Unified Security Management (USM) 5.2 Vulnerability Assessment Guide
|
|
|
- Stephen Henry
- 10 years ago
- Views:
Transcription
1 AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide
2 USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat Exchange, AlienVault OTX Reputation Monitor, AlienVault OTX Reputation Monitor Alert, AlienVault OSSIM, and OSSIM are trademarks or service marks of AlienVault, Inc. All other registered trademarks, trademarks or service marks are the property of their respective owners. Revision to This Document Date October 2, 2015 October 28, 2015 Revision Description Original document based on the 5.2 release. Changes in the format. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 2 of 47
3 Contents Contents About Vulnerability Assessment... 5 What Is Vulnerability Assessment... 5 Vulnerability Assessment in AlienVault USM... 5 Vulnerability Ticket Threshold... 5 Performing Vulnerability Scans... 7 Running a Vulnerability Scan from Assets... 7 Running a Default Vulnerability Scan... 8 Running an Authorized Vulnerability Scan Creating a Credential for the Authorized Scan Running the Authorized Scan Using a Credential Scheduling a Vulnerability Scan Viewing Vulnerability Scan Results Vulnerability Overview Current Vulnerabilities - Asset Vulnerability Details Reports - Scan Reports Detail Viewing the Scan Results Viewing the Scan Results in HTML Viewing the Scan Results in PDF Viewing the Scan Results in Excel Viewing the Scan Results from an NBE File Comparing Scan Results between Two Scans Customizing Vulnerability Scans Customizing Vulnerability Profiles Creating a Custom Scan Profile Modifying a Custom Scan Profile Enabling/Disabling Plugins Checking the Threat Database Changing the Vulnerability Ticket Threshold Changing Other Vulnerability Scanner Options October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 3 of 47
4 Contents Generating Reports Based on Vulnerability Scans Updating the Vulnerability Scanning Rules Appendix A - Configuring a Vulnerability Scan Job: a Practical Example October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 4 of 47
5 About Vulnerability Assessment AlienVault Unified Security Management (USM) delivers vulnerability assessment as part of a complete package of security monitoring and management capabilities for efficient threat detection. In order to improve the security posture of your network, you first need to know what is vulnerable. Using AlienVault USM you get a simple and reliable way to stay on top of what is connected to your network and maintain visibility into its vulnerabilities. What Is Vulnerability Assessment Vulnerability Assessment is a functionality used for defining, identifying, classifying and prioritizing the vulnerabilities in your system. The Figure 1 shows an overall architecture: Figure 1. Overall Architecture. The USM Server controls vulnerability scanning on USM Sensors. It scans assets in specific networks. You can either select which sensor scans which network, or you can specify that the first available sensor in the AlienVault USM deployment performs the scanning. Vulnerability Assessment in AlienVault USM AlienVault USM comes with a built-in vulnerability scanner, that can be used to detect vulnerabilities in critical assets in your organization. You can use discovered vulnerabilities in crosscorrelation rules, and when creating compliance and auditing reports. The USM Sensor component performs this functionality. It is controlled from the SIEM console (USM Server), that allows running and scheduling vulnerability scans; generating and examining reports; and updating vulnerability signatures. Vulnerability Ticket Threshold Discovering a vulnerability is important, but being able to estimate the associated risk to an asset is just as important. AlienVault USM assigns a threshold to each vulnerability found in the system. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 5 of 47
6 USM has two ways of displaying the threshold of vulnerabilities. Table 1. How the USM displays the thresholds of vulnerabilities. Vulnerability Scanner Values 1 Settings Values 2 Serious 1 High 2 Medium 3, 4 and 5 Low 6 Info 7, 8, 9 and 10 Although USM displays the vulnerability threshold shown in Table 1, internally, USM makes the correspondence shown in Table 2 between internal thresholds of vulnerabilities. Table 2. Internal correspondence between the thresholds of vulnerabilities. Severity Internal Value Serious 1 High 2 Medium 3 Low 6 Info 7 In this way, USM normalizes the values using this formula: 1 Values from Configuration > Administration > Main > Vulnerability Scanner. 2 Values from Environment > Vulnerabilities > Overview > Settings. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 6 of 47
7 $risk = 8 - $internal_value USM assigns the value of $risk and cannot be modified. But, you can configure that the vulnerabilities generate a ticket. Use the Vulnerability Ticket Threshold field to make this configuration and set a value (see Changing the Vulnerability Ticket Threshold). Performing Vulnerability Scans A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses. USM has a number of simultaneous scans per sensor, that is five. If a new scan job enters a sensor when there are already five scans running, this last job is rescheduled to start 15 minutes later. Scan jobs are postponed in a 15 minutes frequency until the sensor is able to start with it. For further information about the scanner options, see Changing Other Vulnerability Scanner Options. Running a Vulnerability Scan from Assets To run a vulnerability scan from assets 1. Navigate to Environment > Assets & Groups. 2. Select the assets. 3. Click Actions > Run Vulnerability Scan. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 7 of 47
8 Figure 2. Assets & Groups: Run Vulnerability Scan. The Vulnerability Scan page appears. For further information about creating a scan job, see Running a Default Vulnerability Scan. Running a Default Vulnerability Scan This option displays the scans that are running at that moment, the jobs that have been scheduled and a summary of all scans. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 8 of 47
9 Figure 3. Scan Jobs main screen. Use this button to disable a scheduled job. See Table 3 for knowing the meaning of the scan job fields. Table 3. Scan Jobs: fields. Field Status Job Name Launch Time Scan Start Time Scan End Time Scan Time Next Scan Meaning Scan completed or failed. Name given to the scan job. Exact date when the scan job launched. Exact date when the scan job started. Exact date when the scan job ended. Length of the scan job, in minutes. Time when the scan job should start. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 9 of 47
