LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0

Size: px
Start display at page:

Download "LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0"

Transcription

1 LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0 LogLogic Security Event Viewer and Security Event Manager offer scalable and comprehensive data security assistance monitoring for organizations challenged by the complexity of modern IT infrastructures. Security Event Viewer and Security Event Manager are designed to continuously protect the most valuable business assets: core systems and the intellectual property they hold. This document lists functionality changes and bug fixes in Security Event Viewer version and Security Event Manager version Note: For changes to the Release Notes after the initial release, see New Features... 2 Bug Fixes and Enhancements... 3 Standard Content... 5 Bug Fixes and Enhancements... 5 Supported Products by SEV/SEM... 6 New Supported Products... 6 Bug Fixes and Enhancements... 6 Supported Product List... 8 SEV/SEM Appliances...10 Appliances Description...10 Software Requirements...11 Log Collector Requirements...11 Web Console Requirements...11 Upgrading to SEV/SEM v Known Limitations...11 Documentation...12 SEV/SEM Documentation...12 Devices Specific Documentations...13 Technical Support...14 LL E January

2 New Features New Web Console style In order to provide users with uniformity and visual continuity for both LMI and SEM GUIs, the SEM Web Console style has been improved: new Color palette, improved Web Console layout, new log in and loading pages, improved forms layout, new Online Help design. LL E January

3 Bug Fixes and Enhancements Log Collection ID # Summary Support # #8629 The option "add log source host as target" now works as expected with a Solaris Log Source file #8685 Collection policy on WELF log source works now as expected #9061 All log collectors configured with the communication mode "Server Log Collector" now work as expected after a restoration Engines ID # Summary Support # #8430 Correlation rules on distinct field values are correctly saved in database #8626 Correlation rules using else/or conditions now works as expected #8649 The correlation alert triggered threshold now works as expected #8974 The Incident Send communication process has been corrected according to the specified WSDL file #9134 The SOAP communication environment has been updated (use of uniform resource name and not static URL) #9304 Grouping on undefined values in scenarios now works as expected Web Console ID # Summary Support # #6446 The creation and deletion of configuration profiles now works as expected #8054 In the event list, modifying the column type does not reset filters any longer #8344 #8409 The Alerts / Events / Incidents tab refresh now works as expected #8645 The edition of a rule in the scenario creation does not change the general order of the rules anymore #8648 The filter on "creation date: last 24h" is not reset any more to "creation date: last hour" when sorted by "last updated" #8682 The online documentation for the "External Server" section is now available #8693 During the host creation/edition, the host name can begin by a numeric character #8758 The copy of a live reporting table does not generate a blank table, whose name is not supported by the database #8774 Upload license on Internet Explorer 8 now works as expected LL E January

4 #8800 Auto refresh (server time) is now correctly effective for Internet Explorer 7 and 8 #9157 A confirmation message is displayed before deleting archives file in the Web Console #9176 Incidents now include aggregated events attributes #9321 Incidents tab now refreshes as expected Security Dashboards ID # Summary Support # #9109 Reports can now be correctly ordered by detect time LL E January

5 Standard Content Bug Fixes and Enhancements Correlation Rules ID # Summary Support # #8575 Corrected ontology in the "Threshold Control User" rule #9327 The "Segregation of duties violation" scenario now works as expected Reporting Policy ID # Summary Support # #8576 Corrected taxonomy for the live reporting rule "Asset Availability" Other ID # Summary Support # #8846 GeoIP database has been updated #9147 For new installed SEM 3.5 version, default password has been changed: root shell account: pwd="logapp" Admin shell account: pwd="logapp" Web Console superadmin account: pwd="admin" In case of a SEM 3.5 upgrade, no password will be changed. LL E January

6 Supported Products by SEV/SEM New Supported Products ID # Vendor Product Support # #9100 CheckPoint All Products through LMI #9017 ASA 8.2 & 8.3 #9181 #9120 IPS (SDEE) #8999 Fortinet Fortigate v3 & v4 #8880 Juniper IDP through LMI #9112 LogLogic Database Security Manager 9111 McAfee epo through LMI #9153 Exchange 2007 #8878 Nortel Nortel Contivity through LMI #9151 Oracle Oracle DB through LMI (9, 10, 11) #8696 Palo Alto Networks Firewall #8681 Solaris BSM #9015 Trend Micro TMCM through LMI Bug Fixes and Enhancements ID # Vendor Product Support # #6367 BlueCoat BlueCoat SG #7013 CheckPoint CheckPoint OPSec #6917 #8973 CheckPoint FW1 SFDC #7963 ACS #9202 ASA #8830 #9220 FWSM #9247 IronPort #8832 VPN #8627 ClamAV ClamAV LL E January

