CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE FOR ANY IDEAS OR RECLAMATIONS MAIL TO:

Size: px
Start display at page:

Download "CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE FOR ANY IDEAS OR RECLAMATIONS MAIL TO: [email protected]"

Transcription

1 CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE FOR ANY IDEAS OR RECLAMATIONS MAIL TO:

2 CONTENTS 1. GENERAL SYSTEM SETTINGS Services started with Citrix XenServer Time synchronization configuration Usage of SSHv Usage of AES cryptoalgorithm for SSH Restrict root login via SSH Limit access to su command Forbid login to single user mode without password extlinux loader password Activate password storing in /etc/shadow file Ensure that there are no users with empty passwords Ensure that passwd and shadow and files and system group files do not include «+» Install Citrix XenServer server certificates Update vulnerable packages Store password history Configure unsuccessful login attempts logging and limit additional attempts Password policy configuration SYSTEM NETWORK CONFIGURATION Separate network interfaces by task Restrict unencrypted connections to XAPI Use encrypted connections in data transferring network Configure umask creation for VHD files Remote NFS storage configuration Disable promiscuous mode for network cards on virtual machines OS kernel network settings configuration Firewall configuration XENSERVER HYPERVISOR SETTINGS Disable debug mode for xenstored Configure shared secret for «pool» mode Disable debug mode for xapi demon Configure xenstored demon logging Disable vncterm automatic logon into dom0 as a root Disable xsconsole autorun as a root on tty Configure PAM in XAPI module Disable testing mode in xsconcole Disable default web page VIRTUAL MACHINE SETTINGS Limit log file size Disable unused virtual devices Disable service console redirection CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 2 of 21

3 1. GENERAL SYSTEM SETTINGS This chapter covers general system settings. The introduced protection methods are the same as used for usual servers based on OS Linux. 1.1 Services started with Citrix XenServer We recommend you to limit services started with the system by default. Do the following for all unused services: chkconfig <servicename> off where <servicename> is a service name. The results for a separately installed XenServer 5.6 server may be as follows: chkconfig --list grep 3:on attach-static-vdis crond fcauthd fe iptables lwsmd management-interface mpp network ntpd perfmon portmap rawdevices set-memory-target snapwatchd squeezed sshd syslog unplug-vcpus v6d vhostmd xapi xapi-domains xe-linux-distribution xen-domain-uuid xenservices CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 3 of 21

4 1.2 Time synchronization configuration Time synchronization is necessary for correct cooperation of XenServer hosts individually or in pool mode. You can use your own NTP server or default time servers. Add the following strings into /etc/ntp.conf file (address rhel.pool.ntp.org is an example): server 0.rhel.pool.ntp.org server 1.rhel.pool.ntp.org server 2.rhel.pool.ntp.org Start NTP server: /etc/init.d/ntpd start chkconfig ntpd on 1.3 Usage of SSHv2 You can use SSH to access Service Console. In this case, disable insecure authentication methods and some other settings from the list below: Configure the following settings in /etc/ssh/sshd_config file: Protocol 2 IgnoreRhosts yes RhostsRSAAuthentication no HostbasedAuthentication no PermitEmptyPasswords no Reboot sshd for the modifications to take effect: /etc/init.d/sshd restart 1.4 Usage of AES cryptoalgorithm for SSH We recommend to use AES cryptoalgorithm for SSH traffic. It is more secure than previously used, and opposite to Blowfish and other cryptoalgorithms (supported by OpenSSL library), the great number of client devices support it. Set Ciphers option in /etc/ssh/sshd_config configuration file: Ciphers aes256-cbc,aes128-cbc CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 4 of 21

5 Reboot sshd for the modifications to take effect: /etc/init.d/sshd restart 1.5 Restrict root login via SSH We recommend you to restrict root login via SSH for secure purposes. This measure helps to prevent root password brute force attacks, and also make it easier to investigate incidents in case several users are aware of the password. Set the following option in /etc/ssh/sshd_config configuration file: PermitRootLogin no Reboot sshd for the modifications to take effect: /etc/init.d/sshd restart 1.6 Limit access to su command su command allows users to execute the shell with the privileges of a specified user, mostly root. We recommend you to grant access to the command only for Citrix XenServer server administrators: include the administrators into wheel group and then enable access limitations that means that only wheel members are able to execute su command. Note. Depending on the company s security policy, su can be forbidden in the system. In this case, you can execute privileged operations via sudo, and wheel group should not include users. Do the following for every user (admin is an example): usermod -G wheel admin Then, enable access to su command for wheel members only. Ensure that /etc/pam.d/su file includes the following string (not in comments): auth required pam_wheel.so use_uid If su is forbidden, ensure that wheel do not include users via contents of files from /etc/passwd folder (primary group) and /etc/group folder (secondary groups). CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 5 of 21

