The OpenNavigator command Example: Notes databases can have a navigator - similar to a user interface that exists to aid users to navigate to data and documents. Every database comes with a default navigator - called $defaultnav. This navigator simply shows a list of visible views and folders. When combined with the $defaultnav, the OpenNavigator command opens a security hole as it presents a list of visible views in the database: Note that the default Navigator will not show a list of hidden views - though there are other ways to get this information - see the section on Database Structure Enumeration. There is information freely available on how to prevent access to the default Navigator on the Notes web site ( - however their suggested fix doesn't work and can be easily by-passed. It describes how to create a URL to Redirection mapping (this part is right). Here is their fix: Open the servers view and then click on the Actions menu bar item then select Web -> Create a URL Mapping/Redirection. This will open up the Mapping/Redirection form. On the Basics tab you want to set up a "Url -> Redirection" action. If the server in question is a virtual server from the site information tab enter its IP address and optionally a comment. In the mapping tab enter in the "Incoming URL path" edit box "*/*.nsf/$defaltnav*". In the "Redirection URL string" edit box enter a url where you'd have the person redirected to - for example /. You need not enter anything in the "Administration" tab. Once this has been done save and close the document and issue from the Domino console the command tell http restart for the changes to take effect. There are two things wrong with setting the Incoming URL path to */*.nsf/$defaltnav* Firstly, if we make a request for the database using the ReplicaID such as then the pattern matching will be broken. Secondly if we substitute any characters for their hex encoded equivalent, for example /foo.nsf/$%64efaultnav then, again, the pattern matching is broken. A Domino administrator needs to create a URL redirection mapping for every possibility and when you consider /$%44efaultNav works just as well as /$%64efaultNav you have to take into case sensitivity. Because of this it would be far too impracticle to have a mapping for every variant. It is suggested therefore that only the first two characters be taken into consideration - $d. 4
5 This way only 8 mappings need to be created: */%24D* */%24d* */%24%64* */%24%44* */$d* */$D* */$%64* */$%44* Note that if you substitute the leading slash with %2F or %5C the redirection mapping still works: produces a 500 Unable to process request response, whereas performs the redirection. NGSSoftware Insight Security Research have also tested variants of double URL encoding and UTF-8 encoding and these seem not to work - i.e. an attacker cannot get access to the default Navigator. If you have a normal database view which starts with the characters "$d" then this fix will prevent access to this view from over the web as any request that contains with "/$d" will be redirected. To work around this you could set up an alias for this view. Once the changes have been made from the Domino Server console issue the command "tell http restart" to load these changes. Having said all this if access control lists are set properly on the database and its objects then even if someone were able to access the default navigator then this pose little risk. The ReadEntries command Example: This command returns an XML listing of visible views. This XML listing contains information such as the views' Universal NoteID (UNID) and the views' name. This command exists to allow Java applets to work out what view are accessible for its use. Essentially this command returns to an attacker the same information as a request to the default Navigator so if you've prevent access to the default Navigator but not prevent access to ReadEntries then it was for naught. Like with the default Navigator fix a URL to Redirection mapping should be created taking into consideration all possibilities. However in this case you must use! and? and R but also note that this will also prevent the ReadForm, ReadViewEntires and ReadDesign commands and therefore may not be viable. It is better to secure a database and its objects using proper ACLs. Note that if clients are to access this database using Java applets preventing the use of the ReadEntries command may cause the applets to cease form working. Commands which act on a View The OpenView command Example: This command lists documents within a view. Normally this command does not present a problem 5
6 and is integral to the way Domino operates. The ReadViewEntries command Example: Like the ReadEntries command the ReadViewEntries command returns an XML listing of documents within a view and is used by client-side Java applets to make use of documents in the database. The ReadDesign command Example: Like the ReadEntries command the ReadDesign command returns an XML listing, but this command returns a description of the structure of the view. Commands which act on Documents The OpenDocument command Example: The OpenDocument command opens a document in read mode. The EditDocument command Example: If the ACLs on the document allow it, the EditDocument command opens a document in write mode. EditDocument returns an HTML form with fields in the document that can be edited. However, it is possible to change the other fields too. By saving the HTML page and editing the source an attacker can add the name of the field to be changed as a form input field and then submit the changes. For example, consider a document that had two fields, "foo" and "bar". On requesting the EditDocument command the HTML form returned only allowed the editing of the "foo" field. By adding the line: <INPUT TYPE="text" NAME="bar" VALUE="I shouldn't be able to change this but I can"> and then submitting the form both the "foo" and "bar" fields are changed. This of course only happens if the user has the permissions to edit that particular field. The SaveDocument command Example: If the source of the HTML form is viewed from the EditDocument command, you can see that the form action is to the SaveDocument command. Providing the ACLs allow it on submitting the EditDocument form the SaveDocument command is executed. The DeleteDocument command Example: As you would expect the DeleteDocument command deletes the document. If you don't want attackers stripping documents from your system it is advisable to setup ACLs correctly. The CreateDocument command Example: Notes Forms are used to create documents in a Notes database. If you open a form over the web and HTML form is returned with an action of CreateDocument. 6
