Corporate Software Inspector

Size: px
Start display at page:

Download "Corporate Software Inspector"

Transcription

1 Corporate Software Inspector - Integrated with Microsoft WSUS & SCCM for 3rd Party Patch Management - CSI Setup and Usage guide Server Edition -Rev

2 Table of Contents 1. About Secunia About Secunia Research The Secunia CSI Integrated with Microsoft WSUS & SCCM for 3rd Party Patch Management The Scan Process how does it work Patch Management how does it work Installation and System Requirements CSI Operational Requirements CSI GUI/Console Prerequisites CSI with Patching Capability Agent-based Scan - Requirements Scan Groups/Agent-less Scan - Requirements Setting Up Clients to Access WSUS Installing the Secunia CSI GUI How Can I Scan Target Hosts? Agent installation Single Host mode Agent Installation Network Appliance Mode Troubleshooting Scanning Remote Scanning via CSI Quick Scan Scan Groups Scan Progress Remote Scanning via Agents Network Appliance Agents Network Appliance Groups Agent Download & Setup Scanning via Local Agents Single Host Agents Agent Download & Setup Filter Scan Results Scan Paths Ignore Rules Completed Scans Results Sites Hosts Programs and Operating Systems All Insecure Patched Categories Reports Dashboard Change Summary Generate Reports View Scheduled Reports Patch Create Available Deployment Configuration Step 1 Connection Status Step 2 Certificate Status Step 3 Group policy Agent Deployment /45

3 10. Configuration Settings Suggest Software Reset Password Support Manual & FAQ Microsoft WSUS Changelog Contact Information Secunia Advisories About Secunia advisories From (attack vector) Criticality Impact Other Frequently Used Terms Technical Support...31 Appendix A: FAQ...32 Appendix B: Proxy Settings...33 Appendix C: Deploying Agents on a Network via GPO...34 Appendix D: Setup Examples...38 Appendix E: Install the WSUS Administration Console...39 Appendix F: User Management...40 Appendix G: Accessing the CSI Local Database...41 Appendix H: CSI Agent Single Host Mode & Appliance Mode /45

4 1. About Secunia Secunia is an independent, world-leading provider of Vulnerability Intelligence. Our aim is to give you exactly the intelligence you need, which enables you to address vulnerabilities quickly and effectively before intruders cause serious harm to your organisation. We have no ties to specific vendors, nor any strings or bias that go with such ties. We provide objective and verified analyses in the manner and format of your choice. Whether you control security from a central security department or have distributed security responsibilities, our services assure that you receive the security alerts relevant to your IT infrastructure instead of having to spend vast amounts of time browsing through information with questionable relevance. The vulnerability issue cannot be denied. very corporation faces the certain knowledge that vulnerabilities in the IT infrastructure can be used to compromise security. This represents an extra challenge for the person responsible for IT: How can you protect your IT infrastructure more effectively? How can you make sure that you have all the Vulnerability Intelligence you need? How can you do this without spending too much time and effort investigating and evaluating loads of unstructured information compiled from various sources? And how do you achieve the best possible fit with your other security tasks, like compliance, ACL, user management, etc? policy Save both time and money with our solutions, you can rely on being alerted pre-emptively with a full verification and analysis of any vulnerability that could compromise your network security. Furthermore, our solutions give you the tools to both manage your network security and keep it updated at all times. Imagine a solution that ensures you are alerted when someone discovers a major vulnerability in one of your key applications. Imagine that this solution alerts you, even if the vendor does not. Imagine that this solution presents the alert in a comprehensive manner, verifies the exact issue, and tells you how to deal with it in the best possible way and provides you with the tools necessary to eliminate the threat effectively. No more unnecessary worries. No more wasted time trying to keep track of Vulnerability Intelligence. No more guilty conscience about not being able to cover so much ground. 4/45

5 2. About Secunia Research Our experts monitor all available intelligence on vulnerability issues, subscribe to all securityrelated sites, newsgroups and newsletters, and are in ongoing dialogue with vendors regarding vulnerability issues. In addition, our vast network with the industry ensures that we have access to all vulnerability alerts available. Once a vulnerability has been identified, an advisory is issued based on the expertise of the Secunia Research team. The advisory includes thorough analysis, allowing you to evaluate and eliminate the vulnerability immediately. With the Secunia Enterprise Vulnerability Manager solution, you can be at the forefront in eliminating vulnerabilities. With the Corporate Software Inspector you will be pre-emptive in eliminating vulnerabilities and in protecting your network against outside threats. The cutting-edge technology combined with the expertise of the Secunia Research team will enable you to track and eliminate any vulnerability that poses a threat to your network. Professionals rely on Secunia. As a customer, you will have the most comprehensive Vulnerability Intelligence in the palm of your hand and filtered to your specific needs, thus ensuring that you have access to accurate and relevant information. The Vulnerability Intelligence is available in your own customised area, which is updated and accessible 24/7. The Secunia blog is used to communicate our opinions about vulnerabilities, security, ethics, and our responses to articles, research papers, and other blog entries regarding Secunia and vulnerabilities. Please find our blog on this link: Besides the Secunia Corporate Software Inspector, other Secunia solutions include: Intuitive, fast, and easy to use SSL-encrypted web-based interface accessible 24/7. Filtering and management of Secunia Advisories. Overview, documentation, and detailed reports. Vulnerability Scanning of your IP addresses and software. Customised alerting via and SMS. 5/45