10 Table 4 displays the possible actions related to the scans. Table 4. Scan Jobs: actions. Actions Meaning Changes the owner of the report and makes the scan job visible for a user or entity. Re-runs the scan job. Displays the results of the report in HTML within the same browser. Exports the results of the report in a PDF file. The browser, such as Chrome, may open it in a different tab if it recognizes the file extension. Exports the results of the report in an Excel file. Exports the results of the scan job in an NBE file. (n) Indicates the number of vulnerabilities found on that scan job. Deletes the scan job. To start a new vulnerability scan 1. Navigate to Environment > Vulnerabilities > Scan Jobs. 2. Click New Scan Job. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 10 of 47
11 Figure 4. Create a Scan Job. 3. In the Job Name field, type a name to identify the scan job. 4. In the Select Sensor listbox, click to expand it and select a sensor. 5. In the Profile listbox, click to expand it and select a profile. For guidelines, see Table In the Schedule Method listbox, click to expand it and select a schedule method (Table 5). Table 5. Vulnerability Scan: Schedule Method. Schedule Method Immediately Run Once Daily Day of the Week Meaning Launches the scan job without delay. Schedules a scan job at a specific date and time, and just at that time. Schedules a scan job every x days beginning on a specific day. Schedules a scan job on a specific day of the week. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 11 of 47
12 Schedule Method Day of the Month Nth weekday of the month Meaning Schedules a scan job on a specific day of the month. Schedules a scan job on a specific day and week of a month. The advanced options are for running authorized scans using a credential, see Running an Authorized Vulnerability Scan. 7. To speed up the scanning process, click Only scan hosts that are alive. 8. If you do not want to pre-scan from a remote sensor, click Pre-Scan locally. 9. If you do not want to resolve hostnames or FQDN, click Do not resolve names. 10. Select or type the assets you want to scan. If you wish to exclude a specific IP address, prefix your selection with an exclamation mark (! ), which means do not scan that IP address. For instance,! means you do not want to scan that IP address. 11. To create the vulnerability scan, click New Job. Running an Authorized Vulnerability Scan Creating a Credential for the Authorized Scan Use credentials to perform an authenticated scan. Authenticated scans yield better and more relevant results than unauthenticated scans. They are also more comprehensive and have fewer false positives than non-authenticated scans. Create a set of credentials is optional. To create a set of credentials 1. Navigate to Environment > Vulnerabilities > Overview, click Settings. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 12 of 47
13 Figure 5. Vulnerability Scans Settings. 2. In the Name field, type a name to identify the credential. 3. In the Available for listbox, click to expand it and select: a single user to have permission to utilize this credential or to allow its utilization to all users. an entity and allow the access to all users within the entity. 4. In the Login field, authenticate the credential: Type a password. Choose a file for a key pair or private key. 5. Click Create Credential. The new credential appears below the Credentials title, where you can find the available credentials. In this page you can (see Figure 6): Check a credential and make sure all data are correct by clicking the icon. Delete a credential if you click the icon. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 13 of 47
14 Figure 6. Available Credentials. Click the icon to check the credential. A new window appears where you must type a host. Then, click Check: Figure 7. Checking a Credential. Running the Authorized Scan Using a Credential To run an authorized scan using a credential 1. Navigate to Environment > Vulnerabilities > Scan Jobs. 2. Click New Scan Job (see Figure 4). 3. In the Job Name field, type a name to identify the scan job. 4. In the Select Sensor listbox, click to expand it and select a sensor. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 14 of 47
15 5. In the Profile listbox, click to expand it and select a profile according to the Table In the Schedule Method listbox, click to expand it and select a schedule method (see Table 5). 7. Expand Advanced to reveal the options of Table 6. Table 6. Vulnerability Scan: Advanced Options. Advanced Options SSH Credential SMB Credential Timeout Send an notification Meaning SSH login is used to do a scan deeply on Unix systems. SMB login is used to do a scan deeply on Windows systems. Type the maximum number of seconds that the scan runs. After this time the job will be finished and marked as a timeout. Click No if you do not want to send an notification; or click Yes to send an notification then use the dropdown to select a single user or to send the notification to all users; or you can use the dropdown entity to select an. 8. To speed up the scanning process, click Only scan hosts that are alive. 9. If you do not want to pre-scan from a remote sensor, click Pre-Scan locally. 10. f you do not want to resolve hostnames or FQDN, click Do not resolve names. 11. Select or type the assets you want to scan. If you want to exclude a specific IP address, prefix your selection with an exclamation mark (! ), which means do not scan that IP address. For instance,! means you do not want to scan that IP address. 12. To create the vulnerability scan, click New Job. Scheduling a Vulnerability Scan To schedule a vulnerability scan job 1. Navigate to Environment > Vulnerabilities > Scan Jobs. 2. Click New Scan Job (see Figure 4). 3. In the Job Name field, type a name to identify the scan job. 4. In the Select Sensor listbox, click to expand it and select a sensor. 5. In the Profile listbox, click to expand it and select a profile according to the Table In the Schedule Method listbox, click to expand it and select a schedule method, see Table 5. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 15 of 47
16 7. To speed up the scanning process, click Only scan hosts that are alive. 8. If you do not want to pre-scan from a remote sensor, click Pre-Scan locally. 9. If you do not want to resolve hostnames or FQDN, click Do not resolve names. 10. Select or type the assets you want to scan. If you wish to exclude a specific IP address, prefix your selection with an exclamation mark (! ), which means do not scan that IP address. For instance,! means you do not want to scan that IP address. 11. To create the vulnerability scan, click New Job. Viewing Vulnerability Scan Results Vulnerability Overview This view examines the vulnerability statistics across all scans. You can also display the results, called scan reports in this view. You can view scanned reports as HTML or export them as a PDF or Excel file. To see the summary of vulnerabilities Navigate to Environment > Vulnerabilities > Overview: October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 16 of 47
