Best Practices Guide. Database Activity Monitoring Best Practices
|
|
|
- Briana Miller
- 10 years ago
- Views:
Transcription
1 Best Practices Guide
2 Table of Contents Recommended Object Groups 3 Generic groups 3 Application-specific groups 4 Recommended Rules 6 Generic rules 6 Application-specific rules 7 Summary 7 2
3 This document contains recommendations from McAfee for creating custom rules and rule objects. It should serve both as a starting point for the implementation of McAfee Database Activity Monitoring and as an example of the ease of rule creation and management. Recommended Object Groups Object groups are groups of elements that can be used as replacement variables inside rules with the $groupname notation. It allows you to decouple the rules from the actual parameters that the rules apply to so that changing those parameters will affect all rules using the group without the need to actually change the rules themselves. Generic groups The generic groups are groups relevant to all applications and databases. Those groups will be later used in generic rules as well as in application related rules. admin_ips object type = IP Create a group that will contain either a list of IPs for administrator machines or an administrative subnet (if it exists). Example: , , / suspect_programs object type = application This pre-populated group contains a list of programs that allow you to directly manipulate database content without the restrictions of an application. You can edit this group to add various applications used in your organization that should be restricted. Example sqlplus, toad, DbVisualizer, SQL Developer, SQL Server Management Studio, osql, Microsoft Office, sqlcmd, plsqldeveloper, sqlplusw, sqlnavigator, dbartisan, tora, rapidsql suspect_modules object type = module This group is essentially the same as the above suspect_programs group but contains a list of suspect modules such as SQL*Plus. Modules are harder to fake than applications. Example SQL*Plus, T.O.A.D work_day object type = weekday This pre-populated group contains the list of working days for your organization. Example: MONDAY, TUESDAY, WEDNESDAY, THURSDAY, FRIDAY work_hours object type = hour This group should contain a list of regular working hours. Example 07, 08, 09, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19 3
4 admin_db_usernames object type = user This group should contain the list of database administrator usernames. The group can be populated by running McAfee Vulnerability Manager scans and collecting the list of all administrative accounts. Example sys, system, dbsnmp, sysman, sa admin_os_usernames object type = osuser This group should contain the list of administrator usernames. The group can be populated by integrating with Microsoft Active Directory or LDAP and pointing to the security group the DBAs are part of. Example oracle, joe, john, jane Application-specific groups The following groups are groups that should be specified per application. The <app> notation in the group name should be replaced with a TLA representing the actual application such as CRM, ERP, or others. <app>_allowed_programs object type = application This group should contain a list of application names that the given application consists of. Please review application mapping to see the actual application names connecting to the database. Example apps.exe, console <app>_allowed_module object type = module This group should contain a list of modules that the application uses. If the application passes the module to the database, you can use this group. Alternatively, you can take advantage of the McAfee Database Activity Monitoring Identifier application plug-in to propagate application modules into the database. Please review application mapping to see the actual module names connecting to the database. Example admin, customer, account <app>_allowed_ips object type = IP This group should contain the list of IPs that are allowed to access the application databases. You can also use subnets. Example / <app>_db_users object type = user This list should contain the database users that own or access the application data. Usually, an application will use a single central database user to own all application tables. Please review application mapping to see the actual users connecting to the database. Example apps 4
5 <app>_os_users object type = osuser This group should contain the list of OS users that the application server is running with (in the case of a three-tier application) or a list of allowed OS users in client server architecture. Please review application mapping to see the actual users connecting to the database. Example local_system, oracle_ias <app>_db_admins object type = user This group should contain application-specific administrative accounts in the database. Example apps_admin <app>_os_admins object type = osuser This group should contain application-specific OS users that have administrative privileges in the database. The group can be populated by integrating with Active Directory or LDAP and pointing to the security group the application DBAs are part of. Example oracle, joe, john, jane <app>_sensitive_objects object type = object This group