7 #9222 #8686 #8675 #9232 Intersect alliance Windows Snare #8534 Juniper Juniper Secure Access #8580 #8643 Juniper NetScreen OS v6 #9171 LogLogic LMI #8584 LogLogic SEM (SMP Monitoring) #6209 #6582 #6607 #7009 #7054 #8659 #8695 Windows (All workstation versions) Windows 2003 Server #8504 #6734 #8638 #7236 #9262 Windows 2008 Server #8691 Oracle DB Oracle convertor #8642 Oracle Oracle audit trail 9, 10, 11 #8687 Solaris Solaris 8910 LL E January

8 Supported Product List Vendor Product Vendor Product Anti virus/spyware/spam Apache Spamassassin Blue Coat Blue Coat ProxyAV Ironport Mail Security ClamAV ClamAV Clearswift Mimesweeper For SMTP DB Clearswift Mimesweeper For SMTP Log Clearswift Mimesweeper For WEB FSecure Policy Manager Sophos Puremessage Norton Antivirus Antivirus TrendMicro Interscan Viruswall TrendMicro Trend Micro SPS sytem Authentication server ActivIdentity Activpack v4 ActivIdentity Activpack v6.3 ActivIdentity Activpack v6.5 ACS Csv ACS Syslog Cistron Radius EMC Rsa Ace server EMC Rsa Ace WMI EMC Rsa Securid linux Internet Authentication Service Novell Novell edirectory Utimaco Safeguard Business application Centralized management Ntsyslog Arkoon Arkoon DB Arkoon Arkoon DB v3 Arkoon Arkoon DB v4 Arkoon Arkoon Syslog Intrusion.com Securenet Provider ISS SiteProtector SP4 ISS SiteProtector SP5 ISS SiteProtector SP6 ISS SiteProtector SP7 Juniper Netscreen Security Manager v2004 LogLogic Security Change Manager McAfee Epolicy Orchestrator Operation Management Nagios Nagios TrendMicro Trend Micro Control Manager Webmin Webmin Database services Ms sql Ms sql Operational Loglogic Database Security Manager (DSM) Oracle Oracle DB Sourcefire Sourcefire3D isc.org Domain Name System (DNS) File server Bind Vsftpd NetApp Netapp ProFTPD ProFTPD Wuftpd Wuftpd honeyd.org 3Com Enterasys Enterasys Enterasys ForeScout Intrusion.com ISS Juniper McAfee McAfee Niksun Samhain Sentry Tools Snort Snort Snort Tripwire Tripwire LogLogic LogLogic LogLogic Honeypot Honeyd Intrusion Detection System (IDS) / Intrusion Prevention System (IPS) Log management TippingPoint CSA v45 CSA v52 CSA v60 IPS (SDEE) Dragon IDS v7_0 Dragon IDS v7_1 Dragon IDS v7_2 Activescout Securenet Sensor Realsecure wgm Netscreen IDP Entercept Intrushield Netdetector Samhain Portsentry Snort Snort DB Winsnort Client Security Endpoint Protection Network Security Tripwire Tripwire Entreprise LMI SMP SMP Relay Messaging services Imapd Ciphertrust IronMail couriermta.org Courier MTA Eudora Qpopper GNU Exim Inter7 Vpopmail Lotus Lotus Domino Exchange Postfix Postfix sendmail.org Sendmail TrendMicro Interscan Messaging Security Suite Directory services LL E January

