Enterprise-Wide Audit-Data Management
|
|
- Griffin Blair
- 8 years ago
- Views:
Transcription
1 Enterprise-Wide Audit-Data Management Enterprise Security Management Special Program Office (NSA/I5E) Lloyd E Lutz Jr Booz Allen Hamilton 27 October
2 Enterprise Security Management Overview Enterprise Management Mission Management Defend the GIG Logistics NetCentricity NetCentricity Servers Coordination Managers Command & Control Deployment Apps Lift ISR Fires Interdiction Enterprise Services Users Maneuver Communicatio ns Coalition Synchronizatio n NetOps NetOps Enterprise Security Management? Manage Identities Manage Attributes Authentication Manage Credentials Manage Digital Policies Manage Privileges Manage Cryptographic Keys Manage IA Metadata Manage Security Manage IA Audit Logs Configurations 2 27 October 2009
3 Scope of Audit-Data Management Audit-Data Management is one of 10 Enterprise Security Management Functions Four Key Audit Functions Capture Store Disseminate Control Audit Processes Direction to Devices Policy Direction for Storage of Control Audit Processes Direction Users Needs for Capture Store Pushed User Query Pushed or Pulled Disseminate Users of Audit Data Direction of Dissemination of Overall Management of Processes to Satisfy Users Needs for 3 27 October 2009
4 Hierarchy of Enterprise-Wide Management of Individual Devices Part of LAN or Platform Have Audit Capabilities Detect Device Events Capture Hold Report 4 27 October 2009
5 Hierarchy of Enterprise-Wide Management of Individual Devices Part of LAN or Platform Have Audit Capabilities Detect Device Events Capture Hold Report 5 27 October 2009
6 Hierarchy of Enterprise-Wide Management of Local Audit Node Each Device Is Controlled by One Local Audit Node Individual Devices Part of LAN or Platform Have Audit Capabilities Detect Device Events Capture Hold Report 6 27 October 2009
7 Hierarchy of Enterprise-Wide Management of Local Audit Nodes (Tier-3) Direct Auditing Devices Coordinate with Peers Verify Audit Configuration Receive from Devices Normalize Reduce Store Detect Local Events Report Local Events Individual Devices Part of LAN or Platform Detect Device Events Capture Hold Report Directed by One Local Audit Node 7 27 October 2009
8 Hierarchy of Enterprise-Wide Management of Region- Organization Audit (Tier-2) Plan & Direct Regional Audit Actions Direct Sets of Local Audit Nodes Coordinate with Peers (NetOps) Verify Direction Compliance Receive Event Reports Retrieve Store Detect Regional Events Report Regional Events Local Audit Nodes (Tier-3) Direct Auditing Devices Coordinate with Peers Verify Audit Configuration Receive from Devices Normalize Reduce Store Detect Local Events Report Local Events Individual Devices Part of LAN or Platform Detect Device Events Capture Hold Report Directed by One Local Audit Node 8 27 October 2009
9 Hierarchy of Enterprise-Wide Management of CC-Service- Agency Audit (Tier-1) Plan & Direct Auditing Coordinate with Peers (NetOps) Assess Audit Effectiveness Audit Capability Development Receive Event Reports Store Event Data Detect CC/S/A & Enterprise Events Report Events Region- Organization Audit (Tier-2) Plan & Direct Regional Audit Actions Direct Sets of Local Audit Nodes Coordinate with Peers (NetOps) Verify Direction Compliance Receive Event Reports Retrieve Store Detect Regional Events Report Regional Events Local Audit Nodes (Tier-3) Direct Auditing Devices Coordinate with Peers Verify Audit Configuration Receive from Devices Normalize Reduce Store Detect Local Events Report Local Events Individual Devices Part of LAN or Platform Detect Device Events Capture Hold Report Directed by One Local Audit Node 9 27 October 2009
