Release Notes ArcSight SmartConnector
|
|
- Jeffry Clarke
- 8 years ago
- Views:
Transcription
1 Release Notes ArcSight SmartConnector Release July 10, 2009
2 Release Notes ArcSight SmartConnector Release July 10, 2009 Copyright 2009 ArcSight, Inc. All rights reserved. ArcSight, the ArcSight logo, ArcSight TRM, ArcSight NCM, ArcSight Enterprise Security Alliance, ArcSight Enterprise Security Alliance logo, ArcSight Interactive Discovery, ArcSight Pattern Discovery, ArcSight Logger, FlexConnector, SmartConnector, SmartStorage and CounterACT are trademarks of ArcSight, Inc. All other brands, products and company names used herein may be trademarks of their respective owners. Follow this link to see a complete statement of ArcSight's copyrights, trademarks and acknowledgements: This document is ArcSight Confidential. SmartConnector Release Release Notes Page ii
3 Contents SmartConnector Release Important Note for Versions of ArcSight Manager Prior to 3.5 SP3...1 To Apply This Release...1 New Connectors...1 Connectors with New Device Versions Supported...1 SmartConnector Enhancements...2 Connector End-of-Life Notices...2 Issues Closed...3 Available Beta Support...4 Beta SmartConnectors...4 Scanner FlexConnectors...5 Known Issues or Limitations...5 New and Updated SmartConnector Documentation...7 SmartConnector Release Release Notes Page iii
4 SmartConnector Release These notes describe how to apply this latest release of ArcSight's SmartConnectors, as well as providing other information about recent changes and open and closed issues. Important Note for Versions of ArcSight Manager Prior to 3.5 SP3 Do not install this new SmartConnector release until you complete these steps. As announced previously, for easy reference, SmartConnector versioning now reflects the timing of each release. If you are running versions of ArcSight ESM Manager prior to version 3.5 SP3, make the following modifications to ensure that zones and categorizations match up and install properly. Modify these properties in the config/server.properties file in your ArcSight ESM Manager version 3.5 pre-sp3 installation: zone-mapping.aup.agent.version.max= console-category.aup.agent.version.max= Restart the ArcSight Manager for this change to take effect. If you will be upgrading your ArcSight ESM Manager in the near future, by waiting until that time to install this SmartConnector release, you can avoid an additional ArcSight ESM Manager restart. To Apply This Release Download the appropriate executable for your platform as well as the zipped file of SmartConnector Configuration Guides for the release. For a successful SmartConnector installation, follow the installation procedures documented in the individual SmartConnector Configuration Guides. To ensure the most current configuration guides are available with each SmartConnector release, they are offered in a separate downloadable file from the ArcSight Customer Support site rather than as part of the SmartConnector installation process. Create a folder for the documentation (such as c:\arcsight\docs) and unzip the file there. Then double-click index.html to access the individual configuration guides. To keep support information current, each SmartConnector Configuration Guide contains a link to a separate document entitled "SmartConnector Product and Platform Support." You also can access this document from the index.html or SmartConnectorReadMe.htm file downloaded with the documentation. New Connectors SmartConnector for Solaris Basic Security Module Syslog 10 Device Version Supported Connectors with New Device Versions Supported SmartConnector for Device Version Supported Check Point FW-1/VPN-1 OPSEC NG R70 Juniper NetScreen IDP Syslog McAfee FoundScan DB 6.7 McAfee IntruShield Manager Syslog 5.1 Qualys Vulnerability Scanner SmartConnector Release Release Notes Page 1
5 Connectors with New Product Support SmartConnector for New Product Supported McAfee epolicy Orchestrator DB Rogue System Detection v2.0 with epo 4.0 Rogue System Detection v1.0 with epo 3.6 SmartConnector Enhancements In each SmartConnector release, updates and enhancements are made to the field mappings for individual SmartConnectors. If you use any of the SmartConnectors listed in the "Issues Closed" section of these release notes, be aware that installing the updated SmartConnector can impact your created content. ArcSight advises you to verify your content before deploying the SmartConnector into your production environment. FIPS Compliance Under the Information Technology Management Reform Act (Public Law ), the Secretary of Commerce approves standards and guidelines that are developed by the National Institute of Standards and Technology (NIST) for Federal computer systems. These standards and guidelines are issued by NIST as Federal Information Processing Standards (FIPS) for government-wide use. ArcSight has added support for SmartConnector installation in FIPS-compliant mode. See the connectors under New and Updated SmartConnector Documentation for a list of connectors with this new support. McAfee epolicy Orchestrator DB Added support for HIPS, Rogue System Detection, and MA events. See the SmartConnector Configuration Guide for specific products and versions now supported. Microsoft DHCP File Added support for processing of multiple log files. Symantec Endpoint Protection DB Added support for Network Access Control events. Connector End-of-Life Notices Symantec Endpoint Protection Syslog Support ending 12/31/2009 Currently, ArcSight supports Symantec Endpoint Protection through two