7 For all these commands that act on Documents ensure that the ACLs are set correctly to prevent unauthorized tampering. Special Database Objects Notes database have special database objects. For example the default Navigator, $defaultnav, and the $searchform template are two examples. Most of these have no security ramifications though it is helpful to know they exist and how they are used. The $icon object Example: This is the icon for the database. The $help object Example: The $help object describes how to use the database. The $about object Example: This object opens a page that tells you "about" the database. The $icon object Example: This is the icon for the database. The $first object Example: This opens the first document in a given view. The $defaultform object Example: This returns the first form found in the database. Database Structure Enumeration Enumerating Views, Forms, Agents and Special Database Objects Objects in the database are tracked in many ways. There are Universal Note IDs (UNIDs) that are 32 character long strings. For example the following URL: 059cc6 shows a view with a UNID of 0a89ad68dd8b caf0 and a document with a UNID of b937c60966dbb9dd80256a cc6. Another way to reference a database object is with its NoteID which is a much smaller number. For example, the NoteID of the view above has a NoteID of 136. A NoteID is basically the postion of the object in the database file, somewhat akin to a file pointer. As far as the author can tell there is no way to get the NoteID of a view remotely. However, for all Notes databases on all servers the way NoteIDs are issued is standard as higher level objects such as forms and views reside at roughly the same location between two database files. 7
8 For any view, hidden or visible, form or agent the NoteID issued to that object is issued starting at around 0x11A and increments in 4. Try it out: Make 10 requests and so on. If the NoteID exists the page is returned. It may be a special database object such as $icon or $help, it might be a form or it might be a view. If the NoteID doesn't exist then the server will return an error, "Invalid or nonexistent document". There is one exception to this - if the server returns an "Unknown Command Exception" error then the NoteID belongs to an Agent - you can't call an Agent with its NoteID. By going all the way up from 0x11A to 0xFFF in increments of 4 (only 953 requests) you'll have found the NoteID of every hidden view, visible view, agent, form and special object - thus the higher level database structure can be enumerated. Enumerating Documents Documents also have a NoteID. To get the NoteID of a document open a view with the ReadViewEntries command. The NoteID of every document in this view will be returned in the XML listing. One of the peculiar things with Domino is that if you reference a document that exists in one view you can access it by requesting it through another view. For example go to select a NoteID at random (136 is the NoteID of the "3. Events" view) and then request it like so: The Event document will be returned. Now request: Normally with statrep.nsf there will be no documents in that view. However - now request and the Event document is returned! This means that it is possible to gain access to documents in one view through another and 8
9 therefore it is possible to enumerate all the documents in a database by selecting 1 view and counting upwards from 0x8F6 in increments of 4. (As far as the author can tell document NoteIDs start at 0x8F6) and onwards... When a 500 Invalid or nonexistent message is returned all of the documents have been enumerated. If the server returns a 404 it usually means the document no longer exists - for example it has been deleted. By-passing ACLs set on views The fact that you can request a document in one view through another view opens up a security hole. If ACLs are set on a view to give say only admins access, then any documents in that view may be access directly through another view - thus bypassing the access control. This works because the permissions allow access to the database, the fake view and the document in question. At each stage where permission checking takes place the authorization process succeeds. If the request was made through the real view then authorization would fail. Remember by requesting a NoteID you're simply asking for the contents from a position in the database file. To prevent against this, you must ensure that not only do you set ACLs on views but also on the documents that view is supposed to protect. Features of Domino that lead to security vulnerabilities Domino comes, by default with a Web Administrator database, webadmin.nsf. Anonymous users are not allowed to access this database, but they are allowed to access the template from which webadmin.nsf is derived, webadmin.ntf. Webadmin.ntf contains the same functionality as it's database child and resides in the same directory. Recalling from the introduction, database files (those with a.nsf,.ns4 and.box file extention) are served from the lotus\domino\data directory. Everything else is served from the lotus\domino\data\domino\html directory. Therefore if a user were to request Domino would search in the latter of these two locations, but as webadmin.ntf actually exists in the former location the server cannot find the file and returns a 404 file not found message. However, there are a couple of features of Domino that can allow a user to trick domino into searching in the right directory for webadmin.ntf. Firstly is the use of ReplicaIDs. A ReplicaID is used to maintain a database's consistency - if the database exists in two locations i.e. on two separate servers then Domino uses the ReplicaID to keep track of changes. It is completely legal to make a request to Domino for a database using its ReplicID. 9
