LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0
|
|
- Patricia Allen
- 8 years ago
- Views:
Transcription
1 LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0 LogLogic Security Event Viewer and Security Event Manager offer scalable and comprehensive data security assistance monitoring for organizations challenged by the complexity of modern IT infrastructures. Security Event Viewer and Security Event Manager are designed to continuously protect the most valuable business assets: core systems and the intellectual property they hold. This document lists functionality changes and bug fixes in Security Event Viewer version and Security Event Manager version Note: For changes to the Release Notes after the initial release, see New Features... 2 Bug Fixes and Enhancements... 3 Standard Content... 5 Bug Fixes and Enhancements... 5 Supported Products by SEV/SEM... 6 New Supported Products... 6 Bug Fixes and Enhancements... 6 Supported Product List... 8 SEV/SEM Appliances...10 Appliances Description...10 Software Requirements...11 Log Collector Requirements...11 Web Console Requirements...11 Upgrading to SEV/SEM v Known Limitations...11 Documentation...12 SEV/SEM Documentation...12 Devices Specific Documentations...13 Technical Support...14 LL E January
2 New Features New Web Console style In order to provide users with uniformity and visual continuity for both LMI and SEM GUIs, the SEM Web Console style has been improved: new Color palette, improved Web Console layout, new log in and loading pages, improved forms layout, new Online Help design. LL E January
3 Bug Fixes and Enhancements Log Collection ID # Summary Support # #8629 The option "add log source host as target" now works as expected with a Solaris Log Source file #8685 Collection policy on WELF log source works now as expected #9061 All log collectors configured with the communication mode "Server Log Collector" now work as expected after a restoration Engines ID # Summary Support # #8430 Correlation rules on distinct field values are correctly saved in database #8626 Correlation rules using else/or conditions now works as expected #8649 The correlation alert triggered threshold now works as expected #8974 The Incident Send communication process has been corrected according to the specified WSDL file #9134 The SOAP communication environment has been updated (use of uniform resource name and not static URL) #9304 Grouping on undefined values in scenarios now works as expected Web Console ID # Summary Support # #6446 The creation and deletion of configuration profiles now works as expected #8054 In the event list, modifying the column type does not reset filters any longer #8344 #8409 The Alerts / Events / Incidents tab refresh now works as expected #8645 The edition of a rule in the scenario creation does not change the general order of the rules anymore #8648 The filter on "creation date: last 24h" is not reset any more to "creation date: last hour" when sorted by "last updated" #8682 The online documentation for the "External Server" section is now available #8693 During the host creation/edition, the host name can begin by a numeric character #8758 The copy of a live reporting table does not generate a blank table, whose name is not supported by the database #8774 Upload license on Internet Explorer 8 now works as expected LL E January
4 #8800 Auto refresh (server time) is now correctly effective for Internet Explorer 7 and 8 #9157 A confirmation message is displayed before deleting archives file in the Web Console #9176 Incidents now include aggregated events attributes #9321 Incidents tab now refreshes as expected Security Dashboards ID # Summary Support # #9109 Reports can now be correctly ordered by detect time LL E January
