Security Support in Mobile Platforms (part I) Vincent Naessens - MSEC

Size: px
Start display at page:

Download "Security Support in Mobile Platforms (part I) Vincent Naessens - MSEC"

Transcription

1 Security Supprt in Mbile Platfrms (part I) Vincent Naessens - MSEC

2 Security Mechanisms in Mbile Platfrms 1. Platfrm Supprt fr Data and Credential Prtectin 2. App Distributin 3. App Islatin 4. Mbile Device Management

3 Mbile Device Encryptin Systems 1. Different appraches t encrypt assets File encryptin vs file system encryptin Key derivatin mechanisms 2. Different cnfiguratin strategies Develper cnfiguratin End user r MDM cnfiguratin 3. Different strategies applied by app develpers Rely n platfrm security functins Develpment f prprietary slutins

4 Key Derivatin Mdule user input secure element KDF Encryptin Mdule Carse grained encryptin Fine grained encryptin file system keystre

5 Assumptins and attack scenaris Assumptins 1. Cryptgraphic algrithms are crrectly implemented 2. Stlen device is nt jailbreaked/rted yet 3. Attacker steals with gal t retrieve data, and is security expert Attack scenaris 1. Attacks n the encryptin system 2. Attacks n the key derivatin mechanism 3. Attacks n unfeasible cnfiguratin r weak develpment Key Derivatin Mdule user input secure element KDF Carse grained encryptin Encryptin Mdule Fine grained encryptin file system keystre

6

7 The Andrid encryptin system Key Derivatin Mdule user input KDF Encryptin Mdule Carse grained encryptin file system keystre

8 The Andrid encryptin system Encryptin system file system encryptin based n dm-crypt in Linux kernel keychain encrypted with AES key sme vendrs have extended Andrid functinality t supprt encryptin f external strage media Key derivatin PIN/passcde cmbined with salt PBKDF2 (i.e. repeating SHA1 many times) 128 bit AES key used t decrypt master key Offline attacks are pssible!!!

9 The Andrid encryptin system Cnfiguratin ptins and develper decisins User (BYOD) r administratr (MDM) file system encryptin is nt enabled by default Length f passwrd r PIN impact n security MDM can enfrce minimum passwrd lenghts Applicatin develpers Needs t decide where t stre cnfidential data May nt assume that users cnfigure device well

10 The ios encryptin system Key Derivatin Mdule secure element KDF Key Derivatin Mdule user input secure element KDF Encryptin Mdule Carse grained encryptin Encryptin Mdule Fine grained encryptin file system keystre file system keystre

11 The ios encryptin system ios Hardware Security Features Every ios device has AES256 crypt engine in DMA path between flash strage and RAM UID en GID are 256 bit AES keys fused in applicatin prcessr N direct access by SW r firmware Keys cannt be tampered All ther keys are generated by RNG based n Yarrw

12 The ios encryptin system Encryptin system File system encryptin system (since ios 3.x) File system encryptin with EMF key EMF key is encrypted by UID that is stred in secure element Offline attacks are very hard!!! Decryptin pssible by jailbreaking/rting device!!! Data Prtectin API (since ios 4) Encryptin based n prtectin classes defined by develpers Prtectin class defines when encryptin keys are available - File prtectin NSFilePrtectin - KeyChain prtectin ksecattaccessible

13 The ios encryptin system NSFilePrtectin ksecattraccessible Nne Always N file prtectin Cmplete WhenUnlcked Keys available until device is lcked UntilFirstUserAuth AfterFirstUnlck Keys available until shutdwn CmpleteUnlessOpen --- Keys available as lng as files are pen Secure element and passcde required except fr Nne and Always Remark: KeyChain prtectin classes DeviceOnly versin: keys cannt be transferred t backups

14 The ios encryptin system Key derivatin File system encryptin system Attack by jailbreaking, key derivatin nt relevant Data Prtectin system PBKDF2 with input based n passwrd, UID key and salt time SHA (90 msec per trial) - 6 character alphanumeric passcde 5,5 years t try all cmbinatins - 9 digit passcde 2,5 years t try all cmbinatins Brute frce attack is slwed dwn Brute frce attack cannt be perfrmed ffline