10 For example, on the author's system the ReplicaID of names.nsf is 80256A ABF and access could be had to names.nsf through any of the following requests A ABF.nsf/ A ABF.ns4/ A ABF.box/ Each of the requests will cause Domino to look in the lotus\domino\data directory for a file with this ReplicaID. As names.nsf is created afresh with each new install the ReplicaID of the author's names.nsf file will probably be different to everyone else's names.nsf. However, the Web Administrator template file, webadmin.ntf is not created from scratch. It is shipped whole as part of the install and therefore the ReplicaID of the author's webadmin.ntf will be the same as everyone elses webadmin.ntf. Therefore by making a request for webadmin.ntf's ReplicaID an anonymous user can can access to the Web Administrator and use its functionality. To get the ReplicaID of the webadmin.ntf file open catalog.nsf holding Control, Shift and H down together whilst you open the catalog. (This key sequence will show all hidden views as well as visible of the database). The ReplicID can be found in the "$ReplicaID" hidden view. Another method of tricking Domino into opening the Web Administrator template is through the use of buffer truncation. By making the following request access to webadmin.ntf is granted. This works because Domino attempts to protect itself from buffer overrun attacks and chops a user request down to a safe size. In terms of events here's what happens. Domino receives the request and converts all the pluses to spaces and sees it has a.nsf file extention and therefore loads the database parser. The database parser chops the end off of the request, (thus removing the.nsf) to prevent any buffer overrun and then looks in the lotus\domino\data directory for the file, webadmin.ntf<space><space><space>... which it finds and then opens. Thus again the attacker can use webadmin.ntf's functionality. As far as securing against this goes the best solution is to delete the webadmin.ntf file. And probably best to remove the webamin.nsf file too. The buffer truncation issue will be fixed in Domino Further to this the default permissions set on the Web Administrator template file will be modified. General Information Leakage Statrep.nsf Default Permissions The default permissions on the Statistics Report database (statrep.nsf) are set to Default with Manager level access. This means that an anonymous user can, not only browse the database for information, but also edit, create and delete documents. Many of the entries under the "3. Events" view can contain sensitive information pertinent to the system setup and its failures. This information can be used by an attacker when forming further attacks. Needless to say the permissions set on this database should be modified to prevent anonymous access. Domino Banners By default with every page sent by a Domino web server in response to a client request a banner is embedded at the top of the HTML. This banner details the version of Domino and the operating system type it is running on - such as Windows NT on Intel. This is not desirable, as this information can aid an attacker in building attacks against the server. To prevent this information from being sent, edit the notes.ini file adding a line "DominoNoBanner=1". Note that even if you set this value the server version will still be sent in the "Server:" HTTP response - however, the 10
11 operating system is omitted. With Domino due to be released in November 2001 if the DominoNoBanner is set to 1 then the "Server:" HTTP header will no longer be sent as well. Physical Paths In older versions of Domino if a request was made to a nonexistent executable in the /CGI-BIN the physical path was revealed. More recent versions don't exhibit this behaviour. Common Misconfigurations Often, too many people allow anonymous access to sensitive databases such as the Domino Directory, names.nsf. This database controls the server s configuration and also stores the user database. It would not be a good thing to allow anonymous users to download valid Notes users' userid files - with access to these an attacker will be able to masquerade as that user. Other databases that can commonly and wrongly be accessed include but is not limited to, catalog.nsf, domlog.nsf, log.nsf, statrep.nsf, bookmark.nsf and domcfg.nsf. User Authentication Domino supports two methods for authenticating users over the web. The first, and default method, is to send a 401 Unauthorized HTTP response back to a client if they attempt to access a resource they are not authorized to do so. This response will cause the user s web browser to pop up a window prompting for a user ID and password. With the initial 401 server response also comes a realm the realm describes the protected resource and upon successful authentication every time the user requests anything in that realm (i.e. anything to do with that resource) their browser will automatically send with the request the user s credentials. This type of web authentication is known as Basic Authentication and the scheme used to obfuscate the user id and password is base 64 encoding. This is not encryption. A base 64 encoded character string can be easily converted into its original. Anyone with a network sniffer on the wire between the user and the Domino server will be able capture this information. The second type of authentication used if forms based authentication. Here, when a user makes a request for a resource they are not allowed to access the server returns a 200 OK HTTP response but rather than returning the page, it returns a login form. The user would enter their ID and password in this form and submit it. If authentication is successful the server generates a cookie that is used in future requests made by the user. The server maintains a list in memory of all active sessions and uses this cookie for authorization purposes. If no activity has taken place in a given amount of time, half and hour by default then the server