National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report

Size: px
Start display at page:

Download "National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report"

Transcription

1 Natinal Infrmatin Assurance Partnership Cmmn Criteria Evaluatin and Validatin Scheme Validatin Reprt Micrsft Windws 8, Micrsft Windws RT, Micrsft Windws Server 2012 IPsec VPN Client TM Reprt Number: CCEVS-VR-VID Dated: 31 January 2014 Versin: 1.0 Natinal Institute f Standards and Technlgy Natinal Security Agency Infrmatin Technlgy Labratry Infrmatin Assurance Directrate 100 Bureau Drive 9800 Savage Rad STE 6940 Gaithersburg, MD Frt Gerge G. Meade, MD

2 Micrsft Windws IPsec VPN Client ACKNOWLEDGEMENTS Validatin Team Ken Ellitt The Aerspace Crpratin Jim Dnndelinger The Aerspace Crpratin Cmmn Criteria Testing Labratry Leids (frmerly SAIC, Inc.) Clumbia, MD ii

3 Micrsft Windws IPsec VPN Client Table f Cntents 1 Executive Summary Evaluatin Details Interpretatins Threats Organizatinal Security Plicies Identificatin Security Plicy Security Audit Cryptgraphic Prtectin User Data Prtectin Identificatin & Authenticatin Security Management Prtectin f the TOE s Security Functins Trusted Path fr Cmmunicatin Assumptins Clarificatin f Scpe Architectural Infrmatin Dcumentatin Prduct Testing Develper Testing Evaluatin Team Independent Testing Penetratin Testing Evaluated Cnfiguratin Results f the Evaluatin Validatr Cmments/Recmmendatins Annexes Security Target Bibligraphy...9 iii

4 Micrsft Windws IPsec VPN Client List f Tables Table 1 Evaluatin Details... 1

5 1 Executive Summary VALIDATION REPORT Micrsft Windws IPsec VPN Client The evaluatin f the Micrsft Windws 8, Micrsft Windws RT, and Micrsft Windws Server 2012 IPsec VPN Client prduct was perfrmed by Leids (frmerly Science Applicatins Internatinal Crpratin (SAIC)) Cmmn Criteria Testing Labratry (CCTL) in Clumbia, Maryland, United States f America and was cmpleted in January The evaluatin was cnducted in accrdance with the requirements f the Cmmn Criteria and Cmmn Methdlgy fr IT Security Evaluatin (CEM), versin 3.1 and assurance activities specified in the Prtectin Prfile fr IPsec Virtual Private Netwrk (VPN) Clients, Versin 1.1, 30 December The evaluatin was cnsistent with Natinal Infrmatin Assurance Partnership (NIAP) Cmmn Criteria Evaluatin and Validatin Scheme (CCEVS) plicies and practices as described n their web site ( The SAIC evaluatin team determined that the prduct is cnfrmant t the Prtectin Prfile fr IPsec Virtual Private Netwrk (VPN) Clients, Versin 1.1, 30 December The infrmatin in this Validatin Reprt is largely derived frm the Evaluatin Technical Reprt (ETR) and assciated test reprts prduced by the SAIC evaluatin team. This Validatin Reprt is nt an endrsement f the Target f Evaluatin by any agency f the U.S. gvernment, and n warranty is either expressed r implied. The fcus f this evaluatin is n the IPsec Virtual Private Netwrk (VPN) client that is part f the Windws perating system. There are tw mechanisms cvered by this evaluatin that invke the IPsec VPN client: the Remte Access Service (RAS) interface, and the (raw) IPsec interface. The IPsec interface is a part f the cre netwrking stack and can be used t create IPsec security assciatins ver bth lcal and remte netwrks. Remte Access Service (RAS) prvides remte access capabilities t client applicatins n cmputers running Windws. Histrically RAS was used fr dial-up and pint-t-pint netwrking cnnectins. Hwever it can als be used t establish IPsec virtual private netwrk sessins. The prducts, when cnfigured as specified in the guidance dcumentatin, satisfy all f the security functinal requirements stated in the Micrsft Windws 8, Micrsft Windws RT, Micrsft Windws Server 2012 IPsec VPN Client Security Target (ST). 1.1 Evaluatin Details Table 1 Evaluatin Details Evaluated Prduct: Windws 8, Windws RT, Windws Server 2012 Spnsr: Develper: CCTL: Micrsft Crpratin Micrsft Crpratin Leids (frmerly SAIC) 6841 Benjamin Franklin Drive Clumbia, MD Kickff Date: 22 February 2013 Cmpletin Date: 31 January