integration points Syslog and Microsoft SQL Server Database. While a syslog-based connector generally provides benefits such as ease of use, it has been discovered over time that the Symantec Endpoint Protection syslog does not offer the level of normalization necessary for effectively building and maintaining a connector. Symantec Endpoint Protection integrates multiple endpoint security components into one integrated solution. For every component (AntiVirus, Spyware, Network Threat Protection, and so on) there could be many different event types, necessitating the development of sub-message patterns for each of the event types. The Microsoft SQL database, on the other hand, allows one query to be built for each component, making a database connector a much more viable and scalable integration solution. Given its technical limitation, we have decided to phase out support for Symantec Endpoint Protection event collections via syslog. Although we will continue to invest in and enhance the database connector, our current plan is to discontinue support for the syslog-based Symantec Endpoint Protection connector by December 31, ArcSight strongly encourages customers who are currently using this syslog connector to migrate to the Symantec Endpoint Protection DB connector in the next few months. In the meantime, any parsing issues with the syslog connector will be handled on a case-by-case basis. SmartConnector Release Release Notes Page 2
6 Check Point Firewall OPSEC This connector has reached end of life and has been removed from SmartConnector builds. Cisco PIX/ASA/FWSM Syslog Support for version 5.x has been removed. Issues Closed SmartConnector for Number Description All SmartConnectors Entries in the name resolver cache normally are refreshed after the Time To Live (TTL), but if that refresh is substantially delayed, the normal algorithm disregards the cached value after double the TTL. There is a new property (name.resolver.cache.no.ttl) that can be set in agent.properties. When this property is set to true, the name resolver cache entries will continue to be used indefinitely. All SmartConnectors Previously, aggregation could cause memory issues and a null pointer exception. This problem has been fixed. Blue Coat Proxy SG File When s-ip was populated with an IP address (s-ip can contain an IP or a web URL) and the connector did the resolution, a device was created for what was a target host. This resulted in a device being created for every website or host accessed through the Blue Coat proxy, causing issues with managers and databases. This problem has been fixed Previous problems with URL and URI field resolution have been fixed. Check Point FW-1/VPN-1 OPSEC NG Updated severity mappings for the Check Point AD connector. See the SmartConnector for Check Point FW-1/VPN-1 OPSEC NG Configuration Guide for detailed mapping information. Cisco Secure ACS The ESM Manager previously threw an exception due to a long additional data name sent from the connector. The connector has been modified to fix this problem. Fortinet FortiGate Syslog An exception was thrown when a comma appeared where only integers were expected. The parser has been updated to fix this problem. Rapid7 NeXpose XML File The connector no longer creates assets with blank Host Name fields. IBM Lotus Domino DB The parser has been updated to fix problems that previously caused a fatal exception at connector startup. McAfee epolicy Orchestrator DB McAfee HIPS DB McAfee HIPS Multiple DB When running connectors for both McAfee epo DB and McAfee HIPS DB that pull events from the same database, some event duplication previously occurred. The McAfee HIPS DB connectors no longer collect anti-virus events. The McAfee epolicy Orchestrator DB connector now collects HIPS events. See the SmartConnector Configuration Guides for more information. MessageGate Syslog Previously, the connector set the Device Receipt Time year to 1970 for MessageGate events without a date time. This problem has been fixed. Microsoft Windows Event Log Unified SID translation for security events 538, 540, and 576 previously did not occur. This problem has been fixed Previously, SID translation failed when the SID contained double hyphens. This problem has been fixed. SmartConnector Release Release Notes Page 3
7 SmartConnector for Number Description Microsoft Windows Event Log Unified The connector now continues to map correctly, even when the 'Reason' field is missing from the raw event for security event Workstation Name and Source Address fields are now mapped correctly for security event 537 events Mapping problems for security event 565 have been fixed Implemented SID re-translation and multi-threaded SID translation. NIKSUN NetDetector Syslog The parser has been updated to accommodate previously unparsed events. Oracle Audit DB The connector was not verifying connection with all configured databases during connector configuration. This problem has been fixed Previously, when the connector was configured to connect to multiple databases, it connected only to the last configured database. This problem has been fixed. Symantec Endpoint Protection DB Symantec Endpoint Protection Syslog The following mappings have been updated: Allowed or Blocked is mapped to Device Action HOST_NAME is mapped to Device Custom String 2 LOCATION_NAME is mapped to Device Custom String A parser problem discovered with Security Risk Found (Heuristic Scan) events has been fixed. Tenable Nessus File The parser has been modified to parse multiple OS occurrences. Available Beta