SYSTEM BACKUP AND RESTORE (AlienVault USM 4.8+)
|
|
- Claud Cunningham
- 8 years ago
- Views:
Transcription
1 Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved.
2 AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat Exchange, AlienVault OTX Reputation Monitor, AlienVault OTX Reputation Monitor Alert, AlienVault OSSIM and OSSIM are trademarks or service marks of AlienVault.
3 CONTENTS 1. INTRODUCTION SCOPE HOW TO BACKUP AN ALIENVAULT APPLIANCE Payload Backup Environment Backup Raw Data Backup Saving Generated Backup Files HOW TO RESTORE AN ALIENVAULT APPLIANCE BACKUP Copy the backup files into the appliance Stop appliance services Payload Restore MongoDB Dump Recovery Environment Restore Raw Data Restore Start Appliance Services DC Edition 01 Copyright 2015 AlienVault. All rights reserved. Page 3 of 11
4 1. INTRODUCTION This document describes how to perform a full backup of an AlienVault USM appliance (4.8+) so the system can be recovered - or replaced by another system - after proceeding with the restore process. The appliance to be recovered MUST have the same software version used during the backup process. 2. SCOPE This procedure will save all the information from your system required for recovery purposes: Payload: events, alarms, assets, users, reports, tickets, historic data... Environment: processes configuration, plugins, keys... Raw Data: Logger data and Netflows All the steps described in the following sections must be done, in the order here defined, to perform the full backup and restore of the system. Do not use this procedure to try to clone/duplicate data or configuration across your deployment. 3. HOW TO BACKUP AN ALIENVAULT APPLIANCE The backup procedure requires the users to have full access to the appliance console (local or remote access). To get remote access: Open a console terminal and type the following command: ssh root@ip_address IP_address refers to the default IP of your appliance. DC Edition 01 Copyright 2015 AlienVault. All rights reserved. Page 4 of 11
5 The AlienVault Setup main menu should be displayed after the user authentication. On the computer keyboard, press the arrow keys to move to option 3: Jailbreak System. Then, press Enter to accept the selection (<OK>). Execute the following command: screen The instructions below will generate the following backup files: Payload alienvault-dbs.sql.gz alienvault-mongo.tgz Environment Alienvault-environment.tgz Raw Data alienvault-data.tgz Please, keep these files in a secure location. They are needed in order to recover your appliance. DC Edition 01 Copyright 2015 AlienVault. All rights reserved. Page 5 of 11
6 3.1. PAYLOAD BACKUP The entire payload data managed by AlienVault appliances is stored in two databases: MySQL: events, alarms, assets info, users and permissions, reports, tickets... Mongo DB: IDM historic data So saving up a dump from these databases will provide the payload backup MYSQL DATABASE DUMP 1. Execute the following command: mysqldump -p`grep ^pass /etc/ossim/ossim_setup.conf sed 's/pass=//'` --noautocommit --single-transaction --all-databases gzip > alienvaultdbs.sql.gz 2. The alienvault-dbs.sql.gz backup file should be created MONGO DATABASE DUMP 1. Execute this command to dump your database: mongodump --host localhost 2. A directory called dump should be generated. 3. Compress the dump file. Type the following command: tar cvzf alienvault-mongo.tgz dump 4. The alienvault-mongo.tgz file should be successfully created ENVIRONMENT BACKUP This section describes how to save the environment configuration files related to the appliance platform, processes, plugins, keys Execute the following command: if [[! -f /etc/alienvault-center/alienvault-center-uuid ]]; then dmidecode - s system-uuid awk '{print tolower($0)}' > /etc/alienvault- DC Edition 01 Copyright 2015 AlienVault. All rights reserved. Page 6 of 11
