LogLogic Symantec Endpoint Protection Log Configuration Guide
|
|
|
- Peregrine Walters
- 10 years ago
- Views:
Transcription
1 LogLogic Symantec Endpoint Protection Log Configuration Guide Document Release: September 2011 Part Number: LL ELS This manual supports LogLogic Symantec Endpoint Protection Release 1.0 and later, and LogLogic Software Release 5.1 and later until replaced by a new edition.
2 2011 LogLogic, Inc. Proprietary Information Trademarks This document contains proprietary and confidential information of LogLogic, Inc. and its licensors. In accordance with the license, this document may not be copied, disclosed, modified, transmitted, or translated except as permitted in writing by LogLogic, Inc. LogLogic and the LogLogic logo are trademarks or registered trademarks of LogLogic, Inc. in the United States and/or foreign countries. All other company or product names are trademarks or registered trademarks of their respective owners. Notice The information contained in this document is subject to change at any time without notice. All warranties with respect to the software and accompanying documentation are set our exclusively in the Software License Agreement or in the Product Purchase Agreement that covers the documentation. LogLogic, Inc. 110 Rose Orchard Way, Suite 200 San Jose, CA Tel: Fax: U.S. Toll Free:
3 Contents Preface About This Guide Technical Support Documentation Support Conventions Chapter 1 Configuring LogLogic s Symantec Endpoint Protection Introduction to Symantec Endpoint Protection Prerequisites Configuring Symantec Endpoint Protection Adding a Symantec Endpoint Protection Device Verifying the Configuration Chapter 2 How LogLogic Supports Symantec Endpoint Protection How LogLogic Captures Symantec Endpoint Protection Data LogLogic Real-Time Reports Appendix A Event Reference LogLogic Support for Symantec Endpoint Protection Events Symantec Endpoint Protection Log Configuration Guide 3
4 4 Symantec Endpoint Protection Log Configuration Guide
5 Preface About This Guide The LogLogic Appliance-based solution lets you capture and manage log data from all types of log sources in your enterprise. The LogLogic support for Symantec Endpoint Protection enables LogLogic Appliances to capture logs from machines running Symantec Endpoint Protection. Once the logs are captured and parsed, you can generate reports and create alerts on Symantec Endpoint Protection s operations. For more information on creating reports and alerts, see the LogLogic User Guide and LogLogic Online Help. Technical Support LogLogic is committed to the success of our customers and to ensuring our products improve customers' ability to maintain secure, reliable networks. Although LogLogic products are easy to use and maintain, occasional assistance might be necessary. LogLogic provides timely and comprehensive customer support and technical assistance from highly knowledgeable, experienced engineers who can help you maximize the performance of your LogLogic Appliances. To reach LogLogic Customer Support: Telephone: Toll Free LOGS Local EMEA or APAC: + 44 (0) or +44 (0) [email protected] You can also visit the LogLogic Support website at: When contacting Customer Support, be prepared to provide: Your name, address, phone number, and fax number Your company name and company address Your machine type and release version A description of the problem and the content of pertinent error messages (if any) Documentation Support Your feedback on LogLogic documentation is important to us. Send to [email protected] if you have questions or comments. Your comments will be reviewed and addressed by the LogLogic technical writing team. In your message, please indicate the software name and version you are using, as well as the title and document date of your documentation. Symantec Endpoint Protection Log Configuration Guide 3