17 s Figure 8. Vulnerabilities assessment: overview. This overview displays the following information: Table 7. Elements of the vulnerabilities assessment overview page. Element By Severity By Services-Top 10 Description A pie chart that displays, in percentages, all current vulnerabilities by severity along with the number of vulnerabilities found, indicated in square brackets. A pie chart that displays vulnerabilities from the top 10 services. You can click on a service to filter the vulnerabilities related to that service and the pie October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 17 of 47
18 Element Top 10 Hosts Top 10 Networks Current Vulnerabilities Reports Description chart will change to show the result of that filter. The Current Vulnerabilities part will change to show as well the result of that filter. Click Overview to refresh and view of all services. A horizontal bar graph that displays the top 10 hosts with the most vulnerabilities. You can click on a host to filter the vulnerabilities related to that host, the horizontal bar will change to the result of that host. The Current Vulnerabilities part will change to show as well the result of that filter. Click Overview to refresh and view of all hosts. A horizontal bar graph that displays the top 10 networks with the most vulnerabilities. You can click on a network to filter the vulnerabilities related to that network, the horizontal bar will change to show the result of that network. The Current Vulnerabilities part will change to show as well the result of that filter. Click Overview to refresh and view of all networks. It summarizes the vulnerabilities found in the scan jobs. The first line refers to all scans and the following lines refers to every host. Vulnerabilities are classified by importance (Serious, High, Medium, Low and Info). See Vulnerabilities Ticket Threshold. It displays the results from every scan (see Viewing the Scan Results). Vulnerabilities are classified by importance (Serious, High, Medium, Low and Info). See Vulnerabilities Ticket Threshold. The overview screen includes the following buttons: Table 8. Buttons on the Vulnerabilities Assessment Overview Screen. Element Profiles Settings New Scan Job Description This is a button to open the vulnerability scan profiles screen (see Customizing Vulnerability Profiles). This is a button to open the vulnerability scan settings screen (see Running an Authorized Vulnerability Scan). This is a button to create a scan job, see Running a Default Vulnerability Scan. You can also see the summary of vulnerabilities by going to Dashboards > Overview > Vulnerabilities. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 18 of 47
19 Current Vulnerabilities - Asset Vulnerability Details This part summarizes all current vulnerabilities found in the scan jobs ordered by number of vulnerabilities. The first line refers to all scans and the following lines refers to every host. Lines are ordered, being the first one the biggest number of vulnerabilities. Figure 9. Assets Vulnerability Details. Table 9. Asset Vulnerability Details. Field Host-IP Date/Time Profile Meaning Shows the hostname and IP of the host. The first line All summarizes all hosts. Shows the exact date and time that the scan occurred. Indicates the chosen profile to run the scan. Displays the number of Serious vulnerabilities found in the latest scan. Displays the number of High vulnerabilities found in the latest scan. Displays the number of Medium vulnerabilities found in the latest scan. Displays the number of Low vulnerabilities found in the latest scan. Displays the number of Info vulnerabilities found in the latest scan. Note: For further information about the threshold of vulnerabilities, see Vulnerabilities Ticket Threshold. To filter the data 1. Type in the empty box above the table the name of a service, a free text or an IP address of a host/network. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 19 of 47
20 2. Click the corresponding radio button. 3. Click Find. For instance, according to the following pie chart we can see that the https service has 18 vulnerabilities (between the square brackets): Figure 10. Example of a search by service. To know which hosts have these kind of vulnerabilities 1. Type https on the search field. 2. Click the Service radio button 3. Click Find. We also can click directly on the service. The result of this search is the following: October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 20 of 47
21 Figure 11. Example of a search by service: result. Figure 11 shows that the bat50 host has 44 vulnerabilities, 18 of which are https services. To check them you can view the HTML report or export a PDF or Excel file. The actions related to the results are the following: Table 10. Scan Reports Details: actions. Actions Meaning Results of the scan job in HTML within the same browser. Exports the results of the scan job to a PDF file. The browser, such as Chrome, may open it in a different tab if it recognizes the file extension. Exports the results of the scan job to an Excel file. Deletes the report. Reports - Scan Reports Detail This is a table that displays the reports that are generated in every scan. The reports appear in ascending order. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 21 of 47
22 Figure 12. Scan Reports Details. Table 11. Scan Reports Details. Field Date/Time Job Name Targets Profile Meaning Shows the exact date and time that the scan occurred. Name given to the report. Shows the hostname and IP of the host. Indicates the chosen profile to run the scan. Displays the number of Serious vulnerabilities found in that scan. Displays the number of High vulnerabilities found in that scan. Displays the number of Medium vulnerabilities found in that scan. Displays the number of Low vulnerabilities found in that scan. Displays the number of Info vulnerabilities found in that scan. Note: For further information about the threshold of vulnerabilities, see Vulnerabilities Ticket Threshold. To filter the data 1. Type in the empty box above the table the date, a name of the job or an IP address of a host/network. 2. Click the corresponding radio button. 3. Click Find. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 22 of 47
23 The actions related to the results are the following: Table 12. Scan Reports Details: actions. Actions Meaning Displays the results of the scan report in HTML within the same browser. Exports the results of the scan report to a PDF file. The browser, such as Chrome, may open it in a different tab if it recognizes the file extension. Exports the results of the scan report to an Excel file. Changes the owner of the report and makes the scan job visible for a user or entity. Compare reports, see Comparing Scan Results between Two Scans for further information. Deletes the report. Viewing the Scan Results You can view the scan results in HTML, PDF, Excel or from an NBE file. It is also possible to compare scan results between two scans. Viewing the Scan Results in HTML To view the results of the scan report in HTML within the same browser 1. Navigate to Environment > Vulnerabilities > Overview. 2. Click Reports if that part has not been yet deployed. Figure 13. Scan Reports Details. 3. Click the icon on the scan job that you want to see. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 23 of 47