Support For the enhancements or fixes for SmartConnectors listed in this section, formal release after testing and documenting will be available in a future SmartConnector release. It is up to your discretion whether to update your installed connectors with this build. Contact ArcSight Customer Support for more information if you are interested in any of these items. Localization for Microsoft Windows Event Log Unified Connector Beta support has been added for the localization of security events for the Simplified and Traditional Chinese, French, and Japanese languages. FlexConnector for Multiple Database Instances Beta support is provided to correct a problem in which, for the multiple database connector, events from a database table that uses negative BIGINT IDs were not collected, or events from a database table that uses positive BIGINT IDs were collected repeatedly. Red Hat Enterprise Linux 5.3 (RHEL 5) AS 64-bit JVM Beta support for this platform is available. ncircle Scanner XML3 File Beta support for device version 6.8. Beta SmartConnectors SmartConnector for Lancope SMC Web Services This SmartConnector obtains flows, probes, and host snapshots from Lancope StealthWatch Management Console (SMC) and can, optionally, generate ArcSight events. Lancope SMC version 5.8 is supported. SmartConnector Release Release Notes Page 4
8 Scanner FlexConnectors ArcSight Confidential ArcSight FlexConnector Developer's Guide for complete information on Scanner FlexConnector beta support for the following: ArcSight FlexConnector for Scanner DB ArcSight FlexConnector for Scanner Text Reports ArcSight FlexConnector for Scanner XML Reports Known Issues or Limitations ArcSight FlexConnector CounterACT When "ArcSight FlexConnector CounterACT" is selected for installation, a popup window asks whether you want to use the configuration wizard to define the CounterACT commands. Answering "Yes" causes an error that shuts down connector installation. Select "No" for successful installation of the FlexConnector. When "No" is selected, the installation sequence asks for the CounterACT properties file name, which should have already been authored manually. This problem will be fixed in a future SmartConnector release. ArcSight Threat Response Manager CounterACT If you install the CounterACT connector on a system running Java JRE 1.6, perform these steps on that system after installation is complete: In the following procedure, ARCSIGHT_HOME is the directory where the CounterACT connector software is installed. On Linux or Unix: 1. In the ARCSIGHT_HOME/jre6/lib directory, create a sub-directory called endorsed with read, write, and execute permissions. 2. Copy the ARCSIGHT_HOME/lib/agent/saaj.jar file to the sub-directory called endorsed, which you created in step 1. On Windows: 1. In the ARCSIGHT_HOME\jre6\lib directory, create a sub-directory called endorsed with read, write, and execute permissions. 2. Copy the ARCSIGHT_HOME\lib\agent\saaj.jar file to the sub-directory called endorsed, which you created in step 1. Aruba Mobility Controller Syslog Due to Aruba product limitations, the Aruba Networks Mobility Controller syslog messages can only be processed by the syslog daemon connector, not by the syslog pipe or syslog file connector. The SmartConnector processes the security events only. Cisco CiscoWorks The ArcSight SmartConnector for CiscoWorks Syslog supports a limited set of syslog messages originating from a specific CiscoWorks component. Full CiscoWorks syslog support will be certified in an upcoming SmartConnector release. Cisco NetFlow File The connector currently listens to all traffic on the specified port rather than by individual IP address. This issue is being addressed and will be fixed in a future SmartConnector release. DB SmartConnectors on Windows Server 2003 R2 Enterprise x64 that use ODBC System DSN We have found that the JDBC/ODBC bridge driver "sun.jdbc.odbc.jdbcodbcdriver" does not work with the ODBC System data sources created using Control Panel -> Administrative Tools -> Data Sources (ODBC) on the Windows Server 2003 R2 64-bit platform. To use this driver, create ODBC System data sources using the executable at c:\windows\syswow64\odbcad32.exe. This opens up the same type of graphical user interface as the Control Panel -> Administrative Tools -> Data Sources (ODBC), but it creates the Data sources using the 32-bit drivers. SmartConnector Release Release Notes Page 5
9 IBM Lotus Domino DB ArcSight has identified a potential problem with the IBM Domino ODBC driver that can cause data duplication when using ArcSight s SmartConnector for IBM Lotus Domino DB. We have been able to reproduce a customer issue in which the Domino connector can inadvertently send duplicate data to the ArcSight ESM Manager or ArcSight Logger. This SmartConnector uses IBM s Domino ODBC driver to retrieve data from the Domino server; ArcSight has traced the issue to an incorrect result set returned by this ODBC driver. Based upon our lab testing, the issue may be related to large log.nsf files (a file size of 1.6Gb in our lab, but size might depend upon Domino s server hardware). This cause for this data duplication issue has not yet been confirmed with IBM, but we are currently seeking their assistance. In our lab, once the log was cleaned up, reducing its size in the process, the problem disappeared and IBM s Domino ODBC driver started returning correct result sets. Until we receive further information from IBM regarding this issue, customers are advised to periodically monitor the data sent by the