times out the session and the user will have to authenticate again. Like with Basic authentication the user id and password are sent over the network wire in clear text and anyone with a sniffer will be able to access this information. With both methods it is suggested that if you are going to allow users to authenticate over the web it should be done over secure socket layer (SSL) as this will prevent anyone from with a sniffer from capturing credentials as the traffic is encrypted. As a side note, with Domino 5.x, SSL version 2 is disabled and only SSL version 3 is. SSL2 should be left disabled as SSL 2 is much more easy to break than SSL3 and if an attack is successful the attacker will be able to derive the server s private key. A Note on Notes Access Control Lists Many times in this document we have drawn attention to setting ACLs correctly. Before we delve into ACLs it s important to understand the difference between authentication and authorization. Authentication describes when a user passes over some credentials such as a user ID and password to be allowed access. Authorization describes what that user can do after they have been authenticated. Just because a user has be authenticated does not mean they have the 11
12 authorization to perform a certain task or access a resource. As far as the web server is concerned the Domino server performs 4 authorization checks: firstly on the database itself, then the view, then the document and finally fields within the document. Even if a user is listed as having access to a view or document if they re not included in the database ACLs then they will not be given access and will be prompted to authenticate. Successful authorization needs to be successful with the first three of the four checks. If the user is not authorized to access a field in a document, but they are authorized on the database, view and document, then the document is still displayed, though the field they re not authorized to access will be omitted. If a user has permission to access a database and a document, but not the view the document exists in, then an illegal argument exception error is generated by the server when the user attempts to access this document. As has already been noted, though, it is possible to by-pass this view permission issue by requesting the document through another view so this is one thing to be wary of. Conclusion As can be seen there are many issues to tackle before a Domino web server should be exposed to the Internet and what is key to the security of the Domino server and its applications is the correct access controls being set on databases. Whilst this document contains up to date information as of October the 21st 2001 it may be out of date in a week if a new Domino vulnerability is discovered. It is suggested that Domino and Notes administrators keep abreast of current Domino security issues. The Notes website ( contains a wealth of security information and likewise Subscribing to security mailing lists such as bugtraq ( can help keep those who need to know in the know. NGSSoftware will also maintain a vigil and we will endeavour to keep our website ( up to date and we have written and provide a security management tool, DominoScan, that is continually updated to help protect Domino web servers. More information about this audit tool is available from the NGSSoftware website A NGSSoftware Insight Security Research Publication NextGenSS Ltd 12
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
Migrating helpdesk to a new server
Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2
NeoMail Guide. Neotel (Pty) Ltd
NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
Business Internet Email service from Bell User Guide
Business Internet Email service from Bell User Guide Table Of Contents (click a page number to access that page) Getting Started 3 Access your email remotely using Webmail 3 Basic Features 4 Out Of Office
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
Fasthosts Internet Parallels Plesk 10 Manual
Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
Configure Single Sign on Between Domino and WPS
Configure Single Sign on Between Domino and WPS What we are doing here? Ok now we have the WPS server configured and running with Domino as the LDAP directory. Now we are going to configure Single Sign
One step login. Solutions:
Many Lotus customers use Lotus messaging and/or applications on Windows and manage Microsoft server/client environment via Microsoft Active Directory. There are two important business requirements in this
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Live@edu User Guide. Please visit the Helpdesk website for more information: http://www.smu.edu.sg/iits/helpdesk_support/index.asp
IITS Main Office SINGAPORE MANAGEMENT UNIVERSITY Administration Building, Level 11 81, Victoria Street Singapore 188065 Phone: 65-6828 1930 Email: [email protected] Please visit the Helpdesk website for
WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM
WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create
User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration
User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves
SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit
SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit Note: SecureAware version 3.7 and above contains all files and setup configuration needed to use Microsoft IIS as a front end web server. Installing
Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
Creating a User Profile for Outlook 2013
Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when
Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
VPN Overview. The path for wireless VPN users
VPN Overview The path for wireless VPN users First, the user's computer (the blue computer) connects to an access point in the uiuc-wireless-net network and is assigned an IP address in that range (172.21.0.0
How to move email to your new @students.ecu.edu account with MAC Mail
How to move email to your new @students.ecu.edu account with MAC Mail 1. Open Mail, and then do one of the following: If you've never set up any e mail accounts using Mail, the Welcome to Mail page appears.