7 center/alienvault-center-uuid ; fi 2. Backup the appliance configuration: tar cvzf alienvault-environment.tgz /etc/ossim/ /etc/alienvault/ /etc/alienvault-center/ /etc/ansible/ /root/.ssh/ /home/avapi/ /home/avforw/ /home/avserver/ /var/ossec/ /etc/snort/ /etc/suricata/ /etc/nagios3/ /etc/openvpn/ /var/cache/openvas/ /var/lib/openvas/ /etc/logrotate.d/ /etc/rsyslog.d/ /etc/apache2/ /usr/share/alienvault-center/ /etc/nfsen/ /etc/mysql/ /var/ossim/keys/ /var/ossim/ssl/ /etc/hosts /etc/resolv.conf 3. The alienvault-environment.tgz file should be created RAW DATA BACKUP 1. Create a compressed file containing the Logger and Netflows data: tar cvzf alienvault-data.tgz /var/ossim/logs /var/nfsen /var/cache/nfdump 2. The alienvault-data.tgz file should be created SAVING GENERATED BACKUP FILES Do not forget to copy the generated backup files in a secure location. You can use any SCP application; for example, WinSCP (for Windows) or SCP command (for Linux): alienvault-dbs.sql.gz alienvault-mongo.tgz alienvault-environment.tgz alienvault-data.tgz 4. HOW TO RESTORE AN ALIENVAULT APPLIANCE BACKUP The appliance to be recovered MUST have the same software version used during the backup process. The restore procedure requires the users to have full access to the appliance console (local or remote access). To get remote access: DC Edition 01 Copyright 2015 AlienVault. All rights reserved. Page 7 of 11
8 Open a console terminal and type the following command: ssh root@ip_address IP_address refers to the default IP of your appliance. The AlienVault Setup main menu should be displayed after the user authentication. On the computer keyboard, press the arrow keys to move to option 3: Jailbreak System. Then, press Enter to accept the selection (<OK>). Execute the following command: screen 4.1. COPY THE BACKUP FILES INTO THE APPLIANCE The following files, previously saved, must be copied into your target appliance in order to restore the backup. You can use any SCP application; for example, WinSCP (for Windows) or SCP command (for Linux): alienvault-dbs.sql.gz alienvault-mongo.tgz alienvault-environment.tgz alienvault-data.tgz Please, copy these files under the root directory of the appliance. DC Edition 01 Copyright 2015 AlienVault. All rights reserved. Page 8 of 11
9 4.2. STOP APPLIANCE SERVICES 1. Stop the following services in the appliance: /etc/init.d/monit stop /etc/init.d/ossim-server stop /etc/init.d/ossim-agent stop /etc/init.d/ossim-framework stop /etc/init.d/alienvault-idm stop /etc/init.d/alienvault-center stop /etc/init.d/alienvault-api stop 2. Create a backup of the AlienVault configuration file: cp /etc/ossim/ossim_setup.conf /root/ossim_setup.conf_last 4.3. PAYLOAD RESTORE MYSQL DUMP RECOVERY Enter the following command to restore the dump file: zcat alienvault-dbs.sql.gz ossim-db 4.4. MONGODB DUMP RECOVERY 1. Extract the tar file: tar xvzf alienvault-mongo.tgz 2. Restore the mongodb backup: mongorestore --db inventory dump/inventory/ DC Edition 01 Copyright 2015 AlienVault. All rights reserved. Page 9 of 11
10 4.5. ENVIRONMENT RESTORE 1. Remove current configuration: rm -rf /etc/ossim/ /etc/alienvault/ /etc/alienvault-center/ /etc/ansible/ /root/.ssh/ /home/avapi/ /home/avforw/ /home/avserver/ /var/ossec/ /etc/snort/ /etc/suricata/ /etc/nagios3/ /etc/openvpn/ /var/cache/openvas/ /var/lib/openvas/ /etc/logrotate.d/ /etc/rsyslog.d/ /etc/apache2/ /usr/share/alienvault-center/ /etc/nfsen/ /etc/mysql/ /var/ossim/keys/ /var/ossim/ssl/ /etc/hosts /etc/resolv.conf 2. Restore configuration from your backup. Extract the tar file into the / directory: tar xvzf alienvault-environment.tgz -C / 3. Copy the Alienvault configuration file under /etc/ossim: cp /root/ossim_setup.conf_last /etc/ossim/ 4. Enter the following commands to update the files permissions: tar tvzf alienvault-environment.tgz tr -s ' ' > /root/file_list ulimit -s cd / for i in `cat /root/file_list cut -f2 -d" " sort -u`; do user=`echo $i cut -f1 -d"/"`; group=`echo $i cut -f2 -d"/"`; chown $user:$group `grep $i root/file_list cut -f6 -d" " xargs`; done ulimit -s 8192 cd / 4.6. RAW DATA RESTORE 1. Extract the tar file to the / directory: tar xvzf alienvault-data.tgz -C / 2. Enter the following commands to update the files permissions: tar tvzf alienvault-data.tgz tr -s ' ' > /root/file_list DC Edition 01 Copyright 2015 AlienVault. All rights reserved. Page 10 of 11