connector and, in particular, the size of the log.nsf file to make sure it does not grow too large. The SmartConnector for IBM Lotus Domino SNMP has been developed for situations in which this known issue occurs. Lancope SMC Web Services Beta ArcSight Lancope SMC Web Services connector logs the inaccurate message Failed to execute command in agent.log and also sends an internal ArcSight event for this, even when the command is successfully executed and receives the response from the connector. This is only a case of inaccurate logging of an inaccurate internal event and has no impact on the connector's command response and event generating capabilities. Microsoft ISA Multiple Server File The SmartConnector for Microsoft ISA Multiple Server cannot be run as a service when it is run remotely. Microsoft Windows Event Log Unified The following known limitations exist for the current release of this connector: In some cases, the description of specific Windows events may not be captured into individual ArcSight event fields. When this happens, the missing information is captured in the Raw Event field and the agent log displays a warning that it has received an unmatched number of keys and values for a particular Windows event ID. This can be addressed by a parser fix. See the "Troubleshooting" section for an example of how to resolve these key values. SID translation is supported on a best-effort basis, but there may be a few instances when SIDs cannot be successfully translated. This could happen due to network issues, the host could be busy and may not respond, or the SID could be unresolvable, which results in the connector being unable to translate the SID. The connector attempts to translate all the SIDs by default. If the first translation attempt fails, the connector retries three times. If translation still fails, SID translation can be enabled in multi-threaded mode by setting the parameter sidguidtranslationmultithreaded to true. See "Troubleshooting" or "Advanced Common Configuration Parameters for SID Translation" for more configuration information. GUID translation is not currently supported. Solsoft Version Support The Solsoft CounterAct SmartConnector may not work with Solsoft version and later versions. As of connector release , a newer version of Apache AXIS library is being used for the web services client. This could affect the operation of the SmartConnector for Solsoft CounterAct, which used an older version of the Apache AXIS library. The workaround for this problem is to rename the library file named all-axis-libs.jar under lib/agent/axis to another name (for example, all-axis-libs.jar.bak). Symantec Endpoint Protection Syslog For some Network Thread Detection events, there may be none, one, or multiple sets of IP information for the same host. Currently, for such events, the host name and IP address is not mapped to the destination host name and address fields; the entire network information is mapped to the message field. Sub-parsing and mapping of these events to the appropriate fields will be available in a future SmartConnector release. SmartConnector Release Release Notes Page 6
10 New and Updated SmartConnector Documentation The following SmartConnector documentation has been added or updated for this release. Technical Notes for Installing FIPS-Compliant SmartConnectors Technical notes describing the process for installing FIPS-compliant connectors are provided via hot links in the applicable SmartConnector configuration guides. Aladdin esafe Gateway File Updated mapping information and global update to installation procedure for FIPS support. Blue Coat Proxy SG File Added new Device Address mapping to x-bluecoat-proxy-primary-address for all supported log types; added configuration information for including this field. Updated field mappings. Removed configuration steps for getting AV events through this connector; this function is not available at this time. Global update to installation procedure. Global update to installation procedure for FIPS support. Check Point FW-1/VPN-1 OPSEC NG Added support for Check Point FW-1/VPN-1 OPSEC NG R70. Global update to installation procedure for FIPS support. Updated severity mappings for Advanced Security Log. Cisco PIX/ASA/FWSM Syslog Removed support for version 5.x. Global update to installation procedure for FIPS support. Juniper NetScreen IDP Syslog Added support for NetScreen versions Global update to installation procedure for FIPS support. McAfee epolicy Orchestrator DB Added support for Rogue System Detection and MA events. Integrated HIPS event coverage into epo DB connector. Global update to installation procedure for FIPS support. Reference added for JDBC driver Connector Appliance upload information. McAfee FoundScan DB Added support for FoundScan version 6.7. Reference added for JDBC driver Connector Appliance upload information. McAfee IntruShield Manager Syslog Added support for McAfee Network Security Manager v5.1 events. Global update to installation procedure for FIPS support. Microsoft IIS File Added Request URL File Name field mapping. Global update to installation procedure for FIPS support. Microsoft DHCP File Added support for multiple log files. Global update to installation procedure for FIPS support. Microsoft Windows Event Log Unified Updated Features and Enhancements and Known Limitations for SID translation updates. Added "Advanced Common Configuration Parameters for SID Translation" and updated Troubleshooting. Added beta support for the localization of security events for the Simplified and Traditional Chinese, French, and Japanese languages. NetContinuum Web Firewall Syslog Updated mappings information and global update to installation procedure for FIPS support. Qualys Vulnerability Scanner DB Added support for version Rapid7 NeXpose File Updated field mappings and global update to installation procedure for FIPS support. RSA ClearTrust File Updated mapping information and global update to installation procedure for FIPS support. SmartConnector Release Release Notes Page 7