6 1.7 Forbid login to single user mode without password Citrix XenServer is based on RedHat Linux, therefore it also supports single user mode. You can activate it via loader settings. Default settings allow all users to access console with root privileges. This allows attackers with access to Citrix XenServer local console get root privileges and execute arbitrary commands on the vulnerable server. Therefore, we recommend you to configure password authentication to change to single user mode. Add the following entry into /etc/inittab file: ~~:S:wait:/sbin/sulogin Or edit an existed string with S in the second field. 1.8 extlinux loader password OS Citrix XenServer loader allows you to configure a great number of OS kernel settings, including a command used to change to single user mode. By default, OS load options are not protected by password that allows attackers with physical access to Xen server local console to set unauthorized OS loading options. To prevent the situation, we recommend you to set password for loader management. Ensure that only super user has access to the service console loader configuration file for reading/writing. Execute the following command in Service Console as a root: echo <пароль_загрузчика> sha1sum chown root:root /boot/extlinux.conf chmod 600 /boot/extlinux.conf Then, add the 40 hash characters into /boot/extlinux.conf file (global sections of loader settings): menu master passwd <password_sha1_hash> 1.9 Activate password storing in /etc/shadow file OS Citrix XenServer does not store password hashes in a separate file (/etc/shadow) according to pam_unix.so module default settings. Therefore, if an account exists in the system, an attacker can access it. We recommend you to reconfigure the system to prevent this situation. Edit /etc/pam.d/system-auth file as follows: password sufficient pam_unix.so try_first_pass use_authtok nullok md5 shadow CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 6 of 21

7 Execute the following command: pwconv Reboot the operating system Ensure that there are no users with empty passwords An attacker can use user accounts without passwords to login. Ensure that all user accounts have passwords or blocked via «!!». Here is an example (/etc/shadow): vncterm_base:!!:15278:0:99999:7::: Set passwords for all accounts. Use passwd command, or block unused accounts via usermod L <username> command Ensure that passwd and shadow and files and system group files do not include «+» «+» characters in used in accounts and passwords system configuration files as to insert NIS values. We recommend you to delete such entries to protect the system security. Here is an example of such entry from /etc/shadow file: username:+:15278:0:99999:7::: Delete these settings from service files Install Citrix XenServer server certificates We recommend you to install custom.pem SSL certificates to prevent certificate spoofing. Do the following to install CA certificate: Link a key media to the system. Execute the following command: xe pool-certificate-install filename=</path/to/ca-cert.pem> where </path/to/ca-cert.pem> is a certificate file path on the external media. Do the following to add a server certificate: Mount the key media. Execute the following commands: CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 7 of 21

8 service xapi stop pkill stunnel cp /etc/xensource/xapi-ssl.pem /etc/xensource/orig-xapi-ssl.pem cp /path/to/new/cert.pem /etc/xensource/xapi-ssl.pem service xapi start Do the following to enable SSL certificate checks: touch /var/xapi/verify_certificates 1.13 Update vulnerable packages It is known that OS Citrix XenServer is based on RedHat Linux 5. Citrix policy states that patch updates are usually issued twice a year. The system package often includes rather old versions. In spite of Citrix notifications that these packages do not include vulnerabilities, we recommend you to check your system for vulnerable packages on your own with third-party software. Here we use MaxPatrol 8 (Positive Technologies). Note that you use this method at your own risk, and there is no guarantee that the system would normally operate as you install updates. We hardly recommend you to create a backup copy before updating. You can use this method only in case you can solve problems with xapi and other system components on your own. Detect vulnerable packages by any means, i.e.,with a security scanner or check versions with yum secure plagin. Here is an example hop to detect vulnerable packages and what measures to take. Let us suppose, that you ve detected that the following packages are vulnerable: <package_1> <package_2> <package_3> Then, you should activate yum repository to update the packages.edit strings enabled= in /etc/yum.repos.d/centos-base.repo file: [base] name=centos-$releasever - Base mirrorlist= #baseurl= gpgcheck=1 gpgkey=file:///etc/pki/rpm-gpg/rpm-gpg-key-centos-5 exclude=kernel-xen*, *xen* enabled=1 #released updates [updates] name=centos-$releasever - Updates mirrorlist= CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 8 of 21

9 #baseurl= gpgcheck=1 gpgkey=file:///etc/pki/rpm-gpg/rpm-gpg-key-centos-5 exclude=kernel-xen*, *xen* enabled=1 While updating, you have to disable Citrix repository in /etc/yum.repos.d/citrix.repo file: enabled=0 Then, update vulnerable packages via yum tool: yum update <package_1> <package_2> <package_3> 1.14 Store password history You should store several password hashes to prevent passwords to be used again in a short period of time. The recommended value is 10. Note. In case administrator (root) changes a user password, the hash is not stored in password history file. Do the following commands: touch /etc/security/opasswd chmod 600 /etc/security/opasswd chown root:root /etc/security/opasswd Then, add the following string into /etc/pam.d/system-auth file password required pam_unix.so remember= Configure unsuccessful login attempts logging and limit additional attempts We recommend you to use additional logging for unsuccessful login attempts. You should also block an account for a certain period in case of an authentication error. To configure the system use PAM module configuration settings. Edit /etc/pam.d/system-auth file. We recommend to enable pam_tally module to make it harder for attackers to conduct brute force attacks. With the settings shown below, it blocks users for 300 seconds if there are three unsuccessful login attempts: auth required pam_env.so CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 9 of 21