6 3. The Secunia CSI Integrated with Microsoft WSUS & SCCM for 3rd Party Patch Management The Secunia CSI is an authenticated internal vulnerability scanner, capable of assessing the security state of practically all legitimate programs running on Microsoft Windows platform. The Secunia CSI also integrates with Microsoft WSUS & SCCM for easy deployment of 3 rd party updates, making patching a simple and straight-forward process for all IT departments. The Secunia CSI utilises the Secunia Advisory & Vulnerability Database to assess the security state of detected programs, thus making the vulnerability intelligence foundation for the Secunia CSI superior in every aspect, especially compared to competitive solutions that rely on ad-hoc/random vulnerability information gathering from various sources. Furthermore, the Secunia CSI's unique and unparalleled scan engine technology is capable of detecting programs based on actual data on the file system, which is extremely reliable compared to making assumptions based on inaccurate/out-of-date information from, e.g., the Windows Registry, which is what many of the competitive solutions do. Since the Secunia CSI is running as a trusted application with the purpose of assisting the system administrator, it can take a light-weight, but much more in-depth approach, suited for internal vulnerability scanning. Furthermore, the Secunia CSI is already running with administrative privileges on the network and thus is capable of logging into the systems being scanned. It can read data from files on the hard-drive of the scanned system and assess whether the installed programs are vulnerable or not, cross-referencing with Secunia Vulnerability Intelligence. 3.1 The Scan Process how does it work The first process of scanning a system is to collect specific META data from primarily.exe,.dll, and.ocx files on the system being scanned. META data is generic non-sensitive text strings embedded in the binary files from the vendor of the program. This data is collected and then sent to Secunia's Secure Data Processing Cloud (DPRC) where it is processed and parsed. After being processed, the data is matched against the Secunia File Signatures, which are the rules that match the raw META data to an actual program installation. Part of this matching process also results in an exact version being extracted from the META data. This means that after the initial parsing the Secunia CSI knows exactly which programs are on the system and their exact version a precise inventory of software on the system. The inventory of software is then compared against the unique Secunia Advisory & Vulnerability Database, which contains the most accurate and current Vulnerability Intelligence available. The result is a precise inventory of programs, their versions, and the exact security state of each, along with a direct reference to the corresponding Secunia Advisory detailing the exact vulnerabilities and their Secunia assessed criticality and impact. Since the scan process works by looking at the actual files on the system being scanned, the result is extremely reliable as a program cannot be installed on a system without the actual files required being present. This in turn means that the Secunia CSI rarely identifies falsepositives and thus the customer can use the result from the Secunia CSI immediately without doing additional data mining! 3.2 Patch Management how does it work Patching of vulnerable software, in particular 3rd party software which is not supported by Microsoft WSUS, has been a cumbersome and resource demanding process causing many enterprises to either neglect patching or only patch very few non-microsoft applications. Through the seamless Microsoft WSUS & SCCM integration with the Secunia CSI the patching process has been simplified and can literally be conducted with a few simple clicks. Patch Management has never been easier and more straightforward than with the Microsoft WSUS & SCCM and the Secunia CSI integration. 6/45

7 4. Installation and System Requirements 4.1 CSI Operational Requirements The following section describes the operational requirements needed by the Secunia CSI 4.1 taking into consideration the different components/features CSI GUI/Console Prerequisites In order to install and run the Secunia CSI 4.1 Console (Graphical User Interface), the following requirements should be met: The CSI Console must be launched by a user with Domain Admin1 privileges http(s)://your-server-domain or http(s)://your-server-ip must be added to the Trusted sites in the Internet Options of IE Connection - Port 80 or 443 (see Appendix C in Server installation Guide) open inbound to the Secunia CSI server Minimum 1024 * 768 screen resolution CSI with Patching Capability To successfully create updates the following requirements should also be present: WSUS installer (Administration console only, please refer to Appendix E) Visual C runtime Microsoft.NET runtime V2.0 SP2 When running the Secunia CSI 4.1 for the first time in Windows Vista, 7 or 2008, rightclick the CSI icon and select 'Run as administrator' Remote Registry must be enabled to successful install the certificates (In Vista and Win7 this service is by default disabled) Agent-based Scan - Requirements The Secunia CSI provides enough flexibility that it can be easily adapted to your environment. If you choose to scan using the installable Agent2 (Agent-based scans), please consider the following requirements that should be present in the target hosts: Administrative privileges (to install the CSI Agent csia.exe) Microsoft Windows 2000, XP, 2003, 2008, Vista and 7 Connection - Port 80 or 443 (see Appendix C in Server installation Guide) open inbound to the Secunia CSI server Windows Update Agent 2.0 or later Scan Groups/Agent-less Scan - Requirements If you prefer to scan without installing the CSI agent (Agent-less scans), please consider the following requirements that should be present in the target hosts: Ports 139/TCP and 445/TCP open inbound (on hosts) File sharing enabled on hosts Easy/simple file sharing disabled Windows Update Agent 2.0 or later Required Windows services started on hosts (should be by default): Workstation service Server service Remote Registry service COM+ services (COM+ System Application: Set to Automatic) 1 The user running the Secunia CSI must have the necessary privileges so it can perform tasks such as: configure/connect to Microsoft WSUS, perform remote scans to hosts in the network, install the necessary certificates so client machines can accept the packages created by the Secunia CSI. 2 Section 4.4 Agent installation - Single Host mode 7/45

8 4.1.5 Setting Up Clients to Access WSUS The Secunia CSI 4.1 uses the WSUS update mechanism so that updates/patches become available to clients in your network. In this way, it is important to configure your clients to access the WSUS server. When connecting the Secunia CSI to a WSUS server for the first time, you will get prompted by the CSI Group Policy wizard1, through this wizard you can easily create a Group Policy that will enable your clients to get updates from the WSUS server. If you choose not to create a new Group Policy using the 'CSI WSUS Group Policy' wizard, please edit your existing WSUS Group Policy in the following manner: 1) In the Group Policy Management Console (GPMC), browse to the Group Policy Object (GPO) on which you want to configure WSUS, and then click Edit. 2) In the GPMC, expand Computer Configuration, expand Administrative Templates, expand Windows Components, and then click Windows Update. Enable: Configure Automatic Updates (choose your settings) Enable: Specify intranet Microsoft update service location. (Add the hostname/ip of your WSUS server). Enable: Allow signed updates from an intranet Microsoft update service location. (Important enables WSUS to distribute patches through the Secunia CSI) Please refer to section 9.4 Configuration to read about the 'WSUS Publishers Self-Signed' certificate installation. For installing the WSUS server we recommend reading the Step by Step Installation Guide provided by Microsoft: Installing the Secunia CSI GUI Please follow the below steps in order to install the latest version of the Secunia CSI 4.1: Download the Secunia CSI installer from your server. http(s)://your-server-domain/csisetup.exe or http(s)://your-server-ip/csisetup.exe Double click the installer icon and follow the wizard instructions. Launch the Secunia CSI as Domain Administrator, i.e. right-click and 'Run as administrator' (if running on Windows Vista, 7 or 2008) Login with your CSI Account credentials (User name/password) You will be prompted to reset your password. We strongly recommend the user proceeds with the password reset since the first Secunia password will expire after the first login. Upgrading from a previous version of the Secunia CSI, i.e. CSI2.x, to Secunia 4.1 is not possible! Supported Microsoft Operating Systems: Windows 2000 SP4 Windows XP SP3 Windows Vista (x86/x64) Windows 7 (x86/x64) Windows Server 2003 Windows Server 2008 (x86/x64) 1 Section Step 3 Group policy 8/45