6 Conventions LogLogic documentation uses the following conventions to highlight code and command-line elements: A monospace font is used for programming elements (such as code fragments, objects, methods, parameters, and HTML tags) and system elements (such as filenames, directories, paths, and URLs). A monospace bold font is used to distinguish system prompts or screen output from user responses, as in this example: username: system home directory: home\app A monospace italic font is used for placeholders, which are general names that you replace with names specific to your site, as in this example: LogLogic_home_directory\upgrade\ Straight brackets signal options in command-line syntax. For example: ls [-AabCcdFfgiLlmnopqRrstux1] [-X attr] [path...] 4 Symantec Endpoint Protection Log Configuration Guide
7 Chapter 1 Configuring LogLogic s Symantec Endpoint Protection This chapter describes the configuration steps involved to enable a LogLogic Appliance to capture Symantec Endpoint Protection logs. The configuration steps assume that you have a functioning LogLogic Appliance that can be configured to capture Symantec Endpoint Protection log data. Introduction to Symantec Endpoint Protection Prerequisites Configuring Symantec Endpoint Protection Adding a Symantec Endpoint Protection Device Verifying the Configuration Introduction to Symantec Endpoint Protection The LogLogic Appliance support for the Symantec s Antivirus and IDS/IPS events is now available. The Symantec s security policy will consist of specific rules enabled with logging used to capture and send to the LogLogic Appliance. These events will be auto-identified, if enabled, and parsed into the LogLogic report tables for later review. Prerequisites Prior to configuring Symantec Endpoint Protection and the LogLogic Appliance, ensure that you meet the following prerequisites: Symantec Endpoint Protection 11.0 Proper access permissions to make configuration changes. Administrative user on Symantec Endpoint Protection Server. LogLogic Appliance running Release 5.1 or later installed with a Log Source Package that includes Symantec Endpoint Protection support. Administrative access on the LogLogic Appliance. Configuring Symantec Endpoint Protection You must enable and configure Syslog on Symantec Endpoint Protection prior to configuring the LogLogic Appliance. Note: This document does not describe all features and functionality within Symantec Endpoint Protection regarding configuration and Syslog. For more information on these areas, see Symantec Endpoint Protection Product Documentation. Note: You may elect to briefly store the latest portion of the logs using the Symantec s memory; however the Symantec may not have the capacity to retain a all of the log data. Symantec Endpoint Protection Log Configuration Guide 7
8 To specify events log settings: 1. In the admin console, choose Admin > Server > highlight [name] Site 2. Click Configure External Logging Figure 1 Symantec Endpoint Protection Manager 3. Click Enable Transmission of Logs to a Syslog Server 4. Enter LogLogic Appliance information 8 Symantec Endpoint Protection Log Configuration Guide
9 Figure 2 External Logging for a Local Site 5. Click Log Filter tab; check which log types you want to send to the Loglogic Appliance. See appendix for parsed log types. Adding a Symantec Endpoint Protection Device If you do not want to utilize the auto-identification feature, you can manually add a Symantec Endpoint Protection device to the LogLogic Appliance before you redirect the logs. To add Symantec Endpoint Protection as a new device: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Administration > Manage Devices. The Device tab appears. 3. Click Add New. The Add Device tab appears. 4. Type in the following information for the device: Name Name for the Symantec Endpoint Protection device Description (optional) Description of the Symantec Endpoint Protection device Device Type Select Symantec Endpoint Protection from the drop-down menu Host IP IP address of the Symantec Endpoint Protection appliance Enable Select the Yes radio button Refresh Device Name through DNS Lookups (optional) Select this checkbox to enable the Name field to be automatically updated. The name is obtained using a reverse DNS lookup on the configured refresh interval. The DNS name overrides any manual name you assign. 5. Click Add. Symantec Endpoint Protection Log Configuration Guide 9
