QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
|
|
|
- Clifton Rich
- 10 years ago
- Views:
Transcription
1 QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014
2 Copyright by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc Bridge Parkway Redwood Shores, CA (650)
3 Contents Welcome to WAS... 4 QualysGuard WAS Features... 4 About the Platform: Benefits for Users... 5 Let s Begin... 6 Let s go to WAS... 6 Add a new web application... 7 Launch a discovery scan... 8 View your discovery scan results... 9 Launch a vulnerability scan View your vulnerability scan results Configure scan schedules Check out your dashboard View a sitemap of your web application Using the Catalog Do you want to import Burp findings Reporting Account Management Contact Support
4 Welcome to WAS QualysGuard Web Application Scanning (WAS) enables organizations to assess, track and remediate web application vulnerabilities. Delivered on demand, the service allows users to: Crawl web applications and scan them for vulnerabilities Identify web applications handling of sensitive or secret data Customize: authentication, black/white lists, robots.txt, sitemap.xml and more View reports with recommended security coding practice and configuration QualysGuard WAS provides several major enhancements to help customers catalog their web applications on a global scale and scan them for vulnerabilities that can lead to exploitation. Delivered via the QualysGuard Cloud Platform and its Java-based backend, the WAS user interface (UI) raises the bar in terms of ease-of-use, flexible reporting and automation of scanning tasks. Web Application Scanning Lifecycle The web application scanning lifecycle assists users with managing security and compliance through web application creation, scanning, reporting and remediation. QualysGuard WAS Features Major features in QualysGuard WAS include: Scanning of web applications (Intranet, Internet) Fully interactive UI with flexible workflows and reporting Supports scanning HTML web applications with JavaScript and embedded Flash 4
5 Welcome to WAS Comprehensive detection of custom web application vulnerabilities including: OWASP Top 10 Vulnerabilities: SQL injection, cross-site scripting (XSS), source disclosure, directory traversal Checks web applications handling of sensitive or secret data Reports on recommended secure coding practice and configuration Differentiates exploitable fault-injection problems from simple information disclosure Customizable scanning options Customized crawling using Black/White lists, Robots.txt and Sitemap.xml files Supports common authentication schemes Performs brute force attacks using pre-defined and custom password lists Profiles custom web application behaviors Configures scanning performance with customizable performance level About the Platform: Benefits for Users New technologies implemented in the Java-based backend offer many benefits for users: UI with dynamic and interactive interfaces, wizards and new report templates to present scan data with a wide range of presentation options. Customizable template-driven reporting engine outputs reports in a variety of formats (html, pdf, encrypted pdf, ppt, xml, cvs). Fast searching of several extensive Qualys data sets, including scan results, asset data, scan profiles, users and vulnerabilities. Create and manage tags (static and dynamic) to group and organize web applications. Dynamic distribution of scans on multiple scanners based on availability and load to optimize scanning of large networks, drastically reducing the overall scan time required to complete large scan jobs. 5
6 Let s Begin Welcome to WAS. As you are getting started we recommend you first review the WAS features and become familiar with the user interface. Let s go to WAS It s easy. Just log in to QualysGuard and select WAS from the application picker. Your WAS dashboard will be blank until you (or another user) adds a web application and scans are completed in your account. It will be automatically updated as new scan results are ready. 6
7 Let s Begin Add a new web application Use the wizard to add your first web application. Enter the web application details and configure scan settings. Turn on Malware Monitoring for an external site if you want us to perform automatic daily malware scans. Tip: Turn help tips on in the title bar and get help for each setting as you mouse over a field name. Your web application appears in the Web Applications tab, where you can edit the application or launch a scan on it. Why use authentication? Using authentication allows our service to access to all parts of your web application during the crawling process. This way we can perform more in-depth assessment of your web application. Some web applications require authenticated access to the majority of their functionality. Authenticated scanning can be configured for HTML forms like login pages and server-based authentication (HTTP Basic, Digest, NTLM, or SSL client certificates). Just go to the Authentication tab, select New Record and configure an authentication record with access credentials. Form and server authentication may be combined as needed - we ll monitor the session state to ensure an authenticated scan remains authenticated throughout the crawl. Warning about scans and their potential impact Web application scans submit forms with test data. If this is not desired you should add configurations for black lists, POST data black lists, and/or select the GET only method within the option profile. Keep in mind when these configurations are used, testing of certain areas of the web application is not included and any vulnerabilities that exist in these areas may not be detected. 7