10 auth required pam_tally.so deny=3 unlock_time=300 even_deny_root_account auth sufficient pam_unix.so try_first_pass nullok auth required pam_deny.so account required pam_unix.so account required pam_tally.so password required pam_cracklib.so try_first_pass retry=3 password sufficient pam_unix.so try_first_pass use_authtok nullok md5 shadow password required pam_unix.so remember=10 password required pam_deny.so session optional pam_keyinit.so revoke session required pam_limits.so session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid session required pam_unix.so 1.16 Password policy configuration Users should use passwords of at least 9 characters. We recommend you to limit maximum password age (90 days) to decrease the negative effect in case the system is compromised. We also recommend you to notify users 14 days earlier the day the password is expired. If a user does not change its password in 7 days, you should block the account. Execute the following command for every user in the system except administrator: chage -m 7 <имя_пользователя> Edit the following strings in /etc/login.defs file to configure the password policy: PASS_MAX_DAYS=90 PASS_MIN_DAYS=7 PASS_WARN_AGE=14 PASS_MIN_LEN=9 CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 10 of 21

11 2. SYSTEM NETWORK CONFIGURATION The shown below settings are an abstract example. You should remember your own network architecture and server hardware to use these recommendations. 2.1 Separate network interfaces by task We recommend you to protect networks for management, data transferring and virtual machines to provide maximum security. In that way, you can prevent system compromising in case an attacker manages to crack one of the networks. Pic. 1 shows this solution. SMAPI XAPI Citrix XenServer VM VM VM NIC-2 NIC-3 Management Network NIC-1 Storage Network External Network Pic. 1. Logic scheme that shows how to separate hypervisor networks It there are several network interfaces, separate them physically and logically. It you unable to separate the networks, we recommend you to separate them on IP level or in any way. Managing interface configuration: Show UUID PIF according to eth0 (NIC0) device and its network UUID: xe pif-list device=eth0 params=uuid,network-uuid CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 11 of 21

12 Modify the network name: xe network-param-set uuid=<network uuid> name-label="management NW" Data transferring interface configuration: Show UUID PIF according to eth1 (NIC1) device and its network UUID: xe pif-list device=eth1 params=uuid,network-uuid Configure network IP address: # xe pif-reconfigure-ip uuid=<pif uuid>> mode=static IP=<ip> \ gateway=<gateway> netmask=<netmask> DNS=<DNS> Modify the network name: xe network-param-set uuid=<network uuid> name-label="storage NW" Virtual machine nterface configuration Show UUID PIF according to eth2 (NIC2) device and its network UUID: xe pif-list device=eth2 params=uuid,network-uuid Configure a guest network in case there is no IP address: xe pif-reconfigure-ip uuid=<uuid> mode=none Modify the network name: xe network-param-set uuid=<network uuid> name-label= "Guest NW 0" Do the operations for eth3, eth4 and so on. 2.2 Restrict unencrypted connections to XAPI By default, XAPI stack listen ports 80 (unencrypted channel) and 443 (SSL tunnel) for connection. If unencrypted data are used, an attacker can compromise administrator s operations. We recommend you to disable access by port 80 for all clients except XenCenter working station. Execute the following command: /etc/init.d/iptables save Edit /etc/sysconfig/iptables file: -A RH-Firewall-1-INPUT s <xen_center_ip> -p tcp -m state --state NEW - m tcp --dport 80 -j ACCEPT CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 12 of 21

13 Execute the following command: /etc/init.d/iptables restart 2.3 Use encrypted connections in data transferring network If you move virtual machines, data is transferring between servers (for example, in XenMotion mode) in plain text. It means that data is transferred unencrypted. In spite the fact that networks are separated, you should protect this traffic. We recommend you to use encryption on IP level, such as VPN. There is no example because of a great variety of possible solutions. Configure encryption for iscsi password transferring: OpenISCSI software is used to connect to remote iscsi storage for iscsi traffic. This software supports CHAP protocol to send passwords. We recommend you to use CHAP authentication for OpenlSCSI connections. Set the following setting for the variable in /etc/iscsi/iscsid.conf file. # To enable CHAP authentication set node.session.auth.authmethod # to CHAP. The default is None. node.session.auth.authmethod = CHAP 2.4 Configure umask creation for VHD files By default, Citrix XenServer creates virtual machine files with read privileges for other. Therefore, every user has rights to get virtual machine data. We recommend you to limit privileges for these file types. You should modify server scripts to modify umask settings. Edit /opt/xensource/sm/filesr.py file: def create(self, sr_uuid, vdi_uuid, size): os.umask(077) if util.ioretry(lambda: util.pathexists(self.path)): Then, you can need to compile file pyc and pyo. Create /opt/xensource/sm/compile.py file with the following content: #!/usr/bin/python import py_compile py_compile.compile('/opt/xensource/sm/filesr.py') Then, execute the following commands: CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 13 of 21