6 Micrsft Windws IPsec VPN Client CC: Interpretatins: CEM: Evaluatin Class: Descriptin: Disclaimer: PP: Evaluatin Persnnel: Validatin Bdy: Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin, Versin 3.1, Revisin 4, September Nne Cmmn Methdlgy fr Infrmatin Technlgy Security Evaluatin, Part 2: Evaluatin Methdlgy, Versin 3.1, Revisin 4, September Nne The TOE prvides capabilities fr establishing IPsec security assciatins ver bth lcal and remte netwrks. The infrmatin cntained in this Validatin Reprt is nt an endrsement f the Micrsft Windws 8, Micrsft Windws RT, Micrsft Windws Server 2012 IPsec VPN Client prduct by any agency f the U.S. Gvernment and n warranty f the prduct is either expressed r implied. Prtectin Prfile fr IPsec Virtual Private Netwrk (VPN) Clients, Versin 1.1, 30 December 2012 Leids (frmerly SAIC): Anthny J. Apted James L. Arnld, jr Tammy Cmptn Crnelius Haley Natinal Infrmatin Assurance Partnership CCEVS 1.2 Interpretatins Nt applicable. 1.3 Threats The ST identifies the fllwing threats that the TOE and its peratinal envirnment are intended t cunter: Security mechanisms f the TOE may fail, leading t a cmprmise f the TSF. A user may gain unauthrized access t the TOE data and TOE executable cde. A malicius user, prcess, r external IT entity may masquerade as an authrized entity in rder t gain unauthrized access t data r TOE resurces. A malicius user, prcess, r external IT entity may misrepresent itself as the TOE t btain identificatin and authenticatin data. A malicius party attempts t supply the end user with an update t the prduct that may cmprmise the security features f the TOE. 2

7 Micrsft Windws IPsec VPN Client Malicius remte users r external IT entities may take actins that adversely affect the security f the TOE. These actins may remain undetected and thus their effects cannt be effectively mitigated. User data may be inadvertently sent t a destinatin nt intended by the riginal sender. 1.4 Organizatinal Security Plicies The ST identifies the fllwing rganizatinal security plicies that the TOE and its peratinal envirnment are intended t fulfill: The TOE must meet Request fr Cmments (RFC) requirements fr implemented prtcls t facilitate inter-perability with ther netwrk equipment using the same prtcls. The TOE must prvide the capability t cnfigure security-relevant aspects f its peratin. 2 Identificatin The evaluated prduct is Micrsft Windws 8, Micrsft Windws RT, and Micrsft Windws Server 2012, with fcus n the IPsec Virtual Private Netwrk (VPN) client that is part f these Windws perating systems. 3 Security Plicy The TOE enfrces the fllwing security plicies as described in the ST. Nte: Much f the descriptin f the security plicy has been derived frm the Micrsft Windws 8, Micrsft Windws RT, Micrsft Windws Server 2012 IPsec VPN Client Security Target and Final ETR. 3.1 Security Audit Windws has the ability t cllect audit data, review audit lgs, prtect audit lgs frm verflw, and restrict access t audit lgs. Audit infrmatin generated by the system includes the date and time f the event, the user identity that caused the event t be generated, and ther event-specific data. Authrized administratrs can review audit lgs and have the ability t search and srt audit recrds. Authrized administratrs can als cnfigure the audit system t include r exclude ptentially auditable events t be audited based n a wide range f characteristics. 3.2 Cryptgraphic Prtectin Windws prvides FIPS validated cryptgraphic functins that supprt encryptin/decryptin, cryptgraphic signatures, cryptgraphic hashing, cryptgraphic key agreement (which is nt studied in this evaluatin), and randm number generatin. The TOE additinally prvides supprt fr public keys, credential management and certificate validatin functins and prvides supprt fr the Natinal Security Agency s Suite B cryptgraphic algrithms. Windws als prvides extensive auditing supprt f cryptgraphic peratins, the ability t replace cryptgraphic functins and randm number generatrs with alternative implementatins, 1 and a key islatin service designed t limit the ptential expsure f secret and private keys. In additin t using cryptgraphy fr its wn security functins, Windws ffers access t the cryptgraphic supprt functins fr user-mde and kernel-mde prgrams. Public key certificates generated and used by Windws authenticate users and machines as well as user prtect and system data in transit. 1 This ptin is nt included in the Windws Cmmn Criteria evaluatin. 3

8 VALIDATION REPORT Micrsft Windws IPsec VPN Client IPsec: Windws implements IPsec t prvide prtected, authenticated, cnfidential, and tamperprf netwrking between tw peer cmputers. 3.3 User Data Prtectin In this cntext f this evaluatin, Windws prvides bject and subject residual infrmatin prtectin. 3.4 Identificatin & Authenticatin In the cntext f this evaluatin, Windws prvides the ability t use, stre, and prtect X.509 certificates that are used fr IPsec. Windws als has the ability t use pre-shared keys fr IPsec. 3.5 Security Management Windws includes several functins t manage security plicies. Plicy management is cntrlled thrugh a cmbinatin f access cntrl, membership in administratr grups, and privileges. 3.6 Prtectin f the TOE s Security Functins Windws prvides a number f features t ensure the prtectin f TOE security functins. Windws prtects against unauthrized data disclsure and mdificatin by using a suite f Internet standard prtcls including IPsec, IKE, and ISAKMP. Windws ensures prcess islatin security fr all prcesses thrugh private virtual address spaces, executin cntext, and security cntext. The Windws data structures defining prcess address space, executin cntext, memry prtectin, and security cntext are stred in prtected kernel-mde memry. Windws includes self-testing features that ensure the integrity f executable prgram images and its cryptgraphic functins. Finally, Windws prvides a trusted update mechanism t update Windws binaries itself. 3.7 Trusted Path fr Cmmunicatin Windws uses the IPsec suite f prtcls t prvide a Virtual Private Netwrk Cnnectin (VPN) between itself, acting as a VPN client, and a VPN gateway. 4 Assumptins The ST identifies the fllwing assumptins abut the use f the prduct: Infrmatin cannt flw nt the netwrk t which the VPN client's hst is cnnected withut passing thrugh the TOE. Physical security, cmmensurate with the value f the TOE and the data it cntains, is assumed t be prvided by the envirnment. TOE Administratrs are trusted t fllw and apply all administratr guidance in a trusted manner. 4.1 Clarificatin f Scpe All evaluatins (and all prducts) have limitatins, as well as ptential miscnceptins that need clarifying. This text cvers sme f the mre imprtant limitatins and clarificatins f this evaluatin. Nte that: 1. As with any evaluatin, this evaluatin nly shws that the evaluated cnfiguratin meets the security claims made, with a certain level f assurance (the assurance activities specified in the Prtectin Prfile fr IPsec Virtual Private Netwrk (VPN) Clients and perfrmed by the evaluatin team). 4

