W H IT E P A P E R : TE C Symantec Endpoint Protection 11.0: H N Application and Device Control I C Technical Field Enablement Team A Version 1.
|
|
|
- Ezra Stevens
- 10 years ago
- Views:
Transcription
1 W H I T E P A P E R : T E C H N I C A L Symantec Endpoint Protection 11.0: Application and Device Control Technical Field Enablement Team Version 1.2
2 White Paper: Symantec Technical Content Table Content Introduction... 3 Audience... 3 Chapter One: Application control policy... 4 Creating an Application Control policy:... 4 Application Control Rule Sets... 5 Rules... 7 Conditions... 8 Common Mistakes Performances Chapter Two: Device control Policy Standard Devices Custom Device Chapter Three: Use cases for Application and device control Blocking Unwanted network interfaces / Dialup Allowing only corporate purchased USB keys Monitor Device ID centrally Harden Internet Explorer security against drive by downloads... 29
3 Introduction Device and Application Control is an advanced security feature included in Symantec Endpoint Protection This feature has two focuses, firstly Device and Application Control, provides administrators with the ability to monitor and/or control the behaviour of applications. Administrators can grant/deny access to certain registry keys, files, and folders. In addition, administrators can also define which applications are permitted to run, which applications that cannot be terminated through irregular processes, and which applications can call Dynamic Link Libraries. Secondly, Device and application controls can block and control peripherals connected to a SEP client. This gives administrators the flexibility to enable, disable and control access to removable storage and other peripherals. This document will focus on providing several examples on how to create Device and Application Control Policies to take full advantage of all the capabilities of this feature. Audience This document is aimed at administrators and product specialist with a working knowledge of Symantec Endpoint Protection The reference guide and other documentation provided on the CD are a pre requisite to fully benefit from this document.
4 Chapter One: Application control policy Application Control Policies can only be created and/or modified from the Symantec Endpoint Protection Admin console. Application Control cannot be modified on the Endpoint Protection Client. Creating an Application Control policy: Screen Capture Description Open the SEPM Console and login with an administrator account, or an account with rights On the Left Tab, Select Policies Under the View Policies Tab, Select Application and Device Control In the tasks section, select Add an Application and Device Control Policy In the Policy Name Type the name you would like to give this policy and enter a description if required. From the Left pane of the policy windows, select Application Control 4
5 Application Control Rule Sets A Rule Set is a set of controls that allow administrators to allow or block an action. In the example below, you will note that there are currently four rule sets defined. You will also notice that Administrators can choose to create as many rule sets as they would like in a policy. Even though multiple rule sets can be in a given policy, administrators can choose which rule sets are active by toggling the Enabled option. In this example, you will note that none of the rule sets are enabled. To the right of the rule set name there is an option to configure Test/Production. This feature allows administrators to test rules before actually enabling them. In the Test (log only) configuration, no actions will be applied in the rule, but the action is logged. This allows administrators to see what would have happened if this rule would have been active. All new rule sets are created with the default option configured to test. This reduces potential accidents an administrator may make by not considering all possibilities of the rule. BEST PRACTICE FOR RULE SETS: It is recommended to run rules in a test mode for some acceptable period of time before switching them to production. Logs should be reviewed to verify that the correct items are blocked. 5
6 Adding Rule Sets To add a rule set, simply select the add button. To edit or delete a rule set, select the rule, then click the edit or delete button. Note: The edit, delete, move up, and move down button will remain greyed out until a rule set is selected. Rule Sets consists of Rules and Conditions. A rule is a set of conditions and actions that apply to a given process or processes. For organizational purposes, it is recommended to create a rule set that includes all of the actions that you want to allow/block/monitor a given task. For example, if an administrator wanted to block write attempts to all removable drives and block people/applications from tampering with a specific application, it would be recommended to create two distinct rule sets versus creating all of the necessary rules to do both tasks under one rule set. In order to get high performance environment it is recommended not to exceed 100 rules in a rule set. 6