5 Standard Content Bug Fixes and Enhancements Correlation Rules ID # Summary Support # #8575 Corrected ontology in the "Threshold Control User" rule #9327 The "Segregation of duties violation" scenario now works as expected Reporting Policy ID # Summary Support # #8576 Corrected taxonomy for the live reporting rule "Asset Availability" Other ID # Summary Support # #8846 GeoIP database has been updated #9147 For new installed SEM 3.5 version, default password has been changed: root shell account: pwd="logapp" Admin shell account: pwd="logapp" Web Console superadmin account: pwd="admin" In case of a SEM 3.5 upgrade, no password will be changed. LL E January
6 Supported Products by SEV/SEM New Supported Products ID # Vendor Product Support # #9100 CheckPoint All Products through LMI #9017 ASA 8.2 & 8.3 #9181 #9120 IPS (SDEE) #8999 Fortinet Fortigate v3 & v4 #8880 Juniper IDP through LMI #9112 LogLogic Database Security Manager 9111 McAfee epo through LMI #9153 Exchange 2007 #8878 Nortel Nortel Contivity through LMI #9151 Oracle Oracle DB through LMI (9, 10, 11) #8696 Palo Alto Networks Firewall #8681 Solaris BSM #9015 Trend Micro TMCM through LMI Bug Fixes and Enhancements ID # Vendor Product Support # #6367 BlueCoat BlueCoat SG #7013 CheckPoint CheckPoint OPSec #6917 #8973 CheckPoint FW1 SFDC #7963 ACS #9202 ASA #8830 #9220 FWSM #9247 IronPort #8832 VPN #8627 ClamAV ClamAV LL E January
7 #9222 #8686 #8675 #9232 Intersect alliance Windows Snare #8534 Juniper Juniper Secure Access #8580 #8643 Juniper NetScreen OS v6 #9171 LogLogic LMI #8584 LogLogic SEM (SMP Monitoring) #6209 #6582 #6607 #7009 #7054 #8659 #8695 Windows (All workstation versions) Windows 2003 Server #8504 #6734 #8638 #7236 #9262 Windows 2008 Server #8691 Oracle DB Oracle convertor #8642 Oracle Oracle audit trail 9, 10, 11 #8687 Solaris Solaris 8910 LL E January
8 Supported Product List Vendor Product Vendor Product Anti virus/spyware/spam Apache Spamassassin Blue Coat Blue Coat ProxyAV Ironport Mail Security ClamAV ClamAV Clearswift Mimesweeper For SMTP DB Clearswift Mimesweeper For SMTP Log Clearswift Mimesweeper For WEB FSecure Policy Manager Sophos Puremessage Norton Antivirus Antivirus TrendMicro Interscan Viruswall TrendMicro Trend Micro SPS sytem Authentication server ActivIdentity Activpack v4 ActivIdentity Activpack v6.3 ActivIdentity Activpack v6.5 ACS Csv ACS Syslog Cistron Radius EMC Rsa Ace server EMC Rsa Ace WMI EMC Rsa Securid linux Internet Authentication Service Novell Novell edirectory Utimaco Safeguard Business application Centralized management Ntsyslog Arkoon Arkoon DB Arkoon Arkoon DB v3 Arkoon Arkoon DB v4 Arkoon Arkoon Syslog Intrusion.com Securenet Provider ISS SiteProtector SP4 ISS SiteProtector SP5 ISS SiteProtector SP6 ISS SiteProtector SP7 Juniper Netscreen Security Manager v2004 LogLogic Security Change Manager McAfee Epolicy Orchestrator Operation Management Nagios Nagios TrendMicro Trend Micro Control Manager Webmin Webmin Database services Ms sql Ms sql Operational Loglogic Database Security Manager (DSM) Oracle Oracle DB Sourcefire Sourcefire3D isc.org Domain Name System (DNS) File server Bind Vsftpd NetApp Netapp ProFTPD ProFTPD Wuftpd Wuftpd honeyd.org 3Com Enterasys Enterasys Enterasys ForeScout Intrusion.com ISS Juniper McAfee McAfee Niksun Samhain Sentry Tools Snort Snort Snort Tripwire Tripwire LogLogic LogLogic LogLogic Honeypot Honeyd Intrusion Detection System (IDS) / Intrusion Prevention System (IPS) Log management TippingPoint CSA v45 CSA v52 CSA v60 IPS (SDEE) Dragon IDS v7_0 Dragon IDS v7_1 Dragon IDS v7_2 Activescout Securenet Sensor Realsecure wgm Netscreen IDP Entercept Intrushield Netdetector Samhain Portsentry Snort Snort DB Winsnort Client Security Endpoint Protection Network Security Tripwire Tripwire Entreprise LMI SMP SMP Relay Messaging services Imapd Ciphertrust IronMail couriermta.org Courier MTA Eudora Qpopper GNU Exim Inter7 Vpopmail Lotus Lotus Domino Exchange Postfix Postfix sendmail.org Sendmail TrendMicro Interscan Messaging Security Suite Directory services LL E January
