IBM Security. How BigFix Helps Investigate a Threat in Forensic Activities IBM
|
|
|
- Josephine Cobb
- 10 years ago
- Views:
Transcription
1 IBM Security How BigFix Helps Investigate a Threat in Forensic Activities IBM
2 Document Author, Contributors, and Reviewers AUTHOR: Cristina Bonanni CONTRIBUTORS: Bernardo Pastorelli, Bradford Fisher, Rosario Gangemi REVIEWERS: Alex Donatelli, Daniel P Paquette, James Murphy, John Golembiewski, Miles Hamill, Rich Caponigro, Wei Lee
3 Contents Detecting malware and remediating with BigFix Detecting exposures using the Relevance language. 1 An example of computer attack Creating relevance expressions Checking a computer status Checking the enterprise Periodically checking computer compliance... 7 Checking and remediating the environment... 9 Detecting exposures by mapping IOC Mapping an IOC document to a Fixlet BigFix and Yara tool Yara Rules Using Yara from BigFix Some useful relevance examples for malware detection checks Mapping between OpenIOC terms and Relevance language Using WMI Queries Copyright IBM Corp iii
4 iv IBM Security: How BigFix Helps Investigate a Threat in Forensic Activities
5 Detecting malware and remediating with BigFix Organizations are focusing their attention on how to defend themselves against cybersecurity threats by detecting potentially malicious applications when they run on their computers. The objective of incident handling is to manage and control faults and disruptions to IT services in a timely manner. In this battle, BigFix is a fundamental tool to identify malware on computers by scanning them. With BigFix and the applications that run on top of it, security teams can query and analyze information for a potentially compromised computer. They can detect missing patches and install them, uninstall or update software containing vulnerabilities, manage the running and well-being of security tools such as virus scanners and firewalls that are misconfigured, disabled, or running with out-of-date signature data. BigFix is a reliable and fast mechanism for detecting security incidents by being: v Timely: it manages the current situation, not how it was a few minutes ago. v Scalable: it deploys to all the company computing assets. v Efficient: it minimally impacts the network and computing resources. v Role-based: it grants permissions to perform particular activities on particular computers. v Content driven: it shares known and emerging insights efficiently and with flexibility to address situations never before encountered. v Secure: it transfers instructions and results by using secure, authenticated, and compressed data streams. v Actionable on the endpoint: the endpoint runs authenticated instructions. v Lightweight: it minimally impacts the user while these activities are taking place. Using BigFix, you can monitor large networks of remote computers, detect security exposures, incorrect configurations, and other vulnerabilities, and resolve issues in real time. As with any security situation, shortening the time interval from detection to protection is key to surviving an attempted attack. Some of the most common activities that attackers perform on systems include password-dumping, reconnaissance, and data theft. In this document, you can find information on how to detect malware and remediate by using BigFix. Detecting exposures using the Relevance language Using the Relevance language, you can collect a large set of data from a computer, such as files, services, processes, device drivers, operating system configuration, and network configuration. The BigFix agent already provides thousands of key phrases (known as inspectors) of the Relevance language. As the name implies, these phrases are used to inspect the properties of the clients on which the BigFix agent is installed. The values returned by the inspectors can also be used for calculations and comparisons. Copyright IBM Corp
6 You can inspect remote client computers and summarize their properties by running a BigFix analysis. The analysis retrieves the various computer properties, analyzes and reports them to central servers. You can also run a Fixlet to take corrective actions. Use Fixlet Debugger, a BigFix tool, to write and debug Relevance language expressions that are then evaluated on every computer where analyses or Fixlets are run. You can use Fixlets and analyses to detect malware and support forensic company activities. The Bigfix.me community includes many examples of custom content, including single relevance expressions, analyses, and Fixlets. In this community all users can share custom content such as single relevance expressions, analyses, and Fixlets. You can also participate in the discussion about BigFix topics and issues by accessing the BigFix forum. An example of computer attack With the BigFix Relevance language, you can implement and perform many checks to detect a computer attack or security exposure. An example of an attack that might compromise a computer is the combination of the following actions: v Create a registry key whose value contains an IP address, such as * v Start a process that listens on port v Install a file in the Windows system folder that has a well-defined md5 hash and a name that can be represented by the regular expression ^hack.