11 ulimit -s cd / for i in `cat /root/file_list cut -f2 -d" " sort -u`; do user=`echo $i cut -f1 -d"/"`; group=`echo $i cut -f2 -d"/"`; chown $user:$group `grep $i root/file_list cut -f6 -d" " xargs`; done ulimit -s START APPLIANCE SERVICES 1. Type the following command in the console: ossim-reconfig -c -v -d 2. The system has been recovered using the backup. Log out from console. DC Edition 01 Copyright 2015 AlienVault. All rights reserved. Page 11 of 11
How to configure High Availability (HA) in AlienVault USM (for versions 4.14 and prior)
Complete. Simple. Affordable How to configure High Availability (HA) in AlienVault USM Copyright 2015 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM,
More informationAlienVault. Unified Security Management 5.x Configuration Backup and Restore
AlienVault Unified Security Management 5.x Configuration Backup and Restore USM 5.x Configuration Backup and Restore Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationMonitoring VMware ESX Virtual Switches
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationAlienVault. Unified Security Management 5.x Configuring a VPN Environment
AlienVault Unified Security Management 5.x Configuring a VPN Environment USM 5.x Configuring a VPN Environment, rev. 3 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationDevice Integration: Checkpoint Firewall-1
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationModule 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration
Module 1: Overview This module provides an overview of the AlienVault Unified Security Management (USM) solution. Upon completing this module, you will meet these objectives: Describe the goal of network
More informationDevice Integration: Citrix NetScaler
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationDevice Integration: Cisco Wireless LAN Controller (WLC)
Complete. Simple. Affordable Device Integration: Cisco Wireless LAN Controller (WLC) Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM,
More informationAlienVault. Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures
AlienVault Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures USM 4.4-5.x Offline Update and Software Restoration Procedures Copyright 2015 AlienVault, Inc. All rights
More informationDevice Integration: CyberGuard SG565
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationHow to send emails triggered by events
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationAlienVault Unified Security Management (USM) 4.15-5.x. Configuring High Availability (HA)
AlienVault Unified Security Management (USM) 4.15-5.x Configuring High Availability (HA) USM v4.15-5.x Configuring High Availability (HA), rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The
More informationAlienVault Offline Key Activation
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationDeploying HIDS Client to Windows Hosts
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationAlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard
AlienVault Unified Security Management (USM) 5.1 Running the Getting Started Wizard USM v5.1 Running the Getting Started Wizard, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault
More informationAlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationAlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts
AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,
More informationAlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide
AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationSuricata IDS. What is it and how to enable it
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationUser Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationAlienVault. Unified Security Management (USM) 4.8-5.x Initial Setup Guide
AlienVault Unified Security Management (USM) 4.8-5.x Initial Setup Guide Contents USM v4.8-5.x Initial Setup Guide Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault, AlienVault
More informationHow to enable File Integrity Monitoring (FIM)
Complete. Simple. Affordable How to enable File Integrity Monitoring (FIM) AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More information4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions
4PSA Total Backup 3.0.0 for Plesk 10.0.0 and newer versions User's Guide For more information about 4PSA Total Backup, check: http://www.4psa.com Copyright 2009-2011 4PSA. User's Guide Manual Version 84359.5
More informationThe SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
More informationPresented by: CSIR-KNOWGATE. KNOWGATE Email: csirknowgate@niscair.res.in KNOWGATE Website: knowgate.niscair.res.in
Presented by: CSIR-KNOWGATE KNOWGATE Email: csirknowgate@niscair.res.in KNOWGATE Website: knowgate.niscair.res.in Backup of Database Restore of Database Backing up the Koha File System Backup of Local
More informationInstallation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L
Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L Introduction: This guide is written to help any person with little knowledge in AIX V5.3L to prepare the P Server
More informationUsing Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
More informationAlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationConfiguring High Availability for VMware vcenter in RMS Distributed Setup
Configuring High Availability for VMware vcenter in RMS Distributed Setup This chapter describes the process of configuring high availability for the VMware vcenter. It provides the prerequisites and procedures
More informationMigrating your custom settings to version 7.6
Migrating your custom settings to version 7.6 Webinar July 2011 web security data security email security 2009, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:
More informationAssets, Groups & Networks
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationBackup Methods for your BBB or RPi2 Node
Backup Methods for your BBB or RPi2 Node PLEASE NOTE THESE INSTRUCTIONS APPLY STARTING WITH BBB 1.2 AND RPi2 Images It is very important to do periodic backups of your node especially if you make lots
More information1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam
1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam Section 1: Assessing infrastructure needs for the NetScaler implementation 1.1 Task Description: Verify the objectives
More informationChapter 1. Backup service
The current backup policy is a two-step process. First, all hosts run a daily and/or weekly shell script in cron that creates one (or more) compressed tar files with the relevant content to be stored as
More informationULTEO OPEN VIRTUAL DESKTOP V4.0
ULTEO OPEN VIRTUAL DESKTOP V4.0 MIGRATION GUIDE 28 February 2014 Contents Section 1 Introduction... 4 Section 2 Overview... 5 Section 3 Preparation... 6 3.1 Enter Maintenance Mode... 6 3.2 Backup The OVD
More informationSWsoft Plesk 8.3 for Linux/Unix Backup and Restore Utilities
SWsoft Plesk 8.3 for Linux/Unix Backup and Restore Utilities Administrator's Guide Revision 1.0 Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703)
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Disaster Recovery Guide Table of contents Overview... 2 General recovery process... 2 Recovering the HPDM Server... 5 Backing up the data... 5 Installing the
More informationSWsoft Plesk 8.2 for Linux/Unix Backup and Restore Utilities. Administrator's Guide
SWsoft Plesk 8.2 for Linux/Unix Backup and Restore Utilities Administrator's Guide 2 Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670
More informationWhite Paper. Fabasoft on Linux Cluster Support. Fabasoft Folio 2015 Update Rollup 2
White Paper Fabasoft Folio 2015 Update Rollup 2 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and software names used are registered trade names and/or registered
More informationCommandCenter Secure Gateway
CommandCenter Secure Gateway Quick Setup Guide for CC-SG Virtual Appliance and lmadmin License Server Management This Quick Setup Guide explains how to install and configure the CommandCenter Secure Gateway.
More informationHow To Backup A Database On A Microsoft Powerpoint 3.5 (Mysqldump) On A Pcode (Mysql) On Your Pcode 3.3.5 On A Macbook Or Macbook (Powerpoint) On
Backing Up and Restoring Your MySQL Database (2004-06-15) - Contributed by Vinu Thomas Do you need to change your web host or switch your database server? This is probably the only time when you really
More informationAfter you have created your text file, see Adding a Log Source.