10 Hierarchy of Enterprise-Wide Management of Enterprise CC-Service- Agency Audit (Tier-1) Plan & Direct Auditing Operations Enterprise Audit Policy Assess Audit Effectiveness Plan & Direct Auditing Coordinate with Peers (NetOps) Assess Audit Effectiveness Audit Capability Development Audit Capability Requirements Receive Reports Federate with Other Enterprises Receive Event Reports Store Event Data Detect CC/S/A & Enterprise Events Report Broad-Scope Events Region- Organization Audit (Tier-2) Plan & Direct Regional Audit Actions Direct Sets of Local Audit Nodes Coordinate with Peers (NetOps) Verify Direction Compliance Receive Event Reports Retrieve Store Detect Regional Events Report Regional Events Local Audit Nodes (Tier-3) Direct Auditing Devices Coordinate with Peers Verify Audit Configuration Receive from Devices Normalize Reduce Store Detect Local Events Report Local Events Individual Devices Part of LAN or Platform Detect Device Events Capture Hold Report Directed by One Local Audit Node October 2009
11 Compilation of High-Level Requirements Seeking Current Requirements Documents Initial Allocation to Level Within Enterprise Initial Identification of Policy Change Needs Binning by Capability Area Ongoing Efforts: Collection of Requirements Identification of Conflicts Identification of Needed Policy Community Review & Feedback October 2009
12 High-Level Architecture Developing Operational and later Systems Architectures Building upon Functional Decomposition Audit Management from ESM Working Group Initial Top Level Operational Activity Model Drafted Ongoing Steps: Increased Detail for Operational Activity Model Obtain Community Feedback Refine Operational Architecture Later: System Architectures for Selected Design Alternatives A3: Capture Audit & Environment Data Draft Operational Activity Model Device Configuration Commands Update Configuration On Devices A3.1 Observation Instructions Occurrences & Environment Data Observe Situations to Begin Collecting Data A3.2 Collection Action Collect Audit A3.3Data Audit Parameter Collection Instructions Raw Data Audit Log Format Instructions Write Audit Data to Audit Logs A3.4 Audit Log Legend Purpose: Display decomposition of Capture Audit & Environment Data function. Scope: Portions of enterprise that collect audit data. Viewpoint: From an enterprise level Send Audit Data For Transfer Preparation A3.5 Dissemination Instructions Alert/Event Data Audit Log Data October 2009
13 Top-Level Model of Enterprise-Wide Audit Audit Needs Situational Awareness from Others Policy Direct Security Audit Management A1 Management Draft Operational Activity Model Response to Audit Needs Situational Awareness for Others Instructions for Audit Legend Purpose: Display high-level functions of Audit Log Management Scope: All facets of Audit Log Management from a high level management perspective Viewpoint: From an enterprise level Current Configuration Configuration Change Acknowledgement Generate Configuration For Devices A2 Audit Log Management Configuration Change Request Queries Configuration Status Occurrences & Environment Data Capture Audit & Environment Data A3 Alert/Event Data Audit Log Data Transfer Data to Subscribers A4 Manage Storage A5 Alerts/Events (Transfer to Subscribers) Pattern Match Information Discovery Metadata (to Discovery Service) Query Response October 2009
14 High-Level Design of Enterprise Audit Components Based on Requirements, Identifying Trade Space for Enterprise Audit Components Cost to Implement, Cost to Operate, Training, Bandwidth Store at Local Level vs Store at Enterprise Level Identifying Set of Alternative Designs for Audit Components Management & Direction Storage Upcoming Actions: Flesh out design alternatives Solicit community feedback on trade-space & alternative designs October 2009
15 Concept of Operations (CONOPS) Explanations of How to Use Addresses Non-Materiel Aspects Procedures Anticipating a Family of CONOPS Separate CONOPS for distinct Roles Separate CONOPS same role at different Levels Upcoming Actions: As Audit Components are Designed, Prepare CONOPS for Applicable Roles & Levels Examples of Likely CONOPS Enterprise Audit Manager Service/Agency Audit Manager Repository Manager Tier-3 Repository Manager Tier-2 System Manager Management LAN Administrator Management October 2009