9 Micrsft Windws IPsec VPN Client 2. This evaluatin cvers nly the specific prduct versin identified in this dcument, and nt any earlier r later versins released r in prcess. 3. This evaluatin did nt specifically search fr, nr attempt t explit, vulnerabilities that were nt bvius r vulnerabilities t bjectives nt claimed in the ST. The CEM defines an bvius vulnerability as ne that is easily explited with a minimum f understanding f the TOE, technical sphisticatin and resurces. 5 Architectural Infrmatin This sectin prvides a high level descriptin f the TOE and its cmpnents as described in the Security Target and guidance dcumentatin. The lgical bundary f the TOE includes: The IPv4 / IPv6 netwrk stack in the kernel. The IPsec mdule in user-mde. The IKE and AuthIP Keying Mdules service which hsts the IKE and Authenticated Internet Prtcl (AuthIP) keying mdules. These keying mdules are used fr authenticatin and key exchange in Internet Prtcl security (IPsec). The Remte Access Service device driver in the kernel, which is used primarily fr ad hc r user-defined VPN cnnectins; knwn as the RAS IPsec VPN r RAS VPN. The IPsec Plicy Agent service which enfrces IPsec plicies. The Cryptgraphic Services mdule which cnfirms the signatures f Windws prgram files. Windws Explrer which can be used t create VPN cnnectins and check the integrity f Windws files and updates. The Certificates MMC snap-in which is used when the authrized administratr needs t add a certificate, such as a rt CA r machine certificate, t their certificate stre. 2 The Cmputer Cnfiguratin MMC snap-in which can be used t set the auditing plicy fr the cmputer. The Event Viewer MMC snap-in which is used t view entries in the audit lg. The IP Security Mnitr MMC snap-in which can be used t view active IPsec security assciatins. The IP Security Plicies MMC snap-in which is used t cnfigure IPsec plicies. The Windws Registry t manually set certain prperties fr the RAS interface. The netsh cmmand line applicatin which can be used t manage IPsec settings. The auditpl cmmand line applicatin which can be used t set the auditing plicy fr the cmputer. The sfc cmmand line applicatin which can be used t check the integrity and repair Windws files. 2 Fr cmmn deplyment scenaris manually adding these certificates shuld nt be necessary. 5

10 Micrsft Windws IPsec VPN Client The Get-Authenticde PwerShell Cmdlet which can be used t cnfirm the signatures f Windws prgram files. The fllwing PwerShell Cmdlets t manage IPsec: Get-NetIPsecMainMdeSA Get-NetIPsecQuickMdeSA New-NetIPsecAuthPrpsal New-NetIPsecPhase1AuthSet New-NetIPsecMainMdeCryptPrpsal New-NetIPsecMainMdeCryptSet New-NetIPsecMainMdeRule New-NetIPsecQuickMdeCryptPrpsal New-NetIPsecQuickMdeCryptSet New-NetIPsecRule Set-NetIPsecMainMdeCryptSet Set-NetIPsecQuickMdeCryptSet. Physically, each TOE tablet, wrkstatin, r server cnsists f an ARMv7 Thumb-2, x86 r x64 cmputer. The TOE executes n prcessrs frm Intel (x86 and x64), AMD (x86 and x64), Qualcmm (ARM), r NVIDIA (ARM). A set f devices may be attached as part f the TOE: Display Mnitrs Fixed Disk Drives (including disk drives and slid state drives) Remvable Disk Drives (including USB strage) Netwrk Adaptr Keybard Muse Printer Audi Adaptr CD-ROM Drive Smart Card Reader Trusted Platfrm Mdule (TPM) versin 1.2 r 2.0. While this set f devices is larger than is needed t evaluate IPsec, it is the same set f devices as the General Purpse Operating System Prtectin Prfile evaluatin. By using the same set f devices fr bth evaluatins, cnsumers can gain assurance by using bth cre OS capabilities and IPsec in cmbinatin. The TOE des nt include any netwrk infrastructure cmpnents. 6