7 Rules Rules define the application(s) that you are monitoring. Conditions define what specifically you want to allow or block an application from doing, and actions determine what action to take when the condition is meet. Before getting into rule development, it is best to understand how rules work. A rule applies to an application or multiple applications. Rules contain conditions that monitor specified operations for the application(s) defined in the rule. The condition also contains the actions to take when the specified operation is observed. A majority of the issues encountered by new administrators when configuring Application Control is caused by not realizing that Actions always apply to the process defined in the rule and not the Condition. BEST PRACTICE FOR RULES: Actions always apply to the process defined in the rule, not by the Condition. Adding a Rule 1. Open the Rule Set 2. Click the Add button in the Rules pane 3. Click the Add Rule option. 4. In the Rule Name, enter a name for the rule 5. In the Description Field, enter a description for the rule (optional) Once the rule created, it must be tied to an application or multiple applications. This is done in the Rules Properties window. You will also notice that you have an option to enable or disable the rule by toggling the Enable this Rule Check Box. There are two sections that deal with tying the rule to an application or multiple applications. One process definitions list contains processes to which the rule applies. The other process definitions list contains processes to which the rule does not apply. If an administrator wanted to tie the rule to all application except for a given set of applications, then they would define a wildcard for all (*) in the top section, and list the applications that need an exception in the bottom section. NOTE: In every configuration, the top section must have at least one application defined. When adding applications to a rule, administrators can use the process name, wildcards, regular expressions, fingerprints, and/or drive types from where the application was launched. Adding an Application to a Rule 7
8 1. Determine if the Application being added is the application to tie the rule to or if the application is going to be an exception to the rule. 2. Select the Add for the appropriate the section. 3. In the Add Process Definition, you can use the criteria of choice to define the application(s) Administrators can define as many applications as they would like to a given rule. Conditions Conditions are operations that can be allowed or denied for an application or multiple applications. There are several condition types that can be configured. These include the following: Registry Access Attempts - Allow or block access to a client computer's registry settings File and Folder Access Attempts - Allow or block access to defined files or folders on a client computer Launch Process Attempts -Allow or block the ability to launch a process on a client computer Terminate Process Attempts - Allow or block the ability to terminate a process on a client computer. For example, you may want to block a particular application from being stopped. NOTE: This Condition does not prevent an application from being terminated using normal methods of quitting an application (i.e. Alt-F4, or the Program s native exit routine). It will prevent the process from being terminated by other applications or procedures. Load DLL Attempts - Allow or block the ability to load a DLL on a client computer To add a condition to a rule, select the add Click in the Rules pane and then select the condition type you want to add. 8
9 Multiple conditions can be added to a given rule. As conditions are added, administrators will need to specify the specific properties of the condition and what actions to take when the condition is meet. Each condition type will have different properties. 9
10 Condition Properties Each condition type has its own Condition Properties to specify what the condition is looking for. Each condition also has its own specific actions to take when the condition is true. To edit the properties and action for a condition, select the condition in the rules windows pane. Registry Access Attempts Administrators can define specific registry keys, values, and data to monitor as depicted in the graphic below. Administrators can also use wildcards and regular expressions to define keys, values, and data. 10
11 For registry access attempts, administrators can define different actions to take for read and/or create/delete/write attempts. File and Folder Access Attempts : Administrators can define files and folders. Administrators can also use wildcards and regular expressions. In addition, Administrators can also restrict the monitoring of files and folders to specific drive types. 11
12 NOTE: When applying a condition to everything in a given folder, it is best to {folder name}\*. In many cases, administrators forget to include the wildcard to include all files similar to Registry Attempt Access, administrators can choose to take different actions for read and/or Create/Delete/Write attempts. Launch Process Attempts Administrators can define processes that they want to prevent or allow to start. When defining processes, administrators can use specific file names, wildcards, and regular expressions. Administrators can also choose to limit monitoring to applications being launched from a particular drive type, arguments being passed to an application, and or applications with a particular file fingerprint. 12