16 Schemas for Management Schema for Common Event Expression (CEE) Addresses: Audit Events Audit Records Audit Logs May be applicable to results of analysis of audit data. Capture Store Pushed Pushed or Pulled Schema for Directing Devices that Capture Common Command Language Other Schema Control Audit Processes Capture Direction October 2009
17 Enterprise-Wide Management Four Key Functions Capture Store Disseminate Control Audit Processes Policy Control Audit Processes Direction Users Needs for Capture Store Pushed User Query Pushed or Pulled Disseminate Users of Audit Data Ongoing Efforts are Addressing: Requirements & Policy Architectures & Design Alternatives Variety of Trade Spaces Allocation of Functions to Tiers of the Enterprise Family of Concept of Operations CONOPS by Role and Organizational Level Schema for Standard Data Flows October 2009
18 Enterprise-Wide Audit-Data Management Enterprise Security Management Special Program Office (NSA/I5E) 18
LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042
Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:
More informationBridging the Digital Divide with Net-Centric Tactical Services
Bridging the Digital Divide with Net-Centric Tactical Services Authors: Scott D. Crane, Charles Campbell, Laura Scannell Affiliation: Booz Allen Hamilton E-mail: crane_scott@bah.com 1. Abstract The DoD
More information3SL. Requirements Definition and Management Using Cradle
3SL Requirements Definition and Management Using Cradle November 2014 1 1 Introduction This white paper describes Requirements Definition and Management activities for system/product development and modification
More informationUSING SECURITY METRICS TO ASSESS RISK MANAGEMENT CAPABILITIES
Christina Kormos National Agency Phone: (410)854-6094 Fax: (410)854-4661 ckormos@radium.ncsc.mil Lisa A. Gallagher (POC) Arca Systems, Inc. Phone: (410)309-1780 Fax: (410)309-1781 gallagher@arca.com USING
More informationDefense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability
Defense Information Systems Agency Identity and Access Management (IdAM): Consistent Access to Capability 17 August 2011 Disclaimer The information provided in this briefing is for general information
More informationIntegration of Information Assurance (IA) into DoDAF Architectures. Annual Computer Security Applications Conference (ACSAC 04) 8 December 2004
Copyright (c) 2004 Booz Allen Hamilton. All rights reserved 1 Integration of Information Assurance (IA) into DoDAF Architectures Annual Computer Security Applications Conference (ACSAC 04) 8 December 2004
More informationCourse Outline: Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions
Course Outline: Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This course provides SharePoint
More informationArchitecture Modeling Approach for Net-Centric Enterprise Services (C4ISR/C2 Architecture Track)
A Paper submitted to the 10th International Command and Control Research and Technology Symposium "The Future of C2" Architecture Modeling Approach for Net-Centric Enterprise s (C4ISR/C2 Architecture Track)
More informationTaking the Open Source Road
The National Security Agency s Review of Emerging Technologies Taking the Open Source Road Raising the Bar in Operating System Security Cryptographic Binding of Metadata Providing a Secure Foundation with
More informationNational Initiative for Cybersecurity Education
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
More informationTenable for CyberArk
HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments
More informationDeveloping Microsoft SharePoint Server 2013 Advanced Solutions MOC 20489
Developing Microsoft SharePoint Server 2013 Advanced Solutions MOC 20489 Course Outline Module 1: Creating Robust and Efficient Apps for SharePoint In this module, you will review key aspects of the apps
More informationBuild Your Knowledge!