9 4.3 How Can I Scan Target Hosts? The Secunia CSI allows scanning of target hosts by using different approaches, namely: Scan the target hosts by launching a scan from the system where the Secunia CSI Console is installed. By using this approach, no software is installed in the target hosts. The scanning is made by using standard operating system services. Please check sections: Scan Groups/Agent-less Scan - Requirements and Scan Groups. Alternatively, you can perform Agent-based scans. This type of scan is conducted by the Secunia CSI agent that can be installed in different modes: Single Host Mode, Network Appliance Mode, or Command Line Mode. Please refer to section Agent Download & Setup for more details. The following sections describe in greater detail the agent installation in Single Host Mode and in Network Appliance Mode. 4.4 Agent installation Single Host mode The Secunia CSI provides different scan approaches, enabling you to select the one that best suits your environment, the Agent-based deployment is more robust and flexible for segmented networks or networks with mobile clients (e.g., laptops). Once installed, the agent will silently run in the background, even behind a firewall. Example: Install the CSIA.exe (Agent) in Single Host mode, download the agent from the CSI console in 'Scan-> Scheduled Scan-> Download Agent'. Please refer to section Agent Download & Setup for further details. NOTE! Make sure that the agent is locally present in a local folder on the target PC before installing. Once the agent is installed, every time the laptop goes online (Internet connection) it will verify if a new scan should be conducted. After scanning, the result will show up in 'Scan-> Completed Scans' in the Secunia CSI Console, allowing full control to scan and view results of hosts that are not always connected to your network. Result: Hosts scanned with the Agent in Single Host mode will show in 'Results-> Hosts'. When and how the hosts are scanned can be controlled from the Secunia CSI console under 'Single Host Agents'. Right-click a host name and select Edit Configuration to change the agent settings. Install the Agent from the command prompt with local Admin account using: >csia.exe -i -L By using the -L parameter, the agent will be installed as a service running under the LocalService user account. If you are a member of a domain and you don't use the -L switch, the service will be installed under the user account performing this action, thus granting the 'logon as a service' privilege. However this privilege is usually removed in the next GPO background refresh, since domain policies will not allow it. As a consequence, the Agent will stop working after the privilege has been removed. 9/45

10 Example of an installation: 4.5 Agent Installation Network Appliance Mode Network Appliance Agents are one solution for scanning one or more networks at scheduled intervals without having to install the Agent in every single target host. With the CSIA.exe installed in Appliance mode, you will have the ability to schedule remote scans. The hosts to be scanned can be identified by an IP-range, IP-network or Host-name. The CSI console allows you to easily manage the scans being done by the Appliance agent. NOTE! Make sure that the agent is locally present in a local folder on the PC before installing. Example: If you want to scan three different networks (i.e. Germany, United States, and United Kingdom) without having to install the agent in single host mode, then you can install three instances of CSIA.exe in Network Appliance mode, one on each network. Afterwards you will be able to scan all the hosts on the three locations at scheduled intervals. This is done by creating the appropriate scan groups in 'Scan-> Scheduled Scanning-> Network Appliance Groups' and assigning each group to its respective and previously installed Network Appliance Agent. Result: After installing a CSIA.exe in Network Appliance mode, the Appliance agent will appear in 'Scan-> Scheduled Scanning-> Network Appliance Agents'. To specify the target host to be scanned by the Appliance mode agent, please configure the scan group in 'Scan-> Scheduled Scanning-> Network Appliance Groups' Installing the Network Appliance Agent from the command prompt: >csia.exe -A -i It is very important that the CSIA.exe is installed with the correct credentials. The user installing the Appliance Agent must have admin rights to all the target hosts that will be scanned by the Appliance Agent. Example of an installation: 4.6 Troubleshooting If the Secunia CSI 4.1 fails to launch properly, please consider the following support resources: Appendix A: FAQ Online FAQ available in Also, examples of different Agent setups are provided in Appendix D: Setup Examples. 10/45

11 5. Scanning 5.1 Remote Scanning via CSI The following options are listed under 'Scanning' : Quick Scan Scan Groups Scan Progress Through these you can perform and monitor the progress of scans conducted on your PC and/or remote hosts on your network. These scans are performed in an Agent-less manner and is important to mention that the credentials used by the Secunia CSI to authenticate on the target hosts will be the same as those of the user that launched the Secunia CSI Console. Please consider the system requirements for the Scan Groups / Agent-less scans, described in section Scan Groups/Agentless Scan - Requirements Quick Scan Simply enter the Computer name and/or IP-address range for the hosts you wish to scan in the 'Enter hosts to scan' area and press the 'Scan Hosts' button. The scan progress will be available 'Scan Progress' Scan Groups Through this option you can create 'Scan Groups' by choosing which hosts you would like to scan for vulnerabilities. After pressing the 'New Scan Group' button, a new window will appear. In this new window you can create and configure a group of hosts to be scanned. After navigating through the different tabs: 'Name & Scan Type', 'IP Ranges', 'IP Networks and Hosts & IPs', press the 'Save' button to save and create the scan group. To start a scan on a previously created group, right-click the group name and select 'Scan Now'. 11/45

12 Please consider the system requirements for the Scan Groups / Agent-less scans mentioned in section Scan Groups/Agent-less Scan - Requirements Scan Progress Through this view you can track the scans being conducted. If you wish to configure the number of simultaneous scans threads, please see section 10. Configuration of this document, the default value is set to Remote Scanning via Agents Network Appliance Agents In this screen you can manage configurations and schedule scans for the hosts where the Agent is installed as a service in Single Host Mode. Double click a row to manage the configuration of the selected agent and change its settings (Inspection type, Check-in frequency, Days between scans). If you right-click on a host name and select 'Edit site configuration' you will be able to manage the configuration for all the hosts in that Site. 12/45

13 5.2.2 Network Appliance Groups In this screen you can create a target group that will be scanned by a Network Appliance Agent. Press the 'New Group' button to start creating a new target group that will be remotely scanned by one of the Network Appliance Agents previously installed Agent Download & Setup The Secunia CSI Agent (CSIA.exe) is a small, simple, customisable and extremely powerful Secunia CSI scan engine that offers a fully featured command line interface (CLI) to the Secunia CSI scanning functionality. In this screen it is possible to download the csia.exe file as well as read an explanation of the Network Appliance and Command Line Agent modes. NOTE! Make sure that the agent is locally present in a local folder on the PC before installing. 5.3 Scanning via Local Agents Single Host Agents In this screen you can manage configurations and schedule scans for the hosts where the Agent is installed as a service in Single Host Mode. Double click a row to manage the configuration of the selected agent and change its settings (Inspection type, Check-in frequency, Days between scans). If you right-click on a host name and select 'Edit site configuration' you will be able to manage the configuration for all the hosts in that Site. The hosts scanned with the CSIA.exe will be grouped by Site. By default the domain name will be used as a Site name. To change a Site name, please refer to section 7.1 Sites. You can also specify a Site name when installing the agent, by using the -g parameter or by specifying a site name in the special parameters when creating the agent deployment package, 9.5 Agent Deployment Agent Download & Setup The Secunia CSI Agent (CSIA.exe) is a small, simple, customisable and extremely powerful Secunia CSI scan engine that offers a fully featured command line interface (CLI) to the Secunia CSI scanning functionality. This allows you to run CSI scans directly from the command line, to embed the Agent in a command script or to distribute it through WSUS/SCCM. Please refer to section 9.5 Agent Deployment to deploy the csia.exe through WSUS/SCCM, or check Appendix C: Deploying Agents on a Network via GPO, to get a better understanding of how to deploy the CSIA.exe via Group Policy. 13/45