* The following topics provide step-by-step instructions about how you can write and run the Relevance expressions to detect the three attack actions. Creating relevance expressions A security operator can create relevance expressions to verify any of the three attack actions described in An example of computer attack as follows: v To check the existence of a specific registry, use the following expression: exists key "HKEY_LOCAL_MACHINE\SOFTWARE\Hack\HackedValue" whose (value of it as string = regex "^192\.168\.100\.\d{1,3}") of registry v To check if a listening mode socket exists and that the listening port is 1234, use the following relevance: exists sockets whose (listening of tcp state of it and local port of it = 1234) of network v To check the existence of a file and its hash, use the following relevance expression: exists descendants whose( name of it as lowercase = regex "^hack.*" and md5 of it as lowercase = "54a47f6b5e09a77e c6a08866" as lowercase) of system folder The relevance expression counts the files (descendants) in the Windows system folder whose name matches your chosen regular expression and whose md5 matches the hacked value. To find other useful Relevance expressions, see Some useful relevance examples for malware detection checks on page IBM Security: How BigFix Helps Investigate a Threat in Forensic Activities
7 Checking a computer status To run the previously defined relevance expressions on a single computer, use Fixlet Debugger. When you enter the relevance expressions in the (qna) tab of the Fixlet Debugger tool, ensure that each one is preceded by the prefix Q: to identify it as a question. You can also use the single clause tab, which does not require you to prefix your expression with Q:. Press Ctrl-A or select Edit > Question/Answer from the menu to get an answer to the questions entered in the Fixlet Debugger tool. The results are shown in the following screen capture: Detecting malware and remediating with BigFix 3
8 The answer to the second question reveals that the registry key was matched and this means that the computer was compromised. Checking the enterprise Using BigFix you can check and continuously monitor all the computers of an enterprise by defining an analysis or a Fixlet. More specifically, you can run an analysis to get true or false answers and to collect data. As a first step, you can define an analysis that collects true or false answers from all the endpoints in your enterprise. An analysis can collect multiple properties. For each of the three relevance expressions, you can define a property. The following screen capture shows a custom analysis created with these properties related to the three attack actions: v HackedFile v HackedRegistry v HackedNetwork 4 IBM Security: How BigFix Helps Investigate a Threat in Forensic Activities
9 The resulting analysis is displayed as follows in the BigFix console: The analysis evaluates the property on the endpoint periodically and, if any of the properties change, the new property values are uploaded to the server. Detecting malware and remediating with BigFix 5
10 You can monitor the results from the console by looking at the collected data: In the Results table, you can assess the environment and check for exposures. The columns in the Results table can be ordered to search for computers with specific results. You can see that just one computer seems to be affected by an issue. In addition, to get a true or false answer, you can use an analysis to collect information from a computer. For example, assume that you want to change the analysis to collect the IP addresses that is defined in the registry key, if the registry key exists. This information might be helpful to get more details about the hack, regardless of whether or not the computer is compromised. You can change the second relevance example by using the following expression: values of keys "HKEY_LOCAL_MACHINE\SOFTWARE\Hack\HackedValue" whose (value of it as string = regex "^192\.168\.100\.\d{1,3}") of registry The result shows that the HackedRegistry property has no value for computers that are not affected by the hack, but instead contains the IP address, specified in the registry key, for computers that are affected. In this way BigFix is collecting additional information and not just a simple Boolean answer. 6 IBM Security: How BigFix Helps Investigate a Threat in Forensic Activities
11 Periodically checking computer compliance After an analysis is configured, an administrator can set up BigFix to deliver a periodic report about the status of that analysis on the computers in the environment. It means that a daily report about the status of the environment is sent directly to an inbox, without you having to check the BigFix console every day. You can use BigFix Web Reports to create reports that filter computers by specific properties. The following screen capture shows a configuration example in which you can select all the computers for which at least one of the properties is true: This report contains the basic computer properties, in addition to the three new properties that are defined by the analysis. It includes a filter on the three properties that matches computers for which any of the properties is true. After you create the report, save it with the name HackReport. To receive a daily with the outcome of the report, create a scheduled activity by selecting the Administration entry in the top navigation bar. The following page opens: Detecting malware and remediating with BigFix 7