9 Vendor Product Vendor Product Network device Aruba Aruba Wireless Access Point Check Point Check Point Internal Log CSS FWSM Router Switch VPN VPN IOS compat Cyberguard Cyberguard Draytek Vigor F5 Bigip Juniper Juniper Secure Access Juniper Netscreen Juniper Netscreen v6 Linksys Wap11 Lucent Brick Nortel Alteon Web Switch Nortel Contivity Nortel Nortel Alteon Nortel Nortel switch Nortel Nortel VPN gateway StoneSoft Stonegate Zyxel Zywall Zyxel Zyxel Operating System Ipchains Breach Security Modsecurity FreeBSD FreeBSD Grsecurity Grsecurity HP HP UX HP Tru64 IBM Aix IBM Tivoli Directory Server Intersect alliance Windows 2000 server snare Intersect alliance Windows 2000 workstation snare Intersect alliance Windows 2003 server snare Intersect alliance Windows 2008 server snare Intersect alliance Windows all snare Intersect alliance Windows Vista workstation snare Intersect alliance Windows XP workstation snare Linux Linux Internet Connection Firewall Windows 2000 server Windows 2000 workstation Windows 2003 server English Windows 2003 server French Windows 2008 server English Windows 2008 server French Windows Vista English Windows Vista French Windows XP English Windows XP French Netfilter Netfilter Nokia IPSO Sun Solaris Sun Solaris BSM Squid Squid Sun TrendMicro TrendMicro WebSense WebSense Astaro Astaro Barracuda Check Point Check Point Fortinet PaloAlto Networks NetASQ NetASQ NetASQ NetASQ Sonicwall Remote desktop Internet Security Acceleration v2004 Squid Squidguard Iplanet Interscan Web Security Suite Linux v2 Interscan Web Security Suite Windows v2 Websense v5 Websense v6 PCanywhere Unified Threat Management (UTM) Virtualization Criston ISS ISS McAfee Qualys Tenable Security Apache APC APC Astaro v4 Astaro v5 Barracuda Check Point Pointsec Protector ASA PIX Fortigate Firewall Netasq Alarm v6 Netasq Connection v6 Netasq Filter v6 Netasq v5 Sonicwall Gateway Security v2 Gateway Security v3 Vulnerability scanner Web server Other Criston VM Internet Security Scanner v6 Internet Security Scanner v7 Foundstone QualysGuard Nessus Apache Internet Information Services NCSA Internet Information Services W3C Internet Information Services W3C v3 APC EMU APC UPS Products also supported through LogLogic LMI are underlined in green Proxy / Reverse proxy Beeware Blue Coat Deny ALL F5 Ingrian McAfee I Sentry Blue Coat ProxySG Rweb Appshield Ingrian WebShield Internet Security Acceleration v2000 FW LL E January
10 SEV/SEM Appliances Appliances Description 3 rd Gen Appliances SEM 1060 SEM 3060 SEM 4060 Rack Format 1U 2U 2U Processor(s) Type E5520 E5520 X5570 Total Core # RAM (GB) Max. EPS (remote Log Collector) Max. Instances Archive Storage (GB) Online Storage (GB) LL E January