14 The 'csia.exe' file is a customised executable, unique and private for your Secunia CSI account. This means that the CSIA.exe automatically links all scan results to your Secunia CSI account. Make sure that the agent is locally present in a local folder on the PC before installing. 5.4 Filter Scan Results This feature will allow you to filter your scan results, either by restricting/allowing the scanning to specific paths or by creating ignore rules that are applied to a scan after its completion Scan Paths This feature allows a user to specify Whitelist or Backlist paths. If using the Whitelist, the paths specified will be the only paths that will be investigated by the scanner. All other paths will be ignored. If using the Blacklist, the specified paths will be ignored and all other paths will be investigated by the scanner. Use this feature with caution. By using the Scan Path Rules some of your paths will be excluded from the scan. Thus, the Secunia CSI will not alert you towards excluded insecure programs, even if they potentially expose your hosts to security threats. It is not possible to simultaneous use both Blacklist and Whitelist Ignore Rules Through this feature the user can create and maintain 'Ignore Rules' for excluding specific content from results and reports. These ignore rules can be applied to backup directories or inactive programs. Once you have configured an 'Ignore Rule', press 'Save' to make the rule effective. The rule will be applied to all new scan results generated by the Secunia CSI. 6. Completed Scans This option gives you a complete list of all performed scans, including the result of those scans. The sorting of both lines and columns can be defined by the user, thus allowing the user to create the layout that best suits their needs. The column's position can be modified by dragging and dropping the selected column to the desired position. To see the details of a scan result, double click or right-click on an entry of the presented table. A new window similar to the one shown below will be displayed. 14/45

15 Programs matching the conditions defined in 'Filter Scan Results' will be excluded from scan results, meaning that the Secunia CSI will not provide information about insecure programs that are potentially exposing your IT environment to security threats. 7. Results 7.1 Sites This view will display all the Sites maintained within your account. You can easily double click a Site name to see its hosts. By rightclicking a Site you can change or view its hosts. Scanned hosts will be grouped in a Site with the same name as the domain they log on to. You can easily right-click a Site to change its name if you prefer to use a different naming standard. In this view you can also compare the performance of the different Sites over a specific time frame, by selecting which Sites you would like to see displayed in the Trend Reporting section. 7.2 Hosts This view will show all the hosts maintained within your account. Double click a host in the presented table to view additional details about the programs installed on that particular host, as well as the current security state of those programs. From this view you can easily move hosts to a new or existing Site by right-click the host name and choosing 'Edit Site'. A graph showing the evolution of the selected host will also be displayed. To generate a graph for more than one host, do a multiple selection of the hosts that you would like to view in the chart area (up to 15 hosts simultaneously). 15/45

16 7.3 Programs and Operating Systems By selecting 'Programs' or 'Operating Systems', you can easily see all the Programs or Operating Systems found through the CSI scans. For a matter of convenience the found software is sorted in accordance with its security status: Insecure, End-of-Life or Patched All In this screen you are presented with a list containing all the unique Programs / Operating Systems installed on the scanned hosts. Double click in any row to view a full report with extensive details about the actual hosts, versions, and security states Insecure This view lists all unique Insecure programs installed on the scanned hosts, including their criticality rating. Double click in any row to view a full report with extensive details about hosts, versions, and security states End-of-Life This view lists all unique End-of-Life programs installed on the scanned hosts, including their criticality rating. Double click in any row to view a full report with extensive details about the actual hosts, versions, and security states Patched This view lists all unique Patched programs installed on the scanned hosts. Double click in row to view a full report with extensive details about the actual hosts, versions and security states. 7.4 Categories This feature allows the user to create and manage software categories. By having different categories you can easily identify specific software that was found during the scans. To add a software product to a previously created category, simply drag and drop the product into the desired category. The categories created can be used to easily find specific products from the the scan results. To do so, go to 'Results-> Programs-> All' and select the category to filter the programs being listed. Based on the result of the filter you can now right-click and select 'View installations'. 16/45

17 8. Reports This section groups the Secunia CSI reporting features, namely the 'Dashboard', the 'Change Summary', the 'Generate Reports' and 'View Scheduled Reports'. In the next sections a more detailed explanation for each of these features will be given. 8.1 Dashboard The Dashboard is the main window of the CSI GUI that summarizes information collected by the Secunia CSI. The information presented in the dashboard can be customised in order to better suit the user's needs. This customisation is done by adding or deleting the available 'portlets'. Each 'portlet' provides specific information. To better manage the information presented in the Dashboard, a user can create several profiles. Each profile stores information about the 'portlets' being displayed - for convenience, a user can create and alternate between several dashboard profiles. For each dashboard profile created, a static URL is available. The user can use the static URL to publish the dashboard into another system simply by copying the Static Dashboard URL. 8.2 Change Summary This feature allows you to receive s containing a Change Summary that covers changes related to added/removed programs, updated programs, and insecure programs. 17/45

18 18/45

19 8.3 Generate Reports This feature contains a three step wizard to schedule report generation based on the state of all hosts and programs associated with your account at the time of generation Step 1 Choose the type of report. Step 2 Select which hosts or programs you would like to include in the report. If in the previous step you have selected the Executive Summary Report, step 2 is not applicable. Step 3 Select the report options (if any) that are specific to the type of report selected in step 1. Optionally you can also choose a file name that will be used to name the.pdf file containing the report. Select if you want to schedule the report and its recurrence and/or if you want the report to be ed as soon as possible. Specify the recipients for the report or select the address entered in 'Configuration-> Settings'. Once this is done, press the 'Schedule Report Generation' button. At any time you can go directly back to step 1 and start over by pressing the 'Return to step 1' button. Data entered without scheduling a report will not be saved or persist. All the reports available through this feature are provided in.pdf format and will be ed to the defined addresses in accordance with the schedule and recurrence specified. The s containing the.pdf reports will be sent from no-reply@secunia.com 19/45