11 Micrsft Windws IPsec VPN Client 6 Dcumentatin 6.1 Prduct Guidance The guidance dcumentatin examined during the curse f the evaluatin and delivered with the TOE is as fllws: Micrsft Windws 8, Micrsft Windws Server 2012, Micrsft Windws RT Cmmn Criteria Supplemental Admin Guidance fr IPsec VPN Clients On-line dcumentatin referenced by the Supplemental Admin Guidance 7 Prduct Testing This sectin describes the testing effrts f the Evaluatin Team. It is derived frm infrmatin cntained in the Micrsft Windws 8, Windws RT, Windws Server 2012 Test Reprt and Micrsft Windws 8, Windws RT, Windws Server 2012 Detailed Test Results. Evaluatin team testing was cnducted at the Leids (frmerly SAIC) CCTL in Clumbia, MD. 7.1 Develper Testing The assurance activities in the Prtectin Prfile fr IPsec Virtual Private Netwrk (VPN) Clients d nt specify any requirement fr develper testing f the TOE. 7.2 Evaluatin Team Independent Testing The evaluatin team devised a Test Plan based n the Testing Assurance Activities specified in the Prtectin Prfile fr IPsec Virtual Private Netwrk (VPN) Clients. The Test Plan described hw each test activity was t be instantiated within the TOE test envirnment. The evaluatin team executed the tests specified in the Test Plan and dcumented the results in the Micrsft Windws 8, Windws RT, Windws Server 2012 IPsec VPN Client Test Reprt. Tests were executed n all platfrms claimed in the ST, with the exceptin f Windws Server 2012 Datacenter Editin, fr which an equivalence argument t the Windws Server 2012 Standard Editin was prvided. The testing demnstrated the TOE satisfies the security functinal requirements specified in the Prtectin Prfile fr IPsec Virtual Private Netwrk (VPN) Clients. 7.3 Penetratin Testing The evaluatin team cnducted an pen surce search fr vulnerabilities in the prduct. The pen surce search did nt identify any vulnerabilities applicable t the TOE in its evaluated cnfiguratin, but did identify a general vulnerability f IPsec VPN clients, related t unverified Cmmn Name in X.509 certificates. The evaluatin team determined the tests already specified in the Prtectin Prfile fr IPsec Virtual Private Netwrk (VPN) Clients were sufficient t test fr this vulnerability, and evaluatin team testing demnstrated the TOE is nt subject t the vulnerability. 8 Evaluated Cnfiguratin The evaluated versin f the TOE is Micrsft Windws 8, Micrsft Windws RT, and Micrsft Windws Server The TOE is delivered by six prduct variants f Windws 8, Windws RT, and Windws Server 2012: Micrsft Windws 8 Editin (32-bit and 64-bit versins) Micrsft Windws 8 Pr Editin (32-bit and 64-bit versins) 7

12 Micrsft Windws IPsec VPN Client Micrsft Windws 8 Enterprise Editin (32-bit and 64-bit versins) Micrsft Windws RT Micrsft Windws Server 2012 Standard Editin Micrsft Windws Server 2012 Datacenter Editin The fllwing security updates and patches must be applied t the abve Windws 8 prducts: All critical security updates published as f February The fllwing security updates must be applied t the abve Windws RT prducts: All critical security updates published as f February The fllwing security updates must be applied t the abve Windws Server 2012 prducts: All critical security updates published as f February Physically, each TOE tablet, wrkstatin, r server cnsists f an ARMv7 Thumb-2, x86 r x64 cmputer. The TOE executes n prcessrs frm Intel (x86 and x64), AMD (x86 and x64), Qualcmm (ARM), r NVIDIA (ARM). Evaluatin testing tk place n the fllwing hardware platfrms: Micrsft Surface RT Micrsft Surface Pr ASUS VivTab RT Dell XPS 10 Dell OptiPlex 755, 3.0 GHz Intel Cre 2 Du E8400, 64-bit. The evaluatin cvered the fllwing mechanisms that invke the IPsec VPN Client: the Remte Access Service (RAS) interface; and the underlying (raw) IPsec interface. 9 Results f the Evaluatin The evaluatin was cnducted based upn the assurance activities specified in the Prtectin Prfile fr IPsec Virtual Private Netwrk (VPN) Clients, in cnjunctin with versin 3.1, revisin 4 f the CC and the CEM. A verdict fr an assurance cmpnent is determined by the resulting verdicts assigned t the crrespnding evaluatr actin elements. The evaluatin team assigned a Pass, Fail, r Incnclusive verdict t each wrk unit f each assurance cmpnent. Fr Fail r Incnclusive wrk unit verdicts, the evaluatin team advised the develper f issues requiring reslutin r clarificatin within the evaluatin evidence. In this way, the evaluatin team assigned an verall Pass verdict t the assurance cmpnent nly when all f the wrk units fr that cmpnent had been assigned a Pass verdict. The validatin team s assessment f the evidence prvided by the evaluatin team is that it demnstrates that the evaluatin team perfrmed the assurance activities in the Prtectin Prfile fr IPsec Virtual Private Netwrk (VPN) Clients, and crrectly verified that the prduct meets the claims in the ST. The details f the evaluatin are recrded in the Evaluatin Technical Reprt (ETR), which is cntrlled by the SAIC CCTL. The security assurance requirements are listed in the fllwing table. TOE Security Assurance Requirements 8