TECHNICAL UPLOADING TEXT FILES INTO A REFERENCE SET MAY 2012 This technical note provides information on how to upload a text file into a STRM reference set. You need to be comfortable with writing regular
More informationOpen-Xchange Server Backup Whitepaper
OPEN-XCHANGE Whitepaper Open-Xchange Server Backup Whitepaper How to back up and restore your Groupware Data v1.20 Copyright 2005, OPEN-XCHANGE Inc. This document is the intellectual property of Open-Xchange
More informationFred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer
Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical
More informationNoMachine Enterprise Products, Cloud Server Installation and Configuration Guide
pproved by: NoMachine Enterprise Products, Cloud Server Installation and Configuration Guide Page 1 of 18 pproved by: Table of Contents 1. NoMachine Cloud Server 3 1.1. Resources on the Web 3 1.2. Prerequisites
More informationAlienVault Unified Security Management for Government v4.12 & CyberC4:Alert v4.12 Configuration for Common Criteria
AlienVault Unified Security Management for Government v4.12 & CyberC4:Alert v4.12 Configuration for Common Criteria AVUG-00001 Edition 13 DOCUMENT HISTORY AND VERSION CONTROL Edition Date of Issue Description
More informationMySQL backup and restore best practices. Roman Vynar September 21, 2015
MySQL backup and restore best practices Roman Vynar September 21, 2015 Introduction This is a hands-on tutorial on setting up the different types of MySQL backups and recovering from various disasters.
More informationBackup of ESXi Virtual Machines using Affa
Backup of ESXi Virtual Machines using Affa From SME Server Skill level: Advanced The instructions on this page may require deviations from procedure, a good understanding of linux and SME is recommended.
More informationAttix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
More informationBusiness Objects BI Server Installation Guide - Linux
Business Objects BI Server Installation Guide - Linux Business Objects BI Server Linux Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents, which may
More informationinsync Installation Guide
insync Installation Guide 5.2 Private Cloud Druva Software June 21, 13 Copyright 2007-2013 Druva Inc. All Rights Reserved. Table of Contents Deploying insync Private Cloud... 4 Installing insync Private
More informationAdept Backup Solution - Configure Database MySQL Backup Schedule How to configure a MySQL Database Backup. Overview.
201 Datavoice House, PO Box 267, Stellenbosch, 7599 16 Elektron Avenue, Technopark, Tel: +27 218886500 Stellenbosch, 7600 Fax: +27 218886502 Adept Internet (Pty) Ltd. Reg. no: 1984/01310/07 VAT No: 4620143786
More informationInformation Sheet IS13011A. VS Series - Recovering / Installing the Operating System. (For Software Version 4.x) Issue 1.0...
Information Sheet IS13011A VS Series - Recovering / Installing the Operating System (For Software Version 4.x) Issue 1.0...20 January 2014 Nautel Limited 10089 Peggy's Cove Road, Hackett's Cove, NS, Canada
More informationF-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
More informationBACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER
Training course 2007 BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER Nicolas FUNKE PS2 ID : 45722 This document represents my internships technical report. I worked for the Biarritz's Town Hall during
More informationUnified Security Management (USM) 5.2 Vulnerability Assessment Guide
AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationNetNumen U31 R06. Backup and Recovery Guide. Unified Element Management System. Version: V12.14.30
NetNumen U31 R06 Unified Element Management System Backup and Recovery Guide Version: V12.14.30 ZTE CORPORATION No. 55, Hi-tech Road South, ShenZhen, P.R.China Postcode: 518057 Tel: +86-755-26771900 Fax:
More informationHow to backup a remote MySQL server with ZRM over the Internet
How to backup a remote MySQL server with ZRM over the Internet White paper "As MySQL gains widespread adoption and moves more broadly into the enterprise, ZRM for MySQL addresses the growing need among
More informationInstalling a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2. Summary
Technical Bulletin Application Note April 2013 Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2 Summary This application note describes how to install the
More informationMySQL Backup and Recovery: Tools and Techniques. Presented by: René Cannaò @rene_cannao Senior Operational DBA www.palominodb.com
MySQL Backup and Recovery: Tools and Techniques Presented by: René Cannaò @rene_cannao Senior Operational DBA www.palominodb.com EXPERIENCE WITH BACKUP How many of you consider yourself beginners? How
More informationEVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault
EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...