14 python /opt/xensource/sm/compile.py python O /opt/xensource/sm/compile.py and reboot the hypervisor with the following command: shutdown r now 2.5 Remote NFS storage configuration Every remote NFS storage is a folder with a file in VHD format. VHD is not encrypted, therefore we recommend you strictly limit the list of users that are allowed to mount the folder. We recommend you to modify system settings to operate with remote NFS storage. Below we show how to configure NFS storage on Linux remote server. Ensure that single IP address is locked in /etc/exports file: /<vm_share_dir> <xenserver_ip>(rw,root_squash,anonuid=<xen_user_uid>,anongid=<xen_user _GID>,sync) Discover the folder owner: chown <xen_user>:<xen_user_group> <vm_share_dir> Configure mountd, statd, lockd and rquotad demons to operate with static ports (ports are used as an example) in /etc/sysconfig/nfs file: MOUNTD_PORT= 4002 STATD_PORT= 4003 LOCKD_TCPPORT= 4004 LOCKD_UDPPORT= 4004 RQUOTAD_PORT= 4005 STATD_OUTGOING_PORT= 4006 Add the following strings into INPUT table for /etc/sysconfig/iptables network filter: Iptables A INPUT s <xenserver-ip> -p tcp dport 111 j ACCEPT Iptables A INPUT s <xenserver-ip> -p udp dport 111 j ACCEPT Iptables A INPUT s <xenserver-ip> -p tcp dport 4002:4006 j ACCEPT Iptables A INPUT s <xenserver-ip> -p udp dport 4002:4006 j ACCEPT Iptables A INPUT s <xenserver-ip> -p tcp dport 2049 j ACCEPT Iptables A INPUT s <xenserver-ip> -p udp dport 2049 j ACCEPT CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 14 of 21

15 2.6 Disable promiscuous mode for network cards on virtual machines If promiscuous mode is enabled for simulated network interface, a virtual machine is able to intercept traffic from other guest systems, and also use other specific features including a possibility to send malformed or malicious requests accidentally or deliberately Therefore, we do not recommend you to enable this mode. Execute the following commands in Service Console to disable VIF or promiscuous mode: xe pif-param-set uuid=<pif UUID> other-config:promiscuous="off" or: xe pif-param-set uuid=<pif UUID> other-config:promiscuous="false" 2.7 OS kernel network settings configuration The following OS kernel settings are necessary to harden Citrix XenServer network attack tolerance: net.ipv4.tcp_max_syn_backlog = 4096 net.ipv4.tcp_syncookies = 1 net.ipv4.conf.all.rp_filter = 1 net.ipv4.conf.all.accept_source_route = 0 net.ipv4.conf.all.accept_redirects = 0 net.ipv4.conf.all.secure_redirects = 0 net.ipv4.conf.default.rp_filter = 1 net.ipv4.conf.default.accept_source_route = 0 net.ipv4.conf.default.accept_redirects = 0 net.ipv4.conf.default.secure_redirects = 0 net.ipv4.icmp_echo_ignore_broadcasts = 1 Add the settings into /etc/sysctl.conf file, reboot the system and execute the following command: sysctl -p 2.8 Firewall configuration Default Citrix XenServer installation includes Netfilter firewall and iptables command line utility used to manage it. We recommend you to configure this software to provide secure network communication. Use the following settings for managing network: service iptables start iptables -F iptables -X iptables -P INPUT ACCEPT iptables -P FORWARD ACCEPT iptables -P OUTPUT ACCEPT CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 15 of 21

16 iptables -A INPUT -i xenbr0 -p tcp --dport 443 -m state --state NEW -j ACCEPT iptables -A INPUT -i xenbr0 -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -A INPUT -i xenbr0 -j DROP iptables -A OUTPUT -o xenbr0 -p tcp --dport 443 -m state --state NEW -j ACCEPT iptables -A OUTPUT -o xenbr0 -p tcp --dport m state --state NEW -j ACCEPT iptables -A OUTPUT -o xenbr0 -p tcp --dport m state --state NEW -j ACCEPT iptables -A OUTPUT -o xenbr0 -p udp --dport 123 -m state --state NEW -j ACCEPT iptables -A OUTPUT -o xenbr0 -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -A OUTPUT -o xenbr0 -j DROP Input chain for data transferring network: iptables -A INPUT -i xenbr1 -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -A INPUT -i xenbr1 -j DROP Add the following permissions to configure NFS remote connections (as an example): iptables -A OUTPUT -o xenbr1 -p udp --dport 111 -m state --state NEW -j ACCEPT iptables -A OUTPUT -o xenbr1 -p tcp --dport 111 -m state --state NEW -j ACCEPT iptables -A OUTPUT -o xenbr1 -p udp --dport m state --state NEW -j ACCEPT iptables -A OUTPUT -o xenbr1 -p tcp --dport m state --state NEW -j ACCEP iptables -A OUTPUT -o xenbr1 -p udp --dport 4002:4006 -m state --state NEW -j ACCEPT iptables -A OUTPUT -o xenbr1 -p tcp --dport 4002:4006 -m state --state NEW -j ACCEPT iptables -A OUTPUT -o xenbr1 -m state --state RELATED,ESTABLISHED -j ACCEPT iptables -A OUTPUT -o xenbr1 -j DROP Add your own rules to connect to alternative remote storages. Finalize the configuration: service iptables save chkconfig iptables on CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 16 of 21

17 3. XENSERVER HYPERVISOR SETTINGS This chapter is about specific configuration and critical file options for internal XAPI demon and its environment. These changes can influence virtual infrastructures, therefore we recommend you to make them on testing systems first on all. 3.1 Disable debug mode for xenstored This is necessary to restrict debug mode for guest systems. Delete entries like allow-debug=true from /etc/xensource/xenstored.conf file. 3.2 Configure shared secret for «pool» mode This is actual for pool-master systems. It is necessary to harden spoofing of the certificate used for data transferring inside the system. We recommend you to create a certificate based on random-number generator with enough entropy. Do the following to create the token: service xapi stop rm /etc/xensource/ptoken (ent=$(cat /proc/sys/kernel/random/entropy_avail); while [[ $ent -lt 2000 ]]; do \ sleep 15; ent=$(cat /proc/sys/kernel/random/entropy_avail); done) && \ service xapi start 3.3 Disable debug mode for xapi demon By default, Global Catalog Debug mode is enabled. This setting is insecure, we recommend you to disable this mode to prevent system compromising. Replace the following value in /etc/xensource/xapi.conf file: gc-debug = true with false. CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 17 of 21