13 Micrsft Windws IPsec VPN Client Assurance Cmpnent ID ADV_FSP.1 AGD_OPE.1 AGD_PRE.1 ALC_CMC.1 ALC_CMS.1 ATE_IND.1 AVA_VAN.1 Assurance Cmpnent Name Basic functinal specificatin Operatinal user guidance Preparative prcedures Labeling f the TOE TOE CM cverage Independent testing - cnfrmance Vulnerability survey 10 Validatr Cmments/Recmmendatins The validatrs d nt have any additinal cmments r recmmendatins regarding the TOE. 11 Annexes Nt applicable. 12 Security Target The ST fr this prduct s evaluatin is Micrsft Windws 8, Micrsft Windws RT, Micrsft Windws Server 2012 IPsec VPN Client Security Target, Versin 1.0, January 23, Bibligraphy 1. Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 1: Intrductin and general mdel, Versin 3.1, Revisin 4, September 2012, CCMB Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 2: Security functinal requirements, Versin 3.1, Revisin 4, September 2012, CCMB Cmmn Criteria fr Infrmatin Technlgy Security Evaluatin Part 3: Security assurance requirements, Versin 3.1, Revisin 4, September 2012, CCMB Cmmn Methdlgy fr Infrmatin Technlgy Security: Evaluatin Methdlgy, Versin 3.1, Revisin 4, September 2012, CCMB Prtectin Prfile fr IPsec Virtual Private Netwrk (VPN) Clients, Versin 1.1, 30 December Micrsft Windws 8, Micrsft Windws RT, Micrsft Windws Server 2012 IPsec VPN Client Security Target, Versin 1.0, January 23,

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. Juniper Networks Security Appliances

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. Juniper Networks Security Appliances Natinal Infrmatin Assurance Partnership Cmmn Criteria Evaluatin and Validatin Scheme TM Validatin Reprt Juniper Netwrks Security Appliances Reprt Number: CCEVS-VR-10452-2012 Dated: 28 June 2012 Versin:

More information

Firewall Protection Profile

Firewall Protection Profile samhällsskydd ch beredskap 1 (10) ROS-ISÄK Rnny Janse 010-2404426 rnny.janse@msb.se Firewall Prtectin Prfile Extended Package: NAT samhällsskydd ch beredskap 2 (10) Innehållsförteckning 1. Intrductin...

More information

National Information Assurance Partnership

National Information Assurance Partnership Natinal Infrmatin Assurance Partnership TM Cmmn Criteria Evaluatin and Validatin Scheme Validatin Reprt Micrsft Windws Server 2003, Micrsft Windws XP Prfessinal, and Micrsft Windws XP embedded Reprt Number:

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

National Information Assurance Partnership

National Information Assurance Partnership Natinal Infrmatin Assurance Partnership TM Cmmn Criteria Evaluatin and Validatin Scheme Validatin Reprt Apple Cmputer Mac OS X Versin 10.3.6 Reprt Number: CCEVS-VR-05-0086 Dated: 13 January 2005 Versin:

More information

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1 Preparing t Deply Reflectin : A Guide fr System Administratrs Versin 14.1 Table f Cntents Table f Cntents... 2 Preparing t Deply Reflectin 14.1:... 3 A Guide fr System Administratrs... 3 Overview f the

More information

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2. Oracle s Hyperin Data Integratin Management Release 9.2.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 Intrductin t Data Integratin Management... 1 Data Integratin Management Adapters...

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Microsoft Certified Database Administrator (MCDBA)

Microsoft Certified Database Administrator (MCDBA) Micrsft Certified Database Administratr (MCDBA) 460 hurs Curse Overview/Descriptin The MCDBA prgram and credential is designed fr individuals wh want t demnstrate that they have the necessary skills t

More information

Ten Steps for an Easy Install of the eg Enterprise Suite

Ten Steps for an Easy Install of the eg Enterprise Suite Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Restricted Document. Pulsant Technical Specification

Restricted Document. Pulsant Technical Specification Pulsant Technical Specificatin Title Pulsant Dedicated Server Department Prduct Develpment Cntributrs RR Classificatin Restricted Versin 1.0 Overview Pulsant ffer a Dedicated Server service t underpin

More information

Topic Outline. Page 2 of 5

Topic Outline. Page 2 of 5 C O U R S E D E S C R I P T I O N CTX-1258AI Citrix Presentatin Server 4.0: Supprt This curse prvides learners with the skills necessary t mnitr, maintain and trublesht netwrk envirnments running Citrix

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Learn More Cloud Extender Requirements Cheat Sheet

Learn More Cloud Extender Requirements Cheat Sheet MaaS360.cm > Learn Mre Learn Mre Clud Extender Requirements Cheat Sheet OVERVIEW This dcument defines all requirements t ensure a successfully installatin f the Clud Extender t enable use f ActiveSync

More information

Name. Description. Rationale

Name. Description. Rationale Cmplliiance Cmpnentt Descriptin Ratinale Benefits List the Dmain List the Discipline List the Technlgy Area List Prduct Cmpnent Dcument the Cmpliance Cmpnent Type Cmpnent Sub-type DEEFFI INITION Hst-Based

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

CSC IT practix Recommendations

CSC IT practix Recommendations CSC IT practix Recmmendatins CSC Healthcare 28th January 2014 Versin 3 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Securely Managing Cryptographic Keys used within a Cloud Environment

Securely Managing Cryptographic Keys used within a Cloud Environment Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta sarbari@electrsft-inc.cm 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin

More information

Network Device Protection Profile (NDPP) Extended Package Stateful Traffic Filter Firewall

Network Device Protection Profile (NDPP) Extended Package Stateful Traffic Filter Firewall Netwrk Device Prtectin Prfile (NDPP) Extended Package Stateful Traffic Filter Firewall Infrmatin Assurance Directrate 19 December 2011 Versin 1.0 Table f Cntents 1 Intrductin... 3 1.1 Cnfrmance Claims...