15 The ios encryptin system Key derivatin different security level fr backups PBKDF2 functin is used but n UID invlved Hence, ffline attacks are pssible Hw t attack backup n itunes device? Unencrypted backup cpy whle backup Encrypted backup brute frce attack (ffline)

16 The ios encryptin system Cnfiguratin/develper File system based encryptin system enabled by default Data prtectin system is activated if: 1. Device passcde is set 2. Develper has chsen crrect prtectin classes fr app files Rule 1: select high cmplexity class f passcde pwd length, screen lck, time-uts, Rule 2: cnfigure gd backup ptins Encrypted versus plain backups n itunes Activating/deactivating itunes/iclud backups Strength f passcde is imprtant!

17 The ios encryptin system Cnfiguratin/develper Develpers influences vital aspects f encryptin system security 1. Specifies prtectin classes fr files and KeyChain entries NSFilePrtectin ksecattraccessible Nne Always N file prtectin Cmplete WhenUnlcked Keys available until device is lcked UntilFirstUserAuth AfterFirstUnlck Keys available until shutdwn CmpleteUnlessOpen --- Keys available as lng as files are pen 2. Decides whether a file is included in itunes/iclud backup - Backup flags (kcfurlisexcludedfrmbackupkey)

18 Prtectin f keychain items defined by ios

19 ios passcde and lck cnfiguratin

20 Lessns learnt Decrypting files and credentials in the Andrid Platfrm Master secret is encrypted with key based n passcde Offline brute-frce attack t reveal passcde pssible N file system encryptin by default Decrypting files and credentials in the ios Platfrm Security based n passcde and secure element Offline brute-frce attacks are hard feasible develper and cnfiguratin ptins are crucial

21 Lessns learnt ios platfrm ffers a better level f prtectin KDF based n passcde & secure element High security level can be achieved if right decisins are taken Develper: prtectin classes + backup flags User/administratr: passcde cmplexity + backup ptins Prblem: user/administratr d nt knw if right develpment ptins are taken

22 Security Mechanisms in Mbile Platfrms 1. Platfrm Supprt fr Data and Credential Prtectin 2. App Distributin 3. App Islatin 4. Mbile Device Management

23 2. App Distributin Andrid Marketplace Little applicatin vetting Pssible t install apps utside Ggle Play Apps are asking t much privileges Apple App Stre Strng identificatin f app develpers Static analysis f binaries Little app permissins shwn t users

24 3. App Islatin Sandbxing Each app runs with a distinct system identity N peratins allwed that wuld impact ther apps Each app is installed in its wn cntainer Malicius app is limited t that cntainer Permissins/entitlements Little cntrl n permissins Permissins are displayed t user at install time Sharing data thrugh external strage Larger cntrl n permissins Very little app permissins shwn t users N SD cards allwed

25 4. Mbile Device Management Mbile Device Management 1. Remte wiping 2. Plicy enfrcement Ggle Apps Device Plicy (full MDM) FindMyPhne (remte wipe + find lst device)

26 references 1. Peter Teufl, Thmas Zefferer, Christf Strmberger - "Mbile Device Encryptin Systems" - 28th IFIP TC-11 SEC 2013 Internatinal Infrmatin Security and Privacy Cnference 2. Andrid vs. Apple ios Security Shwdwn Tm Estn 3. ios Security, May Apple ios 4 Security Evaluatin Din A. Dai Zvi 5. Lst iphne? Lst Passwrds! Practical Cnsideratin f ios Device Encryptin Security Jens Heider, Matthias Bll 6. Ggle Andrid: A Cmprehensive Security Assessment - Shabtai, A., Fledel, Y., Kannv, U., Elvici, Y., Dlev, S., Glezer, C.