11 Solaris Basic Security Module Syslog New configuration guide for new connector. Includes global update to installation procedure for FIPS support. Sun ONE Web Access Server Updated mapping information and global update to installation procedure for FIPS support. Symantec Endpoint Protection DB Support added for Network Access Control events. Global update to installation procedure for FIPS support. Reference added for JDBC driver Connector Appliance upload information. The following configuration guides have been updated for FIPS support and to have a new reference to the ArcSight Connector Appliance Administrator's Guide for JDBC driver upload instructions. SmartConnectors using Microsoft SQL Server 2005 JDBC drivers with encryption enabled cannot be installed in FIPS-compliant mode. ActivCard AAA Server DB Application Security AppDetective DB eeye REM Security Management Console eeye Retina Network Security Scanner (DSN-Based) Harris STAT Scanner DB IBM/ISS ICEcap Manager DB IBM/ISS Internet Scanner DB IBM/ISS RealSecure DB IBM/ISS Site Protector DB Intrusion SecureNet Provider DB Lumension PatchLink Scanner DB McAfee Desktop Firewall DB McAfee epo Asset Scanner DB McAfee Host Intrusion Prevention DB McAfee Host Intrusion Prevention Multiple DB Microsoft Audit Collection System DB Microsoft Operations Manager DB Microsoft SQL Server Audit DB (Legacy) Microsoft SQL Server Multiple Instance Audit DB NetIQ Security Manager DB Quest InTrust for Windows DB Symantec Critical System Protection DB Symantec ManHunt DB Trend Micro Asset Scanner DB Trend Micro Control Manager NG DB The following configuration guides have been updated to add a link to installation information for FIPS compliant connectors. AirDefense Enterprise Syslog Apache HTTP Server Access Log Apache HTTP Server Error Log Apache HTTP Server Syslog SmartConnector Release Release Notes Page 8
12 Arbor Networks Peakflow Syslog ArcSight Common Event Format Syslog ArcSight Common Event Format File ArcSight Logger Streaming Connector Aruba Mobility Controller Syslog BEA WebLogic Server File Blue Coat Proxy SG Syslog Bro IDS File CA etrust SiteMinder File CA Top Secret for z/os File Check Point Firewall-1 SAM Check Pont Firewall-1 SNMP Check Point FW-1/VPN-1 OPSEC NG (Legacy) Cisco Catalyst OS Syslog Cisco CiscoWorks Syslog Cisco IDS RDEP Cisco IPS SDEE Cisco IronPort Security File Cisco IronPort Security Syslog Cisco IronPort Web Security File Cisco Mobility Services Engine Syslog Cisco PIX SNMP Cisco Router Syslog Cisco Secure ACS File Cisco Secure ACS Syslog Cisco Secure IDS Post Office Cisco Security Agent File eeye Retina Network Security Scanner DB eeye Retina Network Security Scanner (RTD5) DB Enterasys Dragon Export Tool File Enterasys Dragon Server SNMP F-Secure Anti-Virus File Fortinet Fortigate Syslog HoneyD Syslog HP OpenVMS File HP ProCurve Ethernet Switch SNMP HP-UX Audit File IBM AIX Audit File IBM AS/400 Audit Journal File IBM DB2 UDB Audit File IBM Lotus Domino DB IBM Lotus Domino SNMP IBM Lotus Domino Web Server File IBM NVAS for z/os File SmartConnector Release Release Notes Page 9
13 IBM NVAS Session for z/os File IBM RACF for z/os File IBM SDSF System Log for z/os File IBM System Log for z/os File IBM Tivoli Access Manager File IBM Tivoli Access Manager XML File IBM WebSphere File IDMEF XML File Ingrian DataSecure Syslog Intersect Alliance SNARE for Windows Syslog Intrusion Computer Misuse Detection System File Intrusion SecureNet Provider SNMP ipolicy Intrusion Prevention Firewall Syslog ISC BIND Syslog ISC DHCP Syslog Juniper M Series Routers Syslog Juniper NetScreen OS Syslog Juniper NetScreen Security Manager Syslog Juniper NetScreen SSL VPN Syslog Juniper Steel-Belted Radius File Lancope StealthWatch Syslog Lucent Brick Managed Services File Lumeta IPsonar File Mazu Profiler DB Mazu Profiler V3 DB McAfee Antivirus VirusScan File McAfee Entercept API McAfee Entercept DB McAfee IntruShield DB McAfee Secure Internet Gateway Syslog MessageGate Syslog Microsoft Auditing Collection System Microsoft Exchange Message Tracking Log File Microsoft IAS File Microsoft IIS Multiple Server File Microsoft IIS Multiple Site File Microsoft IIS Syslog Microsoft ISA Multiple Server File Microsoft ISA Server File Microsoft ISA Server 2004 File Mirage CounterPoint Syslog Nagios Syslog ncircle Scanner SNMP ncircle Scanner XML2 File SmartConnector Release Release Notes Page 10
14 Network Appliance NetCache File Newbury WiFi WatchDog Syslog NFR Central Management and Sentivist Servers File NFR Central Management Server File NFR Host Intrusion Detection DB NIKSUN NetDetector Syslog NitroSecurity IPS Syslog Nmap XML File Nortel Contivity Switch Syslog Novell Nsure Audit DB Oblix NetPoint File Oracle Audit DB Oracle Audit Syslog Oracle SYSDBA Audit Syslog OVAL XML File PureSight Content Filter DB QoSient ARGUS Radware DefensePro Syslog RSA ACE Server Syslog SaberNet NTSyslog Syslog SANA Primary Response SNMP SAINT Vulnerability Scanner SAP Audit File SAP Real-Time Audit File SAP Real-Time Multiple Folder Audit File Secure Computing Gauntlet Syslog Secure Computing IronMail Syslog Secure Computing SafeWord Premier Access File Secure Computing Sidewinder Syslog Securify SecurVantage SNMP Sendmail Syslog Snort DB Snort File Snort IDS (Barnyard) File Snort Multiple File Solaris Basic Security Module File SonicWALL Firewall Syslog Sourcefire Defense Center estreamer Sourcefire/Snort Sensor Syslog Squid Proxy Server File Stonesoft StoneGate Firewall Syslog Sun ONE Directory Multiple Server File Sun ONE Directory Server File Sybari Antigen for Microsoft Exchange DB SmartConnector Release Release Notes Page 11