10 6. Verify that your new device appears in the Devices tab and that Enable is set to Yes. When the logs arrive from the specified Symantec Endpoint Protection appliance, the LogLogic Appliance uses the device you just added if the hostname or IP match. Verifying the Configuration To verify the Configuration: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Dashboards > Log Source Status. 3. Locate the IP address for each Symantec Endpoint Protection device. If the device name (Symantec Endpoint Protection) appears in the list of devices, then the configuration is correct (see Figure 1). Figure 3 Verification of the Symantec Endpoint Protection Configuration If the device does not appear in the Log Source Status tab, check the Symantec Endpoint Protection logs to identify if any events are being generated. If events were detected, but are still not appearing on the LogLogic Appliance, please verify the Symantec Endpoint Protection configuration and the LogLogic Appliance configuration. You can also verify that the LogLogic Appliance is properly capturing log data from Symantec Endpoint Protection by trying to view the data in the reports. LogLogic recommends checking the reports to make sure that the data obtained is valid and matches expectations. For more information, see LogLogic Real-Time Reports on page Symantec Endpoint Protection Log Configuration Guide
11 Chapter 2 How LogLogic Supports Symantec Endpoint Protection This chapter describes LogLogic s support for Symantec Endpoint Protection. LogLogic enables you to capture Symantec Endpoint Protection log data to monitor events. LogLogic supports Symantec Endpoint Protection logs. How LogLogic Captures Symantec Endpoint Protection Data LogLogic Real-Time Reports How LogLogic Captures Symantec Endpoint Protection Data Symantec Endpoint Protection streams events via Syslog to the LogLogic Appliance. Figure 4 Symantec Endpoint Protection with LogLogic Appliance as the Syslog Server Once the data is captured and parsed, you can generate reports and create alerts. For more information on creating reports and alerts, see the LogLogic User Guide and LogLogic Online Help. Table 1 on page 14 lists the Symantec Endpoint Protection Syslog messages that are supported by the LogLogic Appliance. Note: The LogLogic Appliance captures all messages from the Symantec Endpoint Protection logs, but includes only specific messages for report/alert generation. For more information, see Appendix A Event Reference on page 13 for sample log messages for each event and event to category mapping. Symantec Endpoint Protection Log Configuration Guide 11
12 LogLogic Real-Time Reports LogLogic provides pre-configured Real-Time Reports for Symantec Endpoint Protection log data. To access LMI 5 Real-Time Reports: 1. In the top navigation pane, click Reports. 2. Select Access Control The following Real-Time Reports are available: User Access Reports details on administrator activity in the Symantec Endpoint Protection Management console. User Authentication Reports Login events to the Symantec Endpoint Protection Management console. User Create/Deleted Reports Administrator activity on user adding and removing. User Last Activity Displays the last activity for the logged in user to the management console. 3. Click Threat Management. The following Real-Time Reports are available: Threat Activity Displays Antivirus and Antispam events detected by the endpoint clients. Configuration Activity Displays Location changes and policy updates on the endpoint clients Scan Activity Reports scan results on the endpoint clients HIPS Activity Displays alerts from IPS/IDS signatures, DDOS attacks, and port scan occurrences. You can create custom reports from the existing Real-Time Report templates. For more information, see the LogLogic User Guide and LogLogic Online Help. 12 Symantec Endpoint Protection Log Configuration Guide