24 The HTML report appears on the same screen. Figure 14. Scan Reports Details. The HTML reports display the following information: Table 13. HTML report: information displayed. Element Scan Time Definition Time in which the report was made. It has the following format: yyyy-mm-dd hh:mm:ss October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 24 of 47
25 Element Profile Generated Job Name Chart Pie Summary of scanned hosts Definition Profile name that was chosen when the job was created. Time it took to generate the report, in the format: yyyy-mm-dd hh:mm:ss Name given to the job. A pie chart that displays all found vulnerabilities by severity. It is in percentages and in colors It displays the following table: Click the icon to enable/disable the risk level view. Vulnerability Details This is a table, which includes the vulnerability name, the vulnerability ID, the service name and the severity of that vulnerability. The background color refers to the type of vulnerability being pink for Serious, salmon for High, gold for Medium, yellow for Low and light yellow for Info. Viewing the Scan Results in PDF When you export a report in a PDF file, you can see a logo and the name of the portal branding. This information is configured through the Settings option. To view the scan results in PDF 1. Navigate to Environment > Vulnerabilities > Overview, click Reports (see Figure 13). 2. Click the icon on the scan job that you are interested in and the result appears in a new tab. To change the site header logo and the portal branding in a PDF file 1. Navigate to Environment > Vulnerabilities > Overview, click Settings. 2. In the Site header logo field, type the path of the header logo that will appear on the report. 3. In the Portal Branding field, type the name of the portal branding the user wants to appear on the report. 4. Click Update. 5. Click the icon to close this window. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 25 of 47
26 Viewing the Scan Results in Excel When you export a report in an Excel file, you can see the name of the portal branding. This information is configured through the Settings option. To change the portal branding in an Excel file 1. Navigate to Environment > Vulnerabilities > Overview, click Settings. 2. In the Portal Branding field, type the name of the portal branding the user wants to appear on the report. 3. Click Update. 4. Click the icon to close this window. To view the scan results in Excel 1. Navigate to Environment > Vulnerabilities > Overview, click Reports (see Figure 13). 2. Click the icon on the scan job that you are interested in. 3. Depending on the browser, a new screen can appear to ask you if you want to open the file or to save it;; or the file will be downloaded directly. The name of the exported file has the following structure: ScanResult_yyyymmdd_.xls Viewing the Scan Results from an NBE File This option allows the user to import a scanning result from other scanners. This file is useful if you want to use a result from external scanners when creating reports or performing cross-correlation. To import an NBE File 1. Navigate to Environment > Vulnerabilities > Scan Jobs. 2. Click Import NBE File. Figure 15. Importing an NBE File. 3. In the Report Name field, type a report name. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 26 of 47
27 4. In the File field, choose the file to import. 5. In the Source field, select the source. 6. In the Assign to listbox, click to expand it and select a single user to assign the import or to assign it to all users;; or you can select an entity and assign the import to that the entity. 7. Click Import & Asset Insertion to import the vulnerabilities and add the new assets or click Import to import just the vulnerabilities. A message appears to inform you that the file has been imported successfully. 8. Click the icon to close this window. Comparing Scan Results between Two Scans Use this option to compare two reports. To compare two reports 1. Navigate to Environment > Vulnerabilities > Overview. 2. Click Reports. 3. Click the icon of the report you can compare with. Figure 16. Scan Reports Details. 4. Use the dropdown to select the other report to compare. 5. Click Compare. The result displays similar to the following: October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 27 of 47
28 Figure 17. Scan Reports Details. Customizing Vulnerability Scans When performing scans, you must select a scanning profile. This profile defines the type of scan to perform, and how thorough the scan is going to be. To view the vulnerability scan profiles Navigate to Environment > Vulnerabilities > Overview and click Profiles. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 28 of 47
29 Figure 18. Vulnerability Scan Profiles Screen. The three predefined profiles are explained in Table 14. Table 14. USM Built-In Vulnerability Scan Profiles. Profile Deep Default Ultimate Meaning A non-destructive full and fast scan. Use this scan if the scanned system breaks or crashes when overwhelmed with scanning requests. Full and fast scan, including destructive tests. Include dangerous stress tests that can crash the scanned system (for example, filling a network switch s memory with random MAC addresses). It is not possible to modify or delete these three profiles. The edit and delete buttons below the action column are disabled. But you can create new profiles and later use the buttons to modify or delete the profiles you created. Click the icon to close the vulnerability scan profiles window. Customizing Vulnerability Profiles It is possible to create and/or modify a custom scan profile. Creating a Custom Scan Profile You can create a custom profile and tailor it to the type of the target system you are scanning. To create a custom profile for vulnerability scans 1. Navigate to Environment > Vulnerabilities > Overview, October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 29 of 47
30 2. Click Profiles. 3. Click Create New Profile. Figure 19. Creating a Custom Profile for Vulnerability Scans. 4. In the Name field, type a name to identify the scan profile. 5. In the Description field, type a description of the scan profile. 6. In the Clone existing scan policy listbox, click to expand it and select an existing profile to use as a basis for the new profile or select None to create a new profile from scratch. 7. In the Make this profile available for listbox, click to expand it and select a single user to have access to this profile or to allow all users to access it;; or you can expand Entity to select an entity and allow the access to all users within the entity. 8. In the Autoenable plugins option listbox, click to expand it and select the auto-enable plugins option between by category or by family. The Autoenable by category option allows the user to use all plugins that belong to certain categories of vulnerabilities. For example, enabling all plugins from Denial category, will add all plugins that test targets for being vulnerable to the Denial of Service type of attacks. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 30 of 47