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

Licensing Windows Server 2012 for use with virtualization technologies

Licensing Windows Server 2012 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This

More information

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn SlarWinds Technical Reference Preparing an Orin Failver Engine Installatin Intrductin t the Orin Failver Engine... 1 General... 1 Netwrk Architecture Optins and... 3 Server Architecture Optins and... 4

More information

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is

More information

BackupAssist SQL Add-on

BackupAssist SQL Add-on WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system

More information

Copyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.com/ We have attempted to make these documents complete, accurate, and

Copyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.com/ We have attempted to make these documents complete, accurate, and ii Cpyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.cm/ We have attempted t make these dcuments cmplete, accurate, and useful, but we cannt guarantee them t be perfect. When we

More information

Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel

Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel An HP PrCurve Netwrking Applicatin Nte Traffic mnitring n PrCurve switches with sflw and InMn Traffic Sentinel Cntents 1. Intrductin... 3 2. Prerequisites... 3 3. Netwrk diagram... 3 4. sflw cnfiguratin

More information

State of Wisconsin DET Dedicated Virtual Host Services Offering Definition

State of Wisconsin DET Dedicated Virtual Host Services Offering Definition State f Wiscnsin DET Dedicated Virtual Hst Services Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 10/29/2010 1.0 Phil Staley Initial draft 11/3/2010 1.1 Phil Staley Ryan McKee Secnd

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

MITEL OPEN INTEGRATION GATEWAY (OIG): END- CUSTOMER DEVELOPMENT & LICENSING

MITEL OPEN INTEGRATION GATEWAY (OIG): END- CUSTOMER DEVELOPMENT & LICENSING MITEL OPEN INTEGRATION GATEWAY (OIG): END- CUSTOMER DEVELOPMENT & LICENSING JULY, 2014 The infrmatin cnveyed in this dcument is cnfidential and prprietary t Mitel and is intended slely fr Mitel emplyees

More information

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8 McAfee Enterprise Security Manager Data Surce Cnfiguratin Guide Data Surce: Infblx NIOS September 2, 2014 Infblx NIOS Page 1 f 8 Imprtant Nte: The infrmatin cntained in this dcument is cnfidential and

More information

Licensing Windows Server 2012 R2 for use with virtualization technologies

Licensing Windows Server 2012 R2 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This

More information

Loss Share Data Specifications Change Management Plan

Loss Share Data Specifications Change Management Plan Lss Share Data Specificatins Change Management Plan Last Updated: 2/27/2013 Table f Cntents I. Purpse... 3 II. Change Management Apprach... 3 III. Categries f Revisins... 4 IV. Help and Supprt... 6 Lss

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...

More information

Attunity RepliWeb SSL Guide

Attunity RepliWeb SSL Guide Attunity RepliWeb SSL Guide Sftware Versin 5.2 June 25, 2012 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm, Supprt: http://supprt.repliweb.cm

More information

Best Practices for Optimizing Performance and Availability in Virtual Infrastructures

Best Practices for Optimizing Performance and Availability in Virtual Infrastructures Best Practices fr Optimizing Perfrmance and Availability in Virtual Infrastructures www.nimsft.cm Best Practices fr Optimizing Perfrmance and Availability in Virtual Infrastructures PAGE 2 Table f Cntents

More information

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Audit Cmmittee Charter St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Versin 2.0, 22 February 2016 Apprver Bard f Directrs St Andrew

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U

More information

DVS Enterprise Test Results for Microsoft Lync 2013 and Citrix XenDesktop 7. Dell Client Cloud Computing Engineering Revision: 1.

DVS Enterprise Test Results for Microsoft Lync 2013 and Citrix XenDesktop 7. Dell Client Cloud Computing Engineering Revision: 1. DVS Enterprise Test Results fr Micrsft Lync 2013 and Citrix XenDesktp 7 Dell Client Clud Cmputing Engineering Revisin: 1.0 11/6/13 THIS DOCUMENT IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010 OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity

More information

Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents

Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents Level 1 Technical RealPresence Web Suite and Web Suite Pr Cntents 1 - Glssary... 2 2 Features... 3 RealPresence Platfrm integratin... 3 RealPresence Web Suite Sftware... 3 Sftware Keys... 3 3 - Web Client

More information

Caching Software Performance Test: Microsoft SQL Server Acceleration with FlashSoft Software 3.8 for Windows Server

Caching Software Performance Test: Microsoft SQL Server Acceleration with FlashSoft Software 3.8 for Windows Server The linked image cannt be displayed. The file may have been mved, renamed, r deleted. Verify that the link pints t the crrect file and lcatin. Technical Brief Caching Sftware Perfrmance Test: Micrsft SQL

More information

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved. Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