Developing secure applications for Windows Phone. SecureApps user group meeting 12/11/2014

Developing secure applications for Windows Phone. SecureApps user group meeting 12/11/2014 Develping secure applicatins fr Windws Phne SecureApps user grup meeting 12/11/2014 2 Overview Intrductin Windws n mbile devices Windws (Phne) 8.1 architecture Silverlight-based vs. WinRT-based apps WP

More information

Securely Managing Cryptographic Keys used within a Cloud Environment

Securely Managing Cryptographic Keys used within a Cloud Environment Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta [email protected] 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin

More information

Mobile Deployment Guide For Apple ios

Mobile Deployment Guide For Apple ios Fr Apple ios Cpyright This dcument is prtected by the United States cpyright laws, and is prprietary t Zscaler Inc. Cpying, reprducing, integrating, translating, mdifying, enhancing, recrding by any infrmatin

More information

Cloud Services MDM. Windows 8 User Guide

Cloud Services MDM. Windows 8 User Guide Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad

More information

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: [email protected],

More information

Integrating With incontact dbprovider & Screen Pops

Integrating With incontact dbprovider & Screen Pops Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint

More information

iphone Mobile Application Guide Version 2.2.2

iphone Mobile Application Guide Version 2.2.2 iphne Mbile Applicatin Guide Versin 2.2.2 March 26, 2014 Fr the latest update, please visit ur website: www.frte.net/mbile Frte Payment Systems, Inc. 500 West Bethany, Suite 200 Allen, Texas 75013 (800)

More information

Addressing Mobile Device Security and Management Requirements in the Enterprise

Addressing Mobile Device Security and Management Requirements in the Enterprise White Paper Addressing Mbile Device Security and Management Requirements in the Enterprise By Jn Oltsik Octber, 2010 This ESG White Paper was cmmissined by Juniper Netwrks and is distributed under license

More information

WatchDox Server Administrator's Guide

WatchDox Server Administrator's Guide WatchDx Server Administratr's Guide Versin 4.0.0 Cnfidentiality This dcument cntains cnfidential material that is prprietary WatchDx. The infrmatin and ideas herein may nt be disclsed t any unauthrized

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

RSA SecurID Software Token Security Best Practices Guide. Version 3

RSA SecurID Software Token Security Best Practices Guide. Version 3 RSA SecurID Sftware Tken Security Best Practices Guide Versin 3 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA, the RSA Lg

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

MaaS360 for Mobile Devices

MaaS360 for Mobile Devices MaaS360.cm MaaS360 fr Mbile Devices Getting the Mst Guide MaaS360.cm Cpyright 2013 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline

More information

CryptoMate64. USB Cryptographic Token. Technical Specifications V1.03. Subject to change without prior notice. [email protected] www.acs.com.

CryptoMate64. USB Cryptographic Token. Technical Specifications V1.03. Subject to change without prior notice. info@acs.com.hk www.acs.com. CryptMate64 USB Cryptgraphic Tken Technical Specificatins V1.03 Subject t change withut prir ntice [email protected] www.acs.cm.hk Table f Cntents 1.0. Intrductin... 3 2.0. Features... 4 2.1. Cryptgraphic

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

Zimbra Professional Services Portfolio, Purchasing Guide & Price List

Zimbra Professional Services Portfolio, Purchasing Guide & Price List In- Tuitin Netwrks Ltd Zimbra Prfessinal Services Prtfli, Purchasing Guide & Price List This dcument prvides an verview f In- Tuitin Netwrks Limited s range f Zimbra Prfessinal Services available n the

More information

CareLink Connectivity Options Introduction and Comparison Updated June 2013

CareLink Connectivity Options Introduction and Comparison Updated June 2013 CareLink Cnnectivity Optins Intrductin and Cmparisn Updated June 2013 There are fur cnnectivity ptins available fr CareLink, each f which has certain advantages and disadvantages. It is imprtant t think

More information

1)What hardware is available for installing/configuring MOSS 2010?