Set up Outlook for your new student e mail with IMAP/POP3 settings
Set up Outlook for your new student e mail with IMAP/POP3 settings 1. Open Outlook. The Account Settings dialog box will open the first time you open Outlook. If the Account Settings dialog box doesn't
SurfCop for Microsoft ISA Server. System Administrator s Guide
SurfCop for Microsoft ISA Server System Administrator s Guide Contents INTRODUCTION 5 PROGRAM FEATURES 7 SYSTEM REQUIREMENTS 7 DEPLOYMENT PLANNING 8 AGENTS 10 How It Works 10 What is Important to Know
CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
Configuring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
Configuring, Customizing, and Troubleshooting Outlook Express
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Kaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7
ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...
Lotus Notes (NSF) Microsoft Exchange/Outlook (PST)
A Transend Corporation White Paper Lotus Notes (NSF) Microsoft Exchange/Outlook (PST) Transend Migrator 10.x Transend Migrator Forensic Edition 10.x Copyright February 11, 2011 by Transend Corporation
Talk Internet User Guides Controlgate Administrative User Guide
Talk Internet User Guides Controlgate Administrative User Guide Contents Contents (This Page) 2 Accessing the Controlgate Interface 3 Adding a new domain 4 Setup Website Hosting 5 Setup FTP Users 6 Setup
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
IBM. Implementing SMTP and POP3 Scenarios with WebSphere Business Integration Connect. Author: Ronan Dalton
IBM Implementing SMTP and POP3 Scenarios with WebSphere Business Integration Connect Author: Ronan Dalton Table of Contents Section 1. Introduction... 2 Section 2. Download, Install and Configure ArGoSoft
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
StarterPlus Mailbox Email Software Setup Guide
StarterPlus Mailbox Email Software Setup Guide Setting up an StarterPlus mailbox only takes a few minutes. You can set up any email software to send and receive email from your mailbox. You can connect
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook
FTP Service Reference
IceWarp Server FTP Service Reference Version 10 Printed on 12 August, 2009 i Contents FTP Service 1 V10 New Features... 2 FTP Access Mode... 2 FTP Synchronization... 2 FTP Service Node... 3 FTP Service
5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next.
Installing IIS on Windows XP 1. Start 2. Go to Control Panel 3. Go to Add or RemovePrograms 4. Go to Add/Remove Windows Components 5. At the Windows Component panel, select the Internet Information Services
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643)
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) Chapter Six Configuring Windows Server 2008 Web Services, Part 1 Objectives Create and configure Web
Email Client Configuration Guide
Email Client Configuration Guide Table of Contents Email Configuration...3 Email settings...3 IMAP...3 POP...3 SMTP...3 Process Overview...5 Account set up wizards...5 Anatomy of an email address...5 Why
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Configuring Thunderbird for Flinders Mail at home.
Configuring Thunderbird for Flinders Mail at home. Downloading Thunderbird can be downloaded from the Mozilla web site located at http://www.mozilla.org/download.html This web site also contains links
Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes
Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes May 07, 2002 Thank you for choosing Ensim WEBppliance 3.0 for Windows. This document includes information about the following: About Ensim
MGC WebCommander Web Server Manager
MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information
Load testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
WebLogic Server 6.1: How to configure SSL for PeopleSoft Application
WebLogic Server 6.1: How to configure SSL for PeopleSoft Application 1) Start WebLogic Server... 1 2) Access Web Logic s Server Certificate Request Generator page.... 1 3) Fill out the certificate request
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
FileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
Business mail 1 MS OUTLOOK CONFIGURATION... 2
Business mail Instructions for configuration of Outlook, 2007, 2010, 2013 and mobile devices CONTENT 1 MS OUTLOOK CONFIGURATION... 2 1.1 Outlook 2007, 2010 and 2013 adding new exchange account, automatic
Print Audit 6 - SQL Server 2005 Express Edition
Print Audit 6 - SQL Server 2005 Express Edition Summary This is a step-by-step guide to install SQL Server 2005 Express Edition to use as a database for Print Audit 6. Pre-Requisites There are a few pre-requisites
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
2/24/2010 ClassApps.com
SelectSurvey.NET Training Manual This document is intended to be a simple visual guide for non technical users to help with basic survey creation, management and deployment. 2/24/2010 ClassApps.com Getting
Cryoserver Archive Lotus Notes Configuration
Lotus Notes Configuration Version 1.0 December 2007 Forensic & Compliance Systems Ltd +44 (0)800 280 0525 [email protected] www.cryoserver.com Contents INTRODUCTION... 3 SMTP ROUTING TO CRYOSERVER...
Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.
Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive
Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.
Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them
SQL EXPRESS INSTALLATION...
Contents SQL EXPRESS INSTALLATION... 1 INSTALLING SQL 2012 EXPRESS... 1 SQL EXPRESS CONFIGURATION... 7 BILLQUICK DATABASE... 9 SQL Express Installation The Microsoft SQL Server 2012 Express software is
Working with Mail (Hosted Exchange)
TM Control Panel User Guide Working with Mail (Hosted Exchange) 1 Working with Mail (Hosted Exchange) TM offers Microsoft Exchange hosting as a powerful messaging solution allowing you to create and manage
How To Create A Mailbox In Windows Mail On A Pc Or Mac Or Ipad (For A Mac)
Advanced Mailbox Email Software Setup Guide Advanced Mailbox Setup Guide Setting up an Advanced mailbox only takes a few minutes. You can set up any email software to send and receive email from your mailbox.
Migration guide. Business Email
Migration guide Business Email June 2013 Contents Introduction 3 Administrator Migration What You Need to Get Started 1. Importing PST Files 2. Exporting PST Files 3 3 4 5 End User Migration Using Outlook
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Terms you ll need to understand:
14 Managing Servers............................................... Terms you ll need to understand: Transaction logging Activity logging Policy documents Administrator access Network names Directory deployment
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal 1.1.3 On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (
Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration This document provides configuration steps for Avaya one X Portal s 1.1.3 communication
Sophos UTM Web Application Firewall for Microsoft Exchange connectivity
How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Plesk 11 Manual. Fasthosts Customer Support
Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
ConnectMail Mobile Email Configuration
ConnectMail Mobile Email Configuration Introduction/Utility ConnectMail allows you to use your mobile phone to access information in your account. This includes e mail messages, calendar, and contacts.
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
UOFL SHAREPOINT ADMINISTRATORS GUIDE
UOFL SHAREPOINT ADMINISTRATORS GUIDE WOW What Power! Learn how to administer a SharePoint site. [Type text] SharePoint Administrator Training Table of Contents Basics... 3 Definitions... 3 The Ribbon...
Creating and Configuring Web Sites in Windows Server 2003
Page 1 of 18 Admin KnowledgeBase Articles & Tutorials Authors Hardware Links Message Boards Newsletters Software Control USB stick usage - Network-wide control with LANguard PSC. - Dl Admin KnowledgeBase
Version 1.7. Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide. Last updated October 2011
Version 1.7 Inbound Email Integration (POP3 and IMAP) Installation, Configuration and User Guide Last updated October 2011 1 Introduction and Overview... 1 2 The Case for Email monitoring... 2 3 Installation
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism
Technical Note Configuring Outlook Web Access with Secure WebMail Proxy for eprism Information in this document is subject to change without notice. This document may be distributed freely only in whole,
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States
isecuremail User Guide for iphone
isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...
Transition from Pegasus Mail To Exchange/Outlook 2003
Contents: Page(s): Setup Outlook and Exchange 2 4 Prepare Pegasus Mail 5 7 Transferring Emails 7 12 Transferring Address books 13 20 Change Email Routing 21 22 SYSTEMS & TECHNOLOGY Transition from Pegasus
4. Client-Level Administration
4. Client-Level Administration Introduction to Client Usage The Client Home Page Overview Managing Your Client Account o Editing Your Client Record View Account Status Report Domain Administration Page
IceWarp Outlook Connector 4 User Guide
IceWarp Unified Communications IceWarp Outlook Connector 4 User Guide Version 10.3 Printed on 23 February, 2011 Contents IceWarp Outlook Connector 4 1 Installing IceWarp Connector... 2 Pre-Installation