12 Click Create Scheduled Activity to create a new scheduled activity and define it to generate and the report daily: Enter the address ([email protected]) to which you want to the report and save the activity. This setting save the administrator from having to frequently check the BigFix console. The report content might display as follows: 8 IBM Security: How BigFix Helps Investigate a Threat in Forensic Activities
13 Checking and remediating the environment Administrators can use BigFix Fixlets to check the environment and remediate suspicious behavior. A Fixlet contains a set of relevance conditions that assess the status of the target system, as well as an action that can be run to remediate the target system. Considering the attack scenario described in An example of computer attack on page 2, you can define a Fixlet that has a relevance condition that is met when any of the three conditions, described in Creating relevance expressions on page 2, is met. The following screen capture shows you how to create the relevance section of a Fixlet: Detecting malware and remediating with BigFix 9
14 The Fixlet also has an action that you can use to clean up any computer that is affected by the hack. For example, consider an action that deletes the registry key, as shown in the following screen capture: The Fixlet is shown to be applicable to all computers that have been hacked; in this scenario, one computer. 10 IBM Security: How BigFix Helps Investigate a Threat in Forensic Activities
15 When you click Take Action, you activate the action on all the computers where the Fixlet is relevant. The action cleans up the registry and remediates the exposure. Detecting exposures by mapping IOC Forensics identifies checks that detect exposures through Indicators Of Compromise (IOC). BigFix uses the Relevance language to map these IOC checks. One of the most common ways to code Indicators Of Compromise is the OpenIOC format, which defines the checks in xml documents. The following topic shows how to convert an OpenIOC document into a Fixlet. Mapping an IOC document to a Fixlet For example, see the document unusual files in recycler, retrieved from the repository. This document checks a typical attack technique that uploads files to C:\$RECYCLE.BIN\ and then runs them. This is the content of the IOC example: <?xml version="1.0" encoding="us-ascii"?> <ioc xmlns:xsi=" xmlns:xsd=" id="8ada2a7f-b5f4-43b6-b6cc-5d255cedc814" last-modified=" t20:19:25" xmlns=" <short_description>unusual Files in Recycler</short_description> <description>this IOC will detect unusual files executing out of the C:\Recycler\ folder typically indicative of malicious activity.</description> <authored_by>@iocbucket</authored_by> <authored_date> t20:15:13</authored_date> <links /> <definition> <Indicator operator="or" id="b9482ca1-930f c65-b9c35d0c2333"> <Indicator operator="and" id="df0e5af2-d911-4a12-ab2c-a9f174eb9d03"> <Indicator operator="or" id="a2f c-479e c3a6c87e7fa"> <IndicatorItem id="f54f7698-e4b b57d c5c10" condition="is"> <Context document="fileitem" search="fileitem/filepath" type="mir" /> <Content type="string">recycler</content> <IndicatorItem id="1788ef42-1d22-4b5a-bed7-dba72cf93766" condition="is"> <Context document="fileitem" search="fileitem/filepath" type="mir" /> <Content type="string">recycle.bin</content> Detecting malware and remediating with BigFix 11
16 </Indicator> <Indicator operator="or" id="3cdc8990-2ee bdf0-9167cf7f163b"> <IndicatorItem id="6517e3b1-26f6-409c-8bac-370a2b4c2d25" condition="is"> <Context document="fileitem" search="fileitem/fileextension" type="mir" /> <Content type="string">txt</content> <IndicatorItem id="0f0b51ca-db95-453a-9f09-b20c98e37ebc" condition="is"> <Context document="fileitem" search="fileitem/fileextension" type="mir" /> <Content type="string">dll</content> <IndicatorItem id="1cea087e-aa16-46e6-b769-ea50ce998600" condition="is"> <Context document="fileitem" search="fileitem/fileextension" type="mir" /> <Content type="string">exe</content> <IndicatorItem id="038c1d41-7d80-4e49-8ca2-a966091b907e" condition="is"> <Context document="fileitem" search="fileitem/fileextension" type="mir" /> <Content type="string">rar</content> </Indicator> </Indicator> <Indicator operator="and" id="5537bbaa-3d b964974"> <IndicatorItem id="4e38893a-6d64-417c-a2a3-e1b e4" condition="contains"> <Context document="registryitem" search="registryitem/path" type="mir" /> <Content type="string">typedpaths</content> <Indicator operator="or" id="af61d88f-9b1f-4895-b7f7-9ba3fba348fd"> <IndicatorItem id="5b6c c ed63105d47f8" condition="contains"> <Context document="registryitem" search="registryitem/text" type="mir" /> <Content type="string">recycler</content> <IndicatorItem id="754aab92-35df-4d5d-803f-2296ce5cc405" condition="contains"> <Context