Heterogeneous Environments. Paul Long/Microsoft
|
|
- Griffin Booker
- 7 years ago
- Views:
Transcription
1 Message PRESENTATION Analysis TITLE and GOES Visualization HERE in Heterogeneous Environments Paul Long/Microsoft
2 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. 2
3 Abstract Message Analysis and Visualization in Heterogeneous Environments Microsoft Message Analyzer is the next generation tool for analyzing messages from almost any source. Diagnosis of heterogeneous systems has continued to evolve as we explore new ways to visualize information for any type of trace data, be it a text log file, comma or tab separated data, network capture, or ETW component. Discover how to import Samba debug logs directly or define Text Log adapters, then inspect, filter, and organize as structured data. Learn how to analyze your file systems interoperability with Windows without having to read documentation. Expand your understanding of the interactions by including Windows component-specific information to gain insight into deep protocol and system behaviors. 3
4 Message Analyzer Activities Capture Analyze Share 4
5 Message Analyzer differences? Simulates protocol behavior Diagnosis messages for finding misbehavior 5
6 Message Analyzer differences? Coalesces network information Full defragmentation of messages High level performance info, like Server Response Times 6
7 Homogeneous Environments Different types of systems Windows Unix/Linux Apple Different kinds of traces and logs Text logs Network traces Events for Windows Traces (ETL) Different machines and parts of the world Time shifts Time zones 7
8 Sharing Create and save assets Filters, Trace Scenarios, Sequences, View Layouts, etc. Share assets through feeds Via network shares Later via service 8
9 PRESENTATION Sharing TITLE GOES Demo HERE 9
10 Capturing with Message Analyzer SMB Client/Server Very concise, no noise Runs forever No network related traffic like DNS, DHCP, ICMP, ARP Firewall Less overhead than capturing at the network layer Can capture Loopback Requires configuration 10
11 PRESENTATION Capture TITLE GOES Demo HERE
12 Analysis Importing Data Importing Homogeneous Data Text Logs, CAP, ETL, CSV, PCAP, PCAPNG Time Shifting By time zone or just a smidge 12
13 Import PRESENTATION Data TITLE GOES Demo HERE 13
14 Text Log Configuration RegEx expressions and OPN to parse a text log file Resources
15 Text Log Configuration Netlogon log Sample Netlogon.log 01/19 17:04:53 [MAILSLOT] Ping response 'Sam Logon Response Ex' (null) to \\mphewqtbx308.hew.us.ml.com Site: 1-NewYork-HUB on UDP LDAP 01/19 17:04:53 [LOGON] SamLogon: Transitive Network logon of CORP\NBKTIYN from B80C16EFD31D0 (via enycvc03dfs01) Entered 01/19 17:04:53 [LOGON] NlPickDomainWithAccount: CORP\NBKTIYN: Algorithm entered. UPN:0 Sam:1 Exp:0 Cross: 0 Root:0 DC:0 01/19 17:04:53 [LOGON] NlPickDomainWithAccount: Username CORP\NBKTIYN is in forest bankofamerica.com (found via LsaMatch) 01/19 17:04:53 [LOGON] SamLogon: Transitive Network logon of CORP\NBKTIYN from B80C16EFD31D0 (via enycvc03dfs01) Returns 0x0 15
16 Text Log Configuration file 01/19 17:04:53 [LOGON] SamLogon: Transitive Network logon of CORP\NBKTIYN from B80C16EFD31D0 (via enycvc03dfs01) Entered // // Message to capture Sam logon request. // message SamLogonRequest with EntryInfo { Regex \[(?<msgtype>[\s]+)\] SamLogon: Transitive Network logon of (?<UserName>[\S]+) (?<RemainingText>.*) Entered" } : BaseNetLogon { string UserName; string RemainingText; } { } override string ToString() return ("SamLogonRequest" + RemainingText); 16
17 Text Log Configuration file 17
18 Text PRESENTATION Log TITLE Adapter GOES HERE Demo 18
19 Analysis Analyzing Data Validating Implementation Diagnosis to understand adherence Viewpoints Hiding operations and exploring other network layers Sequence Expressions Describing complex patterns Visualizations Exposing patterns via pictures 19
20 Validation 20
21 Viewpoints Hide operations Remove operations so request/responses aren t grouped Alternate viewpoint Change your viewpoint to see traffic from a different layers perspective 21
22 Viewpoint: Default 22
23 Viewpoint: Link Layer 23
24 Viewpoint: Network 24
25 Viewpoint: Network 25
26 Viewpoint: SMB 26
27 Viewpoint PRESENTATION TITLE GOES Demo HERE
28 Sequence Expressions Like a filter, but over a set of messages 28