15 Sybase Adaptive Server Enterprise DB Symantec AntiVirus Corporate Edition File and Multiple File Symantec Endpoint Protection Syslog Symantec Enterprise Firewall File Symantec Enterprise Firewall SNMP Symantec Enterprise Security Manager DB Symantec ESM Reporting DB Symantec Gateway Security/Enterprise Firewall File Symantec Gateway Security/Enterprise Firewall NG File Symantec Intruder Alert File Symantec Intruder Alert SNMP Symantec Mail Security Syslog Symantec ManHunt Syslog Symantec NetRecon NRD File Symantec Network Security Syslog Symantec SESA DB Tenable Nessus NSR File Tenable Nessus XML File Tenable Nessus XML for Windows TippingPoint UnityOne Syslog TopLayer Attack Mitigator Syslog Tripwire Enterprise Syslog Tripwire Manager File Type80 SMA_RT Syslog Unix Login/Logout VarySys PacketAlarm Syslog Visionael Security Audit DB Vontu CEF Syslog Vormetric CoreGuard Syslog Websense Web Security Suite SNMP Webwasher CSM File SmartConnector Release Release Notes Page 12
RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method
RSA envision Supported Event Sources A Actividentity 4TRESS AAA Server - version 6.4.1 AirDefense AirDefense Enterprise Server - version 7.2 Airmagnet Airmagnet Enterprise - version 7.5.0 Apache HTTP Server
More informationArcSight Supports a Wide Range of Security Relevant Products
ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the
More informationSymantec Security Information Manager Version 4.7
Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM
More informationCiscoWorks SIMS(Netforensics)
Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture
More informationConnectors Overview APPLICATION SECURITY ANTI-VIRUS/ANTI-SPAM CLOUD CONTENT SECURITY APPLICATIONS DATABASE ACTIVITY MONITORING (DAM)/ DB SECURITY
Connectors Overview Our library of out-of-the-box Connectors provides source-optimized collection for leading security commercial products. These products span the entire stack of event-generating source
More informationIBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
More informationHawkEye AP Log Adapter List Updated January 2014
HawkEye AP Log Adapter List Updated January 2014 Firewalls / VPN Aventail SSL VPN * Check Point Firewall-1 fwexport * Check Point Firewall-1 LEA Check Point VPN-1 * Cisco ASA (via SyslogNG) Cisco FWSM
More informationIBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM
IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product
More informationHawkEye AP Log Adapter List Updated January 2016
HawkEye AP Log Adapter List Updated January 2016 Firewalls / VPN Aventail SSL VPN * Check Point Firewall-1 fwexport * Check Point Firewall-1 LEA Check Point VPN-1 * Cisco ASA (via SyslogNG) Cisco FWSM
More informationLogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0
LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0 LogLogic Security Event Viewer and Security Event Manager offer scalable and comprehensive data security assistance monitoring
More informationREQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM
REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM Proposal Release Date: AUGUST 20 th 2008 Proposal Due Date: SEPTEMBER 16 th 2008 TABLE OF CONTENTS 1 - INTRODUCTION...
More informationReference Guide. Skybox View 7.0.600. Revision: 11
Reference Guide Skybox View 7.0.600 Revision: 11 Copyright 2002-2014 Skybox Security, Inc. All rights reserved. This documentation contains proprietary information belonging to Skybox Security and is provided
More informationExtreme Networks Security Vulnerability Assessment Configuration Guide
Extreme Networks Security Vulnerability Assessment Configuration Guide 9034869 Published July 2015 Copyright 2007 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make
More informationList of Supported Systems & Devices
List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged
More informationTripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF Tripwire Log Center HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE Enterprise organizations of all sizes need to achieve compliance with regulations and standards and
More informationPlugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo
Functionality Vendor Plugin Name AlienVault Supported Plugin Community Supported Plugin Access Control Cisco Systems cisco-acs cisco-acs-idm cisco-asa N/A sudo Antivirus Avast avast GFI Security gfi McAfee
More informationManaging Vulnerability Assessment
Security Threat Response Manager Release 2012.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-12 Copyright Notice Copyright 2013
More informationTECHNOLOGY INTEGRATION GUIDE
TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and
More informationLog Correlation Engine 4.6 Quick Start Guide. January 25, 2016 (Revision 2)
Log Correlation Engine 4.6 Quick Start Guide January 25, 2016 (Revision 2) Table of Contents Introduction... 4 Standards and Conventions... 4 Product Overview... 4 Prerequisites... 4 LCE Quick Start...