document="registryitem" search="registryitem/text" type="mir" /> <Content type="string">recycler.bin</content> </Indicator> </Indicator> </Indicator> </definition> </ioc> This IOC document can be translated into a Relevance language expression. The first step of the translation process is to analyze the operators in the IOC document. The example performs the OR of two conditions, one on files, the other one on the registry content. The first condition searches all the files whose path (FileItem/FilePath) contains either the word recycler or the word recycle.bin. The check on the paths is ANDed with a set of four checks on the file extension (FileItem/Fileextension). This condition thus matches all the files on disk that have: 1. The path containing either recycler or recycle.bin 2. The file extension is txt, dll, exe, or rar This check can be encoded in the Relevance language, but a straightforward translation would be very resource-intensive and should be avoided. Instead of searching all the files on the disk, the relevance expression can be optimized to search for the recycle bin in the root folder of the disk, and then search for files inside the recycle bin. This approach greatly reduces the number of files analyzed. The following example shows the resulting relevance expression: exists descendants whose (name of it as lowercase = regex "(.*txt.*dll.*exe.*rar)" ) of folders whose (name of it as lowercase contains "recycler" or name of it as lowercase contains "recycle.bin") of folder "C:\" 12 IBM Security: How BigFix Helps Investigate a Threat in Forensic Activities
17 It maps the following section of the IOC document: <Indicator operator="and" id="df0e5af2-d911-4a12-ab2c-a9f174eb9d03"> <Indicator operator="or" id="a2f c-479e c3a6c87e7fa"> <IndicatorItem id="f54f7698-e4b b57d c5c10" condition="is"> <Context document="fileitem" search="fileitem/filepath" type="mir" /> <Content type="string">recycler</content> <IndicatorItem id="1788ef42-1d22-4b5a-bed7-dba72cf93766" condition="is"> <Context document="fileitem" search="fileitem/filepath" type="mir" /> <Content type="string">recycle.bin</content> </Indicator> <Indicator operator="or" id="3cdc8990-2ee bdf0-9167cf7f163b"> <IndicatorItem id="6517e3b1-26f6-409c-8bac-370a2b4c2d25" condition="is"> <Context document="fileitem" search="fileitem/fileextension" type="mir" /> <Content type="string">txt</content> <IndicatorItem id="0f0b51ca-db95-453a-9f09-b20c98e37ebc" condition="is"> <Context document="fileitem" search="fileitem/fileextension" type="mir" /> <Content type="string">dll</content> <IndicatorItem id="1cea087e-aa16-46e6-b769-ea50ce998600" condition="is"> <Context document="fileitem" search="fileitem/fileextension" type="mir" /> <Content type="string">exe</content> <IndicatorItem id="038c1d41-7d80-4e49-8ca2-a966091b907e" condition="is"> <Context document="fileitem" search="fileitem/fileextension" type="mir" /> <Content type="string">rar</content> </Indicator> </Indicator> The second condition in the IOC document checks if the recycle bin path was entered manually in Windows Explorer. The condition analyzes the entire registry, searching for a key that contains the string TypedPaths and for a value that contains either the string recycler; or recycle.bin. Again, searching the entire registry is an expensive operation, so try to optimize the check operations when you translate to the Relevance language. In this case the TypedPath registry key is always located at: HKEY_USERS\user_SID\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths The following example shows the resulting relevance expression: exists values whose (it as string as lowercase contains "recycler" or it as string as lowercase contains "recycle.bin") of keys "Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths" of keys of key "HKEY_USERS" of registry It maps the following section of the IOC document <Indicator operator="and" id="5537bbaa-3d b964974"> <IndicatorItem id="4e38893a-6d64-417c-a2a3-e1b e4" condition="contains"> <Context document="registryitem" search="registryitem/path" type="mir" /> <Content type="string">typedpaths</content> <Indicator operator="or" id="af61d88f-9b1f-4895-b7f7-9ba3fba348fd"> <IndicatorItem id="5b6c c ed63105d47f8" condition="contains"> <Context document="registryitem" search="registryitem/text" type="mir" /> <Content type="string">recycler</content> <IndicatorItem id="754aab92-35df-4d5d-803f-2296ce5cc405" condition="contains"> <Context document="registryitem" search="registryitem/text" type="mir" /> Detecting malware and remediating with BigFix 13