13 Appendix A Event Reference This appendix lists the LogLogic-supported Symantec Endpoint Protection events. The LogLogic Symantec Endpoint Protection event table identifies events which can be analyzed through the LogLogic Agile Reports, as well as a sample log message. LogLogic Support for Symantec Endpoint Protection Events The following list describes the contents of each of the columns in the table below. Agile Reports/Search Defines if the Symantec Endpoint Protection event is available through the LogLogic Agile Reporting engine or through the search capabilities. If the event is available through the Agile Report engine, then you can use LogLogic s Real-Time Reports and Summary Reports to analyze and display the captured log data. Otherwise, all other supported events that are captured by the LogLogic Appliance can be viewed by performing a search for the log data. Event Category The category of the event can be either Operational or Audit Event Type Type of events, AntiVirus, IDS and User Access Reports Appears In LogLogic-provided reports that the event appears in Sample Log Message Sample Symantec Endpoint Protection log messages Symantec Endpoint Protection Log Configuration Guide 13
14 # Agile Reports/ Search Table 1 Event Category Symantec Endpoint Protection Events Event Type Reports Appears In Sample Log Message 1 Agile Antivirus Virus Definition 2 Agile Antivirus Auto Protect Configuration Activity Threat Activity <54>Aug 6 20:56:30 SymantecServer loglabs-sep11a: mailclientxp,category: 2,Symantec AntiVirus,New virus definition file loaded. Version: ak. <54>Aug 26 15:28:07 SymantecServer loglabs-sep11a: mailclientxp,category: 2,Symantec AntiVirus,Symantec Endpoint Protection Microsoft Exchange Auto-Protect Disabled 3 Agile Antivirus Scan Started Scan Activity <54>Aug 11 01:47:44 SymantecServer loglabs-sep11a: Scan ID: ,Begin: :45:50,End: ,Started,Duration (seconds): 0,User1: SYSTEM,User2:,"Scan started on selected drives and folders and all extensions.",,command: Not a command scan (),Threats: 0,Infected: 0,Total files: 0,Omitted: 0,Computer: mailclientxp,ip Address: ,Domain: Default,Group: My Company\Default Group,Server: loglabs-sep11a 4 Agile Antivirus Scan Completed 5 Agile Antivirus Scan Cancelled Scan Activity Scan Activity <54>Aug 11 01:47:44 SymantecServer loglabs-sep11a: Scan ID: ,Begin: :45:50,End: ,Started,Duration (seconds): 0,User1: SYSTEM,User2:,"Scan started on selected drives and folders and all extensions.",,command: Not a command scan (),Threats: 0,Infected: 0,Total files: 0,Omitted: 0,Computer: mailclientxp,ip Address: ,Domain: Default,Group: My Company\Default Group,Server: loglabs-sep11a :13:14,Scan ID: ,Begin: :08:40,End: ,Cancelled,Duration (seconds): 13,User1: adam,user2: adam,"scan started on all drives and all extensions.","scan Canceled: Risks: 0 Scanned: 5 Files/Folders/Drives Omitted: 0",Command: Not a command scan (),Threats: 0,Infected: 0,Total files: 5,Omitted: 0,Computer: mailclientxp,ip Address: ,Domain: Default,Group: My Company\Default Group,Server: loglabs-sep11a 6 Agile Antivirus Scan Warning Scan Activity <54>Aug 10 12:44:55 SymantecServer loglabs-sep11a: mailclientxp,category: 2,Symantec AntiVirus,Could not scan 1 files inside c:\windows\temp\000013c0\guestsdk.cab due to extraction errors encountered by the Decomposer Engines. 7 Agile Antivirus Virus Definition 8 Agile Antivirus Auto Protect Disabled Configuration Activity Threat Activity <54>Aug 6 20:56:30 SymantecServer loglabs-sep11a: mailclientxp,category: 2,Symantec AntiVirus,New virus definition file loaded. Version: ak. <54>Aug 26 15:28:07 SymantecServer loglabs-sep11a: mailclientxp,category: 2,Symantec AntiVirus,Symantec Endpoint Protection Microsoft Exchange Auto-Protect Disabled 14 Symantec Endpoint Protection Log Configuration Guide
15 # Agile Reports/ Search Event Category Event Type Reports Appears In Sample Log Message 9 Agile AntiVirus Alert Message Virus Found Threat Activity "<54>Aug 10 12:45:13 SymantecServer loglabs-sep11a: Virus found,computer name: mailclientxp,source: Real Time Scan,Risk name: EICAR Test String,Occurrences: 1,C:\Documents and Settings\adam\Desktop\New Text Document.txt,"""",Actual action: Cleaned by deletion,requested action: Cleaned,Secondary action: Quarantined,Event time: :51:34,Inserted: :45:13,End: :51:34,Domain: Default,Group: My Company\Default Group,Server: loglabs-sep11a,user: adam,source computer:,source IP: Agile AntiVirus Alert Message Security Risk Found Threat Activity The log format for this event is supported by the LogLogic Appliance, but the event has not been fully validated by LogLogic. Therefore no sample log message is available. For more information on this event, see the Cisco Product Documentation. 