1)What hardware is available for installing/configuring MOSS 2010? 1)What hardware is available fr installing/cnfiguring MOSS 2010? 2 Web Frnt End Servers HP Prliant DL 380 G7 2 quad cre Intel Xen Prcessr E5620, 2.4 Ghz, Memry 12 GB, 2 HP 146 GB drives RAID 5 2 Applicatin

More information

Why Can t Johnny Encrypt? A Usability Evaluation of PGP 5.0 Alma Whitten and J.D. Tygar

Why Can t Johnny Encrypt? A Usability Evaluation of PGP 5.0 Alma Whitten and J.D. Tygar Class Ntes: February 2, 2006 Tpic: User Testing II Lecturer: Jeremy Hyland Scribe: Rachel Shipman Why Can t Jhnny Encrypt? A Usability Evaluatin f PGP 5.0 Alma Whitten and J.D. Tygar This article has three

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8 McAfee Enterprise Security Manager Data Surce Cnfiguratin Guide Data Surce: Infblx NIOS September 2, 2014 Infblx NIOS Page 1 f 8 Imprtant Nte: The infrmatin cntained in this dcument is cnfidential and

More information

Attunity RepliWeb SSL Guide

Attunity RepliWeb SSL Guide Attunity RepliWeb SSL Guide Sftware Versin 5.2 June 25, 2012 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: [email protected], Supprt: http://supprt.repliweb.cm

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

NEC CLOUD STORAGE. User Guide. Version: R03.1

NEC CLOUD STORAGE. User Guide. Version: R03.1 NEC CLOUD STORAGE User Guide Versin: R03.1 2013 1 INTRODUCTION... 5 1.1 GOALS OF THIS DOCUMENT... 5 1.2 TERMS, ACRONYMS AND ABBREVIATIONS... 5 2 INTRODUCTION TO NEC CLOUD STORAGE... 6 2.1 WHAT IS NEEDED

More information

Configuring SSL and TLS Decryption in ngeniusone

Configuring SSL and TLS Decryption in ngeniusone Cnfiguring SSL and TLS Decryptin in ngeniusone The cnfigure SSL Decryptin feature supprts real-time capture f ASI and ASR traffic flws as well as decding f Secure Scket Link (SSL) and Transprt Layer Security

More information

EA-POL-015 Enterprise Architecture - Encryption Policy

EA-POL-015 Enterprise Architecture - Encryption Policy Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

FO and OTHER FOES - A Guide to Cmmerce

FO and OTHER FOES - A Guide to Cmmerce FO FED DEATED IDENTITY ELEASE NOTES ELEASE 3.2 April 18, 2012 FO FEDEATED IDENTITY ELEASE NOTES Cpyright Infrmatin The infrmatin cntained herein is the cnfidential and prprietary prperty f IP Cmmerce,

More information

Restricted Document. Pulsant Technical Specification

Restricted Document. Pulsant Technical Specification Pulsant Technical Specificatin Title Pulsant Dedicated Server Department Prduct Develpment Cntributrs RR Classificatin Restricted Versin 1.0 Overview Pulsant ffer a Dedicated Server service t underpin

More information

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite CISP/PCI Implementatin Guidance fr Odyssey Suite Applicable Applicatin Versin This dcument supprts the fllwing applicatin versin: Odyssey Suite Versin 2.0 Intrductin Systems which prcess payment transactins

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Ten Steps for an Easy Install of the eg Enterprise Suite

Ten Steps for an Easy Install of the eg Enterprise Suite Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

This guide is intended for administrators, who want to install, configure, and manage SAP Lumira, server for BI Platform

This guide is intended for administrators, who want to install, configure, and manage SAP Lumira, server for BI Platform Hw T install SAP Lumira, server n SAP BusinessObjects BI platfrm Distributed Install Applies t: SAP Lumira, server versin fr the SAP BusinessObjects BI platfrm Summary This guide is intended fr administratrs,

More information

Using PayPal Website Payments Pro UK with ProductCart

Using PayPal Website Payments Pro UK with ProductCart Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...

More information

Tips & Tricks. Table of Contents. Browser Update - WebEx Plugin. Updated Global Access Numbers

Tips & Tricks. Table of Contents. Browser Update - WebEx Plugin. Updated Global Access Numbers Tips & Tricks Table f Cntents Brwser Update - WebEx Plugin... 1 Updated Glbal Access Numbers... 1 WebEx Prfile Settings (Time zne, Email )... 2 Hsting a successful WebEx call with Vide... 2 Using the WebEx

More information

Telelink 6. Installation Manual

Telelink 6. Installation Manual Telelink 6 Installatin Manual Table f cntents 1. SYSTEM REQUIREMENTS... 3 1.1. Hardware Requirements... 3 1.2. Sftware Requirements... 3 1.2.1. Platfrm... 3 1.2.1.1. Supprted Operating Systems... 3 1.2.1.2.