18 <Content type="string">recycler.bin</content> </Indicator> </Indicator> Concatenating these two Relevance expressions by using the OR operator generates an optimized Relevance expression corresponding to the IOC document. This expression can be run inside mfixlet Debugger for validation and then used in an analysis or Fixlet, as described in the scenario Detecting exposures using the Relevance language on page 1. The following screen capture shows that the execution of the optimized relevance requires a very short amount of time and can therefore be run periodically by an analysis or Fixlet without affecting the overall performance of the computer on which the checks are run. BigFix and Yara tool Important: The Fixlets obtained by translating OpenIOC documents can be scheduled to run periodically to continuously monitor known threats. In addition to mapping IOC checks, you can also map Yara rules by using BigFix. Yara is an open source malware identification tool that uses rules based on text or binary patterns to look for malware signatures in files. It also scans compressed files using yextend. This tool runs on Windows, Linux, and Mac OS X and is used to help malware researchers identify and classify malware, but it is also useful for real-time forensic analysis. 14 IBM Security: How BigFix Helps Investigate a Threat in Forensic Activities
19 Anti-malware detection tools find potential threats on your computer systems. They work from rule files downloaded from the vendors website. While these vendors quickly release updates to their rules for new malware definitions, there are times when you need to look for threats (such as zero day vulnerabilities) as soon as possible before these vendors have released updates to the definition files. Yara Rules The website provides a centralized location on GitHub and includes content that is published by the forensic community. Rules are divided into five categories: AntiDebug, Crypto, Malicious Document, Packer, and Malware The website has 11 IOC documents in Yara format. Using Yara from BigFix BigFix does not currently provide content to install Yara and run Yara rules, but it is relatively simple to produce BigFix tasks for your environment that install Yara on target endpoints and run Yara rules. These tasks could indicate success if no infection was found on the target endpoints, or you could code them to generate a simple report of infected computers and send it to the BigFix server for reporting through the BES Upload Manager. If you have experienced situations where you are concerned about your endpoints being vulnerable to a new malware before anti-malware vendors have released an updated set of rules, then using a tool like Yara and running it from BigFix could be just what you need to ensure the security of your IT deployment. Some useful relevance examples for malware detection checks These are some examples of what you can query on your systems by using the Relevance language: Check if a file exists: exists file "svchost.exe" of system folder Calculate the md5 hash of a file: md5 of file "svchost.exe" of system folder Calculate the sha1 hash of a file: sha1 of file "svchost.exe" of system folder Check if a file has a specific sha1 hash: exists file "svchost.exe" whose ( sha1 of it as lowercase = "4af001b3c3816b860660cf2de2c0fd3c1dfb4878" as lowercase) of system folder Look for a file with a specific sha1 and name in the Windows system folder and its subfolders (this relevance might take long time): exists descendant whose( name of it as lowercase = "svchost.exe" and sha1 of it as lowercase = "4af001b3c3816b860660cf2de2c0fd3c1dfb4878" as lowercase) of system folder Detecting malware and remediating with BigFix 15
20 Check if a registry key exists: exists key "HKLM\Software\Microsoft\Windows\CurrentVersion\Run\DaemonDisk" of registry Check if a registry key has a specific value: exists key "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\BigFix\EnterpriseClient\Settings\Client \_GatherService_HTTPServer_HostName" whose (value of it = " ") of registry Check if a file and a registry key exist: exists descendant whose( name of it as lowercase = "svchost.exe" and sha1 of it as lowercase = "4af001b3c3816b860660cf2de2c0fd3c1dfb4878" as lowercase) of system folder OR exists key "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\BigFix\EnterpriseClient\ Settings\Client\_GatherService_HTTPServer_HostName" whose (value of it = " ") of registry Check if a file with a specific hash exists and its name satisfies a regular expression: exists descendants whose( name of it as lowercase = regex "^svc.*" and sha1 of it as lowercase = "4af001b3c3816b860660cf2de2c0fd3c1dfb4878" as lowercase) of system folder List all the files contained in the Windows system folder, whose name matches a regular expression: matches (case insensitive regex (".*kernel.*") ) of names of descendants of system folder Check if a registry key exists with a value satisfying a regular expression: exists key "HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\BigFix\EnterpriseClient \Settings\Client\_GatherService_HTTPServer_HostName" whose (value of it as string = regex "127.*") of registry Use a regular expression to find the letter of the Windows disks defined by using a WMI query: (parenthesized part 1 of (matches (regex "^Win32_LogicalDisk\.DeviceID\=\%22(.*)\%22") of string values of it)) of properties whose(string value of it contains "DeviceID=") of select objects ("DeviceID from Win32_LogicalDisk") of WMI List the wireless connections: (ssids of it, secured of it, encryption of it) of wifi of adapters of network List the storage devices whose name contains usb: friendly names whose (it as lowercase contains "usb") of active devices List the Windows autostart locations: (values of keys "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" of it; values of keys "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Run" of it; values of keys "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" of it) of registry Lists the files opened in Windows Explorer more recently: files of folder ("C:\Users\" & name of current user & "\AppData\Roaming\Microsoft\Windows\Recent") Checks if Internet Explorer stores the passwords: exists values of key "HKCU\Software\Microsoft\Internet Explorer\IntelliForms\Storage2" of registry 16 IBM Security: How BigFix Helps Investigate a Threat in Forensic Activities