18 3.4 Configure xenstored demon logging We recommend you to configure xenstored demon logging for further analysis in case the system is compromised. Edit /etc/xensource/xenstored.conf file: # Logs #log = error;general;file:/var/log/xenstored.log log = warn;general;file:/var/log/xenstored.log #log = info;general;file:/var/log/xenstored.log #log = debug;io;file:/var/log/xenstored-io.log 3.5 Disable vncterm automatic logon into dom0 as a root In case there is an XAPI request that is created to connect to hypervisor testing console, automatic logon is done as a root regardless of XAPI user, that triggered the request if local authorization is used without RBAC subsystem using Active Directory (in versions Free, Advanced). We recommend you to disable such login to protect the system. The best solution is to replace automatic logon with default login prompt (redirection to SSH). Edit /usr/lib/xen/bin/dom0term.sh file, where <admin_user> is your administrative account (not root) : #! /bin/bash read -s -p "Press <Enter> to login " ignore сlear exec /bin/login p 3.6 Disable xsconsole autorun as a root on tty1 By default, Xsconsole console started with root privileges is available on the system physical console. We recommend you to modify autoload script to prevent SH code injection and/or session interception via text mode. Edit /opt/xensource/libexec/run-boot-xsconsole file. Modify the terminal call string as follows: Initial string: exec /sbin/mingetty --noissue --autologin root -- loginprog=/usr/bin/xsconsole $TTY CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 18 of 21

19 Modified string: exec /sbin/mingetty --noissue --autologin nobody -- loginprog=/usr/bin/xsconsole $TTY 3.7 Configure PAM in XAPI module By default, every OS Citrix XenServer user (in versions Free, Advanced) is able to connect to XAPI with pool-admin privileges. This is a product feature. It means that every user can execute operations in the system using Xen API, therefore we recommend you to limit users with access to XAPI in PAM module. As a root, create /etc/xapi_allow file and add root as a first string to the file. Enumerate all users with access to XAPI with line feed separator. Edit /etc/pam.d/xapi file as follows: #%PAM-1.0 auth required pam_env.so auth required pam_listfile.so item=user sense=allow file=/etc/xapi_allow auth sufficient pam_unix.so try_first_pass nullok auth required pam_deny.so account required pam_unix.so password required pam_cracklib.so try_first_pass retry=3 password sufficient pam_unix.so try_first_pass use_authtok nullok md5 password required pam_deny.so session optional pam_keyinit.so revoke session required pam_limits.so session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid session required pam_unix.so If the changes are made, only users from the xapi_allow list are able to access xapi: Also, limit access to this file: root admin user chmod 600 /etc/xapi_allow CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 19 of 21

20 3.8 Disable testing mode in xsconcole If you add a file testing.txt to /usr/lib/xsconsole/ folder, Xsconsole starts in testing mode. If host=, password= variables are defined in file testing.txt, xsconsole program authenticates on a remote server. Besides, if xsconsole is used on tty1 local console, an attacker can access the local console with root privileges. Ensure that /usr/lib/xsconsole/testing.txt file is not existed. If it exists, delete it. 3.9 Disable default web page By default, a web server is active in the system. It allows users to upload XenCenter files and reports current system version. We recommend you to delete the whole page or correct its content to prevent the system compromising. Modify web server index file Citrix-index.html in /opt/xensource/www folder. Replace the following fragment: <html> <title>xenserver 5.6.0</title> <head> </head> <body> <p/>citrix Systems, Inc. XenServer <p/><a href="xencenter.iso">xencenter CD image</a> <p/><a href="xencenter.msi">xencenter installer</a> </body> </html> with <html> </html> 4. VIRTUAL MACHINE SETTINGS 4.1 Limit log file size We recommend you to limit the maximum size of log files for virtual machines to prevent system drive overflow. CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 20 of 21

21 4.2 Disable unused virtual devices We recommend you to disable connections between any virtual devices and virtual machines to prevent the capture of virtual machine credentials. 4.3 Disable service console redirection We recommend you to restrict the usage of text system consoles in *nix operating systems. You should disable XenAPI VM built-in console service and use native OS services. CITRIX XENSERVER FREE/ADVANCED 5.6 HARDENING GUIDE Page 21 of 21

Secure Network Filesystem (Secure NFS) By Travis Zigler

Secure Network Filesystem (Secure NFS) By Travis Zigler Secure Network Filesystem (Secure NFS) By Travis Zigler Overview of Secure NFS Problems with NFS Security of Basic NFS Configurations Securing NFS with SSH Tutorial Securing NFS with SSL Overview Conclusions

More information

Best Practices to Secure Linux Server homing Oracle

Best Practices to Secure Linux Server homing Oracle Best Practices to Secure Linux Server homing Oracle Raj Ravikumar System Analyst BizTech Kyle Snyder CIO, Managing Partner - BizTech Agenda About the Presenters About BizTech What is Linux Enterprise Linux