More informationTotal Protection for Enterprise-Advanced
System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)
More informationTIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
More informationTECHNOLOGY INTEGRATION GUIDE
TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and
More informationIBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Log Sources User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 108. Copyright
More informationConfiguring an ArcSight Smart- Connector to collect events from Kaspersky Admin Kit 8.0
Configuring an ArcSight Smart- Connector to collect events from Kaspersky Admin Kit 8.0 As part of a comprehensive security monitoring program, many organizations have deployed Security Information Event
More informationJuniper Secure Analytics
Juniper Secure Analytics Managing Vulnerability Assessment Release 2014.4 Published: 2015-02-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
More informationSecure Your Operations through NOC/SOC Integration
IBM Software Group Secure Your Operations through NOC/SOC Integration David Jenkins Security Consultant davidjen@de.ibm.com IBM Corporation IBM Business/Service Assurance Offering Only Tivoli s suite offers
More informationINTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE
TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and
More informationCimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
More informationJuniper Secure Analytics
Juniper Secure Analytics Managing Vulnerability Assessment Release 2014.2 Published: 2014-07-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
More informationRelease Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
More informationSelect the right security information and event management solution to automate security and compliance operations.
Security information and event management solutions Buyer s guide: purchasing criteria Select the right security information and event management solution to automate security and compliance operations.
More informationSymantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7
Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7 Symantec Event Collectors Integration Guide for Symantec Security Information Manager 4.7 The software described
More informationApplication Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationOnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
More informationJUNIPER NETWORKS STRM TECHNICAL NOTE
JUNIPER NETWORKS STRM TECHNICAL NOTE USING EXTENSION DOCUMENTS JUNE 2008 Device extensions allow you to modify how a DSM parses logs, which is useful for resolving parsing issues. However, before you define
More informationIBM Security SiteProtector System Configuration Guide
IBM Security IBM Security SiteProtector System Configuration Guide Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 209. This edition
More informationTIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationSENTINEL MANAGEMENT & MONITORING
MANAGEMENT & MONITORING Network Monitoring Server Monitoring Database Monitoring Application Monitoring End User Response Time Monitoring Virtualisation Monitoring VOIP Monitoring SLA Monitoring Knowing
More informationSupported Devices (Event Log Sources)
Operating Systems HP Insight Manager Windows Time service CISCO CatOS IBM DB2 UDB Websense WSG CISCO IOS Imperva Cisco NX OS LogBinder SP Astaro Citrix NetScaler OS MacAfee Intrushield IPS Security 110
More information24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
More informationGetting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
More informationSOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
More informationTANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
More informationWhere can I install GFI EventsManager on my network?
Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location
More informationIBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
More informationRelease Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
More informationPATROL Console Server and RTserver Getting Started
PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
More informationSecospace elog. Secospace elog
Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page
More informationAdaptive Log Exporter Users Guide
IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,
More informationCA Identity Manager. Installation Guide (WebLogic) r12.5 SP8
CA Identity Manager Installation Guide (WebLogic) r12.5 SP8 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationProduct Guide Revision A. McAfee Web Reporter 5.2.1
Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationMcAfee Security Information Event Management (SIEM) Administration Course 101
McAfee Security Information Event Management (SIEM) Administration Course 101 Intel Security Education Services Administration Course The McAfee SIEM Administration course from McAfee Education Services
More informationFileNet Business Activity Monitor (BAM) Release Notes
FileNet Business Activity Monitor (BAM) Release Notes Release 3.6.0 September 2006 FileNet is a registered trademark of FileNet corporation. All other product and brand names are trademarks or registered
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More informationMigrating to vcloud Automation Center 6.1
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationCA Anti-Virus r8.1. Benefits. Overview. CA Advantage
PRODUCT BRIEF: CA ANTI-VIRUS CA Anti-Virus r8.1 CA ANTI-VIRUS IS THE NEXT GENERATION IN COMPREHENSIVE ANTI-VIRUS SECURITY FOR BUSINESS PCS, SERVERS AND PDAS. IT COMBINES PROACTIVE PROTECTION AGAINST MALWARE
More informationCitrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
More informationIBM Tivoli Monitoring for Applications
Optimize the operation of your critical e-business applications IBM Tivoli Monitoring for Applications Highlights Helps maintain the performance and availability of your application environment including
More informationRSA Authentication Manager
McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: RSA Authentication Manager February 26, 2015 RSA Authentication Manager Page 1 of 9 Important Note: The information contained
More informationQuick Install Guide. Lumension Endpoint Management and Security Suite 7.1