11 Software Requirements Log Collector Requirements The Log Collector can be installed on the following platforms, with at least 100 MB of disk space available: Windows 2000 (SP4, Windows installer 3.1 or later) x86 (32bit). Windows 2003/2008/XP/Vista x86 (32bit) or x86_64 (64bit). Linux with kernel 2.4 or later (e.g. Red Hat EL 3 or later) x86 (32bit) or x86_64 (64bit). Solaris 8 or later. Aix 5.2 or later. Web Console Requirements The Web Console can be used with the following web browsers: Internet Explorer 7.0 or higher. Mozilla Firefox or higher. Hosts running the Web Console must have at least: 1 GB of RAM. 1024x768 resolutions. 1 GHz 32bit (x86) or 64bit (x64) processor. Upgrading to SEV/SEM v3.5.0 To upgrade to LogLogic Security Event Viewer and Security Event Manager 3.5.0, please refer to the User Guide section 9, Updating the SMP Server. SEV/SEM User Guide and all other documentations are available on our Support Center web site: Known Limitations After an upgrade to SEV/SEM v3.5.0, please clear your web browser cache to avoid a display issue. LL E January
12 Documentation You can find the complete set of user documentation gathering all product guides on: LogLogic SEM installation DVD SEV/SEM Documentation File Name Status AdministrationGuide SEMen.pdf Updated ConceptsGuide SEMen.pdf Updated LogCollectorInstallationGuideSEMen.pdf ReferenceGuide SEMen.pdf SMPInstallationGuideSEMen.pdf Updated UserGuide SEMen.pdf Updated Online Help Updated LL E January
13 Devices Specific Documentations File Name Status workingwithactivpack.pdf workingwithbluecoatsg.pdf workingwithcheckpoint.pdf workingwithciscoids.pdf Updated workingwithciscoioscatos.pdf workingwithciscopixasa.pdf workingwithenterasysdragon.pdf workingwithexchange.pdf New workingwithfortinetfortigate.pdf workingwithinternetinfoservices.pdf workingwithironport.pdf New workingwithissrealsecure.pdf workingwithisssecurityscanner.pdf workingwithisssiteprotector.pdf workingwithlotusnotes.pdf workingwithmcafeeentercept.pdf workingwithmcafeeepo.pdf workingwithmcafeeintrushield.pdf workingwithmicrosoftisa.pdf workingwithmicrosoftom.pdf workingwithmimesweeper.pdf workingwithnokia.pdf workingwithoracle.pdf New workingwithrsa.pdf workingwithsnarewindows.pdf workingwithsnort.pdf workingwithtrendiwsswindows.pdf workingwithtrendmcm.pdf workingwithwebsense.pdf workingwithwindows.pdf LL E January
14 Technical Support Customers may reach the LogLogic support team by: Telephone: Toll Free: LOGS US Local: EMEA or APAC: + 44 (0) or +44 (0) support@loglogic.com Support Website: LL E January
Symantec Security Information Manager Version 4.7
Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM
More informationPlugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo
Functionality Vendor Plugin Name AlienVault Supported Plugin Community Supported Plugin Access Control Cisco Systems cisco-acs cisco-acs-idm cisco-asa N/A sudo Antivirus Avast avast GFI Security gfi McAfee
More informationRSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method
RSA envision Supported Event Sources A Actividentity 4TRESS AAA Server - version 6.4.1 AirDefense AirDefense Enterprise Server - version 7.2 Airmagnet Airmagnet Enterprise - version 7.5.0 Apache HTTP Server
More informationArcSight Supports a Wide Range of Security Relevant Products
ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the
More informationTripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF Tripwire Log Center HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE Enterprise organizations of all sizes need to achieve compliance with regulations and standards and
More informationVendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga
Vendor/Product Log Format Analyzer Standard Analyzer Premium & Analyzer Giga Vantage & Vantage Giga 3Com 3Com Firewall Yes Yes Yes Yes 8e6 R2000 Yes Yes Yes Yes 8e6 R3000 Yes Yes Yes Yes Aladin Esafe Blocked
More informationSupported Log File Formats
Supported File Formats Vendor/Product Format Analyzer Standard Analyzer Premium & Analyzer Giga Vantage & Vantage Giga 3Com 3Com 8e6 R2000 8e6 R3000 Aladin Esafe Blocked s Allied Telesyn ATI Level 3 Switch
More informationTIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
More informationHawkEye AP Log Adapter List Updated January 2014
HawkEye AP Log Adapter List Updated January 2014 Firewalls / VPN Aventail SSL VPN * Check Point Firewall-1 fwexport * Check Point Firewall-1 LEA Check Point VPN-1 * Cisco ASA (via SyslogNG) Cisco FWSM
More informationCiscoWorks SIMS(Netforensics)
Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture
More informationog 4 NET A SureL 201
SureLog ANET 2014 1. SURELOG: ADVANCED SECURITY MANAGEMENT... 3 2. ADVANTAGES... 3 Why Fast EPS Performance Matters... 3 3. LOG MANAGEMENT... 5 Comprehensive Log Data Collection and Log Management... 5
More informationHawkEye AP Log Adapter List Updated January 2016
HawkEye AP Log Adapter List Updated January 2016 Firewalls / VPN Aventail SSL VPN * Check Point Firewall-1 fwexport * Check Point Firewall-1 LEA Check Point VPN-1 * Cisco ASA (via SyslogNG) Cisco FWSM
More informationTIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE
More informationList of Supported Systems & Devices
List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged
More informationTRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE Enterprise organizations of all sizes need to achieve compliance with regulations and standards
More informationREQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM
REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM Proposal Release Date: AUGUST 20 th 2008 Proposal Due Date: SEPTEMBER 16 th 2008 TABLE OF CONTENTS 1 - INTRODUCTION...
More informationSecure Your Operations through NOC/SOC Integration
IBM Software Group Secure Your Operations through NOC/SOC Integration David Jenkins Security Consultant davidjen@de.ibm.com IBM Corporation IBM Business/Service Assurance Offering Only Tivoli s suite offers
More informationSupported Devices (Event Log Sources)
Operating Systems HP Insight Manager Windows Time service CISCO CatOS IBM DB2 UDB Websense WSG CISCO IOS Imperva Cisco NX OS LogBinder SP Astaro Citrix NetScaler OS MacAfee Intrushield IPS Security 110
More informationDetecting a Hacking Attempt
Detecting a Hacking Attempt Speaker: Isaac Thompson Director of Sales Engineering and Training About Prism Microsystems Founded in 1999, headquartered Columbia, Maryland Current Version EventTracker 6
More informationJUNIPER NETWORKS STRM TECHNICAL NOTE
JUNIPER NETWORKS STRM TECHNICAL NOTE USING EXTENSION DOCUMENTS JUNE 2008 Device extensions allow you to modify how a DSM parses logs, which is useful for resolving parsing issues. However, before you define
More informationTotal Protection for Enterprise-Advanced
System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)
More informationReference Guide. Skybox View 7.0.600. Revision: 11
Reference Guide Skybox View 7.0.600 Revision: 11 Copyright 2002-2014 Skybox Security, Inc. All rights reserved. This documentation contains proprietary information belonging to Skybox Security and is provided
More informationLog Correlation Engine 4.2 Architecture Guide. October 3, 2013 (Revision 2)
Log Correlation Engine 4.2 Architecture Guide October 3, 2013 (Revision 2) Table of Contents Introduction... 3 Standards and Conventions... 3 Architecture... 3 Components of the Log Correlation Engine...
More informationLog Correlation Engine 4.6 Quick Start Guide. January 25, 2016 (Revision 2)
Log Correlation Engine 4.6 Quick Start Guide January 25, 2016 (Revision 2) Table of Contents Introduction... 4 Standards and Conventions... 4 Product Overview... 4 Prerequisites... 4 LCE Quick Start...