21 Mapping between OpenIOC terms and Relevance language The following table describes the mapping between the most commonly used OpenIOC terms and the Relevance language. Table 1. Mapping between IOC terms and Relevance language FileItem/FileName FileItem/Md5sum FileItem/FilePath FileItem/SizeInBytes RegistryItem/KeyPath RegistryItem/Path RegistryItem/Value PortItem/remoteIP FileItem/FullPath FileItem/FileExtension ProcessItem/name RegistryItem/Text ServiceItem/name PortItem/remotePort PortItem/localPort FileItem/Sha1sum PortItem/protocol OpenIOC term FileItem/PEInfo/VersionInfoList/VersionInfoItem/ ProductName ServiceItem/description ProcessItem/path ServiceItem/descriptiveName FileItem/PEInfo/VersionInfoList/VersionInfoItem/ Language EventLogItem/EID ServiceItem/path RegistryItem/Type DriverItem/DriverName name of <file> md5 of <file> parent folder of <file> size of <file> key <string> of registry parent key of <key> Relevance language (it as string) of values of key "<key path>" of registry remote address of <soket> pathname of <file> (following text of last "." of name of it) of file "C:\Windows\System32\fc.exe" name of <process> (it as string) of values of key "<key path>" of registry (service name of it) of services remote port of <socket> local port of <socket> sha1 of <file> tcp of <socket> values "ProductName" of version blocks of file "C:\Windows\System32\fc.exe" display name of services image file of <process> friendly name of services language of version blocks of file "C:\Windows\ System32\fc.exe" (event id of it as string "NA", time generated of it) of records of security event log image paths of services (type of it as string) of values of key "<key path>" of registry service key value name of active devices EventLogItem/source source of <event log record> ( DriverItem/DeviceItem/DeviceName UserItem/Username FileItem/Sha256sum EventLogItem/type PortItem/state EventLogItem/message friendly name of it "NA") of active devices names of logged on users sha256 of <file> event type of <event log record> tcp state of <socket> description of <event log record> Detecting malware and remediating with BigFix 17
22 Table 1. Mapping between IOC terms and Relevance language (continued) VolumeItem/DriveLetter FileItem/Created OpenIOC term ProcessItem/PortList/PortItem/remoteIP TaskItem/Name DriverItem/DeviceItem/AttachedToDriverName PortItem/localIP PortItem/process EventLogItem/writeTime ProcessItem/Username EventLogItem/user ProcessItem/parentpid EventLogItem/machine EventLogItem/log EventLogItem/genTime EventLogItem/categoryNum ServiceItem/status TaskItem/TriggerList/Trigger/TriggerFrequency ProcessItem/PortList/PortItem/localPort VolumeItem/FileSystemName VolumeItem/Type root folders of drives Relevance language creation time of file "C:\Windows\System32\fc.exe" ((remote address of it) as string "na") of sockets whose (name of process of it = <process name> of network names of scheduled tasks names of active device files local address of <socket> process of <socket> (time written of it) of records of security event log user of <process> user sid of <event log record> ppid of <process> computer of <event log record> source of <event log record> (time generated of it) of records of security event log (category of it) of records of security event log (running of it) of services trigger of <task definition> ((local port of it) as string "na") of sockets whose (name of process of it = <process name> of network name of <drive> file system type of <drive> Using WMI Queries You can use the WMI queries supported by the Relevance language to map additional IOC terms for which a matching Relevance term does not exist. This table describes the mapping between IOC terms and WMI queries. Table 2. Mapping between IOC terms and WMI queries DiskItem/DiskName EventLogItem/category ProcessItem/arguments UserItem/disabled UserItem/fullname VolumeItem/BytesPerSector VolumeItem/CreationTime IOC term WMI query Output diskdrive get name, diskdrive where(name= ) ntevent get category process where(name= ) get commandline useraccount where(disabled= true ) useraccount get caption, useraccount where(caption= ) diskdrive get BytesPerSector volume where(deviceid,caption..) get installdate 18 IBM Security: How BigFix Helps Investigate a Threat in Forensic Activities