13 The actions for Launch Process Attempts are limited to allowing the process, blocking the process from being launched, or terminate the calling application. Terminate Process Attempts Properties and actions for Terminate Process Attempts are similar to Process Launch Attempts. The only difference between the two is that Terminate Process Attempts looks for applications/processes that try to kill a specified process vs. looking for a process to start. 13
14 Load DLL Attempts Administrators can define Dynamic Link Library files that they want to prevent or allow to be loaded into an application. When defining DLLs, administrators can use specific file names, wildcards, fingerprint and regular expressions. Administrators can also choose to limit monitoring of DLLs to DLLs being launched from a particular drive type. In the Actions, administrators can choose to allow the DLL to load, block the DLL from being loaded, or terminate the application that is attempting to load the DLL. 14
15 Common Mistakes There are two common mistakes made by individuals configuring Application Control for the first time. The first is configuring the wrong action and the second is neglecting the order of rules. Wrong Action In every action setting, there are four options for the action to take: Continue processing other rules, Allow access, Block access. Continue processing This action allows administrators the ability to log the event and continue processing other rules in the stack. The standard operation is to stop processing rules once the first criteria matches. Allow Allows the operation to continue Block Prevents the operation Terminate process Kills the application making the request. Although these options seem simple, many people will accidentally choose to terminate the process. This can lead to undesired results. To fully understand the common mistake, consider the scenario below: An Administrator wants to block individuals from modifying the secret.doc on client machines. The administrator does the following: 1. Creates a new Rule Set 2. Adds a new rule to the rule set 3. The rule is tied to the application * 4. Adds a condition, File and Folder Attempt Access 5. Adds the file secret.doc to the Condition 6. Configures the Write Action to Terminate Process To test the policy, the administrator opens MS Word. The administrator then proceeds to use Word to navigate to the folder where secret.doc is located. The administrator opens the file. The Administrator makes some changes and then attempts to save the file. The End Result, MS Word terminates. Although no writes were allowed, the administrator did not expect MS Word to close. The reason this occurred is due to the Administrator choosing the Terminate option vs. the Block option. BEST PRACTICE FOR ACTIONS: It is recommended to use the Block Action to prevent a condition vs. Terminate. Terminate should be only be used in advanced configurations. Order of Rules Many new administrators fail to notice that Application Control rules function very similar to the way that most network based firewalls work with the first rule match feature. When there are multiple rules where the conditions are true, the rule list on the top will be the only condition/action that will be applied It is important to understand the order of rules being configured. Neglecting the order could lead to wrong expectations. Consider the following scenario: Suppose an administrator wanted to block everyone from moving/copying/creating files on USB drives, so the Administrator adds a rule to an existing rule set as depicted below. 15
16 In the above scenario, clients would be able to create/modify a file called test.doc on USB drives. Because the Allow Writes to test.doc is ordered before the Block All USB Writes, the Block ALL USB Writes never gets processed in the case where rules above it are true. Performances The more rules you have the more it can slow you down. The effect of the number of rules on the client performance is very gradual. The performance of Application and Device Control really depends on what the rules are applied to. For example if ones creates 1,000 rules only for Word then none of the other applications should function any differently, though Word may be slower. The best practice would be to limit a rule set 100 rules and the policy to 1000 Rule Sets. Note that when doing a block all for read & write actions, smcgui.exe can cause higher than normal CPU utilization. The workaround is to exclude smcgui.exe from this rule. This appears to impact systems limited RAM (512MB or less typically.) 16