More informationTIBCO LogLogic Unity Quick Reference Guide Concepts
TIBCO LogLogic Unity Quick Reference Guide Concepts Overview TIBCO LogLogic Unity is a sleek, modern and scalable platform enabling technical teams to resolve open issues, which require advanced troubleshooting
More informationRelease Notes ArcSight SmartConnector
Release Notes ArcSight SmartConnector Release 4.7.4.5335 July 10, 2009 Release Notes ArcSight SmartConnector Release 4.7.4.5335 July 10, 2009 Copyright 2009 ArcSight, Inc. All rights reserved. ArcSight,
More informationIBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Log Sources User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 108. Copyright
More informationSecurity Correlation Server Quick Installation Guide
orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
More informationMeasurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
More informationDeployment Guide. Websense Web Security Websense Web Filter. v7.1
Deployment Guide Websense Web Security Websense Web Filter v7.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2009 Printed in the United States
More informationSecurity Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
More informationProduct Guide Revision A. McAfee Web Reporter 5.2.1
Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationA CrossTec Corporation. Instructional Setup Guide. Activeworx Security Center Quick Install Guide
A CrossTec Corporation Instructional Setup Guide Activeworx Security Center Quick Install Guide PREPARED BY GARY CONKLE Activeworx Basic Installation and Configuration Guide CrossTec Corporation 500 NE
More informationMcAfee Total Protection Service Installation Guide
McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationMeasurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member
More informationJuniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy
Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Customer Challenges Dispersed Threats IT Overload IT information overload Flood of logged events from many point network
More informationTECHNOLOGY INTEGRATION GUIDE
TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and
More informationHeroix Longitude Quick Start Guide V7.1
Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: support@heroix.com Notice Heroix provides
More informationTECHNOLOGY INTEGRATION GUIDE
TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and
More informationCimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
More informationTable Of Contents INTRODUCTION... 4. About Firewall Analyzer... 5 Release Notes... 6 Supported Firewalls... 9 INSTALLATION AND SETUP...
Table Of Contents INTRODUCTION... 4 About Firewall Analyzer... 5 Release Notes... 6 Supported Firewalls... 9 INSTALLATION AND SETUP... 10 System Requirements... 10 Prerequisites... 12 Installing and Uninstalling...
More informationDEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1
DEPLOYMENT GUIDE Websense Enterprise Websense Web Security Suite TM v6.3.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published June 13, 2007 Printed
More informationAudit and Control of Enterprise Vulnerability Management. Grant Johnson, Technical Account Manager
Audit and Control of Enterprise Vulnerability Management Grant Johnson, Technical Account Manager Phoenix May 14, 2014 Key Elements of EVM IT Asset Inventory and Control Risk-based Vulnerability Management
More informationProfessional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
More informationINTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE
TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and
More informationLOG CENTER SECURITY INTELLIGENCE MADE SIMPLE
CONFIDENCE: SECURED PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence
More informationGetting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.
Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages
More informationWhere can I install GFI EventsManager on my network?
Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location
More informationKaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
More informationAdvanced Linux System Administration Knowledge GNU/LINUX Requirements
Advanced Linux System Administration Knowledge GNU/LINUX Requirements Duration: 112Hours / 28 Classes (4hrs each class Including Theory & Lab Session) (2 Classes/ Week) Class Topic Duration Class 1 History
More informationWatchGuard Training. Introduction to WatchGuard Dimension
WatchGuard Training Introduction to WatchGuard Dimension Introduction to WatchGuard Dimension What is WatchGuard Dimension? Deploy WatchGuard Dimension Configure WatchGuard Dimension Use WatchGuard Dimension
More informationNational Information Assurance Partnership
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report NetIQ Security Manager Version 5.5 Report Number: CCEVS-VR-07-0058 Dated: 9 August 2007
More informationOWASP Logging Project - Roadmap
OWASP Logging Project - Roadmap SUMMARY Why log?... 2 What is commonly logged?... 2 What are security logs?... 2 What are the most common issues with logging?... 2 What are the common functions of a log
More informationWhere can I install GFI EventsManager on my network?
Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location
More informationQuick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.
Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio
More informationNovell Sentinel Log Manager
AUTHORIZED DOCUMENTATION Installation Guide Novell Sentinel Log Manager 1.1 December 2010 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents
More informationConfiguration Audit & Control
The Leader in Configuration Audit & Control Configuration Audit & Control Brett Bartow - Account Manager Kelly Feagans, Sr. Systems Engineer ITIL, CISA March 4, 2009 Recognized leader in Configuration
More informationMcAfee Network Security Platform 8.2
8.2.7.71-8.2.3.84 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.2 Revision B Contents About this release New features Enhancements Resolved Issues Installation instructions Known
More informationMANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com
MANAGED SERVICES Remote Monitoring A N D Ma n a g e m e n t D O C U MENTATION AND Services Gu i d e Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com ABOUT RMM SERVICES Millennium s RMM
More informationDetailed Features. Detailed Features. EISOO AnyBackup Family 1 / 19 WWW.EISOO.COM
Detailed EISOO AnyBackup Family 1 / CONTENT Chapter 1. About AnyBackup Family... 4 Chapter 2. Detailed... 5 2.1 Data Protection... 5 2.2 Regular Backup... 6 2.3 Regular Backup and Restore for File... 7
More informationTivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide
Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Note Before using this information and the product
More informationv7.8.1 Release Notes for Websense Web Security
v7.8.1 Release Notes for Websense Web Security Topic 43010 Release Notes Web Security Solutions Updated 22-Oct-2013 Applies to: Websense Web Filter, Web Security, Web Security Gateway, and Web Security
More informationIBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
More informationRelease Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
More informationInstallation Guide. Sentinel Log Manager 1.2.2. July 2014
Installation Guide Sentinel Log Manager 1.2.2 July 2014 Legal Notice NetIQ Sentinel is protected by United States Patent No(s): 05829001. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED
More informationSupported Data & Log Sources
Supported Data & Log Sources IT Compliance & Event Log Management Software for SIEM 14 South Networks IntraLock 30 3Com 4400 Switch 3Com 4500 Switch 3Com 4500G Switch 3Com 4800G Switch 3Com 5500 Switch
More informationACE Management Server Deployment Guide VMware ACE 2.0
Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.
More informationTable Of Contents INTRODUCTION... 2. About Firewall Analyzer... 3 Release Notes... 4 Supported Firewalls... 6 INSTALLATION AND SETUP...
Table Of Contents INTRODUCTION... 2 About Firewall Analyzer... 3 Release Notes... 4 Supported Firewalls... 6 INSTALLATION AND SETUP... 7 System Requirements... 7 Prerequisites... 10 Installing and Uninstalling...
More informationOnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
More informationSecospace elog. Secospace elog
Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page
More informationPre-Installation Notes & Checklist for LISTSERV Maestro
Pre-Installation Notes & Checklist for LISTSERV Maestro Page 1 Intended Audience and Background: This document is intended for prospective customers, existing customers, and staff of L-Soft. This document
More informationYOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE
FAST FORWARD YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE VISUALIZE COMPLY PROTECT RedSeal Networks, Inc. 3965 Freedom Circle, 8th Floor, Santa Clara, 95054 Tel (408) 641-2200 Toll Free (888)
More informationUpgrade to Webtrends Analytics 8.7: Best Practices
Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.
More informationPulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published: 2015-03-31
Pulse Connect Secure Supported Platforms Guide Product Release 8.1 Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide 2700 Zanker Road, Suite 200 San Jose, CA 95134
More informationContents. Platform Compatibility. GMS SonicWALL Global Management System 5.0
GMS SonicWALL Global Management System 5.0 Contents Platform Compatibility...1 New Features and Enhancements...2 Known Issues...6 Resolved Issues...6 Installation Procedure...7 Related Technical Documentation...8
More informationPeter Dulay, CISSP Senior Architect, Security BU
CA Enterprise Log Manager 12.5 Peter Dulay, CISSP Senior Architect, Security BU Agenda ELM Overview ELM 12.5: What s new? ELM to CA Access Control/PUPM Integration CA CONFIDENTIAL - Internal Use Only Overview
More informationPulse Connect Secure. Supported Platforms Guide. Product Release 8.0. Document Revision 2.0 Published: 2016-01-05
Pulse Connect Secure Supported Platforms Guide Product Release 8.0 Document Revision 2.0 Published: 2016-01-05 2015 by Pulse Secure, LLC. All rights reserved 1 2700 Zanker Road, Suite 200 San Jose, CA
More informationVMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
More informationAdaptive Log Exporter Users Guide
IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,
More informationSymantec Security Information Manager 4.7.4 User Guide
Symantec Security Information Manager 4.7.4 User Guide Symantec Security Information Manager 4.7.4 User Guide The software described in this book is furnished under a license agreement and may be used
More informationDocuShare Installation Guide
DocuShare Installation Guide Publication date: May 2009 This document supports DocuShare Release 6.5/DocuShare CPX Release 6.5 Prepared by: Xerox Corporation DocuShare Business Unit 3400 Hillview Avenue
More informationIBM Security SiteProtector System Configuration Guide
IBM Security IBM Security SiteProtector System Configuration Guide Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 209. This edition
More informationSelect the right security information and event management solution to automate security and compliance operations.
Security information and event management solutions Buyer s guide: purchasing criteria Select the right security information and event management solution to automate security and compliance operations.
More informationStruxureWare TM Center Expert. Data
StruxureWare TM Center Expert Data End to end data center infrastructure management software for monitoring and control of power, cooling, security and energy usage from the building through IT systems
More informationHow To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall
Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition
More informationNetwrix Auditor for Windows Server
Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationUtility Modernization Cyber Security City of Glendale, California
Utility Modernization Cyber Security City of Glendale, California Cyber Security Achievements Cyber Security Achievements (cont) 1. Deploying IT Security Awareness training program Q4 2012 2. Purchased
More informationPCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents
PCI DSS Best Practices with Snare Enterprise InterSect Alliance International Pty Ltd Page 1 of 9 About this document The PCI/DSS documentation provides guidance on a set of baseline security measures
More informationAgency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
More informationmbits Network Operations Centrec
mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,
More informationSage Grant Management System Requirements
Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to
More informationGFI Product Manual. Deployment Guide
GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
More informationVerax Service Desk Installation Guide for UNIX and Windows
Verax Service Desk Installation Guide for UNIX and Windows March 2015 Version 1.8.7 and higher Verax Service Desk Installation Guide 2 Contact Information: E-mail: sales@veraxsystems.com Internet: http://www.veraxsystems.com/
More informationTo read more Linux Journal or start your subscription, please visit http://www.linuxjournal.com.
AlienVault the Future of Security Information Management Meet AlienVault OSSIM, a complex security system designed to make your life simpler. JERAMIAH BOWLING Security Information Management (SIM) systems
More informationDeployment Guide. Websense Web Security Websense Web Filter
Deployment Guide Websense Web Security Websense Web Filter v7 1996 2008, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2008 Printed in the United States
More informationInstallation and Configuration Guide for Windows and Linux
Installation and Configuration Guide for Windows and Linux vcenter Operations Manager 5.7 This document supports the version of each product listed and supports all subsequent versions until the document
More informationInformation Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85
Information Security Measures and Monitoring System at BARC - R.S.Mundada Computer Division B.A.R.C., Mumbai-85 Information Security Approach Secure Network Design, Layered approach, with SPF and Application
More informationJoshua Beeman University Information Security Officer October 17, 2011
Joshua Beeman University Information Security Officer October 17, 2011 1 June, 2011- NPTF Security Presentation on FY 12 InfoSec goals: Two Factor Authentication Levels of Assurance Shibboleth InCommon
More information