ArcSight ESM 6.0c Patch 1. Security Target

ArcSight ESM 6.0c Patch 1. Security Target ArcSight ESM 6.0c Patch 1 Security Target Versin 2.0 12 February 2014 Prepared fr: ArcSight, an HP Cmpany 1140 Enterprise Way Sunnyvale, CA 94089 Prepared By: Science Applicatins Internatinal Crpratin

More information

Instant Chime for IBM Sametime Quick Start Guide

Instant Chime for IBM Sametime Quick Start Guide Instant Chime fr IBM Sametime Quick Start Guide Fall 2014 Cpyright 2014 Instant Technlgies. All rights reserved. Cpyright and Disclaimer This dcument, as well as the sftware described in it, is furnished

More information

HOWTO: How to configure SSL VPN tunnel gateway (office) to gateway

HOWTO: How to configure SSL VPN tunnel gateway (office) to gateway HOWTO: Hw t cnfigure SSL VPN tunnel gateway (ffice) t gateway Hw-t guides fr cnfiguring VPNs with GateDefender Integra Panda Security wants t ensure yu get the mst ut f GateDefender Integra. Fr this reasn,

More information

1)What hardware is available for installing/configuring MOSS 2010?

1)What hardware is available for installing/configuring MOSS 2010? 1)What hardware is available fr installing/cnfiguring MOSS 2010? 2 Web Frnt End Servers HP Prliant DL 380 G7 2 quad cre Intel Xen Prcessr E5620, 2.4 Ghz, Memry 12 GB, 2 HP 146 GB drives RAID 5 2 Applicatin

More information

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

FY-2006 Networking and Security Engineering and Operations NASA Task TM: Richard Kurak

FY-2006 Networking and Security Engineering and Operations NASA Task TM: Richard Kurak FY-2006 Task A-03: Netwrking and Security Engineering and Operatins NASA Task TM: Richard Kurak Task Summary: The Office f Chief Infrmatin Office (OCIO) is respnsible fr prviding ttal cmmunicatins capabilities

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure

More information

IMT Standards. Standard number A000014. GoA IMT Standards. Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical

IMT Standards. Standard number A000014. GoA IMT Standards. Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical IMT Standards IMT Standards Oversight Cmmittee Gvernment f Alberta Effective Date: 2010-09-30 Scheduled Review: 2011-03-30 Last Reviewed: Type: Technical Standard number A000014 Electrnic Signature Metadata

More information

ScaleIO Security Configuration Guide

ScaleIO Security Configuration Guide ScaleIO Security Cnfiguratin Guide 1 Intrductin This sectin prvides an verview f the settings available in ScaleIO t ensure secure peratin f the prduct: Security settings are divided int the fllwing categries:

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Linux

Dell InTrust 11.0. Preparing for Auditing and Monitoring Linux Dell InTrust 11.0 Preparing fr Auditing and Mnitring Linux 2015 Dell Inc. ALL RIGHTS RESERVED. This guide cntains prprietary infrmatin prtected by cpyright. The sftware described in this guide is furnished

More information

CallRex 4.2 Installation Guide

CallRex 4.2 Installation Guide CallRex 4.2 Installatin Guide This dcument describes hw t install CallRex 4.2. It cvers the fllwing: CallRex 4.2 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console INSTALLATION GUIDE Marshal Reprting Cnsle Installatin Guide Marshal Reprting Cnsle March, 2009 Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 3 Sftware Prerequisites 3 Installatin

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages

More information

Network Defense Specialist. Course Title: Network Defense Specialist: Security and Vulnerability Assessment

Network Defense Specialist. Course Title: Network Defense Specialist: Security and Vulnerability Assessment Curse Title: Netwrk Defense Specialist: Security and Vulnerability Assessment Page 1 f 11 Curse Descriptin The Netwrk Defense Series frm EC-Cuncil Press is cmprised f 5 bks designed t educate learners

More information

Integrating With incontact dbprovider & Screen Pops

Integrating With incontact dbprovider & Screen Pops Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint

More information

Monitor Important Windows Security Events using EventTracker

Monitor Important Windows Security Events using EventTracker Mnitr Imprtant Windws Security Events using EventTracker White Paper Publicatin Date: Mar 14, 2014 EventTracker 8815 Centre Park Drive Clumbia MD 21045 www.eventtracker.cm EventTracker: Mnitr Imprtant

More information

Getting Started Guide

Getting Started Guide fr SQL Server www.lgbinder.cm Getting Started Guide Dcument versin 1 Cntents Installing LOGbinder fr SQL Server... 3 Step 1 Select Server and Check Requirements... 3 Select Server... 3 Sftware Requirements...

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is

More information

ABELMed Platform Setup Conventions

ABELMed Platform Setup Conventions ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require

More information

BES12 Jumpstart Program Description ( Jumpstart Program Description )

BES12 Jumpstart Program Description ( Jumpstart Program Description ) BES12 Jumpstart Prgram Descriptin ( Jumpstart Prgram Descriptin ) This dcument includes all attached Annexes, is prvided fr infrmatinal purpses nly, and des nt in itself cnstitute a binding legal dcument.