20 8.4 View Scheduled Reports In this feature you can see all the report generation schedules that were set up. Right click on a given schedule to delete it from the database. The 'Reporting On' and ' Recipient List' fields may be long - in this event, you can mouse over the value to see the entire field. You can also remove any fields from the view if desired by click in a column name and selecting which fields should be added/removed. 9. Patch The following sections are dedicated to the Patch Management functionality available in the Secunia CSI. The features related to Patch Management are accessible from the tree Menu located on the left hand side by expanding the Patch section. 9.1 Create This feature shows programs that have Insecure or End-of-Life installations. To see the complete list of programs that should be patched, please clear the check box: 'Show only Insecure/End-of-Life programs for which update packages can be automatically created'. To create an update package, double click or right-click on the program you wish to update. The Create Update option will be displayed. If you choose to patch one of the greyed out products, a warning message will be displayed. These programs are greyed out because the vendor doesn't provide silent installation parameters. If you choose to proceed, you must provide the.msi/.msp/.exe file that will be used by the Secunia CSI to create and publish the update. This file should be a custom package that you have created. 20/45

21 In the Create Update window, select the installations you wish to update (use CTRL + mouse click for multiple selection). When finished, press the 'Next' button. In the next window you will be presented with the link to download the patch directly from the vendor's site. If you choose to patch a product for which the vendor has not provide the silent installation parameters, these will not be available. After downloading the patch, browse to the file that you have just downloaded. If you did not download the patch from the vendor, you should select the custom made package (.exe/.msi/.msp) that the Secunia CSI will repackage and publish to WSUS. After selecting the correct file, you can edit the silent installation parameters if you wish to. Press the 'Next' button to continue. In the next dialogue message you will have the opportunity to change the package name. If you wish to proceed, press 'Finish'. The created package will now be published to your WSUS server. Go to 'Available' from the menu on the left to view all published updates. 21/45

22 If using Microsoft System Center Configuration Manager (SCCM), the package created with the Secunia CSI will be available in your SCCM. In the example below the package created with the Secunia CSI is available in SCCM after running a synchronization at the 'Update Repository' level. The title of the update will include the criticality of the vulnerability addressed by that specific update. 9.2 Available In this screen you are presented with all the locally created packages that are available for your clients. Double click a package from the list below to view additional details about its status. Or right-click for more options, such as Approve, Decline or Delete. 22/45

23 9.3 Deployment In this screen you are presented with a host's information collected from the WSUS Server. By double clicking a host in the list you can view additional details about its 'Scan Result', 'Patch Information', 'Patches Available' and 'Overview'. Also, by right-clicking in a host listed in this view, you can perform actions such as: verifying the additional information stated above or 'Verify and Install Certificate', thus installing the required Certificate on the selected hosts. In order to successfully install certificates, make sure you have started the Secunia CSI with Domain Administrator privileges. In Vista, Windows7 or Windows 2008, this should be done by right-clicking on the CSI icon and selecting 'Run as administrator'. Also, note that the Remote Registry must be enabled on the hosts for which you intend to install the certificate using the CSI GUI. The WSUS Self-Signed certificate can also be installed through a Group Policy. Please check our online FAQ for detailed instructions. 23/45

24 9.4 Configuration In this section you can configure the integration of the Secunia CSI with your WSUS server(s). If you have a single WSUS server, which is connected to Microsoft Update, running the 'Configure Upstream Server' wizard will be sufficient for setting up the Secunia CSI with WSUS. If you have a WSUS server hierarchy with one or more Downstream WSUS server(s) connected to an Upstream WSUS server, please run the 'Configure Downstream Servers' after running the 'Configure Upstream Server' wizard. After pressing the 'Configure Upstream Server' button, a configuration wizard will be initiated. Follow the wizard steps to successfully configure the Secunia CSI with Microsoft WSUS Step 1 Connection Status In this section you should provide the relevant information (IP-address / DNS-name) regarding the WSUS server you wish to use. After inserting the necessary information, press 'Connect'. To check the status of the connection expand 'Step 1.Connection Status'. Please note that the port number used to connect to your WSUS depends on your settings. Ports 80 or 8530 are commonly used when SSL is not configured Step 2 Certificate Status Here you can create and install a WSUS Self-Signed Certificate in all appropriate certificate stores. A WSUS signing certificate is required to create and install local packages. Without it, only packages from Microsoft Update will be installed. 24/45

25 Click 'Automatically create and install certificate' to install the certificate in the appropriate certificate stores. The certificate will be installed on this system and on your WSUS server in the following stores: 1) "Trusted Root Certification Authorities" 2) "Trusted Publishers" Expand the 'Certificate Options' to have access to the import and export certificate features. If you would like to use your own certificate you can do so by using the Import Signing Certificate button. Please be aware that in order to import a certificate through the Secunia CSI, the WSUS connection must be configured to accept SSL connections Step 3 Group policy A Group Policy is required to distribute certificates and locally created packages, the Secunia CSI can easily create this GPO so the WSUS Signing Certificate is distributed to all clients. Please choose if either you use WSUS or SCCM, once this is done expand the Group Policy Options. If creating the CSI WSUS Group Policy for the first time, proceed by selecting all the options and then press the button 'Create Group Policy'. 25/45

26 It is also worth mentioning that the WSUS Self Signing Certificate must be installed in the following systems: WSUS Server (9.4.2 Step 2 Certificate Status) The system running CSI2 (9.4.2 Step 2 Certificate Status) Clients receiving the Updates (9.4.3 Step 3 Group policy) Besides distributing the certificates through the CSI WSUS GPO, it is also possible to install the certificate in the target computers by going to 'Patch-> Deployment', selecting the target computers where the certificate is to be installed (CRTL+ mouse click for multiple selection) and then right-click and select 'Verify and Install Certificate'. If you prefer to create your own Group Policy to distribute the WSUS Signing Certificate, please refer to our online FAQ. In case the user chooses to not create the CSI WSUS Group Policy the existing Windows Updates GPOs must be edited in accordance with section Setting Up Clients to Access WSUS of this document. Also make sure that the required certificates are properly installed in accordance with section Step 3 Group policy. If you use Microsoft SCCM please make sure you do not check the first option 'Use the WSUS Server specified in the CSI'. If you already have the Windows Updates being configured through a Group Policy, we suggest you check the first 3 options in the 'Create a new CSI WSUS Group Policy' window. Then the CSI WSUS Group Policy will be created but not linked to your domain. This way you can easily check the details of the newly created GPO and verify that the existing WSUS GPO's are correctly configured. 9.5 Agent Deployment If you choose to scan the target host by using the Secunia CSI Agent in Single Host Mode (recommended), you can easily distribute and install the agent by deploying it through WSUS. To start the CSI Agent Package wizard click 'Create CSI Agent Package'. In the wizard window, download the Secunia CSI Agent setup file by clicking in the link 'CSIASetup.exe'. Once the 'CSIASetup.exe' has been downloaded, locate the file using the 'Browse' button. The silent install parameters will be automatically included by the wizard. Additional parameters can be included by filling the correspondent fields. Click the 'Finish' button to create an installer package. 2 Note that the certificate must also be installed on the system running the CSI console. 26/45