29 Sequence Expression Example using SMB2; scenario SequenceExpression = backtrack (SMB2.VirtualOperations.Create) ( SMB2.VirtualOperations.Create{FileId is SMB2.SMB2Fileid{Persistent is var myfileid }} -> ( SMB2.VirtualOperations.Read{FileId is SMB2.SMB2Fileid{Persistent == myfileid }} ) interleave [1,] until SMB2.VirtualOperations.Close{FileId is SMB2.SMB2Fileid{Persistent == myfileid }} ); 29
30 Sequence PRESENTATION TITLE GOES Demo HERE 30
31 Visualizations 31
32 Chart Editor Chart and editor to create visualizations 32
33 Visualization PRESENTATION TITLE GOES HERE Demo
34 PRESENTATION Questions? TITLE GOES HERE
35 References Message Analyzer Blog Message Analyzer Support Forums US/home?forum=messageanalyzer Message Analyzer Beta on Connect Message Analyzer Documentation 35
Using Classification to manage File Servers. Nir Ben-Zvi, Microsoft Corporation
Using Classification to manage File Servers Nir Ben-Zvi, Microsoft Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
More informationIntroduction. Interoperability & Tools Group. Existing Network Packet Capture Tools. Challenges for existing tools. Microsoft Message Analyzer
Introduction Interoperability & Tools Group Existing Network Packet Capture Tools Challenges for existing tools Microsoft Message Analyzer Slide 2 Interop and Tools What we do Part of Windows Server Org
More informationPCI Express IO Virtualization Overview
Ron Emerick, Oracle Corporation Author: Ron Emerick, Oracle Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and
More informationMicrosoft Message Analyzer Packet Analysis at a Higher Level. Neil B Martin Test Manager WSSC- Interop and Tools Microsoft Corporation
Microsoft Message Analyzer Packet Analysis at a Higher Level Neil B Martin Test Manager WSSC- Interop and Tools Microsoft Corporation Content Packet Analyzer - review Abstracting views of protocols Alternative
More informationCloud File Services: October 1, 2014
Cloud File Services: SMB/CIFS and TITLE NFS in the Cloud PRESENTATION GOES HERE October 1, 2014 Webcast Presenters David Fair, SNIA ESF Business Development Chair - Intel John Reed Product Manager, Windows
More informationCloud Data Management Interface (CDMI) The Cloud Storage Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG
Cloud Data Management Interface (CDMI) The Cloud Storage Standard Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG SNIA Legal Notice The material contained in this tutorial is copyrighted
More informationStorage Cloud Environments. Alex McDonald NetApp
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Cloud Environments Alex McDonald NetApp Webcast Presenter Alex McDonald joined NetApp in 2005, after more than 30 years in a variety
More informationDFS For Not-So Dummies. Matthew Geddes
Matthew Geddes SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations and literature under
More informationBlock Storage in the Open Source Cloud called OpenStack
Block Storage in the Open Source Cloud called OpenStack PRESENTATION TITLE GOES HERE June 3, 2015 Webcast Presenters Alex McDonald, Vice Chair SNIA-ESF NetApp Walter Boring, Software Engineer, HP 2 SNIA
More informationConfiguring and Monitoring SharePoint Servers
Configuring and Monitoring SharePoint Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationMS Windows DHCP Server Configuration
MS Windows DHCP Server Configuration Abstract This document describes how to configure option 43 on a Microsoft Windows 2000/2003 DHCP server. This information may be used in an Aruba Networks solution
More informationActive Directory Domain Controller Location Service. Anthony Liguori aliguor@us.ibm.com IBM Linux Technology Center
Active Directory Domain Controller Location Service Anthony Liguori aliguor@us.ibm.com IBM Linux Technology Center Overview 2 Overview History Acronyms Galore! The 80 node network MS-CLDAP and Domain Location
More informationHP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
More informationCloud Archiving. Paul Field Consultant
Paul Field Consultant SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations and literature
More informationConfiguring and Monitoring Event Logs
Configuring and Monitoring Event Logs eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
More informationScale and Availability Considerations for Cluster File Systems. David Noy, Symantec Corporation
Scale and Availability Considerations for Cluster File Systems David Noy, Symantec Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted.
More informationIntegrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
More informationFortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide
FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide February 5, 2015 Revision 1 Copyright 2015 Fortinet, Inc. All rights reserved.
More informationCloud Storage Clients. Rich Ramos, Individual
Rich Ramos, Individual SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
More informationConfiguring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based
More informationHP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
More informationConfiguring and Monitoring SiteMinder Policy Servers
Configuring and Monitoring SiteMinder Policy Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part
More informationNetwork Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
More informationHP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
More informationVisions for Ethernet Connected Drives. Vice President, Dell Oro Group chris@delloro.com March 25, 2015
Visions for Ethernet Connected Drives PRESENTATION TITLE GOES HERE Chris DePuy, Vice President, Dell Oro Group chris@delloro.com March 25, 2015 Webcast Presenters David Fair, SNIA ESF Chair Intel Vice
More informationWAN Optimization and Thin Client: Complementary or Competitive Application Delivery Methods? Josh Tseng, Riverbed
WAN Optimization and Thin Client: Complementary or Competitive Application Delivery Methods? Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member
More informationStep By Step Guide: Demonstrate DirectAccess in a Test Lab
Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008
More informationCUSTOMER Presentation of SAP Predictive Analytics
SAP Predictive Analytics 2.0 2015-02-09 CUSTOMER Presentation of SAP Predictive Analytics Content 1 SAP Predictive Analytics Overview....3 2 Deployment Configurations....4 3 SAP Predictive Analytics Desktop
More informationDeploying Public, Private, and Hybrid Storage Clouds. Marty Stogsdill, Oracle
Deploying Public, Private, and Hybrid Storage Clouds Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies
More informationLANDesk Management Suite 8.7 Extended Device Discovery
LANDesk Management Suite 8.7 Extended Device Discovery Revision 1.0 Roy Meyer Feb. 7, 2007 Information in this document is provided in connection with LANDesk Software products. No license, express or
More informationHow to Create a Basic VPN Connection in Panda GateDefender eseries
How to Create a Basic VPN Connection in Panda GateDefender eseries Support Documentation How-to guides for configuring VPNs with Panda GateDefender eseries Panda Security wants to ensure you get the most
More informationCloud and Big Data initiatives. Mark O Connell, EMC
Object storage PRESENTATION systems: TITLE GOES the underpinning HERE of Cloud and Big Data initiatives Mark O Connell, EMC SNIA Legal Notice The material contained in this tutorial is copyrighted by the
More informationSSD and Deduplication The End of Disk?
SSD and Deduplication The End of Disk? Jered Floyd, CTO, Permabit Technology Corp. Author: Jered Floyd, CTO, Permabit Technology Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted
More informationApplication Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.0 Abstract These Application
More informationHow To Understand And Understand The Risks Of Configuration Drift
How to: Eliminate Configuration Drift Risk Gil Hecht, CEO Continuity Software SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
More informationUnderstanding Enterprise NAS
Anjan Dave, Principal Storage Engineer LSI Corporation Author: Anjan Dave, Principal Storage Engineer, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA
More informationHow To Take Advantage Of Active Directory Support In Groupwise 2014
White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Configuring User Authentication...
More informationActive Directory LDAP Quota and Admin account authentication and management
Active Directory LDAP Quota and Admin account authentication and management Version 4.1 Updated July 2014 GoPrint Systems 2014 GoPrint Systems, Inc, All rights reserved. One Annabel Lane, Suite 105 San
More informationStarWind iscsi SAN & NAS: Configuring HA Shared Storage for Scale- Out File Servers in Windows Server 2012 January 2013
StarWind iscsi SAN & NAS: Configuring HA Shared Storage for Scale- Out File Servers in Windows Server 2012 January 2013 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software
More informationin Transition to the Cloud
PRESENTATION Data Protection TITLE GOES HERE in Transition to the Cloud David A. Chapa, CTE Seagate Technology Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee SNIA Legal Notice
More informationHP IMC User Behavior Auditor
HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC
More informationADS Integration Guide
ADS Integration Guide Document version 9402-1.0-18/10/2006 Cyberoam ADS Integration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of
More informationDeltek Touch Time & Expense for Vision 1.3. Release Notes
Deltek Touch Time & Expense for Vision 1.3 Release Notes June 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical
More informationConfiguring and Monitoring Citrix Branch Repeater
Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
More informationHow it can benefit your enterprise. Dejan Kocic Hitachi Data Systems (HDS)
PRESENTATION Case for flash TITLE GOES storage HERE How it can benefit your enterprise Dejan Kocic Hitachi Data Systems (HDS) SNIA Legal Notice The material contained in this tutorial is copyrighted by
More informationUpgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.
Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,
More informationUnmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
More informationTrends in Application Recovery. Andreas Schwegmann, HP
Andreas Schwegmann, HP SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
More informationUsing Oracle Data Integrator with Essbase, Planning and the Rest of the Oracle EPM Products
Using Oracle Data Integrator with Essbase, Planning and the Rest of the Oracle EPM Products Edward Roske eroske@interrel.com BLOG: LookSmarter.blogspot.com WEBSITE: www.interrel.com TWITTER: ERoske 2 4
More informationRSA Security Analytics Netflow Collection Configuration Guide
RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks
More informationRSA Security Analytics Netflow Collection Configuration Guide
RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks
More informationBig Data Storage Options for Hadoop Sam Fineberg, HP Storage
Sam Fineberg, HP Storage SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
More informationToday s Agile, Complex and Heterogeneous Data Centers
Managing PRESENTATION Backup TITLE and GOES Recovery HERE in Today s Agile, Complex and Heterogeneous Data Centers Maria Pressley, Chief Evangelist Unitrends Gene Nagle, Vice President Technical Services
More informationConfiguring and Monitoring Citrix Access Gateway-Linux Servers. eg Enterprise v5.6
Configuring and Monitoring Citrix Access Gateway-Linux Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice.
More informationComtrend 1 Port Router Installation Guide CT-5072T
Comtrend 1 Port Router Installation Guide CT-5072T 1 Installing Access Point s DSL Service with a Comtrend Router Thank you for selecting Access Point, Inc. to be your Internet service provider. This guide
More informationAn Introduction to Storage Management. Raymond A. Clarke, Oracle
An Introduction to Storage Management Raymond A. Clarke, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this
More informationHands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server 2008 Chapter 10 Managing System Reliability and Availability Using and Configuring Event Viewer Event Viewer Houses the event logs that record information about all types
More informationPineApp Surf-SeCure Quick
PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.
More informationEnterprise Architecture and the Cloud. Marty Stogsdill, Oracle
Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationSynology NAS Server Windows ADS FAQ 2008-11-14
Synology NAS Server Windows ADS FAQ 2008-11-14 2008-11-14 2008 Synology Inc. All Rights Reserved. 1 Synology Inc. 2008 Synology Inc. All rights reserved. No part of this publication may be reproduced,
More informationSage Accpac CRM 5.8. Self Service Guide
Sage Accpac CRM 5.8 Self Service Guide Copyright 2005 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated,
More informationOracle Fusion Middleware
Oracle Fusion Middleware Getting Started with Oracle Business Intelligence Publisher 11g Release 1 (11.1.1) E28374-02 September 2013 Welcome to Getting Started with Oracle Business Intelligence Publisher.
More informationSOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
More informationRohos Logon Key for Windows Remote Desktop logon with YubiKey token
Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Step-by-Step Integration Guide. Tesline-Service S.R.L. 10 Calea Iesilor str., Chisinau, MD-2069, Moldova. Tel: +373-22-740-242 www.rohos.com
More informationApplication Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
More informationSECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
More informationIntel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting 1 Active Directory Overview SS4200-E Active Directory is based on the Samba 3 implementation The SS4200-E will function
More informationStarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012
StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which
More informationPreparing for a Security Audit: Best Practices for Storage Professionals
Preparing for a Security Audit: Best Practices for Storage Professionals Blair Semple, CISSP-ISSEP Vice Chair, SNIA Storage Security Industry Forum, Security Evangelist, NetApp SNIA Legal Notice The material
More informationPortal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationTrouble Shooting SiteManager to GateManager access
Trouble Shooting SiteManager to GateManager access If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection issues, this document
More informationStrong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationMany network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.
RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional
More informationEnabling Remote Management of SQL Server Integration Services
Enabling Remote Management of SQL Server Integration Services Michael@SchmittDotNet.com www.schmittdotnet.com Version 1.0 10/14/2010 Copyright and Disclaimers This guide is for informational purposes only.