9 Vendor Product Vendor Product Network device Aruba Aruba Wireless Access Point Check Point Check Point Internal Log CSS FWSM Router Switch VPN VPN IOS compat Cyberguard Cyberguard Draytek Vigor F5 Bigip Juniper Juniper Secure Access Juniper Netscreen Juniper Netscreen v6 Linksys Wap11 Lucent Brick Nortel Alteon Web Switch Nortel Contivity Nortel Nortel Alteon Nortel Nortel switch Nortel Nortel VPN gateway StoneSoft Stonegate Zyxel Zywall Zyxel Zyxel Operating System Ipchains Breach Security Modsecurity FreeBSD FreeBSD Grsecurity Grsecurity HP HP UX HP Tru64 IBM Aix IBM Tivoli Directory Server Intersect alliance Windows 2000 server snare Intersect alliance Windows 2000 workstation snare Intersect alliance Windows 2003 server snare Intersect alliance Windows 2008 server snare Intersect alliance Windows all snare Intersect alliance Windows Vista workstation snare Intersect alliance Windows XP workstation snare Linux Linux Internet Connection Firewall Windows 2000 server Windows 2000 workstation Windows 2003 server English Windows 2003 server French Windows 2008 server English Windows 2008 server French Windows Vista English Windows Vista French Windows XP English Windows XP French Netfilter Netfilter Nokia IPSO Sun Solaris Sun Solaris BSM Squid Squid Sun TrendMicro TrendMicro WebSense WebSense Astaro Astaro Barracuda Check Point Check Point Fortinet PaloAlto Networks NetASQ NetASQ NetASQ NetASQ Sonicwall Remote desktop Internet Security Acceleration v2004 Squid Squidguard Iplanet Interscan Web Security Suite Linux v2 Interscan Web Security Suite Windows v2 Websense v5 Websense v6 PCanywhere Unified Threat Management (UTM) Virtualization Criston ISS ISS McAfee Qualys Tenable Security Apache APC APC Astaro v4 Astaro v5 Barracuda Check Point Pointsec Protector ASA PIX Fortigate Firewall Netasq Alarm v6 Netasq Connection v6 Netasq Filter v6 Netasq v5 Sonicwall Gateway Security v2 Gateway Security v3 Vulnerability scanner Web server Other Criston VM Internet Security Scanner v6 Internet Security Scanner v7 Foundstone QualysGuard Nessus Apache Internet Information Services NCSA Internet Information Services W3C Internet Information Services W3C v3 APC EMU APC UPS Products also supported through LogLogic LMI are underlined in green Proxy / Reverse proxy Beeware Blue Coat Deny ALL F5 Ingrian McAfee I Sentry Blue Coat ProxySG Rweb Appshield Ingrian WebShield Internet Security Acceleration v2000 FW LL E January

10 SEV/SEM Appliances Appliances Description 3 rd Gen Appliances SEM 1060 SEM 3060 SEM 4060 Rack Format 1U 2U 2U Processor(s) Type E5520 E5520 X5570 Total Core # RAM (GB) Max. EPS (remote Log Collector) Max. Instances Archive Storage (GB) Online Storage (GB) LL E January

11 Software Requirements Log Collector Requirements The Log Collector can be installed on the following platforms, with at least 100 MB of disk space available: Windows 2000 (SP4, Windows installer 3.1 or later) x86 (32bit). Windows 2003/2008/XP/Vista x86 (32bit) or x86_64 (64bit). Linux with kernel 2.4 or later (e.g. Red Hat EL 3 or later) x86 (32bit) or x86_64 (64bit). Solaris 8 or later. Aix 5.2 or later. Web Console Requirements The Web Console can be used with the following web browsers: Internet Explorer 7.0 or higher. Mozilla Firefox or higher. Hosts running the Web Console must have at least: 1 GB of RAM. 1024x768 resolutions. 1 GHz 32bit (x86) or 64bit (x64) processor. Upgrading to SEV/SEM v3.5.0 To upgrade to LogLogic Security Event Viewer and Security Event Manager 3.5.0, please refer to the User Guide section 9, Updating the SMP Server. SEV/SEM User Guide and all other documentations are available on our Support Center web site: Known Limitations After an upgrade to SEV/SEM v3.5.0, please clear your web browser cache to avoid a display issue. LL E January

12 Documentation You can find the complete set of user documentation gathering all product guides on: LogLogic SEM installation DVD SEV/SEM Documentation File Name Status AdministrationGuide SEMen.pdf Updated ConceptsGuide SEMen.pdf Updated LogCollectorInstallationGuideSEMen.pdf ReferenceGuide SEMen.pdf SMPInstallationGuideSEMen.pdf Updated UserGuide SEMen.pdf Updated Online Help Updated LL E January