11 Agile AntiVirus Alert Message Commercial Application Detected Threat Activity "<54>Aug 10 18:47:21 SymantecServer loglabs-sep11a: Security risk found,computer name: mailclientxp,source: Real Time Scan,Risk name: Spyware.ActualSpy,Occurrences: 1,C:\Documents and Settings\adam\Local Settings\Temporary Internet Files\Content.IE5\CNJAED34\actualspy[1].exe,"""",Actual action: Access denied,requested action: Quarantined,Secondary action: Deleted,Event time: :45:33,Inserted: :47:21,End: :44:53,Domain: Default,Group: My Company\Default Group,Server: loglabs-sep11a,user: adam,source computer:,source IP: Agile AntiVirus Alert Message Forced Proactive Threat Detection Threat Activity The log format for this event is supported by the LogLogic Appliance, but the event has not been fully validated by LogLogic. Therefore no sample log message is available. For more information on this event, see the Cisco Product Documentation. 13 Agile AntiVirus Alert Message Proactive Detection Now Permitted Threat Activity <54>Jul 31 17:12:37 SymantecServer v11afvm107: Commercial application detected,computer name: C-afong-L,Detection type: Commercial,Application name: VNC Server 4.0,Application type: Remote Control,Application version: 4.0,Hash type: SHA-1,Application hash: 48440b9f1a49cd970b048c9213ccb499deb6342f,Company name: RealVNC Ltd.,File size (bytes): ,Sensitivity: 0,Detection score: 1,Submission recommendation: 0,Permitted application reason: 0,Source: Heuristic Scan,Risk name:,occurrences: 1,WinVNC4,"WinVNC4",Actual action: Left alone,requested action: Left alone,secondary action: Commercial application detection,event time: :37:30,Inserted: :12:37,End: :37:28,Domain: companya,group: My Company\Production Workstations,Server: VMSEP107,User: Adam_Joe,Source computer:,source IP: Symantec Endpoint Protection Log Configuration Guide 15
16 # Agile Reports/ Search Event Category Event Type Reports Appears In Sample Log Message 14 Agile AntiVirus Alert Message Potential Risk Found Threat Activity The log format for this event is supported by the LogLogic Appliance, but the event has not been fully validated by LogLogic. Therefore no sample log message is available. For more information on this event, see the Cisco Product Documentation. 15 Agile AntiVirus Alert Message Risk Sample was Submitted to Symantec Threat Activity The log format for this event is supported by the LogLogic Appliance, but the event has not been fully validated by LogLogic. Therefore no sample log message is available. For more information on this event, see the Cisco Product Documentation. 16 Agile Console Login User Access, User last Activity, User Authentication 17 Agile Console Logout User Access, User last Activity, 18 Agile Console Deleted User Access, User last Activity, 19 Agile Console Disabled User Access, User last Activity, 20 Agile Console Created User Access, User last Activity, User Created/ Deleted 21 Agile Console Added User Access, User last Activity 22 Agile Console Added User Access, User last Activity, User Created/ Deleted 23 Agile Console Deleted User Access, User last Activity 24 Agile Console Created User Access, User last Activity 25 Agile Console Changed User Access, User last Activity 26 Agile Console Exported User Access, User last Activity <54>Aug 6 16:29:59 SymantecServer loglabs-sep11a: Default,Admin: admin,administrator log on succeeded " <54>Aug 11 17:58:34 SymantecServer loglabs-sep11a: Default,Admin: admin,administrator logout <54>Jun 30 16:53:48 SymantecServer loglabs-sep11a: Default,Admin: admin,domain "tester" was deleted! <54>Jun 30 16:53:24 SymantecServer loglabs-sep11a: Default,Admin: admin,domain "tester" was disabled <54>Jun 30 16:53:03 SymantecServer loglabs-sep11a: Default,Admin: admin,user has been created <54>Jun 30 16:52:20 SymantecServer loglabs-sep11a: Default,Admin: admin,domain "tester" was added <54>Jun 30 16:49:35 SymantecServer loglabs-sep11a: Default,Admin: admin,domain administrator "chris" was added <54>Jun 30 16:49:10 SymantecServer loglabs-sep11a: Default,Admin: admin,group has been deleted <54>Jun 30 16:48:52 SymantecServer loglabs-sep11a: Default,Admin: admin,group has been created <54>Jun 30 16:47:37 SymantecServer loglabs-sep11a: Default,Admin: admin,the password of System administrator "admin" has been changed. <54>Aug 17 18:34:54 SymantecServer loglabs-sep11a: Default,Admin: admin,package has been exported 16 Symantec Endpoint Protection Log Configuration Guide