8 Let s Begin Launch a discovery scan We recommend that you start by running a discovery scan. A discovery scan finds information about your web application without performing vulnerability testing. This is a good way to understand where the scan will go and whether there are URIs you should blacklist for vulnerability scans. Select Web Applications (on the top menu). Click the Web Applications tab and then select New Scan > Discovery Scan. Enter your scan settings using the launch scan wizard. A scan name is provided and you can enter a custom one. Select a web application. If the application has defaults, these appear for Option Profile (scan settings) and Scanner Appliance. If there are no defaults, you must make selections. Want to use authentication? Be sure to select an authentication record that you ve configured for your application. Tell me about the option profile An option profile is a set of scan configuration options. We recommend Initial WAS Options to get started. Editing options in the profile allows you to customize crawling and to use password bruteforcing. Do I need a scanner appliance? Our security service provides cloud scanners for external scanning on the network perimeter. For internal scanning you need to setup a scanner appliance (physical or virtual). Go to VM > Scans > Appliances and select an option from the New menu and we ll walk you through the steps. (Do you have Express Lite? Your account may be enabled with External scanning, Internal scanning or both). 8
9 Let s Begin View your discovery scan results There are multiple ways to view discovery scan results. Check out the scan view Double click the finished discovery scan in the scan list to display the scan view. Overview shows the scan findings. Click Scan Details to see details like the date and time of the scan and the target web application. Click Scan Settings to see the crawling settings, detection scope, other settings you may have configured. Check out the full scan report Click View Report in the View Scan window to view the interactive scan report. You can view the report online, change its settings to update it and then save it to multiple formats. The Results section shows the scan findings. Each QID represents a security check from the KnowledgeBase. The Severity icons indicates the level of severity: minimal, medium and serious. While viewing the report, be sure to check QID Links Crawled and QID Scan Diagnostics. 9
10 Let s Begin Click a row to view details. Launch a vulnerability scan A vulnerability scan performs vulnerability checks, information gathered checks and sensitive content checks (if configured in the option profile). Vulnerability checks may include: cross-site vulnerability checks (persistent, reflected, header, browser-specific) and SQL injection vulnerabilities (regular and blind). Sensitive content checks may include: social security numbers - US Format, credit card numbers and custom strings. Let s get started. Select Scans on the top menu. Click the Scan List tab and then select New Scan > Vulnerability Scan. 10
11 Let s Begin The target for a vulnerability scan is the same as for a discovery scan. Review your settings.when you re ready to launch the scan, click Finish. View your vulnerability scan results There are multiple ways to view vulnerability scan results. Check out the scan preview Select the finished vulnerability scan in the scan list to display a preview of the scan results below the list area. 11
12 Let s Begin Check out the scan view To view the results of a completed vulnerability scan, double click the scan. For this demo application WAS was able to take a screenshot of the application and you ll see a thumbnail image. Click the image to go to the web application. A bar graph shows you a breakdown of the scan findings - vulnerabilities, sensitive content detections and information gathered. Tip: Want to see the scan report? Click the View Report button. The vulnerability checks (QIDs) performed by a web application scan are listed in the KnowledgeBase. We constantly update the KnowledgeBase as new security information becomes available. Click KnowledgeBase on the top menu. Vulnerability checks (in Red) include OWASP Top 10 Vulnerabilities: SQL injection, cross-site scripting (XSS), source disclosure and directory traversal. Information gathered checks (in Blue) identify information gathered during the scan process. This includes information about the web application and about the scan process itself. Red vulnerability severity levels 1-5: minimal, medium, serious, critical, urgent Blue information gathered severity levels 1-3: minimal, medium, serious 12
13 Let s Begin Check out the full scan report Here s the Results section of the scan report including the details of a selected vulnerability. Vulnerabilities are sorted by group. Click a vulnerability row to view all detected instances of that vulnerability. Click a vulnerability instance to display details. Configure scan schedules By scheduling scans you ll get results on a regular basis (daily, weekly or monthly) and during a time window convenient for your organization. You can also run one-time only scans. It s easy to schedule a scan. Just go to Scans > Schedules and select New Schedule. Select Scans on the top menu and then click the Schedules tab. 13