17 Chapter Two: Device control Policy Device control allows SEP administrators to restrict the access of usage of a given peripheral by policy. The features acts in the registry and disable on the device manager level the chosen peripheral. Once a peripheral is blocked you need to re-enable it by policy, uninstalling SEP will not re-enable the device. Standard Devices A large number of devices controlled by SEP are pre listed on the SEPM for the standard entries under Policy >Policy Component >Hardware Devices: This list allows having an out of the box solution for standard requests. Class ID: To facilitate device installation, devices that are set up and configured in the same manner are grouped into a device setup class. For example, SCSI media changer devices are grouped into the Medium Changer device setup class. The device setup class defines the class installer and class co-installers that are involved in installing the device. Microsoft defines setup classes for most devices. IHVs and OEMs can define new device setup classes, but only if none of the existing classes apply. For example, a camera vendor does not have to define a new setup class because cameras fall under the Image setup class. Similarly, uninterruptible power supply (UPS) devices fall under the Battery class. 17
18 There is a GUID associated with each device setup class. System-defined setup class GUIDs are defined in Devguid.h and typically have symbolic names of the form GUID_DEVCLASS_Xxx. The device setup class GUID defines the..\currentcontrolset\control\class\classguid registry key under which to create a new subkey for any particular device of a standard setup class. Custom Device Sometimes these categories do not suffice as you need to allow on ly a specific hardware to work with your SEP clients. (Block IPods, Allow specific WIFI dongle ). For this reason the administrator can add a custom device to integrate in the device control policy alongside with the preconfigured ones. Adding a new custom device Screen Capture Description From the policy tab, expand the policy components object and select hardware device. Click Add a hardware device. The device name is required to be displayed on the hardware list alongside with the Class ID or the device ID of that specific custom device. Class ID or Device ID can be retrieved from a test client where the device is plugged by using a tool provided on the SEP CD2 called devviewer. On the test client plug the hardware you want to control with SEP. Run DevViewer from the CD2 under \Tools\Nosupprt\DevViewer 18
19 In this example we ve used an IPod Shuffle 1 st generation. The ipod is recognized as a USB Mass Storage device. Opening devviewer we can also locate the ipod under Disk drive On the right pane we can see the device ID for that ipod By right clicking on the device ID we can copy the required string USBSTOR\DISK&VEN_APPLE&PROD_IPOD&REV_2.7 0\000A A&0 The resulting Device ID for this ipod is now in the clipboard. I you want to block only that kind of ipod then you can directly paste the string in the new hardware definition in SEPM. 19
20 Device ID A device ID is a vendor-defined identification string that is the most specific ID that Setup uses to match a device to an INF file. A device has only one device ID. A device ID has the same format as hardware ID. When an enumerator reports a list of hardware IDs for a device, the device ID should be the first hardware ID in the list. A device id is like a URL as it gives you the connection path to the device manager. For this string you can gather, the port used by the peripheral, the type of device, the manufacturer, the device version and ultimately in some case the serial number. if you want to block all ipods then you need to add a new hardware description with a wildcard (*) on the device ID string. USBSTOR\DISK&VEN_APPLE&PROD_IPOD* Useful Device ID: Device type Apple ipod Blackberry SD card USB Key / Disk Linksys USB Wi-Fi Dongle Device ID USBSTOR\DISK&VEN_APPLE&PROD_IPOD* USBSTOR\DISK&VEN_RIM&PROD_BLACKBERRY* USBSTOR\DISK& USB\VID_13B1&* 20
21 Chapter Three: Use cases for Application and device control Blocking Unwanted network interfaces / Dialup Sometimes, administrators want to ensure that only one network interface is used to avoid leaking corporate information on a private network at home or on the road. Working in pair with Location awareness it is possible to set Location where specific device will be blocked, like modem or network interface. The challenge comes when you want to block Wi-Fi while using Ethernet. You cannot use the Class ID as both interfaces have the same. Two choices are then possible: a) You have a restricted amount of hardware to manage: Then you can use the Device control policy to add all the Wi-Fi interfaces Devices ID and block these according to what you need. Example: Screen Capture Instructions Gather the Devices ID with DevViewer. Add the specific Wireless and Ethernet Cards as Hardware in SEPM 21
22 Create 4 locations in this order : Outside Wifi: o Computer uses Wireless Lan Ethernet o Computer uses Ethernet o DHCP IP address: Outside Ethernet o Computer Uses Ethernet No Network (Default) o No criteria Create 2 Policies for device & application control: Block Eth Block Wifi Assign the Policies to the appropriate locations 22