17 # Agile Reports/ Search Event Category Event Type Reports Appears In Sample Log Message 27 Agile Console Moved User Access, User last Activity, User Created/ Deleted 28 Agile Console Deleted User Access, User last Activity <54>Aug 27 14:43:37 SymantecServer loglabs-sep11a: Default,Admin: admin,computer has been moved <54>Aug 26 16:17:54 SymantecServer loglabs-sep11a: Default,Admin: admin,computer has been deleted 29 Agile Intrusion Prevention 30 Agile Intrusion Prevention 31 Agile Intrusion Prevention IDS HIPS Activity <54>Aug 25 15:51:21 SymantecServer loglabs-sep11a: mailclientxp,[sid: 23180] MSRPC Server Service Buffer Overflow 2 detected. Traffic has been blocked from this application: C:\Program Files\Tenable\Nessus\nessusd.exe,Local: ,Local: 000C294EC76E,Remote:,Remote: ,Remote: ,Outbound,TCP,Intrusion ID: 0,Begin: :25:43,End: :25:43,Occurrences: 1,Application: C:/Program Files/ Tenable/Nessus/nessusd.exe,Location: Default,User: adam,domain: MAILCLIENTXP DDOS HIPS Activity <54>Jun 30 16:46:44 SymantecServer loglabs-sep11a: AdamFongDesktop,Denial of Service "UDP Flood Attack" attack detected. Description: An excessive number of User Datagram Protocol (UDP) packets are being generated on this computer causing 100% CPU utilization.,local: ,Local: 00FFB06B9509,Remote:,Remote: ,Remote: 00FFB16B9509,Inbound,UDP,,Begin: :41:00,End: :41:00,Occurrences: 1,Application:,Location: Default,User: AFong,Domain: LOGLOGIC Port Scan HIPS Activity <54>Jun 30 16:46:44 SymantecServer loglabs-sep11a: AdamFongDesktop,Port Scan. Description: An excessive number of User Datagram Protocol (UDP) packets are being generated on this computer causing 100% CPU utilization.,local: ,Local: 00FFB06B9509,Remote:,Remote: ,Remote: 00FFB16B9509,Inbound,UDP,,Begin: :41:00,End: :41:00,Occurrences: 1,Application:,Location: Default,User: AFong,Domain: LOGLOGIC 32 Agile Policy Edited User Access, User last Activity 33 Agile Policy Added User Access, User last Activity 34 Agile Policy Removed User Access, User last Activity <54>Aug 26 16:17:37 SymantecServer loglabs-sep11a: Default,Admin: admin,policy has been edited,antivirus and Antispyware policy - High Security <54>Aug 26 16:17:37 SymantecServer loglabs-sep11a: Default,Admin: admin,policy has been added,client Policy <54>Aug 26 16:17:37 SymantecServer loglabs-sep11a: Default,Admin: admin,policy has been deleted,copy of New firewall policy Symantec Endpoint Protection Log Configuration Guide 17
18 # Agile Reports/ Search Event Category Event Type Reports Appears In Sample Log Message 35 Agile Policy Applied Configuration Activity <54>Aug 26 15:28:07 SymantecServer loglabs-sep11a: mailclientxp,category: 0,Smc,Applied new policy with serial number 002D-08/25/ :30: successfully. 36 Agile Service Shutdown Threat Activity <54>Aug 6 17:09:24 SymantecServer loglabs-sep11a: mailclientxp,category: 2,Symantec AntiVirus,Symantec Endpoint Protection services shutdown was successful. 37 Agile Service Disabled Threat Activity <54>Aug 25 15:51:20 SymantecServer loglabs-sep11a: mailclientxp,category: 2,Symantec AntiVirus,Symantec Endpoint Protection Auto-Protect Disabled. 38 Agile Service Change Threat Activity <54>Aug 27 14:52:27 SymantecServer loglabs-sep11a: afong2,category: 0,Smc,User is attempting to terminate Symantec Management Client Agile Systrem Change Configuration Activity <54>Aug 25 15:51:20 SymantecServer loglabs-sep11a: mailclientxp,category: 0,Smc,Location has been changed to Default. 18 Symantec Endpoint Protection Log Configuration Guide
LogLogic Trend Micro OfficeScan Log Configuration Guide
LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and
LogLogic Cisco IPS Log Configuration Guide
LogLogic Cisco IPS Log Configuration Guide Document Release: March 2011 Part Number: LL600072-00ELS090000 This manual supports LogLogic Cisco IPS Release 1.0 and later, and LogLogic Software Release 4.9.1
LogLogic Cisco NetFlow Log Configuration Guide