About this Course This 3-day Instructor led course Explore several advanced topics of working with SharePoint 2013 sites. Topics include SharePoint Server site definitions (Business Intelligence, Document
More informationCoveo Platform 7.0. Microsoft Dynamics CRM Connector Guide
Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing
More informationAppendix A Core Concepts in SQL Server High Availability and Replication
Appendix A Core Concepts in SQL Server High Availability and Replication Appendix Overview Core Concepts in High Availability Core Concepts in Replication 1 Lesson 1: Core Concepts in High Availability
More informationALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide
ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide Notice Altiris Software Delivery Solution for Windows 6.1 SP3 Product Guide 2007 Altiris, Inc. All rights reserved. Document Date: February
More informationOracle Data Integrator: Administration and Development
Oracle Data Integrator: Administration and Development What you will learn: In this course you will get an overview of the Active Integration Platform Architecture, and a complete-walk through of the steps
More informationTool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
More informationDepartment of Defense Net-Centric Services Strategy
Department of Defense Net-Centric Services Strategy Strategy for a Net-Centric, Service Oriented DoD Enterprise March 2007 Prepared by the DoD CIO FOREWORD The Internet has facilitated an e-commerce explosion
More informationSharePoint Training DVD Videos
SharePoint Training DVD Videos SharePoint 2013 Administration Intended for: Prerequisites: Hours: Enterprise Content Managers / Administrators Planners / Project managers None 16 hours of video + 18 hours
More informationActive Directory Installation on Windows Server 2012
Active Directory Installation on Windows Server 2012 What really active directory is..? Active Directory Domain Services (AD DS) is an extensible and scalable directory service you can use to efficiently
More informationThe Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
More informationDirectory Integration in LANDesk Management Suite
Directory Integration in LANDesk Management Suite A white-paper detailing the use of an LDAP Directory in an LANDesk Management Suite environment LANDesk Software Inc. Sam Merrill Technical Marketing Engineer
More informationUS Department of Education Federal Student Aid Integration Leadership Support Contractor June 1, 2007
US Department of Education Federal Student Aid Integration Leadership Support Contractor June 1, 2007 Draft Enterprise Data Management Data Policies Final i Executive Summary This document defines data
More informationAdministering the Web Server (IIS) Role of Windows Server
Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course
More informationAdministering the Web Server (IIS) Role of Windows Server 10972B; 5 Days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days
More informationIdera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013
Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management
More informationMS-55052: SharePoint 2013 End User Level II
MS-55052: SharePoint 2013 End User Level II Description This 3-day Instructor led course Explore several advanced topics of working with SharePoint 2013 sites. Topics include SharePoint Server site definitions
More informationelearning Content Management Middleware
elearning Content Management Middleware Chen Zhao Helsinki 18.2.2004 University of Helsinki Department of Computer Science Authors Chen Zhao Title elearning Content Management Middleware Date 18.2.2004
More informationD83167 Oracle Data Integrator 12c: Integration and Administration
D83167 Oracle Data Integrator 12c: Integration and Administration Learn To: Use Oracle Data Integrator to perform transformation of data among various platforms. Design ODI Mappings, Procedures, and Packages
More information05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
More informationIBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
More informationState of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
More information10972B: Administering the Web Server (IIS) Role of Windows Server
10972B: Administering the Web Server (IIS) Role of Windows Server Course Details Course Code: Duration: Notes: 10972B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationSample Usage of TAXII
THE MITRE CORPORATION Sample Usage of TAXII Version 1.0 (draft) Mark Davidson, Charles Schmidt 11/16/2012 The Trusted Automated exchange of Indicator Information (TAXII ) specifies mechanisms for exchanging
More informationwww.basho.com Technical Overview Simple, Scalable, Object Storage Software
www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...
More informationOnline Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
More informationMicrosoft Project Server Integration with SharePoint 2010
Microsoft Project Server Integration with SharePoint 2010 Microsoft Project Server 2010: brings together the business collaboration platform services of SharePoint Server 2010 with structured execution
More informationHP Universal CMDB. Software Version: 10.22. Data Flow Management Best Practices
HP Universal CMDB Software Version: 10.22 Data Flow Management Best Practices Document Release Date: December 2015 Software Release Date: December 2015 Legal Notices Warranty The only warranties for HP
More informationKit Rowley. Subject: Content type and workflow planning (SharePoint Server 2010) Attachments: image001.gif. Plan content types. Plan content types
Kit Rowley Subject: Content type and workflow planning (SharePoint Server 2010) Attachments: image001.gif Content type and workflow planning (SharePoint Server 2010) Published: May 12, 2010 This article
More informationCourse 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW About this Course This course provides SharePoint developers the information needed to implement SharePoint solutions
More informationDeveloping Microsoft SharePoint Server 2013 Advanced Solutions
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Course Details Course Outline Module 1: Creating Robust and Efficient Apps for SharePoint In this module, you will review key
More informationChemical, Biological, Radiological, and Nuclear (CBRN) and Medical Communities of Interest (COI) Information Sharing
Chemical, Biological, Radiological, and Nuclear (CBRN) and Medical Communities of Interest (COI) Information Sharing Doug Hardy JPM IS SSA Manager douglas.hardy@navy.mil (619) 553-5410 1 CBRN COI Medical
More informationDE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions
DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions Summary Duration Vendor Audience 5 Days Microsoft Developer Published Level Technology 21 November 2013 300 Microsoft SharePoint
More informationTREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The Mainframe Databases Reviewed Met Security Requirements; However, Automated Security Scans Were Not Performed September 30, 2011 Reference Number: 2011-20-099
More informationIdentity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp.