13 Devices Specific Documentations File Name Status workingwithactivpack.pdf workingwithbluecoatsg.pdf workingwithcheckpoint.pdf workingwithciscoids.pdf Updated workingwithciscoioscatos.pdf workingwithciscopixasa.pdf workingwithenterasysdragon.pdf workingwithexchange.pdf New workingwithfortinetfortigate.pdf workingwithinternetinfoservices.pdf workingwithironport.pdf New workingwithissrealsecure.pdf workingwithisssecurityscanner.pdf workingwithisssiteprotector.pdf workingwithlotusnotes.pdf workingwithmcafeeentercept.pdf workingwithmcafeeepo.pdf workingwithmcafeeintrushield.pdf workingwithmicrosoftisa.pdf workingwithmicrosoftom.pdf workingwithmimesweeper.pdf workingwithnokia.pdf workingwithoracle.pdf New workingwithrsa.pdf workingwithsnarewindows.pdf workingwithsnort.pdf workingwithtrendiwsswindows.pdf workingwithtrendmcm.pdf workingwithwebsense.pdf workingwithwindows.pdf LL E January

14 Technical Support Customers may reach the LogLogic support team by: Telephone: Toll Free: LOGS US Local: EMEA or APAC: + 44 (0) or +44 (0) support@loglogic.com Support Website: LL E January

Symantec Security Information Manager Version 4.7

Symantec Security Information Manager Version 4.7 Version 4.7 Agenda What are the challenges? What is Security Information Manager? How does Security Information Manager work? Why? 2 Security Management Challenges 3 Managing IT Security PREVENT INFORM

More information

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo

Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo Functionality Vendor Plugin Name AlienVault Supported Plugin Community Supported Plugin Access Control Cisco Systems cisco-acs cisco-acs-idm cisco-asa N/A sudo Antivirus Avast avast GFI Security gfi McAfee

More information

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method RSA envision Supported Event Sources A Actividentity 4TRESS AAA Server - version 6.4.1 AirDefense AirDefense Enterprise Server - version 7.2 Airmagnet Airmagnet Enterprise - version 7.5.0 Apache HTTP Server

More information

ArcSight Supports a Wide Range of Security Relevant Products

ArcSight Supports a Wide Range of Security Relevant Products ArcSight Supports a Wide Range of Security Relevant Products ArcSight s data collection capabilities are the most versatile in the industry and run the gamut from a centralized collection point on the

More information

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF Tripwire Log Center HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE Enterprise organizations of all sizes need to achieve compliance with regulations and standards and

More information

Vendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga

Vendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga Vendor/Product Log Format Analyzer Standard Analyzer Premium & Analyzer Giga Vantage & Vantage Giga 3Com 3Com Firewall Yes Yes Yes Yes 8e6 R2000 Yes Yes Yes Yes 8e6 R3000 Yes Yes Yes Yes Aladin Esafe Blocked

More information

Supported Log File Formats

Supported Log File Formats Supported File Formats Vendor/Product Format Analyzer Standard Analyzer Premium & Analyzer Giga Vantage & Vantage Giga 3Com 3Com 8e6 R2000 8e6 R3000 Aladin Esafe Blocked s Allied Telesyn ATI Level 3 Switch

More information

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.

More information

HawkEye AP Log Adapter List Updated January 2014

HawkEye AP Log Adapter List Updated January 2014 HawkEye AP Log Adapter List Updated January 2014 Firewalls / VPN Aventail SSL VPN * Check Point Firewall-1 fwexport * Check Point Firewall-1 LEA Check Point VPN-1 * Cisco ASA (via SyslogNG) Cisco FWSM

More information

CiscoWorks SIMS(Netforensics)

CiscoWorks SIMS(Netforensics) Managing Logs and Security Events CiscoWorks SIMS(Netforensics) Georg Bommer, Inter-Networking AG (Switzerland) Table of Content Challenges/Problems Main Functionality Product Tour Report Examples Architecture

More information

og 4 NET A SureL 201

og 4 NET A SureL 201 SureLog ANET 2014 1. SURELOG: ADVANCED SECURITY MANAGEMENT... 3 2. ADVANTAGES... 3 Why Fast EPS Performance Matters... 3 3. LOG MANAGEMENT... 5 Comprehensive Log Data Collection and Log Management... 5

More information

HawkEye AP Log Adapter List Updated January 2016

HawkEye AP Log Adapter List Updated January 2016 HawkEye AP Log Adapter List Updated January 2016 Firewalls / VPN Aventail SSL VPN * Check Point Firewall-1 fwexport * Check Point Firewall-1 LEA Check Point VPN-1 * Cisco ASA (via SyslogNG) Cisco FWSM

More information

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE

More information

List of Supported Systems & Devices

List of Supported Systems & Devices List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged

More information

TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE Enterprise organizations of all sizes need to achieve compliance with regulations and standards

More information

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM Proposal Release Date: AUGUST 20 th 2008 Proposal Due Date: SEPTEMBER 16 th 2008 TABLE OF CONTENTS 1 - INTRODUCTION...