More information

Attunity RepliWeb PAM Configuration Guide

Attunity RepliWeb PAM Configuration Guide Attunity RepliWeb PAM Configuration Guide Software Version 5.2 For Linux and UNIX operating systems June 28, 2012 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954)

More information

Auditing and Hardening Unix Systems Using CIS benchmarks on SUSE Linux

Auditing and Hardening Unix Systems Using CIS benchmarks on SUSE Linux Auditing and Hardening Unix Systems Using CIS benchmarks on SUSE Linux André Carrington, P.Eng, CISSP, CISM Unix experience: 13 years SunOS; NeXTSTEP; Sun Interactive; Wyse Unix; BSD; Solaris; QNX; HP-UX;

More information

Nixu SNS Security White Paper May 2007 Version 1.2

Nixu SNS Security White Paper May 2007 Version 1.2 1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle

More information

Univention Corporate Server. Extended domain services documentation

Univention Corporate Server. Extended domain services documentation Univention Corporate Server Extended domain services documentation 2 Table of Contents 1. Integration of Ubuntu clients into a UCS domain... 4 1.1. Integration into the LDAP directory and the SSL certificate

More information

Unit objectives IBM Power Systems

Unit objectives IBM Power Systems User-level security Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 9.0 Unit objectives After completing this unit, you should be able to: Describe

More information

SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC

SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC SoftNAS Application Guide: In-Flight Encryption Contents Introduction to In-Flight Data Encryption... 2 CIFS Encryption In-Flight...

More information

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny)

Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny) Installing and configuring Intelligent Power Protector On Xen Virtualized Architecture Citrix XenServer 5.6 OpenSource Xen 2.6 on RHEL 5 OpenSource Xen 3.2 on Debian 5.0(Lenny) 1 Introduction... 3 1. Citrix

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT EIGHT. Ubuntu Security. www.uscyberpatriot.org

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT EIGHT. Ubuntu Security. www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT EIGHT Ubuntu Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

How to set up multiple web servers (VMs) on XenServer reusing host's static IP

How to set up multiple web servers (VMs) on XenServer reusing host's static IP How to set up multiple web servers (VMs) on XenServer reusing host's static IP In this document we show how to: configure ip forwarding and NAT to reuse single ip by VMs and host create private network

More information

Distributed File System

Distributed File System Petru Maior University, Târgu-Mureș Science Department Information Technolgy Master Course Distributed File System Students: Bardosi Florin Cifor Crina Danciu Ioana Hintea Dan Alexandru Table of Contents

More information

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3

More information

Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett

Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Linux Boot Camp Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Schedule for the Week Schedule for the Week Mon Welcome from Enrollment Management

More information

OS Installation: CentOS 5.8

OS Installation: CentOS 5.8 OS Installation: CentOS 5.8 OpenTUSK Training University of Nairobi Mike Prentice [email protected] Tufts University Technology for Learning in the Health Sciences July 2013 Outline 1 OS Install

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Syncplicity On-Premise Storage Connector

Syncplicity On-Premise Storage Connector Syncplicity On-Premise Storage Connector Implementation Guide Abstract This document explains how to install and configure the Syncplicity On-Premise Storage Connector. In addition, it also describes how

More information

CRYPTOCard Authentication. Using PAM for Linux and Solaris. Quick Start Guide. Copyright 2002-2003 CRYPTOCard Corporation All Rights Reserved 030428

CRYPTOCard Authentication. Using PAM for Linux and Solaris. Quick Start Guide. Copyright 2002-2003 CRYPTOCard Corporation All Rights Reserved 030428 CRYPTOCard Authentication Using PAM for Linux and Solaris Quick Start Guide Copyright 2002-2003 CRYPTOCard Corporation All Rights Reserved 030428 http://www.cryptocard.com Table of Contents CHANGE HISTORY...

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

Railo Installation on CentOS Linux 6 Best Practices

Railo Installation on CentOS Linux 6 Best Practices Railo Installation on CentOS Linux 6 Best Practices Purpose: This document is intended for system administrators who want to deploy their Mura CMS, Railo, Tomcat, and JRE stack in a secure but easy to

More information

GL550 - Enterprise Linux Security Administration

GL550 - Enterprise Linux Security Administration GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such

More information

VELOCITY. Quick Start Guide. Citrix XenServer Hypervisor. Server Mode (Single-Interface Deployment) Before You Begin SUMMARY OF TASKS

VELOCITY. Quick Start Guide. Citrix XenServer Hypervisor. Server Mode (Single-Interface Deployment) Before You Begin SUMMARY OF TASKS If you re not using Citrix XenCenter 6.0, your screens may vary. VELOCITY REPLICATION ACCELERATOR Citrix XenServer Hypervisor Server Mode (Single-Interface Deployment) 2013 Silver Peak Systems, Inc. This

More information

ENTERPRISE LINUX SECURITY ADMINISTRATION

ENTERPRISE LINUX SECURITY ADMINISTRATION ENTERPRISE LINUX SECURITY ADMINISTRATION COURSE DESCRIPTION: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques

More information

XenServer 5.5.0 User Security

XenServer 5.5.0 User Security XenServer 5.5.0 User Security 5.5.0 Published July 2009 1.0 Edition XenServer 5.5.0 User Security Published July 2009 Copyright 2008 Citrix Systems, Inc. Xen, XenSource, XenEnterpise, XenServer, XenExpress

More information

My FreeScan Vulnerabilities Report

My FreeScan Vulnerabilities Report Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the

More information

CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute.

CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute. CCNA Security Chapter Two Securing Network Devices 1 The Edge Router What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as

More information

Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.

Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local

More information

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days GL-550: Red Hat Linux Security Administration Course Length: 5 days Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range

More information

Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html

Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html Red Hat Docs > Manuals > Red Hat Enterprise Linux Manuals > Red Hat Enterprise Linux 4: Security Guide Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html

More information

Likewise Security Benefits

Likewise Security Benefits Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers

More information

DiamondStream Data Security Policy Summary

DiamondStream Data Security Policy Summary DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers

More information

LDAP (Lightweight Directory Access Protocol) LDAP is an Internet standard protocol used by

LDAP (Lightweight Directory Access Protocol) LDAP is an Internet standard protocol used by LDAP (Lightweight Directory Access Protocol) LDAP is an Internet standard protocol used by applications to access information in a directory. It runs directly over TCP, and can be used to access a standalone

More information

CloudPortal Business Manager 2.2 POC Cookbook

CloudPortal Business Manager 2.2 POC Cookbook CloudPortal Business Manager 2.2 POC Cookbook February 9, 2014 Contents 1 Overview... 3 2 Prepare CloudPlatform to Be Used with CloudPortal Business Manager... 4 2.1 Assumptions... 4 2.2 Steps to configure

More information

Linux Server Configuration Guidelines

Linux Server Configuration Guidelines Linux Server Configuration Guidelines This document is meant to be a living document and intended to accompany more detailed, step- by- step resources. Suggestions in this document are taken from administrators

More information

ENTERPRISE LINUX SECURITY ADMINISTRATION

ENTERPRISE LINUX SECURITY ADMINISTRATION ENTERPRISE LINUX SECURITY ADMINISTRATION This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Security Configuration Guide P/N 300-010-493 Rev A05

Security Configuration Guide P/N 300-010-493 Rev A05 EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed

More information

vsphere Security ESXi 6.0 vcenter Server 6.0 EN-001466-04

vsphere Security ESXi 6.0 vcenter Server 6.0 EN-001466-04 ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

If you prefer to use your own SSH client, configure NG Admin with the path to the executable:

If you prefer to use your own SSH client, configure NG Admin with the path to the executable: How to Configure SSH Each Barracuda NG Firewall system is routinely equipped with an SSH daemon listening on TCP port 22 on all administrative IP addresses (the primary box IP address and all other IP

More information

Recommended File System Ownership and Privileges

Recommended File System Ownership and Privileges FOR MAGENTO COMMUNITY EDITION Whenever a patch is released to fix an issue in the code, a notice is sent directly to your Admin Inbox. If the update is security related, the incoming message is colorcoded

More information

Citrix XenServer-6.2 Administration Training

Citrix XenServer-6.2 Administration Training Citrix XenServer-6.2 Administration Training Course Duration : 20Days Class Duration : 3hours per day ( Fast Track Course duration 7days Per day 8 hours ) Classroom Training Fast-Track Training: - Online

More information

Citrix Training. Course: Citrix Training. Duration: 40 hours. Mode of Training: Classroom (Instructor-Led)

Citrix Training. Course: Citrix Training. Duration: 40 hours. Mode of Training: Classroom (Instructor-Led) Citrix Training Course: Citrix Training Duration: 40 hours Mode of Training: Classroom (Instructor-Led) Virtualization has redefined the way IT resources are consumed and services are delivered. It offers

More information

Viking VPN Guide Linux/UNIX

Viking VPN Guide Linux/UNIX Viking VPN Guide Linux/UNIX Table Of Contents 1 : VPN Questions answered 2 : Installing the Linux Client 3 : Connecting with the Linux Client 4 : Reporting Problems Version 1.0 : 10/27/2010 Information

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Focus on Security. Keeping the bad guys out

Focus on Security. Keeping the bad guys out Focus on Security Keeping the bad guys out 3 ICT Security Topics: Day 1: General principles. Day 2: System hardening and integrity. Day 3: Keeping the bad guys out. Day 4: Seeing the invisible; what's

More information

Network Infrastructure Security Recommendations

Network Infrastructure Security Recommendations Hardening Red Hat Enterprise Linux Ensure that file systems with user-writeable directories (ie /home, /tmp, /var/tem) are mounted on separate partitions. Ensure updates are applied as soon as they become

More information

Guide. Operating System Security Hardening Guide for SAP HANA. Developed for SAP HANA Running on SUSE Linux Enterprise Server. Solution Guide Server

Guide. Operating System Security Hardening Guide for SAP HANA. Developed for SAP HANA Running on SUSE Linux Enterprise Server. Solution Guide Server Operating System Security Hardening Guide for SAP HANA Developed for SAP HANA Running on SUSE Linux Enterprise Server Guide wwwsusecom Solution Guide Server Table of Contents page Introduction 2 SUSE Linux

More information

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap ( WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

VMware Horizon Workspace Security Features WHITE PAPER

VMware Horizon Workspace Security Features WHITE PAPER VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon

More information

Using Network Attached Storage with Linux. by Andy Pepperdine

Using Network Attached Storage with Linux. by Andy Pepperdine Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to