More informationOverview. Remote access and file transfer. SSH clients by platform. Logging in remotely
Remote access and file transfer Overview Remote logins to Bio-Linux with ssh Running software from another machine Logging in from another machine Getting files on and off Bio-Linux Transferring files
More informationLinux System Administration. System Administration Tasks
System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,
More informationCDP 3.0 Release Notes
Backup and Recovery CDP 3.0 Release Notes Contents Platform Compatibility New Features Known Issues Resolved Known Issues Installing SonicWALL Software Procedures Related Technical Documentation Platform
More informationGWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5
GWAVA 5 Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 Copyright 2010 GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com Overview While GWAVA
More informationNetflow Collection with AlienVault Alienvault 2013
Netflow Collection with AlienVault Alienvault 2013 CONFIGURE Configuring NetFlow Capture of TCP/IP Traffic from an AlienVault Sensor or Remote Hardware Level: Beginner to Intermediate Netflow Collection
More informationBackup/Restore MySQL Server
This chapter will describe in details how to use Software to backup your MySQL server and how you can restore your MySQL server from the database backup files. Table of Content 1. Requirements 2. Overview
More informationHow to Install Multicraft on a VPS or Dedicated Server (Ubuntu 13.04 64 bit)
How to Install Multicraft on a VPS or Dedicated Server (Ubuntu 13.04 64 bit) Introduction Prerequisites This tutorial will show you step-by-step on how to install Multicraft 1.8.2 on a new VPS or dedicated
More informationRecommended File System Ownership and Privileges
FOR MAGENTO COMMUNITY EDITION Whenever a patch is released to fix an issue in the code, a notice is sent directly to your Admin Inbox. If the update is security related, the incoming message is colorcoded
More informationBack Up Linux And Windows Systems With BackupPC
By Falko Timme Published: 2007-01-25 14:33 Version 1.0 Author: Falko Timme Last edited 01/19/2007 This tutorial shows how you can back up Linux and Windows systems with BackupPC.
More informationEasy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux
Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com info@1and1.com August 2015 Copyright 2015 1&1
More informationNexentaConnect for VMware Virtual SAN
NexentaConnect for VMware Virtual SAN QuickStart Installation Guide 1.0.2 FP2 Date: October, 2015 Subject: NexentaConnect for VMware Virtual SAN QuickStart Installation Guide Software: NexentaConnect for
More informationINSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER
INSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER A TECHNICAL WHITEPAPER Copyright 2012 Kaazing Corporation. All rights reserved. kaazing.com Executive Overview This document
More informationIntrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationInstalling Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012
Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012 1 The person installing the VC is knowledgeable of the Linux file system
More informationUnified Security Management and Open Threat Exchange
13/09/2014 Unified Security Management and Open Threat Exchange RICHARD KIRK SENIOR VICE PRESIDENT 11 SEPTEMBER 2014 Agenda! A quick intro to AlienVault Unified Security Management (USM)! Overview of the
More informationGetting Started with Universal Command Agent for SOA: XD Connector 4.3.0
Getting Started with Universal Command Agent for SOA: XD Connector 4.3.0 Objective The objective of this document is to assist in the following activities regarding the Universal Command Agent for SOA:
More informationHow To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
More informationGroundWork Monitor Open Source 5.1.0 Installation Guide
GroundWork Monitor Open Source 5.1 is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version
More informationCloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1
Getting Started Guide Cloud Server powered by Mac OS X Getting Started Guide Page 1 Getting Started Guide: Cloud Server powered by Mac OS X Version 1.0 (02.16.10) Copyright 2010 GoDaddy.com Software, Inc.