More information

Secure Your Operations through NOC/SOC Integration

Secure Your Operations through NOC/SOC Integration IBM Software Group Secure Your Operations through NOC/SOC Integration David Jenkins Security Consultant davidjen@de.ibm.com IBM Corporation IBM Business/Service Assurance Offering Only Tivoli s suite offers

More information

Supported Devices (Event Log Sources)

Supported Devices (Event Log Sources) Operating Systems HP Insight Manager Windows Time service CISCO CatOS IBM DB2 UDB Websense WSG CISCO IOS Imperva Cisco NX OS LogBinder SP Astaro Citrix NetScaler OS MacAfee Intrushield IPS Security 110

More information

Detecting a Hacking Attempt

Detecting a Hacking Attempt Detecting a Hacking Attempt Speaker: Isaac Thompson Director of Sales Engineering and Training About Prism Microsystems Founded in 1999, headquartered Columbia, Maryland Current Version EventTracker 6

More information

JUNIPER NETWORKS STRM TECHNICAL NOTE

JUNIPER NETWORKS STRM TECHNICAL NOTE JUNIPER NETWORKS STRM TECHNICAL NOTE USING EXTENSION DOCUMENTS JUNE 2008 Device extensions allow you to modify how a DSM parses logs, which is useful for resolving parsing issues. However, before you define

More information

Total Protection for Enterprise-Advanced

Total Protection for Enterprise-Advanced System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)

More information

Reference Guide. Skybox View 7.0.600. Revision: 11

Reference Guide. Skybox View 7.0.600. Revision: 11 Reference Guide Skybox View 7.0.600 Revision: 11 Copyright 2002-2014 Skybox Security, Inc. All rights reserved. This documentation contains proprietary information belonging to Skybox Security and is provided

More information

Log Correlation Engine 4.2 Architecture Guide. October 3, 2013 (Revision 2)

Log Correlation Engine 4.2 Architecture Guide. October 3, 2013 (Revision 2) Log Correlation Engine 4.2 Architecture Guide October 3, 2013 (Revision 2) Table of Contents Introduction... 3 Standards and Conventions... 3 Architecture... 3 Components of the Log Correlation Engine...

More information

Log Correlation Engine 4.6 Quick Start Guide. January 25, 2016 (Revision 2)

Log Correlation Engine 4.6 Quick Start Guide. January 25, 2016 (Revision 2) Log Correlation Engine 4.6 Quick Start Guide January 25, 2016 (Revision 2) Table of Contents Introduction... 4 Standards and Conventions... 4 Product Overview... 4 Prerequisites... 4 LCE Quick Start...

More information

TIBCO LogLogic Unity Quick Reference Guide Concepts

TIBCO LogLogic Unity Quick Reference Guide Concepts TIBCO LogLogic Unity Quick Reference Guide Concepts Overview TIBCO LogLogic Unity is a sleek, modern and scalable platform enabling technical teams to resolve open issues, which require advanced troubleshooting

More information

Release Notes ArcSight SmartConnector

Release Notes ArcSight SmartConnector Release Notes ArcSight SmartConnector Release 4.7.4.5335 July 10, 2009 Release Notes ArcSight SmartConnector Release 4.7.4.5335 July 10, 2009 Copyright 2009 ArcSight, Inc. All rights reserved. ArcSight,

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Log Sources User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 108. Copyright

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks

More information

Deployment Guide. Websense Web Security Websense Web Filter. v7.1

Deployment Guide. Websense Web Security Websense Web Filter. v7.1 Deployment Guide Websense Web Security Websense Web Filter v7.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2009 Printed in the United States

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Product Guide Revision A. McAfee Web Reporter 5.2.1

Product Guide Revision A. McAfee Web Reporter 5.2.1 Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

A CrossTec Corporation. Instructional Setup Guide. Activeworx Security Center Quick Install Guide

A CrossTec Corporation. Instructional Setup Guide. Activeworx Security Center Quick Install Guide A CrossTec Corporation Instructional Setup Guide Activeworx Security Center Quick Install Guide PREPARED BY GARY CONKLE Activeworx Basic Installation and Configuration Guide CrossTec Corporation 500 NE