27 After the package has been created, it will appear in the list of packages in 'Patch-> Available'. Right-click on the package name in order to manage it just like any other package created by the Secunia CSI. 10. Configuration This section is dedicated to the CSI Settings, the Suggest Software and Reset Password features Settings In this screen you are able to configure the Secunia CSI to fit your preferences, namely: The option to start the Secunia CSI automatically with the system start-up. Define the number of simultaneous scan threads. Please note that the number of simultaneous scan threads will not affect the scans being performed by the CSIA (Agent), since these scans are made locally by the agents. Specify the default address for the recipients receiving the reports. See section 8.3 Generate Reports. Manage the behaviour of the Windows Update Agent (WUA). The Secunia CSI will make use of the information gathered by the WUA when checking for missing Microsoft updates. 27/45

28 Be aware that this setting may affect your scan results, i.e. setting the WUA to use a WSUS that is not completely up to date may result in missing important updates information. If you wish to enable the CSI logging feature, which is useful when troubleshooting any issue that you may experience, please check the option 'Enable Logging'. In the event of a support request you send the log file together any other relevant information to CSC@secunia.com 10.2 Suggest Software Using the provided form you are able to send details about software that you would like to be added to the Secunia File Signature database, the same database used by the Secunia Corporate Software Inspector. Please note that it is important to enter as much information as possible, thus facilitating the processing and acceptance of your request. 28/45

29 10.3 Reset Password The form presented allows you to change your password with Secunia. Please note that passwords must be at least 8 characters in length. 11. Support 11.1 Manual & FAQ This feature provides information about available manuals and FAQs Microsoft WSUS This feature provides links where you can obtain more information about setup, installation, and general usage of Microsoft WSUS Changelog The Changelog feature provides information about the changes made to the Secunia CSI since the previous release. In this screen the user also has access to a link to the online forum. The forum can be used to post user's feedback. All feedback is most welcome! 11.4 Contact Information This feature provides the contact information if you need to contact Secunia. 29/45

30 12. Secunia Advisories 12.1 About Secunia advisories Explanation of terms used within Secunia advisories From (attack vector) From Local System Local system describes vulnerabilities where the attack vector requires that the attacker is a local user on the system. From Local Network From local network describes vulnerabilities where the attack vector requires that an attacker is situated on the same network as a vulnerable system (not necessarily a LAN). This category covers vulnerabilities in certain services (e. g. DHCP, RPC, administrative services etc. ), which should not be accessible from the Internet, but only from a local network and optionally a restricted set of external systems. From Remote From remote describes vulnerabilities where the attack vector does not require access to the system nor a local network. This category covers services which are acceptable to expose to the Internet (e. g., HTTP, HTTPS, SMTP) as well as client applications used on the Internet and certain vulnerabilities, where it is reasonable to assume that a security conscious user can be tricked into performing certain actions Criticality Extremely Critical (5 of 5): Typically used for remotely exploitable vulnerabilities that can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. These vulnerabilities can exist in services like FTP, HTTP, and SMTP or in certain client systems like programs or browsers. Highly Critical (4 of 5): Typically used for remotely exploitable vulnerabilities that can lead to system compromise. Successful exploitation does not normally require any interaction but there are no known exploits available at the time of disclosure. Such vulnerabilities can exist in services like FTP, HTTP, and SMTP or in client systems like programs or browsers. Moderately Critical (3 of 5): Typically used for remotely exploitable Denial of Service vulnerabilities against services like FTP, HTTP, and SMTP, and for vulnerabilities that allow system compromises but require user interaction. This rating is also used for vulnerabilities allowing system compromise on LANs in services like SMB, RPC, NFS, LPD and similar services that are not intended for use over the Internet. Less Critical (2 of 5): Typically used for cross-site scripting vulnerabilities and privilege escalation vulnerabilities. This rating is also used for vulnerabilities allowing exposure of sensitive data to local users. Not Critical (1 of 5): Typically used for very limited privilege escalation vulnerabilities and locally exploitable Denial of Service vulnerabilities. This rating is also used for non-sensitive system information disclosure vulnerabilities (e.g., remote disclosure of installation path of applications). 30/45

31 12.4 Impact Brute force Used in cases where an application or algorithm allows an attacker to guess passwords in an easy manner. Cross-Site Scripting Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behaviour of a web application in a user's browser, without compromising the underlying system. Different Cross-Site Scripting related vulnerabilities are also classified under this category, including 'script insertion' and 'cross-site request forgery'. Cross-Site Scripting vulnerabilities are often used against specific users of a website to steal their credentials or to conduct spoofing attacks. DoS (Denial of Service) This includes vulnerabilities ranging from excessive resource consumption (e.g., causing a system to use a lot of memory) to crashing an application or an entire system. Exposure of sensitive information Vulnerabilities where documents or credentials are leaked or can be revealed either locally or from remote. Exposure of System Information Vulnerabilities where excessive information about the system (e.g., version numbers, running services, installation paths, and similar) are exposed and can be revealed from remote and in some cases locally. Hijacking This covers vulnerabilities where a user session or a communication channel can be taken over by other users or remote attackers. Manipulation of Data This includes vulnerabilities where a user or a remote attacker can manipulate local data on a system, but not necessarily be able to gain escalated privileges or system access. The most frequent type of vulnerabilities with this impact are SQL-injection vulnerabilities, where a malicious user or person can manipulate SQL queries. Privilege Escalation This covers vulnerabilities where a user is able to conduct certain tasks with the privileges of other users or administrative users. This typically includes cases where a local user on a client or server system can gain access to the administrator or root account, thus taking full control of the system. Security Bypass This covers vulnerabilities or security issues where malicious users or people can bypass certain security mechanisms of the application. The actual impact varies significantly depending on the design and purpose of the affected application. Spoofing This covers various vulnerabilities where it is possible for malicious users or people to impersonate other users or systems. 31/45

32 System Access This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user. Unknown Covers various weaknesses, security issues, and vulnerabilities not covered by the other impact types, or where the impact isn't known due to insufficient information from vendors and researchers Other Frequently Used Terms The term users generally refers to authenticated users to the operating system or the application affected. This includes anonymous users when talking about FTP and similar. The term people generally refers to people who are able to make network connections but who are not authenticated. 13. Technical Support Contact Secunia's security experts with any questions regarding advisories or vulnerabilities affecting your systems by opening a new support case. To do so, please send an to Secunia Customer Support Center: csc@secunia.com In order to have your questions answered as soon as possible, please first check our online FAQ located at 32/45