23 Table 2. Mapping between IOC terms and WMI queries (continued) VolumeItem/SerialNumber VolumeItem/VolumeName FileItem/PEInfo/VersionInfoList/ VersionInfoItem/CompanyName FileItem/PEInfo/VersionInfoList/ VersionInfoItem/InternalName FileItem/PEInfo/VersionInfoList/ VersionInfoItem/OriginalFilename FileItem/PEInfo/VersionInfoList/ VersionInfoItem/ProductVersion FileItem/PEInfo/VersionInfoList/ VersionInfoItem/OriginalFilename FileItem/PEInfo/VersionInfoList/ VersionInfoItem/ProductVersion FileItem/PEInfo/VersionInfoList/ VersionInfoItem/OriginalFilename FileItem/PEInfo/VersionInfoList/ VersionInfoItem/ProductVersion Partition/PartitionLength IOC term WMI query Output Partition/PartitionOffset UserItem/description ServiceItem/arguments PrefetchItem/FullPath PrefetchItem/Created PrefetchItem/SizeInBytes EventLogItem/genTime EventLogItem/writeTime ServiceItem/description ProcessItem/description volume get serialnumber volume get DeviceID datafile where(name= fpath ) get Manufacturer datafile where(name= fpath ) get FileName datafile where(name= fpath ) get FileName,Extension datafile where(name= fpath ) get Version datafile where(name= fpath ) get FileName,Extension datafile where(name= fpath ) get Version datafile where(name= fpath ) get FileName,Extension datafile where(name= fpath ) get Version partition get size partition get startingoffset useraccount get description service where(name= ) get PathName datafile where(path= \\windows\\ Prefetch\\ and filename= ) get name datafile where(path= \\windows\\ Prefetch\\ and filename= ) get creationdate datafile where(path= \\windows\\ Prefetch\\ and filename= ) get filesize ntevent get TimeGenerated ntevent get TimeWritten service where(name= ) get description process where(name='') FileName.Extension FileName.Extension FileName.Extension Detecting malware and remediating with BigFix 19
24 20 IBM Security: How BigFix Helps Investigate a Threat in Forensic Activities
IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM
IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide
IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide Note Before using this
Client Manager for Endpoint Protection (CMEP) User s Guide
Client Manager for Endpoint Protection (CMEP) July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product
Sophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Sophos Enterprise Console Help
Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
Manage Traps in a VDI Environment. Traps Administrator s Guide. Version 3.3. Copyright 2007-2015 Palo Alto Networks
Manage Traps in a VDI Environment Traps Administrator s Guide Version 3.3 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Best Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
Capture Pro Software FTP Server System Output
Capture Pro Software FTP Server System Output Overview The Capture Pro Software FTP server will transfer batches and index data (that have been scanned and output to the local PC) to an FTP location accessible
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Installing and configuring Tivoli Endpoint Manager for Software Use Analysis
Tivoli Endpoint Manager for Software Use Analysis Installing and configuring Tivoli Endpoint Manager for Software Use Analysis Version 2.0 SC22-5473-00 Tivoli Endpoint Manager for Software Use Analysis
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Sophos Anti-Virus for Mac OS X: Home Edition Help
Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
Sophos for Microsoft SharePoint Help. Product version: 2.0
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2
Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC
WHITE PAPER Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC www.openioc.org OpenIOC 1 Table of Contents Introduction... 3 IOCs & OpenIOC... 4 IOC Functionality... 5
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
Symantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
Managing Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 [email protected] Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012
SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse
ESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
Core Protection Module 1.6 for Mac powered by. User s Guide
Core Protection Module 1.6 for Mac July, 2010 Copyright All rights reserved. Copyright 1998-2010 Trend Micro Incorporated. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
FileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM
IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product
Automate the Hunt. Rapid IOC Detection and Remediation WHITE PAPER WP-ATH-032015
Rapid IOC Detection and Remediation WP-ATH-032015 EXECUTIVE SUMMARY In the escalating war that is cyber crime, attackers keep upping their game. Their tools and techniques are both faster and stealthier
CLEARPASS ONGUARD CONFIGURATION GUIDE
CONFIGURATION GUIDE REVISION HISTORY Revised By Date Changes Dennis Boas July 2015 Version 1 initial release TABLE OF CONTENTS... 1 INTRODUCTION... 3 CONFIGURATION WORKFLOW... 4 CONFIGURE POSTURE POLICIES...
Automation Suite for. 201 CMR 17.00 Compliance
WHITEPAPER Automation Suite for Assurance with LogRhythm The Massachusetts General Law Chapter 93H regulation 201 CMR 17.00 was enacted on March 1, 2010. The regulation was developed to safeguard personal
Building an Effective Software Deployment Process
Building an Effective Software Deployment Process Using IBM Endpoint Manager JOHN TYNDALL University Services, Classroom and Lab Computing hopefully, you already know ❶ Basic IEM concepts. ❷ Basic relevance.