LogLogic Cisco NetFlow Log Configuration Guide Document Release: September 2011 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 1.0, and LogLogic Software Release
LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide
LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide Document Release: Septembere 2011 Part Number: LL600066-00ELS100000 This manual supports LogLogic General Database Collector
Juniper Secure Access SSL VPN Log Configuration Guide
Juniper Secure Access SSL VPN Log Configuration Guide Document Release: March 2012 Part Number: LL600049-00ELS01000000 This manual supports LogLogic Juniper Secure Access SSL VPN Release 1.0 and later,
LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide
LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide Document Release: September 2011 Part Number: LL600026-00ELS090000 This manual supports LogLogic Microsoft DHCP Release
LogLogic Blue Coat ProxySG Syslog Log Configuration Guide
LogLogic Blue Coat ProxySG Syslog Log Configuration Guide Document Release: September 2011 Part Number: LL600070-00ELS100000 This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic
LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide
LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide Document Release: September 2011 Part Number: LL600027-00ELS090000 This manual supports LogLogic Microsoft DNS Release 1.0 and later,
LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide
LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide Document Release: September 2011 Part Number: LL600015-00ELS090000 This manual supports LogLogic Juniper Networks
LogLogic Cisco NetFlow Log Configuration Guide
LogLogic Cisco NetFlow Log Configuration Guide Document Release: March 2012 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 2.0, and LogLogic Software Release 5.1
LogLogic Microsoft SQL Server Log Configuration Guide
LogLogic Microsoft SQL Server Log Configuration Guide Document Release: March 2012 Part Number: LL600028-00ELS090002 This manual supports LogLogic Microsoft SQL Server Release 2.0 and later, and LogLogic
Microsoft Active Directory (AD) Service Log Configuration Guide
Microsoft Active Directory (AD) Service Log Configuration Guide Document Release: October 2011 Part Number: LL600011-00ELS090000 This manual supports LogLogic Microsoft AD Service Release 1.0 and above,
LogLogic McAfee Firewall Enterprise (Sidewinder) Log Configuration Guide
LogLogic McAfee Firewall Enterprise (Sidewinder) Log Configuration Guide Document Release: September 2011 Part Number: LL600046-00ELS900001 This manual supports LogLogic Sidewinder Release 1.2 and later,
LogLogic Microsoft Internet Information Services (IIS) Log Configuration Guide
LogLogic Microsoft Internet Information Services (IIS) Log Configuration Guide Document Release: September 2011 Part Number: LL60001-00ELS090000 This manual supports LogLogic Microsoft IIS Release 1.0
LogLogic Check Point Management Station Log Configuration Guide
LogLogic Check Point Management Station Log Configuration Guide Document Release: September 2011 Part Number: LL600013-00ELS090000 This manual supports LogLogic Check Point Management Station Release 2.0
LogLogic Apache Web Server Log Configuration Guide
LogLogic Apache Web Server Log Configuration Guide Document Release: September 2011 Part Number: LL60009-00ELS090001 This manual supports LogLogic Apache Web Server Release 1.0 and later, and LogLogic
LogLogic IBM i5/os Collector Guide
LogLogic IBM i5/os Collector Guide Software Release: 1.0 Document Release: December 2010 Part Number: LL600020-00EI5010001 This manual supports LogLogic IBM i5/os Collector Release 1.0 and later, and LogLogic
LogLogic Juniper Networks JunOS Log Configuration Guide
LogLogic Juniper Networks JunOS Log Configuration Guide Document Release: September 2011 Part Number: LL600052-00EL01000000 This manual supports LogLogic s Juniper Networks JunOS Release 1.0 and above,
LogLogic Microsoft Windows Server 2000/2003 Log Configuration Guide
LogLogic Microsoft Windows Server 2000/2003 Log Configuration Guide Document Release: September 2011 Part Number: LL600029-00ELS090002 This manual supports LogLogic Microsoft Windows Server 2000/2003 Release
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.