33 Appendix A: FAQ Q: The Secunia CSI seems to hang during start-up? A: You may need to add this entry to Internet Explorer Trusted Sites: or http(s)://your-server-ip If connecting through a proxy, please see Appendix B: Proxy Settings. Q: How do I deploy agents to all my hosts? A: Please refer to section 9.5 Agent Deployment or to Appendix C: Deploying Agents on a Network via GPO. Q: How do I get technical support? A: Support is available by , please send your questions/feedback/comments to csc@secunia.com. Q: How do I delete a Site? A: in order to delete a Site, the user can rename the existing or he can move the host into another site. When all hosts have been moved, the original Site will be automatically deleted. Q: How do I delete an IP address from a scan group? A: From the 'Scan Now' menu, click the relevant scan group, go to the Hosts & IPs tab and after selecting the IP to be deleted, press 'Delete Selected'. Q: Suggest Software does not work in IE8 A: This is most likely because or http(s)://your-server-ip needs to be in the trusted sites in IE. Q: The agents that I have installed are no longer checking in what happened? A: Make sure that you have installed the Agent with L switch, i.e., csia.exe -i -L If you are a member of a domain and you don't use the -L switch, the service will be installed with the user performing this action, thus granting the 'logon as a service' privilege. However, this privilege will usually get removed after the next GPO background refresh since domain policies will not allow it. This will cause the agent to stop working afterwards. Make sure that the agent is locally present in a local folder on the PC before installing. Q: I cannot download the CSI Agent 'csia.exe' even though I have added or http(s)://your-server-ip to my trusted sites. What to do? A: Verify that the following Internet Setting is not enabled: Internet Options-> Advanced (Scroll down to Security)-> (Uncheck 'Do not save encrypted pages to disk'). Q: I am not able to find my answer in this FAQ? A: Please check our online FAQ in porate/csi/faq40 which is more comprehensive and up-to-date. If still having problems, please contact us at CSC@Secunia.com Check our online FAQ at and find the most up to date and comprehensive information that will help you in getting answers to your questions. 33/45

34 Appendix B: Proxy Settings CSI GUI/console through proxy The Secunia CSI uses Internet Explorer proxy settings only. Set these by opening Internet Explorer and select 'Tools-> Internet Options-> Connections-> LAN Settings-> Proxy Server'. Agents Through Proxy Generally the agent will inherit proxy settings from Internet Explorer. However, depending on the proxy server and authentication mechanism used, you may have to perform one of the following actions: To produce a help screen showing proxy settings: csia.exe -h To specify only proxy setting from the command line: csia.exe -i -R account@company.com -x proxy:port To specify proxy settings with user authentication from the command line: csia.exe -i -R account@company.com -x proxy:port -U username:password 34/45

35 Appendix C: Deploying Agents on a Network via GPO The CSI agent can be easily deployed via an AD Group Policy Object definition, controlling a common logon script. Shown below are examples of a GPO and logon/start-up script, which must both be adapted to your specific needs. Example of a Logon Script csiadeploy.bat Generally you can create a file for deploying the CSI Agent (csia.exe) through a common logon script that will install the csia.exe on the PCs at logon, unless the agent is already installed. Save the below content in a file named off if EXIST c:\program Files\Secunia\CSI\csia.exe GOTO end if not EXIST c:\program Files\Secunia\CSI\ md c:\program Files\Secunia\CSI\ copy %LOGONSERVER%\NETLOGON\csia.exe c:\program Files\Secunia\CSI\csia.exe c:\program Files\Secunia\CSI\csia.exe -i -L :end In the above example the file csia.exe is placed on a network-mount with the only purpose of being copied and locally present in a local folder of the target PC where is supposed to be installed. To install csia.exe as a service make sure the file is locally present on the target computer. If changing the csia.exe install path, never install it where users have write access as this may result in privilege escalation. Often used options/switches Producing a help page: csia.exe -h For installing the agent: csia.exe -i -L For use with proxy, no credentials: csia.exe -i -R account@company.com -x proxyip:port For use with proxy, using credentials: csia.exe -i -R account@company.com -x proxyip:port -U username:password For adhoc scan: csia.exe -c -L 35/45

36 Creating a controlling AD GPO Step 1: Open the GPO Policy Management Editor to create a GPO in your domain: Step 2: Create a group policy (GPO) in your domain named CSIagent-deploy. 36/45

37 Step 3: Right click the created GPO and select Edit-> CSIagent-deploy (the GPO that was created in the previous step) to add the script. Expand User Configuration-> Windows Settings-> right-click Logon ->Properties Step 4: In Logon Properties click Show Files and drag and drop the csiadeploy.bat file. Note: In this example the file used is the same file that was mentioned in the beginning of this Appendix. A different file may be used in accordance with the user preferences. In Logon Properties select 'Add' and click 'Browse' to add the csiadeploy.bat file. 37/45

38 Step 5 : Apply for adding the file. Step 6 : Verify the created GPO by clicking in CSIagent-deploy-> Settings-> Expand Logon Test the created GPO by doing a Logoff/Logon with a computer that connects to your ADdomain, after the Logon the CSIA.exe should be installed on the computer being used. A service named Secunia CSI Agent should now be running on the computer. 38/45

39 Appendix D: Setup Examples CSI - Your CSI graphical user interface. CSI-Agent - The csia.exe installed in Agent mode. CSI-Appliance mode - The csia.exe installed in Network Appliance mode. 39/45

40 Appendix E: Install the WSUS Administration Console Depending on the previous installation on the machine installing 'Visual C runtime' and/or 'Microsoft.NET runtime V2.0 SP2 for x86 CPUs' might be necessary. Start installation of WSUS 3.0 SP2. When prompted select 'Administration Console only' Approve all default settings and finish the installation. 40/45

41 Appendix F: User Management The User Management feature is not part of the default Secunia CSI configuration. Through this feature the CSI main account is able to create other CSI accounts. For illustration purposes consider the following diagram representing a decentralized team responsible for identifying, assessing and patching vulnerabilities. Your Account EMEA ASIA PAC Read/Write USA Read Shadow Account Read LATAM This organization can be mapped into the Secunia CSI by creating several user accounts, as in the picture below: To create a new user account, press the button 'New account' and filling the form, providing all the necessary details about the user. To delegate the administration of one account to another account, in this case USA->LATAM, the USA account must be created with the setting 'User Type: Administrator with 1 account' and the LATAM account must be created with 'Administrator: USA'. When done, press the 'Submit Form'. An will be sent to the user address containing a welcome message and the login credentials to the Secunia CSI. A shadow account can be created in same way a normal account is created. This type of account is able to logon and access the information of a normal account (i.e., for audit purposes or to avoid sharing credentials). When creating a shadow account you can specify the type of access (R/RW). The Administrator account is able to access information from any specific account for which it is responsible. To do so, press the button 'Imitate user' and select the account you would like to access. The data being displayed will be the data of the account that you have chosen to imitate. To return to your account, press 'Imitate User' and select 'Your Account'. If you would like to have the User Management feature enabled in your Secunia CSI, please contact your Secunia Sales Representative. 41/45