More information

CNS-205: Citrix NetScaler 11 Essentials and Networking

CNS-205: Citrix NetScaler 11 Essentials and Networking CNS-205: Citrix NetScaler 11 Essentials and Netwrking Overview The bjective f the Citrix NetScaler 11 Essentials and Netwrking curse is t prvide the fundatinal cncepts and skills necessary t implement,

More information

WatchDox Server. Administrator's Guide. Version 3.8.5

WatchDox Server. Administrator's Guide. Version 3.8.5 WatchDx Server Administratr's Guide Versin 3.8.5 Cnfidentiality This dcument cntains cnfidential material that is prprietary WatchDx. The infrmatin and ideas herein may nt be disclsed t any unauthrized

More information

ITIL Release Control & Validation (RCV) Certification Program - 5 Days

ITIL Release Control & Validation (RCV) Certification Program - 5 Days ITIL Release Cntrl & Validatin (RCV) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management

More information

FINANCIAL SERVICES FLASH REPORT

FINANCIAL SERVICES FLASH REPORT FINANCIAL SERVICES FLASH REPORT Draft Regulatry Cmpliance Management Guideline Released by the Office f the Superintendent f Financial Institutins May 5, 2014 On April 30, 2014, the Office f the Superintendent

More information

Avatier Identity Management Suite

Avatier Identity Management Suite Avatier Identity Management Suite AIMS Versin 9 System Requirements Versin 9 2603 Camin Ramn Suite 110 San Ramn, CA 94583 Phne: 800-609-8610 925-217-5170 FAX: 925-217-0853 Email: supprt@avatier.cm Page

More information

PROTIVITI FLASH REPORT

PROTIVITI FLASH REPORT PROTIVITI FLASH REPORT The PCI Security Standards Cuncil Releases PCI DSS Versin 3.2 May 9, 2016 On April 28, 2016, the PCI Security Standards Cuncil (PCI SSC) released PCI Data Security Standard (PCI

More information

Citrix XenServer from HP Getting Started Guide

Citrix XenServer from HP Getting Started Guide Citrix XenServer frm HP Getting Started Guide Overview This guide utlines the basic setup, installatin, and cnfiguratin steps required t begin using yur Citrix XenServer frm HP. A first time wizard-based

More information

9 ITS Standards Specification Catalog and Testing Framework

9 ITS Standards Specification Catalog and Testing Framework New Yrk State ITS Standards Specificatin Develpment Guide 9 ITS Standards Specificatin Catalg and Testing Framewrk This chapter cvers cncepts related t develpment f an ITS Standards Specificatin Catalg

More information

Presentation: The Demise of SAS 70 - What s Next?

Presentation: The Demise of SAS 70 - What s Next? Presentatin: The Demise f SAS 70 - What s Next? September 15, 2011 1 Presenters: Jeffrey Ziplw - Partner BlumShapir Jennifer Gerasimv Senir Manager Delitte. SAS 70 Backgrund and Overview Purpse f a SAS

More information

Issuing of qualifications and statement of attainment Policy and Procedures Version: 5.0 Last Modified: 12 February 2015

Issuing of qualifications and statement of attainment Policy and Procedures Version: 5.0 Last Modified: 12 February 2015 Issuing f qualificatins and statement f attainment Plicy and Prcedures Versin: 5.0 Last Mdified: 12 February 2015 Purpse Duke Cllege issues AQF certificatin dcumentatin nly t a learner whm it has assessed

More information

State of Wisconsin DET Agency Managed Virtual Services Service Offering Definition

State of Wisconsin DET Agency Managed Virtual Services Service Offering Definition State f Wiscnsin DET Agency Managed Virtual Services Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 6/03/08 1.0 James Sylla Initial draft 9/21/11 1.7 Amy Dustin Annual review

More information

This guide is intended for administrators, who want to install, configure, and manage SAP Lumira, server for BI Platform

This guide is intended for administrators, who want to install, configure, and manage SAP Lumira, server for BI Platform Hw T install SAP Lumira, server n SAP BusinessObjects BI platfrm Distributed Install Applies t: SAP Lumira, server versin fr the SAP BusinessObjects BI platfrm Summary This guide is intended fr administratrs,

More information

Provisioning Services Architecture Overview. User Account Context / Service Account Context

Provisioning Services Architecture Overview. User Account Context / Service Account Context This article prvides a descriptin abut hw the Prvisining Services cmpnents interact with each ther and hw they shuld be cnfigured t grant adequate permissins. Prvisining Services Architecture Overview

More information

Help Desk Level Competencies

Help Desk Level Competencies Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar

More information

Software and Hardware Change Management Policy for CDes Computer Labs

Software and Hardware Change Management Policy for CDes Computer Labs Sftware and Hardware Change Management Plicy fr CDes Cmputer Labs Overview The cmputer labs in the Cllege f Design are clsely integrated with the academic needs f faculty and students. Cmputer lab resurces

More information

Protecting Point of Sale Devices from Targeted Attacks

Protecting Point of Sale Devices from Targeted Attacks Prtecting Pint f Sale Devices frm Targeted Attacks 1-Apr-14 Versin 1.0 Final Prepared by Sean Finnegan, Cybersecurity Directr Michael Hward, Principal Cybersecurity Architect MICROSOFT MAKES NO WARRANTIES,

More information

Internal Audit Charter and operating standards

Internal Audit Charter and operating standards Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw

More information