More information

McAfee Total Protection Service Installation Guide

McAfee Total Protection Service Installation Guide McAfee Total Protection Service Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member

More information

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy

Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Juniper Security Threat Response Manager (STRM) Mikko Kuljukka COMPUTERLINKS Oy Customer Challenges Dispersed Threats IT Overload IT information overload Flood of logged events from many point network

More information

TECHNOLOGY INTEGRATION GUIDE

TECHNOLOGY INTEGRATION GUIDE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

Heroix Longitude Quick Start Guide V7.1

Heroix Longitude Quick Start Guide V7.1 Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: support@heroix.com Notice Heroix provides

More information

TECHNOLOGY INTEGRATION GUIDE

TECHNOLOGY INTEGRATION GUIDE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information

Table Of Contents INTRODUCTION... 4. About Firewall Analyzer... 5 Release Notes... 6 Supported Firewalls... 9 INSTALLATION AND SETUP...

Table Of Contents INTRODUCTION... 4. About Firewall Analyzer... 5 Release Notes... 6 Supported Firewalls... 9 INSTALLATION AND SETUP... Table Of Contents INTRODUCTION... 4 About Firewall Analyzer... 5 Release Notes... 6 Supported Firewalls... 9 INSTALLATION AND SETUP... 10 System Requirements... 10 Prerequisites... 12 Installing and Uninstalling...

More information

DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1

DEPLOYMENT GUIDE. Websense Enterprise Websense Web Security Suite TM. v6.3.1 DEPLOYMENT GUIDE Websense Enterprise Websense Web Security Suite TM v6.3.1 1996 2009, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published June 13, 2007 Printed

More information

Audit and Control of Enterprise Vulnerability Management. Grant Johnson, Technical Account Manager

Audit and Control of Enterprise Vulnerability Management. Grant Johnson, Technical Account Manager Audit and Control of Enterprise Vulnerability Management Grant Johnson, Technical Account Manager Phoenix May 14, 2014 Key Elements of EVM IT Asset Inventory and Control Risk-based Vulnerability Management

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE TECHNOLOGY INTEGRATION GUIDE INTRODUCTION RedSeal s cybersecurity analytics platform integrates data from your network devices and security solutions to provide a comprehensive model of your network and

More information

LOG CENTER SECURITY INTELLIGENCE MADE SIMPLE

LOG CENTER SECURITY INTELLIGENCE MADE SIMPLE CONFIDENCE: SECURED PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence

More information

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. Preface p. ix Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p. 6 Common Linux Features p. 8 Primary Advantages

More information

Where can I install GFI EventsManager on my network?

Where can I install GFI EventsManager on my network? Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

Advanced Linux System Administration Knowledge GNU/LINUX Requirements

Advanced Linux System Administration Knowledge GNU/LINUX Requirements Advanced Linux System Administration Knowledge GNU/LINUX Requirements Duration: 112Hours / 28 Classes (4hrs each class Including Theory & Lab Session) (2 Classes/ Week) Class Topic Duration Class 1 History

More information

WatchGuard Training. Introduction to WatchGuard Dimension

WatchGuard Training. Introduction to WatchGuard Dimension WatchGuard Training Introduction to WatchGuard Dimension Introduction to WatchGuard Dimension What is WatchGuard Dimension? Deploy WatchGuard Dimension Configure WatchGuard Dimension Use WatchGuard Dimension

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report NetIQ Security Manager Version 5.5 Report Number: CCEVS-VR-07-0058 Dated: 9 August 2007

More information

OWASP Logging Project - Roadmap

OWASP Logging Project - Roadmap OWASP Logging Project - Roadmap SUMMARY Why log?... 2 What is commonly logged?... 2 What are security logs?... 2 What are the most common issues with logging?... 2 What are the common functions of a log

More information

Where can I install GFI EventsManager on my network?

Where can I install GFI EventsManager on my network? Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location

More information

Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.

Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved. Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio

More information

Novell Sentinel Log Manager

Novell Sentinel Log Manager AUTHORIZED DOCUMENTATION Installation Guide Novell Sentinel Log Manager 1.1 December 2010 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

Configuration Audit & Control

Configuration Audit & Control The Leader in Configuration Audit & Control Configuration Audit & Control Brett Bartow - Account Manager Kelly Feagans, Sr. Systems Engineer ITIL, CISA March 4, 2009 Recognized leader in Configuration

More information

McAfee Network Security Platform 8.2

McAfee Network Security Platform 8.2 8.2.7.71-8.2.3.84 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.2 Revision B Contents About this release New features Enhancements Resolved Issues Installation instructions Known

More information

MANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com

MANAGED SERVICES. Remote Monitoring. Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com MANAGED SERVICES Remote Monitoring A N D Ma n a g e m e n t D O C U MENTATION AND Services Gu i d e Contact US: 800.677.1919 info@millenniuminc.com millenniuminc.com ABOUT RMM SERVICES Millennium s RMM

More information

Detailed Features. Detailed Features. EISOO AnyBackup Family 1 / 19 WWW.EISOO.COM

Detailed Features. Detailed Features. EISOO AnyBackup Family 1 / 19 WWW.EISOO.COM Detailed EISOO AnyBackup Family 1 / CONTENT Chapter 1. About AnyBackup Family... 4 Chapter 2. Detailed... 5 2.1 Data Protection... 5 2.2 Regular Backup... 6 2.3 Regular Backup and Restore for File... 7

More information

Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide

Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Note Before using this information and the product

More information

v7.8.1 Release Notes for Websense Web Security

v7.8.1 Release Notes for Websense Web Security v7.8.1 Release Notes for Websense Web Security Topic 43010 Release Notes Web Security Solutions Updated 22-Oct-2013 Applies to: Websense Web Filter, Web Security, Web Security Gateway, and Web Security

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Installation Guide. Sentinel Log Manager 1.2.2. July 2014

Installation Guide. Sentinel Log Manager 1.2.2. July 2014 Installation Guide Sentinel Log Manager 1.2.2 July 2014 Legal Notice NetIQ Sentinel is protected by United States Patent No(s): 05829001. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED

More information

Supported Data & Log Sources

Supported Data & Log Sources Supported Data & Log Sources IT Compliance & Event Log Management Software for SIEM 14 South Networks IntraLock 30 3Com 4400 Switch 3Com 4500 Switch 3Com 4500G Switch 3Com 4800G Switch 3Com 5500 Switch

More information

ACE Management Server Deployment Guide VMware ACE 2.0

ACE Management Server Deployment Guide VMware ACE 2.0 Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.

More information

Table Of Contents INTRODUCTION... 2. About Firewall Analyzer... 3 Release Notes... 4 Supported Firewalls... 6 INSTALLATION AND SETUP...

Table Of Contents INTRODUCTION... 2. About Firewall Analyzer... 3 Release Notes... 4 Supported Firewalls... 6 INSTALLATION AND SETUP... Table Of Contents INTRODUCTION... 2 About Firewall Analyzer... 3 Release Notes... 4 Supported Firewalls... 6 INSTALLATION AND SETUP... 7 System Requirements... 7 Prerequisites... 10 Installing and Uninstalling...

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Secospace elog. Secospace elog

Secospace elog. Secospace elog Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page

More information

Pre-Installation Notes & Checklist for LISTSERV Maestro

Pre-Installation Notes & Checklist for LISTSERV Maestro Pre-Installation Notes & Checklist for LISTSERV Maestro Page 1 Intended Audience and Background: This document is intended for prospective customers, existing customers, and staff of L-Soft. This document

More information

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE

YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE FAST FORWARD YOUR NETWORK SECURITY WITH PROACTIVE SECURITY INTELLIGENCE VISUALIZE COMPLY PROTECT RedSeal Networks, Inc. 3965 Freedom Circle, 8th Floor, Santa Clara, 95054 Tel (408) 641-2200 Toll Free (888)

More information

Upgrade to Webtrends Analytics 8.7: Best Practices

Upgrade to Webtrends Analytics 8.7: Best Practices Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.