31 The Autoenable by family option allows the user to narrow a selection of plugins to match certain popular operating systems such as Debian, Solaris, HP-UX, and VMware; network devices such as Cisco; network services such as FTP or SNMP. 9. To add the new profile, click Create. After a few seconds, the vulnerabilities main screen appears. Click Profiles to see the created profile. Modifying a Custom Scan Profile To modify a custom profile for vulnerability scans 1. Navigate to Environment > Vulnerabilities > Overview, click Profiles (see Figure 18). 2. Click the icon of the profile you want to modify. Remember the Deep, Default and the Ultimate profiles have this icon disabled because it is not possible to modify these three profiles. Figure 20. Editing a Custom Profile for Vulnerability Scans. 3. Modify the needed data. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 31 of 47
32 Table 15. Editing a Custom Profile: tabs. Tabs Autoenable Plugins Prefs View Config Meaning Allows the user to modify the description, the availability for a user or entity and the auto-enable options. Allows for detailed adjustment of plugins executed against your assets during vulnerability scan. You will see the number of plugins available and the number of plugins enabled in the current profile. See Enabling/Disabling Plugins. Allows the user to personalize a huge amount of configurations for each profile. These configurations are preferences on the server, such as the cgi path; or different kind of checking, such as file policy violations check; or nmap configurations. These preferences are generated dynamically and may change after a feed update. Shows the final configuration, actually you can view the preferences selected in the previous tab in text mode. 4. Click Update. 5. After a few seconds, the vulnerabilities main screen appears. Enabling/Disabling Plugins This tab allows the user to filter plugins by family or by CVE ID: Figure 21. Edit Profile: Plugins tab. This screen includes the total number of available and enabled plugins. Table 16. Edit Profile: available buttons in the plugins tab. Button Meaning Enable all plugins at the same time. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 32 of 47
33 Button Meaning Enable plugins less aggressive, which ensure your appliance can manage them. Disable all plugins at the same time. Use one of the dropdowns to select a plugin by its family or to select a plugin by its CVE ID. Once you make the selection, the list of vulnerabilities appears: Figure 22. Edit Profile: plugin by its family selected. The displayed data are explained in Table 17. Table 17. Edit Profile: displayed data after the selection of a plugin. Data Enabled Vulnid Vuln Name CVE ID Meaning Enable or disable vulnerabilities. Displays the identification of the vulnerability. Displays the name of the vulnerability. Displays the associated CVE ID, in case of having it. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 33 of 47
34 Data Plugin Category Check All Uncheck All Update Meaning Displays the category of the plugin. Enabling all vulnerabilities in the list. Disabling all vulnerabilities in the list. Updating changes. Checking the Threat Database This option allows the user to search the available plugins. To search a plugin 1. Navigate to Environment > Vulnerabilities > Threat Database. 2. Filter the search by date range, keywords, CVE ID and/or risk factor. Figure 23. Threat Database Main Window. 3. Click Search. The results are similar to Figure 24. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 34 of 47
35 Figure 24. Threat Database Main Window: result of search It is possible to display the details of a plugin when the mouse pointer hovers over the specific ID. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 35 of 47
36 Figure 25. Threat Database Main Window. All CVE fields are links that go to the vulnerability details of that reference. Changing the Vulnerability Ticket Threshold It is possible to add a value to vulnerabilities and generate a ticket from this value. This functionality is useful for having a better management and a rapid response in dealing with vulnerabilities. Use the Vulnerability Ticket Threshold field to enter the value that is going to generate a ticket. The vulnerability ticket threshold is a value that goes from 0 to 10, being 1 a critical situation and 10 an uncritical situation. The 0 value means you want this option disabled. There are two ways of changing the vulnerability ticket threshold: 1. Through the vulnerability screen: a) Navigate to Environment > Vulnerabilities > Overview, click Settings. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 36 of 47
37 b) Choose a value between 0 and 10. Any vulnerability with a higher risk level than this value will automatically generate a vulnerability ticket. See Vulnerabilities Ticket Threshold: Figure 26. Changing the Vulnerability Ticket Threshold through the vulnerability screen. 2. Through the administration screen: a) Navigate to Configuration > Administration > Main. b) Click Vulnerability Scanner. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 37 of 47
38 Figure 27. Changing the Vulnerability Ticket Threshold through the administration screen. c) Choose a value between Info, Low, Medium, High, Serious and Disabled. Any vulnerability with a higher risk level than this value will automatically generate a vulnerability ticket. See Vulnerabilities Ticket Threshold. d) Click Update Configuration. Changing Other Vulnerability Scanner Options To configure the vulnerability scanner 1. Navigate to Configuration > Administration > Main. 2. Click Vulnerability Scanner. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 38 of 47
39 Figure 28. Vulnerability Scanner Configuration. 3. Perform the needed modifications. Table 18. Vulnerability Scanner Configuration. Profile Scanner Login Scanner Password Scanner host Meaning Type a login for the scanner. Type a password to access the scanner. Type an IP that identifies the host (only for non-distributed scans) Scanner port The default port is Enable Pre-Scan locally Vulnerability Ticket threshold Choose between Yes or No but do not pre-scan from scanning sensor. Choose a value between Info, Low, Medium, High and Disabled. Any vulnerability with a higher risk level than this value will automatically generate a vulnerability ticket. See Vulnerabilities Ticket Threshold. 4. Click Update Configuration. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 39 of 47
40 To modify the maximum simultaneous scans 1. Navigate to Configuration > Deployment > Components > Sensors. 2. Click on a sensor. 3. Drag the bar to adjust a value between 1 to 5. The maximum number of simultaneous scans per sensor is 5: Figure 29. Vulnerability Scanner Configuration. 4. Click Update. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 40 of 47