14 Let s Begin Check out your dashboard Your dashboard helps you understand the overall security status of your web applications and provides an interactive way to take actions within your account. The dashboard shows current security risks based on the most recent scan results on all your web applications. 1 View current vulnerability counts for your web applications. High Severity shows levels 4 and 5, Med Severity shows level 3, and Low Severity shows levels 1 and 2. Click an option to see details and further explore the findings 2 You ll see the number of malware detections if you ve enabled malware monitoring for your web applications (and we ve detected malware). You ll also see the highest severity level (High, Med or Low) of your detections. Click to see details in the MDS application. 3 Check out your most vulnerable web applications. 4 View discovered web applications in your Catalog. (This option is not available to Express Lite users.) 5 Check out your latest scans. Mouse over the Scan Date to view complete date and time information. 6 Check out your upcoming scans (your scan schedules). 7 Check out the latest reports. 14
15 Let s Begin View a sitemap of your web application The sitemap gives you an up-to-date view of the security of your entire web application based on the latest scan results. You can drill down to see nested links and explore the security of different parts of your application. Go to Web Applications > Web Applications, hover over a web application and choose View Sitemap from the Quick Actions menu. Here s a sample sitemap for a web application that has 271 total pages crawled, 306 total vulnerabilities and 8 sensitive content detections. 15
16 Let s Begin Filter the Sitemap Click one of the page view filters such as Crawled for crawled pages or Vulnerabilities for current vulnerabilities. Drill down to see nested links Double click a parent folder to display child links. Take actions on links You can create a new web application from a link, or add a link to a black list or white list. Just hover over a row and choose an action from the menu. You can view a link in your browser - just select that row then click the link in the right pane. Move the sitemap to a new browser window If you want to keep the sitemap open while you continue working in the WAS UI, click the icon in the upper right corner to move the sitemap to a new browser window. All the sitemap functionality remains available in the new window. 16
17 Let s Begin Using the Catalog The Catalog is the staging area for web applications you can choose to add to your subscription. Catalog entries are processed from completed maps and vulnerability scans in your account. (The Catalog feature is not available to Express Lite users.) How do I get started? Your catalog will be empty until you (or another user) launches maps and/or vulnerability scans using the VM application. Once they are complete you are ready to process the results. - For vulnerability scans, go to Web Applications > Catalog and select Update above the list. You can safely close the window and track the progress in the Catalog section. - For maps, go to Web Applications > Maps, select one or more maps and then select Process Results. You can safely close the window and track the progress in the Catalog section. You ll see new catalog entries for the newly discovered web applications. You can easily choose to add these web applications to your account and scan them for security risks. 17
18 Let s Begin Do you want to import Burp findings We recognize that there's a place for both automated scanning and attack proxies. To combine the best of both approaches, we've integrated the Burp Suite toolkit into WAS. Click the Burp option on the top menu to access the Burp Management feature. (This feature is not available to Express Lite users.) The Burp section gives you a way to store the findings discovered by the Burp Suite scanner with those discovered by WAS and share this information with multiple users. To learn more about this and future integrations refer to this blog article at the Qualys Community. Go to Burp > Reports and click Import to get started. You can manage your imported Burp reports in the Burp reports list. You ll see the issues from your imported reports in the Burp issues list. 18
19 Reporting Create and manage reports on your web applications within the Reports section. You can create various reports -Web Application Report, Scan Report, Scorecard Report and Catalog Report - and download them in various formats. All reports are interactive. You can create them online, change the parameters and settings and see results instantly. Create your first report Select Reports and then select New report, or click the + button (on the right, below your user name). How do I get started? Select a report type. In this example we ve selected Scan Report. Choose a target for your report. For a scan report, you can choose any number of scans that have the same target web application. Click Finish to create the report. Your report will appear on its own tab. 19
20 Reporting Here s a sample scan report. Click Edit Report if you want to change the report settings and apply filters to the report content. You might want to save the report, so that it s available to other users and available to you the next time you log in to WAS. To save the report, click Downloaded and select the format. The summary displays graphs showing the findings of the scans you reported on. 20