More information

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4 Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access

More information

Cloud.com CloudStack Installation Guide

Cloud.com CloudStack Installation Guide Cloud.com CloudStack Installation Guide Version 2.2 early access release November 20, 2010 1 Specifications are subject to change without notice. The Cloud.com logo, Cloud.com, CloudStack, Hypervisor Attached

More information

Executive Summary and Purpose

Executive Summary and Purpose ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on

More information

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology. CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net

More information

Linux System Administration on Red Hat

Linux System Administration on Red Hat Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Citrix XenServer Design: Designing XenServer Network Configurations

Citrix XenServer Design: Designing XenServer Network Configurations Citrix XenServer Design: Designing XenServer Network Configurations www.citrix.com Contents About... 5 Audience... 5 Purpose of the Guide... 6 Finding Configuration Instructions... 6 Visual Legend... 7

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. IMPLEMENTING A WEB SERVER Apache Architecture Installing PHP Apache Configuration Files httpd.conf Server Settings httpd.conf Main

More information

RemotelyAnywhere. Security Considerations

RemotelyAnywhere. Security Considerations RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP

More information

Oracle VM Server Recovery Guide. Version 8.2

Oracle VM Server Recovery Guide. Version 8.2 Oracle VM Server Recovery Guide Version 8.2 Oracle VM Server for x86 Recovery Guide The purpose of this document is to provide the steps necessary to perform system recovery of an Oracle VM Server for

More information

CloudStack Basic Installation Guide

CloudStack Basic Installation Guide CloudStack Basic Installation Guide For CloudStack Version 3.0.0 3.0.2 Revised August 16, 2012 1:51 AM Pacific 2011, 2012 Citrix Systems, Inc. All rights reserved. Specifications are subject to change

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows) Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Linux Deployment Guide. How to deploy Network Shutdown Module for Linux

Linux Deployment Guide. How to deploy Network Shutdown Module for Linux Linux Deployment Guide How to deploy Network Shutdown Module for Linux 1 Contents 2 Introduction... 4 3 To Prepare your System for Install... 4 3.1 RedHat 5.9 i386 Command... 4 3.2 RedHat 5.9 x86_64 Command...

More information

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref: SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,

More information

Securing Linux Servers

Securing Linux Servers Securing Linux Servers Best Practice Document Produced by the AMRES-led working group on Security Authors: M. Kukoleča (AMRES), M. Zdravković (RCUB), I. Ivanović October 2014 TERENA 2014 All rights reserved.

More information

TimeIPS Server. IPS256T Virtual Machine. Installation Guide

TimeIPS Server. IPS256T Virtual Machine. Installation Guide TimeIPS Server IPS256T Virtual Machine Installation Guide TimeIPS License Notification The terms and conditions applicable to the license of the TimeIPS software, sale of TimeIPS hardware and the provision

More information

How To Install An Org Vm Server On A Virtual Box On An Ubuntu 7.1.3 (Orchestra) On A Windows Box On A Microsoft Zephyrus (Orroster) 2.5 (Orner)

How To Install An Org Vm Server On A Virtual Box On An Ubuntu 7.1.3 (Orchestra) On A Windows Box On A Microsoft Zephyrus (Orroster) 2.5 (Orner) Oracle Virtualization Installing Oracle VM Server 3.0.3, Oracle VM Manager 3.0.3 and Deploying Oracle RAC 11gR2 (11.2.0.3) Oracle VM templates Linux x86 64 bit for test configuration In two posts I will

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Use Enterprise SSO as the Credential Server for Protected Sites

Use Enterprise SSO as the Credential Server for Protected Sites Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured

More information

Securing Linux Servers Best Practice Document

Securing Linux Servers Best Practice Document Securing Linux Servers Best Practice Document Miloš Kukoleča Network Security Engineer CNMS Workshop, Prague 25-26 April 2016 Motivation Majority of production servers in academic environment are run by

More information

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights

More information

Module 4 - Introduction to XenServer Storage Repositories

Module 4 - Introduction to XenServer Storage Repositories Module 4 - Introduction to XenServer Storage Repositories Page 1 Table of contents Scenario... 3 Exercise 1: Creating an NFS Storage Repository... 4 Exercise 2: Probing an Storage Repository... 9 Exercise

More information

Getting Started with RES Automation Manager Agent for Linux

Getting Started with RES Automation Manager Agent for Linux Getting Started with RES Automation Manager Agent for Linux Contents Chapter 1: Introduction 1 Chapter 2: Prerequisites and General Guidelines 2 Chapter 3: Installation 3 3.1 Manual Installation... 3 3.2

More information

Monitoring Clearswift Gateways with SCOM

Monitoring Clearswift Gateways with SCOM Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue

More information

CounterACT 7.0 Single CounterACT Appliance

CounterACT 7.0 Single CounterACT Appliance CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment

More information

Linux Firewalls (Ubuntu IPTables) II

Linux Firewalls (Ubuntu IPTables) II Linux Firewalls (Ubuntu IPTables) II Here we will complete the previous firewall lab by making a bridge on the Ubuntu machine, to make the Ubuntu machine completely control the Internet connection on the

More information

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more Security Review Version 8.1 March 31, 2016 Contacting Leostream Leostream Corporation http://www.leostream.com

More information