Secunia CSI integrated with WSUS (SCCM)

Secunia CSI integrated with WSUS (SCCM) Secunia CSI integrated with WSUS (SCCM) A how to documentation 1 Requirement: 1.1 CSI GUI/console requirements The CSI Console must be launched by a user with Domain Admin privileges https://secunia.com

More information

Secunia Corporate Software Inspector (CSI)

Secunia Corporate Software Inspector (CSI) Secunia Corporate Software Inspector (CSI) Complete Flexible Unique The Secunia CSI 7.0 works the way you do Secunia CSI 7.0 Technical User Guide Rev. 03-Sep-2013 Secunia.com Contents Secunia Corporate

More information

Complete Patch Management

Complete Patch Management Complete Management Targeted, Reliable and Cost-efficient In- Depth CSI Corporate Software Inspector Empower your IT-Operations and Security Teams with the most reliable Vulnerability & Management solution

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

Complete Patch Management

Complete Patch Management Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 LabTech Commands COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 Overview Commands in the LabTech Control Center send specific instructions

More information

Colligo Email Manager 6.2. Offline Mode - User Guide

Colligo Email Manager 6.2. Offline Mode - User Guide 6.2 Offline Mode - User Guide Contents Colligo Email Manager 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Email Manager 3 Checking for Updates 4 Updating Your License

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

System Administrator Guide

System Administrator Guide System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

NetWrix Password Manager. Quick Start Guide

NetWrix Password Manager. Quick Start Guide NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014 QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

EVENT LOG MANAGEMENT...

EVENT LOG MANAGEMENT... Event Log Management EVENT LOG MANAGEMENT... 1 Overview... 1 Application Event Logs... 3 Security Event Logs... 3 System Event Logs... 3 Other Event Logs... 4 Windows Update Event Logs... 6 Syslog... 6

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.

To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008. Znode Multifront - Installation Guide Version 6.2 1 System Requirements To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server

More information

SOLARWINDS ORION. Patch Manager Evaluation Guide

SOLARWINDS ORION. Patch Manager Evaluation Guide SOLARWINDS ORION Patch Manager Evaluation Guide About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse requirements of

More information

SPAMfighter Mail Gateway

SPAMfighter Mail Gateway SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4

More information

IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM

IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Shavlik Patch for Microsoft System Center

Shavlik Patch for Microsoft System Center Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This

More information

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the

More information

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01 Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written

More information

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

MALWAREBYTES PLUGIN DOCUMENTATION

MALWAREBYTES PLUGIN DOCUMENTATION Contents Requirements... 2 Installation Scenarios... 2 Malwarebytes 2.xx or 1.75 is already deployed.... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens...

More information

EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.

EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia. Non-intrusive, authenticated scanning for OT & IT environments The situation: convenience vs. security Interconnectivity between organizations and corporate networks, the internet and the cloud and thus

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

Reconfiguring VMware vsphere Update Manager

Reconfiguring VMware vsphere Update Manager Reconfiguring VMware vsphere Update Manager vsphere Update Manager 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Installing OneStop Reporting Products

Installing OneStop Reporting Products Installing OneStop Reporting Products Contents 1 Introduction 2 Product Overview 3 System Requirements 4 Deployment 5 Installation 6 Appendix 2010 OneStop Reporting http://www.onestopreporting.com support@onestopreporting.com

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Adaptive Log Exporter Users Guide

Adaptive Log Exporter Users Guide IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Avaya Video Conferencing Manager Deployment Guide

Avaya Video Conferencing Manager Deployment Guide Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Fiery EX4112/4127. Printing from Windows

Fiery EX4112/4127. Printing from Windows Fiery EX4112/4127 Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45083884 01 April 2009 CONTENTS 3 CONTENTS

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

TOSHIBA GA-1310. Printing from Windows

TOSHIBA GA-1310. Printing from Windows TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS

More information

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...

More information

Microsoft Corporation. Project Server 2010 Installation Guide

Microsoft Corporation. Project Server 2010 Installation Guide Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups

More information

StruxureWare Power Monitoring 7.0.1

StruxureWare Power Monitoring 7.0.1 StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

FlexSim LAN License Server

FlexSim LAN License Server FlexSim LAN License Server Installation Instructions Rev. 20150318 Table of Contents Introduction... 2 Using lmtools... 2 1. Download the installation files... 3 2. Install the license server... 4 3. Connecting

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

Microsoft Dynamics GP Release

Microsoft Dynamics GP Release Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Administration guide. Océ LF Systems. Connectivity information for Scan-to-File

Administration guide. Océ LF Systems. Connectivity information for Scan-to-File Administration guide Océ LF Systems Connectivity information for Scan-to-File Copyright 2014, Océ All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in any form

More information

SecureAssess Local. Install Guide. www.btl.com. Release 9.0

SecureAssess Local. Install Guide. www.btl.com. Release 9.0 SecureAssess Local Install Guide Release 9.0 Document 1.0 15.11.10 www.btl.com Disclaimer Whilst every effort has been made to ensure that the information and content within this user manual is accurate,

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Avira Management Console User Manual

Avira Management Console User Manual Avira Management Console User Manual Table of Contents Table of Contents 1. About this manual... 5 1.1 Introduction...5 1.2 Structure of the manual...5 1.3 Emphasis in text...6 1.4 Abbreviations...7 2.

More information

Test Case 3 Active Directory Integration

Test Case 3 Active Directory Integration April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of

More information

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015 QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) March, 2013 Ref. 03.10 Kepware Technologies Table of Contents 1. Overview... 1 1.1 What is DCOM?... 1 1.2 What is OPCEnum?... 1 2. Users and

More information

Secunia PSI for Application Patch Management

Secunia PSI for Application Patch Management Secunia PSI for Application Patch Management An installation and user guide to Secunia Personal Security Investigator (PSI) Version 1.2 Created August 16, 2013 Last Edit August 20, 2014 U n i v e r s i

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06 SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide

Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide Contents Introduction... 2 Environment Topology... 2 Virtual Machines / System Requirements...

More information

Introduction to Google Apps for Business Integration

Introduction to Google Apps for Business Integration Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information