21 Reporting Scroll down to view the results. You ll see the detected vulnerabilities (QIDs) with their severity levels. Click a vulnerability row to view the instances of that vulnerability. Click an instance to view the Vulnerability Details window. Move your report to a new browser window If you want to do side-by-side comparisons or work with multiple reports at one time, click the icon in the report header to move your report to a new browser window. You can edit and download your report in the new window just as you would within the UI. 21
22 Reporting Manage your reports The Report List is where you view your reports, create new reports, and download them. 1 Launch new reports, save and download reports to the local file system in one of many formats or delete selected reports. 2 View your report history. Click column headings to sort reports by name, format, type, status and generation date. Mouse over a report to take quick actions. 3 Select one report and view it in the preview pane below the list. Use the actions menu in the preview pane to download or delete the selected report. 4 Search and filter your results. Search and apply filters to quickly find reports you re looking for. 22
23 Account Management How do I manage the web applications and users in my account? Tell me about tags The tag management feature allows you to create tags (static and dynamic) to group and organize your web applications. When your account has the Asset Tagging feature turned on you can manage tags within the Asset Management application - select AM from the application picker. Contact Support or your Account Manager if you are interested in using the Asset Tagging feature. You can manage tags for web applications and other configurations, for example option profiles and search lists. Express Lite users can manage tags for web applications only. What tags do I start with? You ll see certain asset tags in your account when you first log in. These are provided as a convenience, and you can add child tags to them to create tag trees. You can also create other toplevel tags, edit tags and assign them to tag trees and hierarchies. An Asset Group tag appears for each asset group in your account. An Unassigned Business Unit tag appears. All users are assigned to the Unassigned Business Unit tag unless your organization has configured custom business units. A Business Unit tag appears for each custom business unit in your account. Business units can be defined using the VM application. (Custom business units are not available for Express Lite users.) Where do I manage tags? You can manage tags by going to Configuration > Tag Management. If your account has the Asset Tagging feature turned on, you can manage tags within the Asset Management application - select AM from the application picker. Tell me about users Users are created in the VM application. Once a new user logs in to our security service and goes to the WAS application the user is automatically assigned WAS roles (what the user can do) and scope (what the user can access). We ll assign one or more WAS roles to each user, depending on the user's roles and permissions within the VM application. Are you an Express Lite user? If yes then all users will be Manager users. When these users go to the WAS application they will be assigned the Manager role with full scope (access to all configurations, scans and reports). 23
24 Contact Support Do you have another service type? We ll assign an initial WAS role automatically, based on the user's role within the VM application. You can edit user settings, including roles, scopes and permissions, using the Administration utility. You ll see this option in the application picker. What about the user scope? We ll assign each user an initial scope automatically, and this can be changed using the Administration utility. Users with the Manager role are granted full permissions and full scope. Other users (Scanners, Readers) are assigned the tag "Unassigned Business Unit or a custom business unit tag. Here s a summary of the initial user settings: Contact Support Qualys is committed to providing you with the most thorough support. Through online documentation, telephone help, and direct support, Qualys ensures that your questions will be answered in the fastest time possible. We support you 7 days a week, 24 hours a day. Access online support information at 24
QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015
QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Policy Compliance. Getting Started Guide. January 22, 2016
Policy Compliance Getting Started Guide January 22, 2016 Copyright 2011-2016 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
QualysGuard Asset Management
QualysGuard Asset Management Quick Start Guide January 28, 2014 Dynamic Asset Tagging provides a flexible and scalable way to automatically discover and organize the assets in your environment and make
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Security and Compliance Suite
Security and Compliance Suite Quick Tour The Qualys user interface is easy-to-use with powerful Web 2.0 capabilities featuring interactive dashboards, actionable menus and workflows, context-based interactions
Offline Scanner Appliance
Offline Scanner Appliance User Guide March 27, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc. All other
How To Tag Assets In A Microsoft Qoq On A Microsq.Com (For Free) On A Pc Or Macbook Or Macsoft.Com On A Macbook (For Paid) On An Ipad Or Ipad (
Dynamic Asset Tagging provides a flexible and scalable way to automatically discover and organize the assets in your environment and make them available for scanning, reporting and ticketing within Qualys.