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Magenta HR in partnership with breath ehr

Magenta HR in partnership with breath ehr BREATHEHR ONLINE HR SYSTEM AND PORTAL Magenta HR in partnership with breath ehr Magenta HR Cnsulting Ltd. 24 Canning Street, Edinburgh EH3 8EG Tel. 0131 2272769 www.magentahr.cm [email protected] 6 December

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Getting started with Android

Getting started with Android Getting started with Andrid Befre we begin, there is a prerequisite, which is t plug the Andrid device int yur cmputer, and lad the drivers fr the OS. In writing this article, I was using Windws XP, 7

More information

CSC IT practix Recommendations

CSC IT practix Recommendations CSC IT practix Recmmendatins CSC Healthcare 28th January 2014 Versin 3 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins

More information

X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips

X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips X7500 Series, X4500 Scanner Series MFPs: LDAP Address Bk and Authenticatin Cnfiguratin and Basic Trubleshting Tips Lexmark Internatinal 1 Prerequisite Infrm atin In rder t cnfigure a Lexmark MFP fr LDAP

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U

More information

Instant Chime for IBM Sametime Quick Start Guide

Instant Chime for IBM Sametime Quick Start Guide Instant Chime fr IBM Sametime Quick Start Guide Fall 2014 Cpyright 2014 Instant Technlgies. All rights reserved. Cpyright and Disclaimer This dcument, as well as the sftware described in it, is furnished

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

RSA Authentication Manager 5.2 and 6.1 Security Best Practices Guide. Version5

RSA Authentication Manager 5.2 and 6.1 Security Best Practices Guide. Version5 RSA Authenticatin Manager 5.2 and 6.1 Security Best Practices Guide Versin5 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA,

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

Aladdin HASP SRM Key Problem Resolution

Aladdin HASP SRM Key Problem Resolution Aladdin HASP SRM Key Prblem Reslutin Installatin flwchart fr EmbrideryStudi and DecStudi e1.5 Discnnect frm the Internet and disable all anti-virus and firewall applicatins. Unplug all dngles. Insert nly

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

Bitrix Intranet. Product Requirements

Bitrix Intranet. Product Requirements Bitrix Intranet Prduct Requirements Bitrix Intranet: Prduct Requirements Bitrix Intranet is a highly secure, turnkey intranet slutin fr small and medium-sized businesses designed fr effective cllabratin,

More information

Valley Transcription Service I-Phone/I-Pod App User s Guide

Valley Transcription Service I-Phone/I-Pod App User s Guide 541-926-4194 Valley Transcriptin Service I-Phne/I-Pd App User s Guide (Fr use with iphne/ipad/i-pd Tuch) Page 0 Table f Cntents Table f Cntents... i Intrductin... 1 Requirements... 1 1. 2. 3. Installing

More information

Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents

Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents Level 1 Technical RealPresence Web Suite and Web Suite Pr Cntents 1 - Glssary... 2 2 Features... 3 RealPresence Platfrm integratin... 3 RealPresence Web Suite Sftware... 3 Sftware Keys... 3 3 - Web Client

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

Configuring and Monitoring Network Elements

Configuring and Monitoring Network Elements Cnfiguring and Mnitring Netwrk Elements eg Enterprise v5.6 Restricted Rights Legend The infrmatin cntained in this dcument is cnfidential and subject t change withut ntice. N part f this dcument may be

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

Configuring and Monitoring AS400 Servers. eg Enterprise v5.6

Configuring and Monitoring AS400 Servers. eg Enterprise v5.6 Cnfiguring and Mnitring AS400 Servers eg Enterprise v5.6 Restricted Rights Legend The infrmatin cntained in this dcument is cnfidential and subject t change withut ntice. N part f this dcument may be reprduced

More information

BackupAssist SQL Add-on

BackupAssist SQL Add-on WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system