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. The Web Security manager is automatically configured
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
IBM Endpoint Manager Version 9.1. Software Distribution User's Guide
IBM Endpoint Manager Version 9.1 Software Distribution User's Guide IBM Endpoint Manager Version 9.1 Software Distribution User's Guide Note Before using this information and the product it supports,
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1
User's Manual Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1 VirusBarrier Server 2 and VirusBarrier Mail Gateway 2 for Macintosh 2008 Intego. All Rights Reserved Intego
Capture Pro Software FTP Server Output Format
Capture Pro Software FTP Server Output Format Overview The Capture Pro Software FTP server will transfer batches and index data (that have been scanned and output to the local PC) to an FTP location accessible
ViRobot Management System 4.0
USER GUIDE As this document is the property of HAURI Inc., Unauthorized distribution or leaking of this document is prohibited. Copyright c HAURI Inc 2 Contents 1. ViRobot Management System 4.0... 5 1.1
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
Sophos Computer Security Scan startup guide
Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
CA DLP. Stored Data Integration Guide. Release 14.0. 3rd Edition
CA DLP Stored Data Integration Guide Release 14.0 3rd Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Actualtests.C2010-508.40 questions
Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
Managed Antivirus Quick Start Guide
Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. TRITON - Web Security is automatically configured to
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Management, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
Sophos Enterprise Console policy setup guide. Product version: 5.2
Sophos Enterprise Console policy setup guide Product version: 5.2 Document date: September 2014 Contents 1 About this guide...4 2 General policy recommendations...5 3 Setting up an updating policy...6
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
How To Install & Use Metascan With Policy Patrol
Policy Patrol 9 technical documentation June 16, 2014 How To Install & Use Metascan With Policy Patrol No antivirus engine is perfect. With over 220,000 new threats emerging daily, it would be impossible
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions 1 Agenda What is Application Whitelisting (AWL) Protection provided by Application
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Product Guide. McAfee Endpoint Protection for Mac 2.1.0
Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
HomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
Networks & Security Course. Web of Trust and Network Forensics
Networks & Security Course Web of Trust and Network Forensics Virtual Machine Virtual Machine Internet connection You need to connect the VM to the Internet for some of the Web of Trust exercises. Make
Maintaining, Updating, and Protecting Windows 7
Lesson 7 Maintaining, Updating, and Protecting Windows 7 Learning Objectives Students will learn to: Understand Disk Defragmenter Understand Disk Cleanup Understand Task Scheduler Understand Action Center
Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)
Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused
IBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
FileMaker Server 10 Help
FileMaker Server 10 Help 2007-2009 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file folder logo, Bento and the Bento logo
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Snare System Version 6.3.4 Release Notes
Snare System Version 6.3.4 Release Notes is pleased to announce the release of Snare Server Version 6.3.4. Snare Server Version 6.3.4 New Features The behaviour of the Snare Server reflector has been modified
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
AV Management Dashboard
LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data
5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager
5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Security Guidelines for MapInfo Discovery 1.1
Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................
USER GUIDE: MaaS360 Financial IT Reg Enforcement Service
USER GUIDE: MaaS360 Financial IT Reg Enforcement Service 3.2011 Copyright 2011 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software
CTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
Sophos Endpoint Security and Control Help. Product version: 11
Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014
Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability 7 Jul 2014 1 Purpose This document is intended to provide insight on the types of tools and technologies that
How To Test Security Products
Virtual Desktop Anti-malware Protection A COMPARATIVE TEST BETWEEN SYMANTEC ENDPOINT PROTECTION AND TREND MICRO DEEP SECURITY Dennis Technology Labs, 05/04/2012 www.dennistechnologylabs.com This report
Advanced Malware Cleaning Techniques for the IT Professional
Advanced Malware Cleaning Techniques for the IT Professional Mark Russinovich Microsoft Technical Fellow This section of the Microsoft Security Intelligence Report provides information and guidance for
Endpoint Security for DeltaV Systems
DeltaV Systems Service Data Sheet Endpoint Security for DeltaV Systems Essential protection that consolidates endpoint and data security. Reduces the time and effort spent deploying and managing security
Host/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
Using Firefly Media Server with Roku SoundBridge. For Mac OS X 10.3.9 and 10.4.x
Using Firefly Media Server with Roku SoundBridge For Mac OS X 10.3.9 and 10.4.x TABLE OF CONTENTS Introduction........................................... 1 What is Firefly.........................................
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
ESET Remote Administrator
ESET Remote Administrator Installation Manual and User Guide we protect your digital worlds contents Contents 1. Introduction... 4 2. ERA client/server architecture... 5 2.1 ERA Server (ERAS)...5 2.1.1