Qualys PC/SCAP Auditor
Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS
Security and Compliance Suite Evaluator s Guide. August 11, 2015
Security and Compliance Suite Evaluator s Guide August 11, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.
Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive
Creating a generic user-password application profile
Chapter 4 Creating a generic user-password application profile Overview If you d like to add applications that aren t in our Samsung KNOX EMM App Catalog, you can create custom application profiles using
Managed Security Web Portal USER GUIDE
Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1
Elastic Detector on Amazon Web Services (AWS) User Guide v5
Elastic Detector on Amazon Web Services (AWS) User Guide v5 This guide is intended for Elastic Detector users on AWS. Elastic Detector is available as SaaS or deployed as a virtual appliance through an
Security and Compliance Suite Rollout Guide. August 4, 2015
Security and Compliance Suite Rollout Guide August 4, 2015 Copyright 2005-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Baylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Oracle Business Intelligence 11g OPN Advanced Workshop
Oracle Business Intelligence 11g OPN Advanced Workshop Lab Book OPN: Oracle Business Intelligence 11g Advanced Workshop OPN Workshop: BI 11g Advanced Seite 1 Authors Revision Jignesh Mehta Naresh Nemani
PCI Compliance. Network Scanning. Getting Started Guide
PCI Compliance Getting Started Guide Qualys PCI provides businesses, merchants and online service providers with the easiest, most cost effective and highly automated way to achieve compliance with the
GETTING STARTED WITH THE PCI COMPLIANCE SERVICE VERSION 2.3. May 1, 2008
GETTING STARTED WITH THE PCI COMPLIANCE SERVICE VERSION 2.3 May 1, 2008 Copyright 2006-2008 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys,
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
JD Edwards EnterpriseOne Tools. 1 Understanding JD Edwards EnterpriseOne Business Intelligence Integration. 1.1 Oracle Business Intelligence
JD Edwards EnterpriseOne Tools Embedded Business Intelligence for JD Edwards EnterpriseOne Release 8.98 Update 4 E21426-02 March 2011 This document provides instructions for using Form Design Aid to create
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Salesforce Customer Portal Implementation Guide
Salesforce Customer Portal Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered
Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.
Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.
TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE
.trust TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE 2007 Table of Contents Introducing Trustwave Vulnerability Management 3 1 Logging In and Accessing Scans 4 1.1 Portal Navigation and Utility Functions...
How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On
Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files
WebSphere Business Monitor V6.2 KPI history and prediction lab
Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
What is new or different in AppScan Enterprise v9.0.2 if you re upgrading from v9.0.1.1
What is new or different in AppScan Enterprise v9.0.2 if you re upgrading from v9.0.1.1 Larissa Berger Miriam Fitzgerald April 24, 2015 Abstract: This white paper guides customers through the new features
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)
Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning
EMC Smarts Network Configuration Manager
EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015
Load testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Expat Tracker. User Manual. 2010 HR Systems Limited
Expat Tracker User Manual Expat Tracker Assignee Management Software HR Systems Limited Expat Tracker All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic,
WebSphere Business Monitor V7.0 Business space dashboards
Copyright IBM Corporation 2010 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 7.0 LAB EXERCISE WebSphere Business Monitor V7.0 What this exercise is about... 2 Lab requirements... 2 What you should
Business Insight Report Authoring Getting Started Guide
Business Insight Report Authoring Getting Started Guide Version: 6.6 Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software,
Getting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant
How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup
MultiSite Manager. User Guide
MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.