Identity Management Basics Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms
More informationAn Esri White Paper June 2010 Tracking Server 10
An Esri White Paper June 2010 Tracking Server 10 Esri 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2010 Esri All rights
More informationService Oriented Architecture (SOA) for DoD
Service Oriented Architecture (SOA) for DoD Prof. Paul A. Strassmann January 9, 2008 1 Part 1 SOA Requirements 2 The DoD Challenge 3 Most DoD Projects Have Own Data Projects 07 Budget $ Millions Number
More informationReal World Enterprise SQL Server Replication Implementations. Presented by Kun Lee sa@ilovesql.com
Real World Enterprise SQL Server Replication Implementations Presented by Kun Lee sa@ilovesql.com About Me DBA Manager @ CoStar Group, Inc. MSSQLTip.com Author (http://www.mssqltips.com/sqlserverauthor/15/kunlee/)
More informationDesigning a Windows Server 2008 Applications Infrastructure
Designing a Windows Server 2008 Applications Infrastructure Course Number: 6437A Course Length: 3 Days Course Overview This three day course will prepare IT professionals for the role of Enterprise Administrator.
More informationSoftware Architecture Document
Software Architecture Document Project Management Cell 1.0 1 of 16 Abstract: This is a software architecture document for Project Management(PM ) cell. It identifies and explains important architectural
More informationDeveloping Microsoft SharePoint Server 2013 Advanced Solutions
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Page 1 of 9 Developing Microsoft SharePoint Server 2013 Advanced Solutions Course 20489B: 4 days; Instructor-Led Introduction
More informationGoverlan Remote Control
Goverlan Remote Control Feature Overview Goverlan Remote Control Powerful IT remote control, made easy Support, control and manage multiple users anywhere securely and seamlessly. With its powerful broadscope
More information2003 Patricia Ensworth Page 1
1 1 Sample software development project 2 1.1 Start project 3 1.2 Initiation phase 4 1.2.1 Develop project charter 5 1.2.2 Project charter approved 6 1.3 Planning phase 7 1.3.1 Product activities 8 1.3.1.1
More informationOpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way
OpenAM Written and tested with OpenAM Snapshot 9 the Single Sign-On (SSO) tool for securing your web applications in a fast and easy way Indira Thangasamy [ PUBLISHING 1 open source 1 community experience
More informationAudit Logging. Overall Goals
Audit Logging Security Training by Arctec Group (www.arctecgroup.net) 1 Overall Goals Building Visibility In Audit Logging Domain Model 2 1 Authentication, Authorization, and Auditing 3 4 2 5 6 3 Auditing
More informationSAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24. Data Federation Administration Tool Guide
SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24 Data Federation Administration Tool Guide Content 1 What's new in the.... 5 2 Introduction to administration
More informationQMX ios MDM Pre-Requisites and Installation Guide
QMX ios MDM Pre-Requisites and Installation Guide QMX System Requirements The following requirements apply to the system that QMX will be installed on. This system will host the QMX MDM Service. These
More informationANSYS EKM Overview. What is EKM?