23 When such procedure is required ensure that all hardware and network connection types are available when creating the policies. b) You have a large amount of hardware to cover with this requirement: The main issue with the first option is to gather the Device ID for Network interface. If you work on a large environment and new laptops, 3G cards, are being purchased every so often then maintaining the policy current for all hardware will not be a manageable solution. A possible solution is to use Location awareness and the firewall rules in order to block DHCP on the interface you are not meant to use. (Eg. Block DHCP on Eth while using a Wifi connection). Example: Screen Capture Note: Should you have issue with unwanted IP address on blocked interface, think of disabling the smart traffic rules. Intructions Create 3 Firewall policies: FW-Lan FW-Eth_out FW-Wifi_out FW-Lan : allow all traffic in/out on the Ethernet card. Block all on Wifi FW-Eth_out: Allow all traffic outbound on Ethernet. Block all on Wifi FW-Wifi_out: Allow all traffic outbound on Wifi. Block all on Ethernet Assing the Policies to the appropriate locations Test 23
24 Allowing only corporate purchased USB keys Organizations can restrict the usage of personal USB keys / Portable devices with the device control policy. For example: a rremovable storage policy can be implemented to avoid execution of files from a USB storage device and the write access given only to certain individuals. Example: The company Acme, LTD purchased a stock of PNY Attaché USB devices for the employees to exchange documents outside of the corporate network. All other USB storage devices are blocked in every location (Home, Office, VPN). Authorized users are separated in 2 Pools: Content Producers: On the Office location and VPN they can write to the corporate USB device Content Readers: In all locations they can read documents from the corporate USB device Device and application control Policy Producers: Screen Capture Comments Definition of the corporate USB storage device by adding it as a custom Hardware device. Creation of a Device & Application control policy assigned to the Locations Office and VPN for the Producers group 24
25 Device control tab: Block all USB Allow USB corporate custom Hardware and Human Interface Devices (for Keyboard ad Mouse) Application Control tab: Select Block applications from running Select Log File written to USB drives for accountability of information s held on corporate USB sticks. Block application from running ruleset: No modification from the template on the main screen. Click on the * for Apply the rule to the following processes. Deselect Only match processes running from the following drive types Select Only match processes running on the following device type and select USB corporate. 25
26 Monitor Device ID centrally Another use case of the device and application policy is to monitor the registry for devices used in an environment. Each time a user plugs a new device to its system a new registry key is created under the PnP enumerator for USB devices. By monitoring the appropriate registry key we can then gather in a log the device ID for this peripheral in a log. Example: Create a new rule set called Monitor USB and disk Drive Regkeys Create rule monitoring reg keys Create a registry key access attempt rule for the following keys: HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ Enum\ USBSTOR\ * \ * HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ Enum\ USBSTOR\ * \ * HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ Enum\ USB*\ * \ * HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ E num\ USB*\ * \ * HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ Control\ DeviceClas ses\ {53f b6bf- 11d0-94f2-00a0c91efb8b}\ * \ * HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ Control\ DeviceClas ses\ {53f b6bf- 11d0-94f2-00a0c91efb8b}\ * \ * HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ Control\ DeviceClas ses\ {53f b6bf- 11d0-94f2-00a0c91efb8b}\ * \ * HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ Control\ DeviceClas ses\ {53f b6bf- 11d0-94f2-00a0c91efb8b}\ * \ * HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ Control\ DeviceClas s es\ {53f5630d- b6bf- 11d0-94f2-00a0c91efb8b}\ * \ * 26
27 HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ Control\ DeviceClas ses\ {53f5630d- b6bf- 11d0-94f2-00a0c91efb8b}\ * \ *. For each of these key set the following actions: Apply the policy to the group of client you want to monitor and then consult the logs from the console. 27
28 In the following a Blackberry has been plugged into a monitored system. 28
29 Harden Internet Explorer security against drive by downloads Internet explorer and other browsers are the most common target for attackers to infiltrate malicious code on endpoint. With Application control you can add extra security by allowing the browser to write only where necessary to build the image/content cache to display pages while restricting the execution of scripts. The following example illustrate Internet explorer, but you can easily adapt it to the browser of your choice. Create a new rule set for the application control Panel. 29
30 The rule set applies only to the process iexplorer.exe Create a new file and folder access attempt condition. Block writing to system folders applies to files and folders matching: %windir%*\*,%programfiles%*\* Exclude files and folders matching: *\*softwaredistribution*,*\*softwaredistribution*\*\*,*\*windowsupdate*,*\*windowsu pdate*\*\*,%windir%\profile*\*\*. Action: Create, delete, or write attempt: Block (Log) 30