More informationMcAfee Enterprise Security Manager 9.3.2
Release Notes McAfee Enterprise Security Manager 9.3.2 Contents About this release New features for 9.3.2 Upgrade instructions for 9.3.2 Find product documentation About this release This document contains
More informationHOW TO BUILD A VMWARE APPLIANCE: A CASE STUDY
HOW TO BUILD A VMWARE APPLIANCE: A CASE STUDY INTRODUCTION Virtual machines are becoming more prevalent. A virtual machine is just a container that describes various resources such as memory, disk space,
More informationActive Fabric Manager (AFM) Installation Guide 2.0
Active Fabric Manager (AFM) Installation Guide 2.0 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates
More informationTECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server
TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER AUGUST 2012 STRM uses system configuration files to provide useful characterizations of network data flows. Updates to the system configuration files, available
More informationPlesk 8.0 for Linux/UNIX Backup and Restore Utilities
SWsoft, Inc. Plesk 8.0 for Linux/UNIX Backup and Restore Utilities Administrator s Guide Revision 1.1 (31 May 2006) (c) 1999-2006 ISBN: N/A SWsoft, Inc. 13755 Sunrise Valley Drive Suite 325 Herndon VA
More informationUsing Secure4Audit in an IRIX 6.5 Environment
Using Secure4Audit in an IRIX 6.5 Environment Overview... 3 Icons... 3 Installation Reminders... 4 A Very Brief Overview of IRIX System auditing... 5 Installing System Auditing... 5 The System Audit Directories...
More informationSAP HANA Disaster Recovery with Asynchronous Storage Replication Using Snap Creator and SnapMirror
Technical Report SAP HANA Disaster Recovery with Asynchronous Storage Replication Using Snap Creator and SnapMirror Nils Bauer, NetApp March 2014 TR-4279 The document describes the setup of a disaster
More informationSecure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
More informationNIB Information Management System Backup and Restore
SOP Reference: IT 02 Standard Operating Procedure for: NIB Information Management System Backup and Restore Version: Date Created: 2.. 23.07.2013... Date of first review: 01.10.2014.. Date of next review:
More informationWelcome and thank you for considering enstratus as your cloud management platform.
1 1.1 Welcome Welcome and thank you for considering enstratus as your cloud management platform. Please read this guide in its entirety before attempting to install enstratus. It contains very useful information
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationRedmine Installation on Debian. v1.1
Redmine Installation on Debian v1.1 Introduction 1. Objectives Have a fully functional Redmine installation on a dedicated server with good performance. The idea of this document came after an easy installation
More informationContents Set up Cassandra Cluster using Datastax Community Edition on Amazon EC2 Installing OpsCenter on Amazon AMI References Contact
Contents Set up Cassandra Cluster using Datastax Community Edition on Amazon EC2... 2 Launce Amazon micro-instances... 2 Install JDK 7... 7 Install Cassandra... 8 Configure cassandra.yaml file... 8 Start
More informationUsing Emergency Restore to recover the vcenter Server has the following benefits as compared to the above methods:
Executive Summary This document provides certain best practices with regards to the Emergency Restore feature in vsphere Data Protection 5.5 release. It also describes the methods and processes to be used
More informationMonitoring Clearswift Gateways with SCOM
Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue
More informationLocal Caching Servers (LCS): User Manual
Local Caching Servers (LCS): User Manual Table of Contents Local Caching Servers... 1 Supported Browsers... 1 Getting Help... 1 System Requirements... 2 Macintosh... 2 Windows... 2 Linux... 2 Downloading
More informationExtreme Control Center, NAC, and Purview Virtual Appliance Installation Guide
Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide 9034968 Published April 2016 Copyright 2016 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to
More informationMoving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
More informationMySQL Backup and Security. Best practices on how to run MySQL on Linux in a secure way Lenz Grimmer <lenz@mysql.com>
MySQL Backup and Security Best practices on how to run MySQL on Linux in a secure way Lenz Grimmer Introduction In this session you will learn best practises on how to configure and run
More informationRSA Security Analytics System Maintenance Guide
RSA Security Analytics System Maintenance Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or trademarks
More information