More informationStarWind iscsi SAN & NAS: Configuring HA File Server on Windows Server 2012 for SMB NAS January 2013
StarWind iscsi SAN & NAS: Configuring HA File Server on Windows Server 2012 for SMB NAS January 2013 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks
More informationSophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
More informationWeb Proxy Auto Discovery (WPAD) Configuration Guide. Revision 1.0.1. Warning and Disclaimer
Web Proxy Auto Discovery (WPAD) Configuration Guide Revision 1.0.1 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet Professional
More informationConfiguring and Monitoring SNMP Generic Servers. eg Enterprise v5.6
Configuring and Monitoring SNMP Generic Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationSolution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
More informationDMZ Network Visibility with Wireshark June 15, 2010
DMZ Network Visibility with Wireshark June 15, 2010 Ashok Desai Senior Network Specialist Intel Information Technology SHARKFEST 10 Stanford University June 14-17, 2010 Outline Presentation Objective DMZ
More informationHow To Configure A Microsoft Virtual Server 2005 2005 On A Microsoul.Com (Windows) 2005 (Windows 2005) (Windows Vvirtual) (Powerpoint) (Msof) (Evil) (Microsoul) (Amd
Configuring and Monitoring Virtual Server 2005 eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationSvn.spamsvn110. QuickStart Guide to Authentication. WebTitan Version 5
Svn.spamsvn110 QuickStart Guide to Authentication WebTitan Version 5 Copyright 2014 Copperfasten Technologies. All rights reserved. The product described in this document is furnished under a license agreement
More informationDNS: How it works. DNS: How it works (more or less ) DNS: How it Works. Technical Seminars Spring 2010 1. Paul Semple psemple@rm.
DNS: How it works Paul Semple psemple@rm.com DNS: How it works (more or less ) Paul Semple psemple@rm.com 1 Objectives What DNS is and why we need it DNS on Windows Server networks / Community Connect
More informationUsing SAP Logon Tickets for Single Sign on to Microsoft based web applications
Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,
More informationCORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com 7300-1.
CYBEROAM - ADS INTEGRATION GUIDE VERSION: 7 7300-1.0-9/20/2005 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented
More informationBest Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center
Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center Samir Sharma, Juniper Networks Author: Samir Sharma, Juniper Networks SNIA Legal Notice The material contained in this
More informationTenrox and Microsoft Dynamics CRM Integration Guide
Tenrox Tenrox and Microsoft Dynamics CRM Integration Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide describes the procedures for setting up integration between Microsoft
More informationData Center Convergence. Ahmad Zamer, Brocade
Ahmad Zamer, Brocade SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
More information1:1 NAT in ZeroShell. Requirements. Overview. Network Setup
1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already
More informationMonitoring SharePoint 2007/2010/2013 Server Using Event Tracker
Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker White Paper Publication Date: June 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Overview EventTracker
More informationHow to Make the Client IP Address Available to the Back-end Server
How to Make the Client IP Address Available to the Back-end Server For Layer 4 - UDP and Layer 4 - TCP services, the actual client IP address is passed to the server in the TCP header. No further configuration
More informationApplication Note. Intelligent Application Gateway with SA server using AD password and OTP
Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
More informationM86 Authenticator USER GUIDE. Software Version: 2.0.10 Document Version: 04.26.11
M86 Authenticator USER GUIDE Software Version: 2.0.10 Document Version: 04.26.11 M86 AUTHENTICATOR USER GUIDE 2011 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version 1.01,
More informationRSA Event Source Configuration Guide. McAfee Database Security
RSA Event Source Configuration Guide McAfee Database Security Last Modified: Sunday, April 29, 2012 Event Source (Device) Product Information Vendor McAfee Event Source (Device) Database Security Supported
More informationQuality Center LDAP Guide
Information Services Quality Assurance Quality Center LDAP Guide Version 1.0 Lightweight Directory Access Protocol( LDAP) authentication facilitates single sign on by synchronizing Quality Center (QC)
More informationHow it can benefit your enterprise. Dejan Kocic Netapp
PRESENTATION Case for flash TITLE GOES storage HERE How it can benefit your enterprise Dejan Kocic Netapp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise
More informationHow to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
More informationInformation on Syslog For more information on syslog, see RFC 5424. Released: December 2006 Interoperability issues: None. Table 1: Syslog at a Glance
Syslog on Spectralink 84-Series Handsets Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational,
More information