41 Generating Reports Based on Vulnerability Scans There are reports available through the USM Reports functionality. To access to USM Reports 1. Navigate to Reports > USM Reports > Overview. 2. Type Vuln in the search field: Figure 30. USM Reports: doing a search. 3. The available reports display. Table 19. USM Reports: meaning of the buttons. Actions Meaning Deletes the report. Exports the report in an avr file extension. You must enter a password to encrypt the report. Copies the report to another. Allows the user to modify the common options of the report: the report name, the date range, the layout, the user or entity available for the report and the item to include in the report. This button is active in reports that have been created or copied. Allows the user to modify the date range, the layout and the assets to include in the report before running it. Runs the report. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 41 of 47
42 Updating the Vulnerability Scanning Rules To update to the latest version supported by AlienVault 1. Navigate to Configuration > Deployment > Components > AlienVault Center and see if there are new updates pending. Figure 31. AlienVault Center: updating the Vulnerability Scanning Rules. 2. Click on the new update. Important: This update is not only for vulnerability rules. It includes a feed update, plugin update and even, sometimes, product update. 3. Check the package information to make sure the Vulnerability Scanning rules will be updated: October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 42 of 47
43 Figure 32. Updating the Vulnerability Scanning Rules: detail October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 43 of 47
44 Appendix A - Configuring a Vulnerability Scan Job: a Practical Example This appendix is a practical example where we are going to create a scan job for Windows hosts. 1. Navigate to Environment > Vulnerabilities > Overview and click Profiles. 2. Click Create New Profile. 3. In the Name field, type Windows Profile. 4. In the Description field, type This is the profile for scanning Windows hosts. 5. In the Clone existing scan policy listbox, select None. 6. In the Make this profile available for listbox, select admin user. 7. In the Autoenable plugins option listbox, select Auto-enable by family. 8. Disable all options except: Credentials, General, Service detection, Settings, Windows and Windows: Microsoft Bulletins. 9. Click Create to add the new profile. After a few seconds, the vulnerabilities main screen appears. 10. Navigate to Environment > Vulnerabilities > Overview, click Settings. 11. In the Name field, type WindowsCredential. 12. In the Available for listbox, select admin user. 13. In the Login field, type admin and its password. 14. Click Create Credential. 15. Navigate to Environment > Assets & Groups. 16. Click More Filters, then click the Operating System tab and select Microsoft Windows option. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 44 of 47
45 Figure 33. More Filters Screen: Microsoft Windows filter 17. Click Apply. 18. Select all hosts that have appeared and click Actions > Run Vulnerability Scan. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 45 of 47
46 Figure 34. Run Vulnerability Scan on Windows Assets. 19. The Vulnerability Scan window appears for creating the scan job. 20. In the Job Name field, type WindowsScan. 21. In the Select Sensor listbox, click to expand it and select a sensor. 22. In the Profile listbox, click to expand it and select Windows Profile. 23. In the Schedule Method listbox, click to expand it and select Immediately. 24. Click Advanced and select WindowsCredential (admin) in the SMB Credential field. 25. In the Send an notification, select No. 26. Select the options Only scan hosts that are alive and Pre-Scan locally. 27. Click New Job. 28. Navigate to Environment > Vulnerabilities > Scan Jobs. 29. Our scan job appears under Running Scans : October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 46 of 47
47 Figure 35. Running Scan. 30. Click the icon to display the result of the scan. October 28, 2015 USM 5.2 Vulnerability Assessment Guide, rev 1 Page 47 of 47
Assets, Groups & Networks
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
AlienVault. Unified Security Management 5.x Configuring a VPN Environment
AlienVault Unified Security Management 5.x Configuring a VPN Environment USM 5.x Configuring a VPN Environment, rev. 3 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard
AlienVault Unified Security Management (USM) 5.1 Running the Getting Started Wizard USM v5.1 Running the Getting Started Wizard, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Asset Management Guide
Complete. Simple. Affordable AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat Exchange, AlienVault OTX Reputation Monitor,
Unified Security Management (USM) 5.1-5.2 Asset Management Guide
AlienVault Unified Security Management (USM) 5.1-5.2 Asset Management Guide USM 5.1-5.2 Asset Management Guide, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
AlienVault Unified Security Management (USM) 4.15-5.x. Configuring High Availability (HA)
AlienVault Unified Security Management (USM) 4.15-5.x Configuring High Availability (HA) USM v4.15-5.x Configuring High Availability (HA), rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The
AlienVault. Unified Security Management 5.x Configuration Backup and Restore
AlienVault Unified Security Management 5.x Configuration Backup and Restore USM 5.x Configuration Backup and Restore Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Using the Cisco OnPlus Scanner to Discover Your Network
Using the Cisco OnPlus Scanner to Discover Your Network Last Revised: October 22, 2012 This Application Note explains how to use the Cisco OnPlus Scanner with the Cisco OnPlus Portal to discover and manage
How to send emails triggered by events
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
Managing Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 [email protected] Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts
AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,
Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration
Module 1: Overview This module provides an overview of the AlienVault Unified Security Management (USM) solution. Upon completing this module, you will meet these objectives: Describe the goal of network
Quick Start Guide. www.uptrendsinfra.com
Quick Start Guide Uptrends Infra is a cloud service that monitors your on-premise hardware and software infrastructure. This Quick Start Guide contains the instructions to get you up to speed with your
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
Monitoring VMware ESX Virtual Switches
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)
Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Perimeter Service... 3 Subscription and Activation... 3 Multi Scanner Support...