ANSYS EKM Overview What is EKM? ANSYS EKM is a simulation process and data management (SPDM) software system that allows engineers at all levels of an organization to effectively manage the data and processes
More informationDigital Policy Management Framework for Attribute-Based Access Control
Digital Policy Management Framework for Attribute-Based Access Control Contract Milestone Task 12.1 19 December 2014 The Johns Hopkins University Applied Physics Laboratory Table of Contents Executive
More informationCA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6
CA SiteMinder Directory Configuration - OpenLDAP r6.0 SP6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationDepartment of Defense Net-Centric Data Strategy
Department of Defense Net-Centric Data Strategy May 9, 2003 Prepared by: Department of Defense Chief Information Officer (CIO) TABLE OF CONTENTS 1. PURPOSE... 1 2. INTRODUCTION... 1 2.1 DOD DATA VISION...
More informationContent Management System (CMS)
Content Management System (CMS) What is a CMS? What is a CMS? o A Content Management System (CMS) is software that makes it easier to create, edit and publish content on a web site. The features of a CMS
More informationE-SPIN's Planning, Deploying and Managing Microsoft System Center Configuration Manager (7 Day)
Class Schedule E-SPIN's Planning, Deploying and Managing Microsoft System Center Configuration Manager (7 Day) Date: Specific Pre-Agreed Upon Date Time: 9.00am - 5.00pm Venue: Pre-Agreed Upon Onsite/Offsite
More informationA McKnight Associates, Inc. White Paper: Effective Data Warehouse Organizational Roles and Responsibilities
A McKnight Associates, Inc. White Paper: Effective Data Warehouse Organizational Roles and Responsibilities Numerous roles and responsibilities will need to be acceded to in order to make data warehouse
More informationCommon Operating Environment (COE) and Global Information Grid (GIG) Enterprise Services (GES) Mr. Rob Walker 24 September 2003
Common Operating Environment (COE) and Global Information Grid (GIG) Enterprise (GES) Mr. Rob Walker 24 September 2003 Common Operating Environment COE is mission-application independent - A basis for
More informationMicrosoft SQL Server Beginner course content (3-day)
http://www.multimediacentre.co.za Cape Town: 021 790 3684 Johannesburg: 011 083 8384 Microsoft SQL Server Beginner course content (3-day) Course Description This three-day Microsoft SQL Server Beginners
More informationThe DoD CIO Charter:
George Mason University, Fairfax, VA The DoD CIO Charter: A Template for I.T. Governance? Paul A. Strassmann,October 3, 2005 1 Authority for the DoD CIO 2 Traditional Views of the CIO Roles 3 An Expansive
More informationEnterprise Audit Management Instruction for National Security Systems (NSS)
UNCLASSIFIED September 2013 Enterprise Audit Management Instruction for National Security Systems (NSS) THIS DOCUMENT PRESCRIBES STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION UNCLASSIFIED
More informationCourse: 10174B: Configuring and Administering Microsoft SharePoint 2010
Course: 10174B: Configuring and Administering Microsoft SharePoint 2010 Description: This five-day instructor-led course teaches students how to install, configure, and administer Microsoft SharePoint
More informationCúram Business Intelligence Reporting Developer Guide
IBM Cúram Social Program Management Cúram Business Intelligence Reporting Developer Guide Version 6.0.5 IBM Cúram Social Program Management Cúram Business Intelligence Reporting Developer Guide Version
More informationHDA Integration Guide. Help Desk Authority 9.0
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
More informationSAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401
SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401 LEARNING POINTS Learn about Crystal Reports for HANA Glance at the road map for the product Overview of deploying
More information126 SW 148 th Street Suite C-100, #105 Seattle, WA 98166 Tel: 877-795-9372 Fax: 866-417-6192 www.seattlepro.com
SharePoint 2010 Bootcamp This five-day course is designed to equip Systems Administrators, Integrators and Developers with a strong foundation for implementing solutions on Microsoft SharePoint 2010. Attendees
More informationThe Webcast will begin at 1:00pm EST. www.gig-werks.com
SharePoint 2013 & SharePoint Online Security, Compliance & ediscovery The Webcast will begin at 1:00pm EST Today s Presentation: Introduction & About Gig Werks Gig Werks Experience with SharePoint Office
More informationTaking EPM to new levels with Oracle Hyperion Data Relationship Management WHITEPAPER
Taking EPM to new levels with Oracle Hyperion Data Relationship Management WHITEPAPER This document contains Confidential, Proprietary, and Trade Secret Information ( Confidential Information ) of TopDown
More informationBusiness Continuity Position Description
Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary
More informationDeep Freeze and Microsoft System Center Configuration Manager 2012 Integration
1 Deep Freeze and Microsoft System Center Configuration Manager 2012 Integration Technical Paper Last modified: May 2015 Web: www.faronics.com Email: sales@faronics.com Phone: 800-943-6422 or 604-637-3333
More informationENTERPRISE DOCUMENT MANAGEMENT SYSTEM
A Scalable Document Management for all businesses EDMS is a powerful and cost effective document management that allows businesses to centralize management, storage, collaboration, retrieval and archiving
More informationSecuring Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture
IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton
More informationMongoDB Developer and Administrator Certification Course Agenda
MongoDB Developer and Administrator Certification Course Agenda Lesson 1: NoSQL Database Introduction What is NoSQL? Why NoSQL? Difference Between RDBMS and NoSQL Databases Benefits of NoSQL Types of NoSQL
More informationManaging Enterprise Devices and Apps using System Center Configuration Manager
Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8410.03 August 29, 2012 DoD CIO SUBJECT: Network Management (NM) References: See Enclosure 1 1. PURPOSE. This Instruction, issued under the authorities of DoD Directive
More informationUnified Messenger 4.0 changes to the Windows 2000 Active Directory Schema
Introduction This document discusses the changes made to the schema during the installation of Unified Messenger 4.x, to address the customer concern: what is this product going to do to my schema?. This
More informationConfiguring and Monitoring Citrix Branch Repeater
Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
More informationWhite Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
More informationBackground: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture
Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and
More informationData Management Roadmap
Data Management Roadmap A progressive approach towards building an Information Architecture strategy 1 Business and IT Drivers q Support for business agility and innovation q Faster time to market Improve
More informationSoftware configuration management
Software Engineering Theory Software configuration management Lena Buffoni/ Kristian Sandahl Department of Computer and Information Science 2015-09-30 2 Maintenance Requirements System Design (Architecture,
More informationRay A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA
Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA A Marine Corps fighting force armed with assured, secure, accurate, and timely information,
More informationData Management Maturity Model. Overview
Data Management Maturity Model Overview SEPG Tysons Corner May 6, 2014 Who Needs Better Data Management? Every organization in business. Why? Collection of data assets developed over time legacy application
More informationCurrent Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support
Current Environment Assessment Specification Single Sign On Customer Relation Management Workstation Support Georgia State University By: Team #2 Members: Igor Wolbers Tony Yuan Saeed Nadjariun Team2 Version
More informationProduct Comparison List
Product Comparison List Data Center Size Site Solution / Feature
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
More informationModule 1: Introduction to Active Directory Infrastructure
Module 1: Introduction to Active Directory Infrastructure Contents Overview 1 Lesson: The Architecture of Active Directory 2 Lesson: How Active Directory Works 10 Lesson: Examining Active Directory 19
More informationMicrosoft SQL Server 2005 Reporting Services Step by Step
Microsoft SQL Server 2005 Reporting Services Step by Step Stacia Misner; Hitachi Consulting To learn more about this book, visit Microsoft Learning at http://www.microsoft.com/mspress/books/9153.aspx 9780735622500
More informationMicrosoft Project Server 2010 Administrator's Guide
Microsoft Project Server 2010 Administrator's Guide 1 Copyright This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references,
More informationRDS Building Centralized Monitoring and Control
RDS Building Centralized Monitoring and Control 1. Overview This document explains the concept and differing options for the monitoring and control of RDS replication over your network. The very basic
More informationBest Practices Series: Cure Your E-mail Management Headaches in IBM Lotus Notes/Domino Environments
1 Best Practices Series: Cure Your E-mail Management Headaches in IBM Lotus Notes/Domino Environments Part 2: Managing E-mail Compliance and Discovery Challenges Kelly Ferguson Michael Brown 2 Agenda Compliance
More information1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam
1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam Section 1: Assessing infrastructure needs for the NetScaler implementation 1.1 Task Description: Verify the objectives
More information