31 Create a new Launch process attempt to prevent IE launching scripts. Allow IE to launch system process applies to processes matching: %windir%*\*,%programfiles%*\* Exclude: Processes matching *script*.exe Action: Launch process attempt: Allow (Log) Create a new Launch process attempt to block IE from launching any other processes (like a malware for example). Block IE from launching other processes applies to processes matching: * Action: Launch process attempt: Block (Log) Create a new Load DLL attempt condition to allow IE to launch system dlls required to run. Allow IE to load system DLLs applies to DLLs matching: %windir%*\*,%programfiles%*\* Action: Load DLL attempt: Allow 31
32 Create a new Load DLL attempt condition to prevent IE from launching any other dlls. Block IE from loading other DLLs applies to DLLs matching: * Action: Load DLL attempt: Block (Log) 32
33 About Symantec Symantec is a global leader in providing security; storage and systems management solutions to help businesses and consumers secure and manage their information. Headquartered in Cupertino, Calif., Symantec has operations in 40 countries. More information is available at For specific country offices and contact numbers, please visit our Web site. For product information in the U.S., call toll-free 1 (800) Symantec Corporation World Headquarters Stevens Creek Boulevard Cupertino, CA USA +1 (408) (800) Copyright 2009 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Symantec Endpoint Protection 11.0. Application and Device Control
Symantec Endpoint Protection 11.0 Application and Device Control Technical Product Management Team Endpoint Security Copyright 2008 All Rights Reserved Revision 1.1 Application Control Application Control
W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
Best Practices for Deploying Behavior Monitoring and Device Control
Best Practices for Deploying Behavior Monitoring and Device Control 1 Contents Overview... 3 Behavior Monitoring Overview... 3 Malware Behavior Blocking... 3 Event Monitoring... 4 Enabling Behavior Monitoring...
Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should
Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who
Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection
SYMANTEC TECHNOLOGY NETWORK: SECURITY Symantec Endpoint Protection (SEP) 11.0 Configuring the SEP Client for Self-Protection Purpose of this Whitepaper:... 3 Overview... 4 The SEP Client Interface... 5
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described
Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0
Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0 This document supports the version of each product listed and supports all subsequent versions until the document
Verizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Intel Unite Solution. Standalone User Guide
Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
Lenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel +32 16 317 411 Fax +32 16 207 164 http://www.option.com Page 1 of 14
Page 1 of 14 ! " #!"#$ % &&' Page 2 of 14 1 INTRODUCTION One of the highly desirable features of the GlobeSurfer III device is the ability to network together Printers and External Hard Disk drives (aka
Allworx OfficeSafe Operations Guide Release 6.0
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Best Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
Amcrest 960H DVR Quick Start Guide
Amcrest 960H DVR Quick Start Guide Welcome Thank you for purchasing our Amcrest 960H DVR! This quick start guide will help you become familiar with our DVR in a very short time. Before installation and
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
Technical Support Bulletin 1
Technical Support Bulletin 1 Windows 2000 and Windows XP Computer Systems SUBJECT: Troubleshooting Computer Systems Scope February 22, 2006 Troubleshooting Computer System problems on Windows 2000 and
NTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
NetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
User Guide Win7Zilla
User Guide Win7Zilla Table of contents Section 1: Installation... 3 1.1 System Requirements... 3 1.2 Software Installation... 3 1.3 Uninstalling Win7Zilla software... 3 Section 2: Navigation... 4 2.1 Main
Operating System Installation Guide
Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating
AdminToys Suite. Installation & Setup Guide
AdminToys Suite Installation & Setup Guide Copyright 2008-2009 Lovelysoft. All Rights Reserved. Information in this document is subject to change without prior notice. Certain names of program products
LifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Spector 360 Deployment Guide. Version 7
Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
Vine Server. v3.1. Manual
Vine Server v3.1 Manual Copyright 2009 TestPlant Inc. Vine Server Manual Trademarks Vine, Vine Viewer, Vine Server, the Vine logo, TestPlant, and the TestPlant logo are trademarks or registered trademarks
Password Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
Trademark Notice. Copyright Notice
User s Guide Trademark Notice LinQ, SMART Board, Sympodium, Notebook, Bridgit, smarttech and the SMART logo are trademarks or registered trademarks of SMART Technologies Inc. in the U.S. and/or other countries.
Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010
W H I T E P A P E R : T E C H N I C A L S E C U R I T Y S O L U T I O N S Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper Updated 7/20/2010 White Paper: Symantec
Integrating Juniper Netscreen (ScreenOS)
Integrating Juniper Netscreen (ScreenOS) EventTracker Enterprise Publication Date: Jan. 5, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide helps you
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Ethernet Radio Configuration Guide
Ethernet Radio Configuration Guide for Gateway, Endpoint, and Repeater Radio Units April 20, 2015 Customer Service 1-866-294-5847 Baseline Inc. www.baselinesystems.com Phone 208-323-1634 FAX 208-323-1834
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
How To Use The Symantec Vpnclient 7.0.1.1 (Vpnclient) On A Pc Or Mac Or Ipad (Windows) With A Network Card (Windows Xp) With An Ipad Or Ipa (
Release Notes Symantec TM VPN Client Enterprise This document contains the following information about the Symantec Enterprise VPN Client, Version 7.0.1: What s new System requirements Installing the VPN
User's Guide. DK2 Overview 1.0.5
User's Guide DK2 Overview 1.0.5 Printed on 14 January, 2010 All content copyright Starfish Technologies Ltd. All rights reserved The software contains proprietary information of Starfish Technologies
DSG SoftPhone & USB Phone Series User Guide
DSG SoftPhone & USB Phone Series User Guide Table of Contents Overview Before You Start Installation Step 1. Installing DSG SoftPhone Step 2. Installing USB Phone Step 3. System Check First Time Use Step
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
F-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
Building a Penetration Testing Virtual Computer Laboratory
Building a Penetration Testing Virtual Computer Laboratory User Guide 1 A. Table of Contents Collaborative Virtual Computer Laboratory A. Table of Contents... 2 B. Introduction... 3 C. Configure Host Network
StarWind iscsi SAN Software: Using StarWind with VMware ESX Server
StarWind iscsi SAN Software: Using StarWind with VMware ESX Server www.starwindsoftware.com Copyright 2008-2010. All rights reserved. COPYRIGHT Copyright 2008-2010. All rights reserved. No part of this
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
How To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
SafeCom Smart Printing Administrator s Quick Guide
SafeCom Smart Printing Administrator s Quick Guide D10600-08 March 2012 Trademarks: SafeCom, SafeCom Go, SafeCom P:Go, SafeCom epay and the SafeCom logo are trademarks of SafeCom a/s. Company and product
User's Manual. Intego Remote Management Console User's Manual Page 1
User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written
Web Enabled Software for 8614xB-series Optical Spectrum Analyzers. Installation Guide
for 8614xB-series Optical Spectrum Analyzers Installation Guide Copyright Agilent Technologies Company 2001 All Rights Reserved. Reproduction, adaptation, or translation without prior written permission
POPP Hub Gateway. Manual
POPP Hub Gateway Manual 008900 POPP Hub Gateway Manual Quick Start... 2 Hardware... 2 Smart Home User Interface... 2 Applications (Apps) realize the intelligence of your Smart Home... 3 Functions of the
AC1200 Smart WiFi Router
Trademarks NETGEAR, the NETGEAR logo, and Connect with Innovation are trademarks and/or registered trademarks of NETGEAR, Inc. and/or its subsidiaries in the United States and/or other countries. Information
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government
NETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
Kerio Operator. Getting Started Guide
Kerio Operator Getting Started Guide 2011 Kerio Technologies. All rights reserved. 1 About Kerio Operator Kerio Operator is a PBX software for small and medium business customers. Kerio Operator is based
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
NetWrix USB Blocker Version 3.6 Quick Start Guide
NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.
Desktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management
IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo
Meraki MX50 Hardware Installation Guide
Meraki MX50 Hardware Installation Guide January 2011 Copyright 2010, Meraki, Inc. www.meraki.com 660 Alabama St. San Francisco, California 94110 Phone: +1 415 632 5800 Fax: +1 415 632 5899 Copyright: 2010
safend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
WINDOWS PROCESSES AND SERVICES
OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.
Virtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
Virtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
AC1600 Smart WiFi Router
Trademarks NETGEAR, the NETGEAR logo, and Connect with Innovation are trademarks and/or registered trademarks of NETGEAR, Inc. and/or its subsidiaries in the United States and/or other countries. Information
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
Network Projector Operation Guide
Network Projector Operation Guide Table of contents Preparation...3 Connecting the projector with your computer...3 Wired connection... 3 Wireless connection (for selective models)... 4 QPresenter...7
SecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
Parallels Virtual Automation 6.1
Parallels Virtual Automation 6.1 Installation Guide for Windows April 08, 2014 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH. c/o Parallels
Norton Personal Firewall for Macintosh
Norton Personal Firewall for Macintosh Evaluation Guide Firewall Protection for Client Computers Corporate firewalls, while providing an excellent level of security, are not always enough protection for
InventoryControl for use with QuoteWerks Quick Start Guide
InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY
FileMover 1.2. Copyright Notice. Trademarks. Patents
FileMover 1.2 Copyright Notice No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any human or computer language, in any form or by
Central Management System
Central Management System Software Installation Guide Ver. 1.5.0.101115.001 ... ii System Introduction... 3 Client/Server Architecture...3 System Requirements... 4 System Setup...4 Multiple Monitor Configuration...5
How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall
Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition
SiteCount v2.0 Revised: 10/30/2009
SiteCount v2.0 Revised: 10/30/2009 Copyright 2009, Traf-SYS, Inc. Contents Introduction... 4 Requirements... 4 General... 4 Software... 4 Hardware... 4 Fulfilling Software Requirements... 5 Installation
Quick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
OfficeConnect Internet Firewall 25 Internet Firewall DMZ. QuickStart Guide (3C16770, 3C16771)
OfficeConnect Internet Firewall 25 Internet Firewall DMZ QuickStart Guide (3C16770, 3C16771) Checking Package Contents Getting Started Thank you for purchasing the OfficeConnect Internet Firewall. The
AVG Business SSO Connecting to Active Directory
AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud
Implementing McAfee Device Control Security
Implementing McAfee Device Control Security COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
Polycom CMA System Upgrade Guide
Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or
USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB
USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29 Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB Table of Contents UNIT 1: Lab description... 3 Pre-requisites:... 3 UNIT 2: Launching an instance on EC2...
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing
Symantec Licensing Portal and License Management User Guide
Symantec Licensing Portal and User Guide Symantec Licensing Confidence in a connected world. Symantec Licensing Portal and User Guide the Symantec Licensing Portal The Symantec Licensing Portal enables
HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2
HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and
Quick Start. Nighthawk X8 AC5300 Tri-Band WiFi Router Model R8500. Package Contents. NETGEAR, Inc. 350 East Plumeria Drive San Jose, CA 95134 USA
Support Thank you for purchasing this NETGEAR product. You can visit www.netgear.com/support to register your product, get help, access the latest downloads and user manuals, and join our community. We
DisplayLink Corporate Install Guide
This document s classification is: Public This means: It can be freely distributed to Customers without an NDA needing to be in place Document Analysis Title Document number DisplayLink Corporate Install