should contain the list of sensitive objects that should be given extra protection. Such objects are usually either tables containing sensitive data (PII, CC) or stored program units used for encryption/ decryption of sensitive data. The group can be populated by running vulnerability manager scans and performing data discovery. Example customers, cc_table, encryption_pkg <app>_end_user_administrators object type = clientid This group should contain a list of end-user application administrative accounts. It can be used either if the application is setting the client_identifier database field or by taking advantage of the McAfee Database Activity Monitoring Identifier application plug-in to propagate application end users into the database. Example joe, john, jane <app>_admin_module object type = module This group should contain a list of administrative modules in the application. If the application passes the module to the database, you can use this group. Alternatively, you can take advantage of the Database Activity Monitoring Identifier application plug-in to propagate application modules into the database. Example admin, account 5
6 Recommended Rules The following paragraph will specify custom rules that an organization is advised to create to protect its databases. It is recommended that several database groups be created and that the rules be applied to the relevant groups. Examples for such groups are test, staging, and production so that rules will first be applied to the test databases then to staging and then to production. Also, if there are several databases for specific applications, it is recommended that groups be created for them as well. Please note that the following rules should be viewed as recommendations and will probably require refinement for each organization. It is also recommended that rules be created with an initially lower alert level than what s specified below for the first three months (as you are learning about all the applications that connect to the database) and then tighten app the configuration with higher level alerts after the initial refinement. For each rule, we specify rule name in the title, the actual rule text in quotes and the recommended level of alert. Generic rules The following rules should be applied across all the databases (starting from the test group and gradually moving to production). They contain recommended generic protections to restrict access to administrative accounts and to alert on unusual activities in the database. Restrict admin access Rule = user = $admin_db_usernames and (ip not in $admin_ips or osuser not in $admin_os_ usernames) Alert on suspect programs Rule = application contains $suspect_programs or module contains $suspect_modules Alert = Medium Alert on suspect activity Rule = weekday not in $work_days or hour not in $work_hours Alert = Low DDL/DCL activity Rule = cmdtype contains $ddl_cmdtypes and cmdtype <> alter session or cmdtype contains $dcl_ cmdtypes Alert = Low Suspicious activities The rule will catch access to dictionary views to help catch someone doing reconnaissance. Syntax here is Oracle-specific, but similar rules can be applied to other databases. Rule = object in ( user_users, user_tables, user_tab_cols, user_sys_privs, user_role_privs, user_ tab_privs, all_users, all_tables, all_tab_cols, all_sys_privs, all_role_privs, all_tab_privs, dba_users, dba_tables, dba_tab_cols, dba_sys_privs, dba_role_privs, dba_tab_privs ) Alert = Low 6
7 Application-specific rules The following rules should be applied per application. As with the previous section, it is recommended to apply them to the test databases first and move gradually to the production. Restrict access to <app> Rule = user in $app_db_users and (application not in $<app>_allowed_programs or module not in $<app>_allowed_modules or ip not in $<app>_allowed_ips or osuser not in $<app>_os_users) Alert = Medium Protect <app> sensitive objects Rule = object in $<app>_sensitive_objects and (user not in $<app>_db_users or application not in $<app>_allowed_programs or module not in $<app>_allowed_modules or ip not in $<app>_allowed_ ips or osuser not in $<app>_os_users) Restrict <app> administrators Rule = user in $app_db_admins and osuser not in $app_os_admins Restrict <app> admin modules Rule = module in $<app>_admin_modules and clientid not in $<app>_end_user_administrators Restrict <app> sensitive table access Rule = object in $<app>_sensitive_objects and statement not contains where Summary Need more information? For technical support and detailed product documentation, please visit the McAfee Support Service Portal. In addition, you can find valuable knowledge posted by members of McAfee s user community here. 7
8 Disclaimer: These recommendations for rule objects and rules will require some refinement for each implementation of McAfee Database Activity Monitoring Mission College Boulevard Santa Clara, CA McAfee and the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2012 McAfee, Inc gde_dam_0912_fnl_ETMG
McAfee Certified Product Specialist McAfee epolicy Orchestrator
McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives
McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.
McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Power, Patch, and Endpoint Managers Expand McAfee epo Platform Capabilities While Cutting Endpoint Costs
Business Brief Power, Patch, and Endpoint Managers Expand McAfee epo Platform Capabilities While Cutting Endpoint Costs McAfee Compatible Solution Autonomic Software Endpoint Manager 1.2 and McAfee epo
McAfee Web Reporter Turning volumes of data into actionable intelligence
McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access
What s New in AppliDis Fusion 4 Service Pack 1
What s New in AppliDis Fusion 4 Service Pack 1 Systancia Published: September 2010 Summary The new AppliDis Fusion 4 Service Pack 1 version introduces significant new developments to the AppliDis product
NTP Software File Reporter Analysis Server
NTP Software File Reporter Analysis Server Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for installing NTP Software File Reporter Analysis Server from an administrator
Data Collection Agent for NAS EMC Isilon Edition
Data Collection Agent for NAS EMC Isilon Edition Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for the installation of Data Collection Agent for NAS, EMC Isilon
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Data Collection Agent for Active Directory
Data Collection Agent for Active Directory Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for the installation of Data Collection Agent Active Directory, from an
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
Obtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
McAfee Certified Assessment Specialist Network
McAfee Certified Assessment Specialist Network Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 4 Recommended Exam Preparation 4 Exam Objectives 4 Sample
Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
McAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
Parallels Mac Management v4.0
Parallels Mac Management v4.0 Deployment Guide July 18, 2015 Copyright 1999 2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. All other marks and names mentioned herein may be trademarks
Security Analysis. Spoofing Oracle Session Information
November 12, 2006 Security Analysis Spoofing Oracle Session Information OVERVIEW INTRODUCTION Oracle Database session information includes database user name, operating system user name, host, terminal,
GOOD PRACTICE GUIDE 13 (GPG13)
GOOD PRACTICE GUIDE 13 (GPG13) GPG13 - AT A GLANCE Protective Monitoring (PM) is based on Good Practice Guide 13 Comprises of 12 sections called Proactive Monitoring Controls 1-12 Based on four Recording
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
DEPLOYMENT ROADMAP March 2015
DEPLOYMENT ROADMAP March 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may
Enterprise Vault 11 Feature Briefing
Enterprise Vault 11 Feature Briefing Enterprise Vault SCOM Enhancements This document is about the new Enterprise Vault SCOM enhancements introduced in Enterprise Vault 11. If you have any feedback or
Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004
Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory
McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
SapphireIMS Business Service Monitoring Feature Specification
SapphireIMS Business Service Monitoring Feature Specification All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission
An Oracle White Paper March 2009. Integrating Microsoft SharePoint Server With Oracle Virtual Directory
An Oracle White Paper March 2009 Integrating Microsoft SharePoint Server With Oracle Virtual Directory Oracle White Paper Integrating Microsoft SharePoint Server With Oracle Virtual Directory Disclaimer
White Paper. McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention
White Paper McAfee Real-Time Monitoring, Auditing, and Intrusion Prevention Table of Contents Introduction 3 Existing Components of Security 3 Authentication and access control 3 Native database audit
Version 9. Active Directory Integration in Progeny 9
Version 9 Active Directory Integration in Progeny 9 1 Active Directory Integration in Progeny 9 Directory-based authentication via LDAP protocols Copyright Limit of Liability Trademarks Customer Support
TelePresence Migrating TelePresence Management Suite (TMS) to a New Server
TelePresence Migrating TelePresence Management Suite (TMS) to a New Server THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
Verax Service Desk Installation Guide for UNIX and Windows
Verax Service Desk Installation Guide for UNIX and Windows March 2015 Version 1.8.7 and higher Verax Service Desk Installation Guide 2 Contact Information: E-mail: [email protected] Internet: http://www.veraxsystems.com/
Password Management. Password Management Guide HMS 9700
Password Management Password Management Guide HMS 9700 Hospitality Management Systems Purpose of document In certain cases Micros-Fidelio will return the responsibility of maintaining user passwords, including
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
McAfee Endpoint Encryption Manager
McAfee Endpoint Encryption Manager Product Release Notes Version 5.2.6 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 Internet: www.mcafee.com Document:
Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time
Technology Blueprint Assess Your Vulnerabilities Maintain a continuous understanding of assets and manage vulnerabilities in real time LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1
Oracle Database Security Myths
Oracle Database Security Myths December 13, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation About Integrigy ERP Applications
Oracle Enterprise Manager
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory Release 12.1.0.1.0 E28548-04 February 2014 Microsoft Active Directory, which is included with Microsoft
DocAve for Office 365 Sustainable Adoption
DocAve for Office 365 Sustainable Adoption Quick Start Guide Issued October 2015 1 Table of Contents Submitting Documentation Feedback to AvePoint... 3 1. Request a DocAve License from AvePoint... 4 2.
FileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
McAfee Server Security
Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or
White Paper. PCI Guidance: Microsoft Windows Logging
PCI Guidance: Microsoft Windows Logging Table of Contents Introduction...3 This white paper was written by: Cayce Beames, CISSP, QSA, Technical Practice Director, Strategic Services, Intel Security Preparation
White Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010
Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
Centrify Identity Service and Mac - Online Training
C E N T R I F Y D A T A S H E E T M A R C H 2015 Centrify Identity Service and Mac - Online Training Overview This course is designed for administrators of the Centrify User Suite and mobile devices. At
NovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
Installation Guide. Tech Excel January 2009
Installation Guide Tech Excel January 2009 Copyright 1998-2009 TechExcel, Inc. All Rights Reserved. TechExcel, Inc., TechExcel, ServiceWise, AssetWise, FormWise, KnowledgeWise, ProjectPlan, DownloadPlus,
Netop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
Auditing Data Access Without Bringing Your Database To Its Knees
Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda
How To Manage Em Sourceone In Windows Exchange
Using LDAP to Optimize EMC SourceOne Administration in Microsoft Exchange Environments Best Practices Planning Abstract EMC SourceOne administration requirements can significantly benefit from employing
Intel Storage System SSR212CC Enclosure Management Software Installation Guide For Red Hat* Enterprise Linux
Intel Storage System SSR212CC Enclosure Management Software Installation Guide For Red Hat* Enterprise Linux Order Number: D58855-002 Disclaimer Information in this document is provided in connection with
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
Managing BlackBerry Enterprise Service 10 version 10.2
Managing BlackBerry Enterprise Service 10 version 10.2 Course details Course code 726-08882-123 Approximate duration Labs 3 days Labs are included in this course Course overview This course explains how
Configuration Guide. for the Lepide User Password Expiration Reminder
2015 Configuration Guide Follow the simple steps given in this document when you are going to run Lepide User Password Expiration Reminder for the first time. Configuration Guide for the Lepide User Password
Email Encryption Made Simple
White Paper For organizations large or small Table of Contents Who Is Reading Your Email? 3 The Three Options Explained 3 Organization-to-organization encryption 3 Secure portal or organization-to-user
Application Monitoring for SAP
Application Monitoring for SAP Detect Fraud in Real-Time by Monitoring Application User Activities Highlights: Protects SAP data environments from fraud, external or internal attack, privilege abuse and
SapphireIMS 4.0 BSM Feature Specification
SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams
Installing Sage SalesLogix on Microsoft Windows 8, Windows Server 2012, and Internet Explorer 10 Version 8.0.0.02 Developed by Sage SalesLogix User
Installing Sage SalesLogix on Microsoft Windows 8, Windows Server 2012, and Internet Explorer 10 Version 8.0.0.02 Developed by Sage SalesLogix User Assistance Installing Sage SalesLogix on Microsoft Windows
Application Note. Intelligent Application Gateway with SA server using AD password and OTP
Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
OpenText Media Management Audit Module FAQ
OpenText Media Management Audit Module FAQ Collect valuable metrics, analytics, and information about your OpenText Media Management system Introduction Audit capability is a must-have for next-generation
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
IBM Tivoli Network Manager V3.9
IBM Tivoli Network Manager V3.9 Architecture and configuration for shared and replicated NCIM 2013 IBM Corporation IBM Tivoli Network Manager V3.9, Architecture and configuration for shared and replicated
TECHNICAL NOTES. Technical Notes P/N 300-999-663 REV 01
TECHNICAL NOTES Protecting Virtual Machine Manager Environments by Using EMC NetWorker Module for Microsoft Applications Release 2.4 SP1 Technical Notes P/N 300-999-663 REV 01 January 30, 2013 These technical
Intel Security Certified Product Specialist McAfee Network Security Platform (NSP)
Intel Security Certified Product Specialist McAfee Network Security Platform (NSP) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking for
Centrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
Release Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
Application Performance Monitoring for WhatsUp Gold v16.1 Getting Started Guide
Application Performance Monitoring for WhatsUp Gold v16.1 Getting Started Guide Introduction to WhatsUp Gold APM Welcome to APM APM monitors applications across multiple devices, servers, and systems,
CommVault Simpana Archive 8.0 Integration Guide
CommVault Simpana Archive 8.0 Integration Guide Data Domain, Inc. 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 Version 1.0, Revision B September 2, 2009 Copyright 2009
AvePoint Record Rollback 3.1.2 for Microsoft Dynamics CRM
AvePoint Record Rollback 3.1.2 for Microsoft Dynamics CRM Installation and Configuration Guide Revision F Issued April 2014 1 Table of Contents Overview... 3 Obtaining the Record Rollback Solution Package...
McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course
McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course The McAfee University Application Control / Change Control Administration course enables
Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4
Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is
FileMaker Security Guide
TECH BRIEF FileMaker Security Guide The Key to Securing Your Solutions Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5
An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance
An Oracle Technical White Paper May 2015 How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing Kaspersky
Symantec ESM Agent For IBM iseries AS/400
Symantec ESM Agent For IBM iseries AS/400 Version 6.5 Release Notes Legal Notice Copyright 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Symantec Enterprise Security
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
Oracle Audit Vault Administrator s Guide Oracle Audit Vault Auditor s Guide Oracle Enterprise Manager Cloud Control Administrator s Guide
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Oracle Audit Vault Release 12.1 (12.1.0.2.0) E26595-02 September 2012 Oracle Audit Vault is used to transparently collect and
An Oracle White Paper September 2013. Oracle WebLogic Server 12c on Microsoft Windows Azure
An Oracle White Paper September 2013 Oracle WebLogic Server 12c on Microsoft Windows Azure Table of Contents Introduction... 1 Getting Started: Creating a Single Virtual Machine... 2 Before You Begin...
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
IBM WebSphere Application Server Communications Enabled Applications
IBM WebSphere Application Server Communications Enabled Applications Configuring a CEA environment 2011 IBM Corporation This presentation describes how to configure a WebSphere Application Server environment
An Oracle White Paper March 2012. Managing Metadata with Oracle Data Integrator
An Oracle White Paper March 2012 Managing Metadata with Oracle Data Integrator Introduction Metadata information that describes data is the foundation of all information management initiatives aimed at
NTP Software VFM Administration Web Site for Azure
NTP Software VFM Administration Web Site for Azure Installation Guide Version 5.1 This guide provides quick instructions for the installation of NTP Software VFM Administration Web Site, from an administrator
Infor SyteLine Integration Guide for Infor Factory Track
Infor SyteLine Integration Guide for Infor Factory Track Copyright 2014 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and contains
High Availability And Disaster Recovery
High Availability And Disaster Recovery Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID,
Spotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
IBM Tivoli Provisioning Manager V 7.1
IBM Tivoli Provisioning Manager V 7.1 Preparing for patch management in a small environment 2011 IBM Corporation Welcome to the training module for Tivoli Provisioning Manager version 7.1, preparing for
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
McAfee Security Information Event Management (SIEM) Administration Course 101
McAfee Security Information Event Management (SIEM) Administration Course 101 Intel Security Education Services Administration Course The McAfee SIEM Administration course from McAfee Education Services
How to Audit the Top Ten E-Business Suite Security Risks
In-Source Your IT Audit Series How to Audit the Top Ten E-Business Suite Security Risks February 28, 2012 Jeffrey T. Hare, CPA CISA CIA Industry Analyst, Author, Consultant ERP Risk Advisors Stephen Kost
Banner overview. Authentication to Banner & 3 rd Party Apps. Authorization to Banner & 3 rd Party Apps
Banner overview Authentication to Banner & 3 rd Party Apps Authorization to Banner & 3 rd Party Apps 1 Section 1 Higher Education Enterprise Resource Planning (ERP) system. Original vendor SunGard Higher
PowerBroker for Windows
PowerBroker for Windows Desktop and Server Use Cases February 2014 1 Table of Contents Introduction... 4 Least-Privilege Objectives... 4 Least-Privilege Implementations... 5 Sample Regulatory Requirements...
LANDESK Service Desk. Supported Platforms and Feature Compatibility
LANDESK Service Desk Supported Platforms and Feature Compatibility LANDESK SERVICE DESK SUPPORTED PLATFORMS This document contains information, which is the confidential information and/or proprietary
WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
An Oracle White Paper February 2014. Oracle Data Integrator 12c Architecture Overview
An Oracle White Paper February 2014 Oracle Data Integrator 12c Introduction Oracle Data Integrator (ODI) 12c is built on several components all working together around a centralized metadata repository.
TIBCO ActiveMatrix BusinessWorks Plug-in for Microsoft SharePoint Release Notes
TIBCO ActiveMatrix BusinessWorks Plug-in for Microsoft SharePoint Release Notes Software Release 6.0.0 May 2014 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