More information

Strategies for Embracing Consumerization

Strategies for Embracing Consumerization Strategies fr Embracing Cnsumerizatin Micrsft Crpratin Published: April 2011 Abstract Increasingly, wrkers want t use their wn devices, such as slates, smartphnes, and prtable cmputers, fr wrk. Fr IT t

More information

Connecting to Email: Live@edu

Connecting to Email: Live@edu Cnnecting t Email: Live@edu Minimum Requirements fr Yur Cmputer We strngly recmmend yu upgrade t Office 2010 (Service Pack 1) befre the upgrade. This versin is knwn t prvide a better service and t eliminate

More information

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure

More information

Solution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise

Solution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise Slutin Brief Aerhive and Impulse Pwerful Netwrk Security fr Educatin and Enterprise Aerhive and Impulse Intrductin In tday s highly cnnected rganizatins, end users expect secure Wi-Fi access acrss the

More information

Mobile Workforce. Improving Productivity, Improving Profitability

Mobile Workforce. Improving Productivity, Improving Profitability Mbile Wrkfrce Imprving Prductivity, Imprving Prfitability White Paper The Business Challenge Between increasing peratinal cst, staff turnver, budget cnstraints and pressure t deliver prducts and services

More information

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers) Firewall/Prxy Server Settings t Access Hsted Envirnment Client firewall settings in mst cases depend n whether the firewall slutin uses a Stateful Inspectin prcess r ne that is cmmnly referred t as an

More information

Using McAllister Payment Solutions and Updating to AVImark version 2009.0.0.7263

Using McAllister Payment Solutions and Updating to AVImark version 2009.0.0.7263 Using McAllister Payment Slutins and Updating t AVImark versin 2009.0.0.7263 Befre the cnfiguratin f McAllister Payment Slutins (MPS) and AVImark, the McAllister Payment Slutins PA-DSS Implementatin Guide

More information

Fermilab Time & Labor Desktop Computer Requirements

Fermilab Time & Labor Desktop Computer Requirements Fermilab Time & Labr Desktp Cmputer Requirements Fermilab s new electrnic time and labr reprting (FTL) system utilizes the Wrkfrce Central prduct frm Krns. This system is accessed using a web brwser utilizing

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Click Studios. Passwordstate. RSA SecurID Configuration

Click Studios. Passwordstate. RSA SecurID Configuration Passwrdstate RSA SecurID Cnfiguratin This dcument and the infrmatin cntrlled therein is the prperty f Click Studis. It must nt be reprduced in whle/part, r therwise disclsed, withut prir cnsent in writing

More information

BASIC TECHNICAL FEATURE DESCRIPTION

BASIC TECHNICAL FEATURE DESCRIPTION BASIC TECHNICAL FEATURE DESCRIPTION AUDRIGA EMAIL AND GROUPWARE MIGRATION SERVICE Versin 1.3 Datum 20.09.2013 Kntakt Hans-Jörg Happel ([email protected]) TECHNICAL FEATURE DESCRIPTION This is a basic technical

More information

Exchanging Files Securely with Gerstco Using gpg4win Public Key Encryption

Exchanging Files Securely with Gerstco Using gpg4win Public Key Encryption Exchanging Files Securely with Gerstc Using gpg4win Public Key Encryptin Overview Visit the fllwing page n Gerstc s website t watch a vide verview f Public Key Encryptin: www.gerstc.cm/???? Initial Setup

More information

Cloud Services MDM. Device Management Admin Guide

Cloud Services MDM. Device Management Admin Guide Clud Services MDM Device Management Admin Guide 10/27/2014 CONTENTS Device Management... 2 Overview... 2 Dashbard Navigatin... 2 Dynamic Device List... 5 Device Cntrl Panel... 7 Device Infrmatin Menu...

More information

Sony Xperia Configurator User Instructions

Sony Xperia Configurator User Instructions Sny Xperia Cnfiguratr User Instructins This dcument is published by: Sny Mbile Cmmunicatins Inc., 1-8-15 Knan, Minat-ku, Tky 108-0075, Japan www.snymbile.cm Sny Mbile Cmmunicatins Inc., 2009-2014. All

More information