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
More informationSymantec Endpoint Protection Shared Insight Cache User Guide
Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and
More informationJuniper Secure Analytics Release Notes
Juniper Secure Analytics Release Notes 2014.5 February 2016 Juniper Networks is pleased to introduce JSA 2014.5. Juniper Secure Analytics (JSA) 2014.5 Release Notes provides new features, known issues
More informationDesktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationMcAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationNovell Sentinel Log Manager
AUTHORIZED DOCUMENTATION Installation Guide Novell Sentinel Log Manager 1.1 December 2010 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents
More informationIntegrated Citrix Servers
Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights
More informationAhsay Replication Server v5.5. Administrator s Guide. Ahsay TM Online Backup - Development Department
Ahsay Replication Server v5.5 Administrator s Guide Ahsay TM Online Backup - Development Department October 9, 2009 Copyright Notice Ahsay Systems Corporation Limited 2008. All rights reserved. Author:
More informationRebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
More informationSymantec Event Collector 4.3 for Microsoft Windows Quick Reference
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement
More informationCA Workload Automation Agent for Databases
CA Workload Automation Agent for Databases Implementation Guide r11.3.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
More informationOracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (10.1.3.4.
Oracle Business Intelligence Publisher Certification Information 10g Release 3 (10.1.3.4.2) E12692-08 September 2011 This document outlines the certified hardware and software configurations for Oracle
More informationSetting up an icap Server for ISG- 1000/2000 AV Support
Application Note Setting up an icap Server for ISG- 1000/2000 AV Support Version 1.1 Ronald Ng AJTAC Engineer AV/DI/UF Specialist Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA
More informationHP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
More informationMcAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationNational Information Assurance Partnership
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report NetIQ Security Manager Version 5.5 Report Number: CCEVS-VR-07-0058 Dated: 9 August 2007
More informationMcAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
More informationSymantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference
Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license
More informationUser Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software
User Guide FIPS Mode For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationSIEMENS. Teamcenter 11.2. Windows Server Installation PLM00013 11.2
SIEMENS Teamcenter 11.2 Windows Server Installation PLM00013 11.2 Contents Part I: Getting started with Teamcenter server installation Requirements and overview.............................................
More informationMcAfee Host Intrusion Prevention 8.0.0 Patch 6 Software
Release Notes McAfee Host Intrusion Prevention 8.0.0 Patch 6 Software For Windows For use with McAfee epolicy Orchestrator Contents About this release New features Resolved issues Installation instructions
More informationSC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
More informationMcAfee Database Activity Monitoring 5.0.0
Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationA CrossTec Corporation. Instructional Setup Guide. Activeworx Security Center Quick Install Guide
A CrossTec Corporation Instructional Setup Guide Activeworx Security Center Quick Install Guide PREPARED BY GARY CONKLE Activeworx Basic Installation and Configuration Guide CrossTec Corporation 500 NE
More informationGFI Product Manual. Deployment Guide
GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
More informationMcAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationCA IdentityMinder. Installation Guide (WebLogic) 12.6
CA IdentityMinder Installation Guide (WebLogic) 12.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationMcAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
More informationSupported Log File Formats
Supported File Formats Vendor/Product Format Analyzer Standard Analyzer Premium & Analyzer Giga Vantage & Vantage Giga 3Com 3Com 8e6 R2000 8e6 R3000 Aladin Esafe Blocked s Allied Telesyn ATI Level 3 Switch
More informationJuniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy
Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Customer Challenges Dispersed Threats IT Overload IT information overload Flood of logged events from many point network
More informationInstallation Guide. McAfee VirusScan Enterprise for Linux 1.9.0 Software
Installation Guide McAfee VirusScan Enterprise for Linux 1.9.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationInstallation Guide. Sentinel Log Manager 1.2.2. July 2014
Installation Guide Sentinel Log Manager 1.2.2 July 2014 Legal Notice NetIQ Sentinel is protected by United States Patent No(s): 05829001. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationQuick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
More informationIBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic
IBM Security IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic Version 3.0 Note Before using this information and the product it supports, read the information in Notices
More informationCA Service Desk Manager Release 12.5 Certification Matrix
CA Service Desk Manager Release 12.5 Certification Matrix Last Updated: February 11, 2014 End-of-Service: May 31, 2013 CA Service Desk Manager will support service-packs and point-releases of Operating
More informationGetting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
More informationWorld-class security solutions for your business. Kaspersky. OpenSpaceSecurity
World-class security solutions for your business Kaspersky Open Open Kaspersky Open Space Security is a suite of products that offers security coverage for all types of network endpoints, from mobile devices
More information