More information

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published: 2015-03-31

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide Product Release 8.1 Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide 2700 Zanker Road, Suite 200 San Jose, CA 95134

More information

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0 GMS SonicWALL Global Management System 5.0 Contents Platform Compatibility...1 New Features and Enhancements...2 Known Issues...6 Resolved Issues...6 Installation Procedure...7 Related Technical Documentation...8

More information

Peter Dulay, CISSP Senior Architect, Security BU

Peter Dulay, CISSP Senior Architect, Security BU CA Enterprise Log Manager 12.5 Peter Dulay, CISSP Senior Architect, Security BU Agenda ELM Overview ELM 12.5: What s new? ELM to CA Access Control/PUPM Integration CA CONFIDENTIAL - Internal Use Only Overview

More information

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.0. Document Revision 2.0 Published: 2016-01-05

Pulse Connect Secure. Supported Platforms Guide. Product Release 8.0. Document Revision 2.0 Published: 2016-01-05 Pulse Connect Secure Supported Platforms Guide Product Release 8.0 Document Revision 2.0 Published: 2016-01-05 2015 by Pulse Secure, LLC. All rights reserved 1 2700 Zanker Road, Suite 200 San Jose, CA

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

Adaptive Log Exporter Users Guide

Adaptive Log Exporter Users Guide IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,

More information

Symantec Security Information Manager 4.7.4 User Guide

Symantec Security Information Manager 4.7.4 User Guide Symantec Security Information Manager 4.7.4 User Guide Symantec Security Information Manager 4.7.4 User Guide The software described in this book is furnished under a license agreement and may be used

More information

DocuShare Installation Guide

DocuShare Installation Guide DocuShare Installation Guide Publication date: May 2009 This document supports DocuShare Release 6.5/DocuShare CPX Release 6.5 Prepared by: Xerox Corporation DocuShare Business Unit 3400 Hillview Avenue

More information

IBM Security SiteProtector System Configuration Guide

IBM Security SiteProtector System Configuration Guide IBM Security IBM Security SiteProtector System Configuration Guide Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 209. This edition

More information

Select the right security information and event management solution to automate security and compliance operations.

Select the right security information and event management solution to automate security and compliance operations. Security information and event management solutions Buyer s guide: purchasing criteria Select the right security information and event management solution to automate security and compliance operations.

More information

StruxureWare TM Center Expert. Data

StruxureWare TM Center Expert. Data StruxureWare TM Center Expert Data End to end data center infrastructure management software for monitoring and control of power, cooling, security and energy usage from the building through IT systems

More information

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition

More information

Netwrix Auditor for Windows Server

Netwrix Auditor for Windows Server Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

Utility Modernization Cyber Security City of Glendale, California

Utility Modernization Cyber Security City of Glendale, California Utility Modernization Cyber Security City of Glendale, California Cyber Security Achievements Cyber Security Achievements (cont) 1. Deploying IT Security Awareness training program Q4 2012 2. Purchased

More information

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise InterSect Alliance International Pty Ltd Page 1 of 9 About this document The PCI/DSS documentation provides guidance on a set of baseline security measures

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

mbits Network Operations Centrec

mbits Network Operations Centrec mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,

More information

Sage Grant Management System Requirements

Sage Grant Management System Requirements Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

Verax Service Desk Installation Guide for UNIX and Windows

Verax Service Desk Installation Guide for UNIX and Windows Verax Service Desk Installation Guide for UNIX and Windows March 2015 Version 1.8.7 and higher Verax Service Desk Installation Guide 2 Contact Information: E-mail: sales@veraxsystems.com Internet: http://www.veraxsystems.com/

More information

To read more Linux Journal or start your subscription, please visit http://www.linuxjournal.com.

To read more Linux Journal or start your subscription, please visit http://www.linuxjournal.com. AlienVault the Future of Security Information Management Meet AlienVault OSSIM, a complex security system designed to make your life simpler. JERAMIAH BOWLING Security Information Management (SIM) systems

More information

Deployment Guide. Websense Web Security Websense Web Filter

Deployment Guide. Websense Web Security Websense Web Filter Deployment Guide Websense Web Security Websense Web Filter v7 1996 2008, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2008 Printed in the United States

More information

Installation and Configuration Guide for Windows and Linux

Installation and Configuration Guide for Windows and Linux Installation and Configuration Guide for Windows and Linux vcenter Operations Manager 5.7 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85 Information Security Measures and Monitoring System at BARC - R.S.Mundada Computer Division B.A.R.C., Mumbai-85 Information Security Approach Secure Network Design, Layered approach, with SPF and Application

More information

Joshua Beeman University Information Security Officer October 17, 2011

Joshua Beeman University Information Security Officer October 17, 2011 Joshua Beeman University Information Security Officer October 17, 2011 1 June, 2011- NPTF Security Presentation on FY 12 InfoSec goals: Two Factor Authentication Levels of Assurance Shibboleth InCommon

More information