EMC ViPR SRM. Alerting Guide. Version 3.7.1.0 302-002-455 01
EMC ViPR SRM Version 3.7.1.0 Alerting Guide 302-002-455 01 Copyright 2015-2016 EMC Corporation. All rights reserved. Published in the USA. Published February, 2016 EMC believes the information in this
Tracking Network Changes Using Change Audit
CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and
REUTERS/TIM WIMBORNE SCHOLARONE MANUSCRIPTS COGNOS REPORTS
REUTERS/TIM WIMBORNE SCHOLARONE MANUSCRIPTS COGNOS REPORTS 28-APRIL-2015 TABLE OF CONTENTS Select an item in the table of contents to go to that topic in the document. USE GET HELP NOW & FAQS... 1 SYSTEM
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
File Management Utility User Guide
File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held
Strategic Asset Tracking System User Guide
Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data
TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE
.trust TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE 2007 Table of Contents Introducing Trustwave Vulnerability Management 3 1 Logging In and Accessing Scans 4 1.1 Portal Navigation and Utility Functions...
WebSphere Business Monitor V6.2 KPI history and prediction lab
Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...
How to configure High Availability (HA) in AlienVault USM (for versions 4.14 and prior)
Complete. Simple. Affordable How to configure High Availability (HA) in AlienVault USM Copyright 2015 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM,
SonicWALL SSL VPN 3.5: Virtual Assist
SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following
Deploying HIDS Client to Windows Hosts
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
NETWORK PRINT MONITOR User Guide
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Application Performance Monitoring for WhatsUp Gold v16.1 User Guide
Application Performance Monitoring for WhatsUp Gold v16.1 User Guide Contents Table of Contents Introduction APM Overview... 1 Learning about APM terminology... 2 Getting Started with APM... 3 Application
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Copyright EPiServer AB
Table of Contents 3 Table of Contents ABOUT THIS DOCUMENTATION 4 HOW TO ACCESS EPISERVER HELP SYSTEM 4 EXPECTED KNOWLEDGE 4 ONLINE COMMUNITY ON EPISERVER WORLD 4 COPYRIGHT NOTICE 4 EPISERVER ONLINECENTER
Application Performance Monitoring for WhatsUp Gold v16.2 User Guide
Application Performance Monitoring for WhatsUp Gold v16.2 User Guide C o n t e n t s CHAPTER 1 Introduction APM Overview... 1 Learning about APM terminology... 2 Getting Started with APM... 3 Application
AdventNet ManageEngine SupportCenter Plus :: User Guide. Table Of Contents INTRODUCTION... 3 REQUEST... 4. Creating a New Request...
Table Of Contents INTRODUCTION... 3 REQUEST... 4 Creating a New Request... 5 Quick Create...5 Contact Details...5 Classifying Request Category...5 Prioritizing Request...6 Describe Request...6 Add Attachments
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Policy Compliance. Getting Started Guide. January 22, 2016
Policy Compliance Getting Started Guide January 22, 2016 Copyright 2011-2016 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Network Security Platform 7.5
M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE
TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Table of Contents INTRODUCTION...2 HOME PAGE...3. Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...
Table of Contents INTRODUCTION...2 HOME PAGE...3 Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...12 REQUEST...14 Request List View... 15 Creating a New Incident...
rating of 5 out 5 stars
SPM User Guide Contents Aegify comprehensive benefits... 2 Security Posture Assessment workflow... 3 Scanner Management... 3 Upload external scan output... 6 Reports - Views... 6 View Individual Security
Elastic Detector on Amazon Web Services (AWS) User Guide v5
Elastic Detector on Amazon Web Services (AWS) User Guide v5 This guide is intended for Elastic Detector users on AWS. Elastic Detector is available as SaaS or deployed as a virtual appliance through an
Kaspersky Security Center Web-Console
Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION
Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG...