WebSphere Business Monitor V6.2 Business space dashboards
Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 What this exercise is about... 2 Lab requirements... 2 What you should
Presentation Reporting Quick Start
Presentation Reporting Quick Start Topic 50430 Presentation Reporting Quick Start Websense Web Security Solutions Updated 19-Sep-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web
Community Edition 3.3. Getting Started with Alfresco Explorer Document Management
Community Edition 3.3 Getting Started with Alfresco Explorer Document Management Contents Copyright... 3 Introduction... 4 Important notes...4 Starting with Explorer... 5 Toolbar... 5 Sidebar...6 Working
UH CMS Basics. Cascade CMS Basics Class. UH CMS Basics Updated: June,2011! Page 1
UH CMS Basics Cascade CMS Basics Class UH CMS Basics Updated: June,2011! Page 1 Introduction I. What is a CMS?! A CMS or Content Management System is a web based piece of software used to create web content,
nopcommerce User Guide
nopcommerce User Guide Open source ecommerce solution Version 1.90 Copyright Notice Information in this document, including URL and other Internet Web site references, is subject to change without notice.
Strategic Asset Tracking System User Guide
Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data
ServerView Inventory Manager
User Guide - English FUJITSU Software ServerView Suite ServerView Inventory Manager ServerView Operations Manager V6.21 Edition October 2013 Comments Suggestions Corrections The User Documentation Department
ThirtySix Software WRITE ONCE. APPROVE ONCE. USE EVERYWHERE. www.thirtysix.net SMARTDOCS 2014.1 SHAREPOINT CONFIGURATION GUIDE THIRTYSIX SOFTWARE
ThirtySix Software WRITE ONCE. APPROVE ONCE. USE EVERYWHERE. www.thirtysix.net SMARTDOCS 2014.1 SHAREPOINT CONFIGURATION GUIDE THIRTYSIX SOFTWARE UPDATED MAY 2014 Table of Contents Table of Contents...
CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE
CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright
Specify the location of an HTML control stored in the application repository. See Using the XPath search method, page 2.
Testing Dynamic Web Applications How To You can use XML Path Language (XPath) queries and URL format rules to test web sites or applications that contain dynamic content that changes on a regular basis.
CTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
CMS Training. Prepared for the Nature Conservancy. March 2012
CMS Training Prepared for the Nature Conservancy March 2012 Session Objectives... 3 Structure and General Functionality... 4 Section Objectives... 4 Six Advantages of using CMS... 4 Basic navigation...
ESISS Security Scanner
ESISS Security Scanner How to use the ESISS Automated Security Scanner January 2013 v1.1 Table of Contents The ESISS Automated Security Scanner... 3 Using The ESISS Security Scanner... 4 1. Logging On...
Transaction Monitoring Version 8.1.3 for AIX, Linux, and Windows. Reference IBM
Transaction Monitoring Version 8.1.3 for AIX, Linux, and Windows Reference IBM Note Before using this information and the product it supports, read the information in Notices. This edition applies to V8.1.3
Eucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
ORACLE BUSINESS INTELLIGENCE WORKSHOP
ORACLE BUSINESS INTELLIGENCE WORKSHOP Integration of Oracle BI Publisher with Oracle Business Intelligence Enterprise Edition Purpose This tutorial mainly covers how Oracle BI Publisher is integrated with
SAS Business Data Network 3.1
SAS Business Data Network 3.1 User s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS Business Data Network 3.1: User's Guide. Cary,
VALUE LINE INVESTMENT SURVEY ONLINE USER S GUIDE VALUE LINE INVESTMENT SURVEY ONLINE. User s Guide
VALUE LINE INVESTMENT SURVEY ONLINE User s Guide Welcome to Value Line Investment Survey Online. This user guide will show you everything you need to know to access and utilize the wealth of information
Reconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
Managing Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 [email protected] Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
Xerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER
Vulnerability scanners are indispensable both for vulnerability assessments and penetration tests. One of the first things a tester does when faced with a network is fire up a network scanner or even several
Setting up your new Live Server Account
Setting up your new Live Server Account Welcome to Remote Data Backups LiveVault Service. This document will help you set up the agent service on your server as well as giving you some guidance on accessing
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started
Advanced Service Design
vcloud Automation Center 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Business Portal for Microsoft Dynamics GP 2010. User s Guide Release 5.1
Business Portal for Microsoft Dynamics GP 2010 User s Guide Release 5.1 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and
Edwin Analytics Getting Started Guide
Edwin Analytics Getting Started Guide This guide provides assistance for accessing and using Edwin Analytics, the Department of Elementary and Secondary Education s (ESE) online tool for expanding data
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.
Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
/ 1. Online Banking User Guide SouthStateBank.com / (800) 277-2175
/ 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will walk you
Using SQL Reporting Services with Amicus
Using SQL Reporting Services with Amicus Applies to: Amicus Attorney Premium Edition 2011 SP1 Amicus Premium Billing 2011 Contents About SQL Server Reporting Services...2 What you need 2 Setting up SQL
Stellar Phoenix. SQL Database Repair 6.0. Installation Guide
Stellar Phoenix SQL Database Repair 6.0 Installation Guide Overview Stellar Phoenix SQL Database Repair software is an easy to use application designed to repair corrupt or damaged Microsoft SQL Server
EMC Documentum Webtop
EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
PCRecruiter Internal Email Client
PCRecruiter Internal Email Client The standard email buttons on contact record screens and lists allow PCRecruiter users to send email out to any contact in the database. However, if you are using PCRecruiter
Configuring Salesforce
Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
HP Operations Orchestration Software
HP Operations Orchestration Software Software Version: 9.00 HP Business Availability Center Integration Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty The only
Acunetix Web Vulnerability Scanner. Manual V6.5. By Acunetix Ltd.
Acunetix Web Vulnerability Scanner Manual V6.5 By Acunetix Ltd. Acunetix Ltd. http://www.acunetix.com E-mail: [email protected] Information in this document is subject to change without notice. Companies,
Getting Started Guide - Desktop
Getting Started Guide - Desktop 1. Sign Up PERSONAL OPENTEXT CORE ACCOUNT To get started sharing and collaborating on your files from a Mac or Windows browser, you ll need to sign up for your OpenText
Recruiter s Resource Guide
Recruiter s Resource Guide First Edition 1.29.2015 Contents Section One Recruiting... 3 Accessing Team Georgia Careers... 4 My Setup Preferences... 5 Creating a Requisition... 6 Approving a Requisition...
ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01
ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
Quick Start Guide. Installation and Setup
Quick Start Guide Installation and Setup Introduction Velaro s live help and survey management system provides an exciting new way to engage your customers and website visitors. While adding any new technology
EBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators
EBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators Version 1.0 Last Updated on 15 th October 2011 Table of Contents Introduction... 3 File Manager... 5 Site Log...
Learn About Analysis, Interactive Reports, and Dashboards
Learn About Analysis, Interactive Reports, and Dashboards This document supports Pentaho Business Analytics Suite 5.0 GA and Pentaho Data Integration 5.0 GA, documentation revision February 3, 2014, copyright
OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010
OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010 CONTENTS What is Outlook Anywhere? Before you begin How do I configure Outlook Anywhere with Outlook 2010? How do I use Outlook Anywhere? I already
TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE
TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks
HP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
Adobe Marketing Cloud Bloodhound for Mac 3.0
Adobe Marketing Cloud Bloodhound for Mac 3.0 Contents Adobe Bloodhound for Mac 3.x for OSX...3 Getting Started...4 Processing Rules Mapping...6 Enable SSL...7 View Hits...8 Save Hits into a Test...9 Compare
HIRSCH Velocity Web Console Guide
HIRSCH Velocity Web Console Guide MAN012-1112 HIRSCH Velocity Web Console Guide MAN012-1112, November 2012 Version 1.1 Copyright 2012 Identive Group. All rights reserved. ScramblePad and ScrambleProx are
GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.
GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started with Mechanics
GP REPORTS VIEWER USER GUIDE
GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated
Oracle Business Intelligence Publisher: Create Reports and Data Models. Part 1 - Layout Editor
Oracle Business Intelligence Publisher: Create Reports and Data Models Part 1 - Layout Editor Pradeep Kumar Sharma Senior Principal Product Manager, Oracle Business Intelligence Kasturi Shekhar Director,