Table of Contents INTRODUCTION... 2 HOME PAGE... 3 Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... 11 Raising a Service Request... 12 Edit the Service Request...
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal
Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal This Application Note explains how to configure ConnectWise PSA (Professional Service Automation) application settings and Cisco
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
USER GUIDE: MaaS360 Services
USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document
BMC FootPrints Asset Core - Asset Discovery. Version 11.7
BMC FootPrints Asset Core - Asset Discovery Version 11.7 Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1994-2013 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are
How To Log On To The Help Desk On Manageengine Service Desk Plus On Pc Or Mac Or Macbook Or Ipad (For Pc Or Ipa) On Pc/ Mac Or Ipo (For Mac) On A Pc Or Pc Or Mp
Service Desk Plus: User Guide Introduction ManageEngine ServiceDesk Plus is comprehensive help desk and asset management software that provides help desk agents and IT managers, an integrated console to
Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)
Configuring Virtual Switches for Use with PVS February 7, 2014 (Revision 1) Table of Contents Introduction... 3 Basic PVS VM Configuration... 3 Platforms... 3 VMware ESXi 5.5... 3 Configure the ESX Management
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Eucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
Finance Reporting. Millennium FAST. User Guide Version 4.0. Memorial University of Newfoundland. September 2013
Millennium FAST Finance Reporting Memorial University of Newfoundland September 2013 User Guide Version 4.0 FAST Finance User Guide Page i Contents Introducing FAST Finance Reporting 4.0... 2 What is FAST
Advanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
EMC Smarts Network Configuration Manager
EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015
AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide
AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Creating a Website with Publisher 2013
Creating a Website with Publisher 2013 University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology
Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)
Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning
IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide
IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright
WEBFOCUS QUICK DATA FOR EXCEL
WEBFOCUS QUICK DATA FOR EXCEL BRIAN CARTER INFORMATION BUILDERS SUMMIT 2008 USERS CONFERENCE JUNE 2008 Presentation Abstract: Even with the growing popularity and evolvement of Business Intelligence products
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Smart Business Architecture for Midsize Networks Network Management Deployment Guide
Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart
Application Performance Monitoring for WhatsUp Gold v16.1 Getting Started Guide
Application Performance Monitoring for WhatsUp Gold v16.1 Getting Started Guide Introduction to WhatsUp Gold APM Welcome to APM APM monitors applications across multiple devices, servers, and systems,
SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server.
Contents For Administrators... 3 Set up SourceAnywhere... 3 SourceAnywhere Service Configurator... 3 Start Service... 3 IP & Port... 3 SQL Connection... 4 SourceAnywhere Server Manager... 4 Add User...
QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015
QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Salesforce Customer Portal Implementation Guide
Salesforce Customer Portal Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered
AlienVault. Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures
AlienVault Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures USM 4.4-5.x Offline Update and Software Restoration Procedures Copyright 2015 AlienVault, Inc. All rights
XpoLog Center Suite Log Management & Analysis platform
XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011
Network Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D
Network Detective 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D Contents Overview... 3 Components of the Inspector... 3 Inspector Appliance... 3 Inspector Diagnostic Tool... 3 Network
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Securepoint Network Access Controller (NAC)
Securepoint Network Access Controller (NAC) Administration Guide Business Class Secure Mobility Version 1 2 Securepoint NAC Administration Guide 1 Table of contents 1 Table of contents... 2 2 Table of
Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide
Pandora FMS 3.0 Quick User's Guide April 27th, 2009 1 Contents How to monitor a network computer/device?...3 Concepts...3 What's an agent?...3 What's a module?...3 Data transfer modes...3 What is an alert?...3
Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...
Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...
Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal
Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal This Application Note provides instructions for configuring Apps settings on the Cisco OnPlus Portal and Autotask application settings
Kaspersky Security Center Web-Console
Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION
Decision Support AITS University Administration. Web Intelligence Rich Client 4.1 User Guide
Decision Support AITS University Administration Web Intelligence Rich Client 4.1 User Guide 2 P age Web Intelligence 4.1 User Guide Web Intelligence 4.1 User Guide Contents Getting Started in Web Intelligence
GETTING STARTED GUIDE. FileAudit VERSION. www.isdecisions.com
GETTING STARTED GUIDE FileAudit 5 VERSION www.isdecisions.com Introduction FileAudit monitors access or access attempts to sensitive files and folders on Microsoft Windows servers. FileAudit allows you
Best Practices. Understanding BeyondTrust Patch Management
Best Practices Understanding BeyondTrust Patch Management February 2014 Contents Overview... 3 1 - Configure Retina CS... 4 2 - Enable Patch Management for Smart Groups... 6 3 Identify and Approve Patches...
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
InfoView User s Guide. BusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 InfoView User s Guide BusinessObjects Enterprise XI Release 2 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,
PRINT FLEET MANAGER USER MANUAL
PRINT FLEET MANAGER USER MANUAL 1 Disclaimer of warranties and limitation of liabilities ( YES ) reserves all rights in the program as delivered. The program or any portion thereof may not be reproduced
Hamline University Administrative Computing Page 1
User Guide Banner Handout: BUSINESS OBJECTS ENTERPRISE (InfoView) Document: boxi31sp3-infoview.docx Created: 5/11/2011 1:24 PM by Chris Berry; Last Modified: 8/31/2011 1:53 PM Purpose:... 2 Introduction:...
for Small and Medium Business Quick Start Guide
for Small and Medium Business Quick Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described herein without notice. Before using
IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM
IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product
Cloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
Contents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