LogLogic Blue Coat ProxySG Log Configuration Guide
LogLogic Blue Coat ProxySG Log Configuration Guide Document Release: September 2011 Part Number: LL600012-00ELS100001 This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic
TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage
TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE
Integrating Trend Micro OfficeScan 10 EventTracker v7.x
Integrating Trend Micro OfficeScan 10 EventTracker v7.x Publication Date: August 26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help you in
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Integrating Symantec Endpoint Protection
Integrating Symantec Endpoint Protection EventTracker Version 7.x Publication Date: Nov 8, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About this Guide This guide provides
EMC Data Domain Management Center
EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference
Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
Quick Start Guide. for Installing vnios Software on. VMware Platforms
Quick Start Guide for Installing vnios Software on VMware Platforms Copyright Statements 2010, Infoblox Inc. All rights reserved. The contents of this document may not be copied or duplicated in any form,
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and
TIBCO LogLogic Log Management Intelligence (LMI) Configuration and Upgrade Guide
TIBCO LogLogic Log Management Intelligence (LMI) Configuration and Upgrade Guide Software Release 5.4.2 November 2013 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER
Comodo Endpoint Security Manager SME Software Version 2.1
Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Copyright 2013 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Plesk for Windows Copyright Notice
2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.
K7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip
Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Sophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
Symantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used
Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6
INTEGRATION GUIDE May 2014 3725-75304-001 Rev B Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved.
Parallels Plesk Control Panel
Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Monitoring System Status
CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,
escan Corporate Edition User Guide
Anti-Virus & Content Security escan Corporate Edition (with Hybrid Network Support) User Guide www.escanav.com [email protected] The software described in this guide is furnished under a license agreement
Integrate Check Point Firewall
Integrate Check Point Firewall EventTracker Enterprise Publication Date: Oct.26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is
STARTER KIT. Infoblox DNS Firewall for FireEye
STARTER KIT Introduction Infoblox DNS Firewall integration with FireEye Malware Protection System delivers a unique and powerful defense against Advanced Persistent Threats (APT) for business networks.
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
Cyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10
Cyberoam Virtual Security Appliance - Installation Guide for XenServer Version 10 Document Version 10.6.1-01/07/2014 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam Virtual
Vantage Report. User s Guide. www.zyxel.com. Version 3.0 10/2006 Edition 1
Vantage Report User s Guide Version 3.0 10/2006 Edition 1 www.zyxel.com About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the Vantage
Hosted Email Security Quick Start Guide
Hosted Email Security Quick Start Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
Polycom RealPresence Resource Manager System Getting Started Guide
[Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks
escan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
Patented hosting technology protected by U.S.Patents 7,0909,948; 7,076,633. Patents pending in the U.S.
Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd. All rights reserved
Symantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
HP TippingPoint Security Management System User Guide
HP TippingPoint Security Management System User Guide Version 4.0 Abstract This information describes the HP TippingPoint Security Management System (SMS) client user interface, and includes configuration
SonicWALL Global Management System Reporting Guide Standard Edition
SonicWALL Global Management System Reporting Guide Standard Edition Version 2.9.4 Copyright Information 2005 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides
IBM Security QRadar SIEM Version 7.1.0 MR1. Log Sources User Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Log Sources User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 108. Copyright
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Remote Management System
RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED
Adeptia Suite 6.2. Application Services Guide. Release Date October 16, 2014
Adeptia Suite 6.2 Application Services Guide Release Date October 16, 2014 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 Document Information DOCUMENT INFORMATION
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
Integrating Barracuda Web Application Firewall
Integrating Barracuda Web Application Firewall EventTracker v7.x Publication Date: July 28, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides
AV Management Dashboard
LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data
Sophos UTM Web Application Firewall for Microsoft Exchange connectivity
How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services
Endpoint Security Console. Version 3.0 User Guide
Version 3.0 Table of Contents Summary... 2 System Requirements... 3 Installation... 4 Configuring Endpoint Security Console as a Networked Service...5 Adding Computers, Groups, and Users...7 Using Endpoint
SWsoft, Inc. Plesk File Server. Administrator's Guide. Plesk 7.5 Reloaded
SWsoft, Inc. Plesk File Server Administrator's Guide Plesk 7.5 Reloaded (c) 1999-2005 ISBN: N/A SWsoft Inc 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Tel: +1 (703) 815 5670 Fax: +1 (703)
LogLogic McAfee epolicy Orchestrator (epo) Log Configuration Guide
LogLogic McAfee epolicy Orchestrator (epo) Log Configuration Guide Document Release: October 2011 Part Number: LL600048-00ELS100001 This manual supports LogLogic McAfee epo Release 1.0 later, LogLogic
Administration Quick Start
www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
Kaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Docufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2010, Parallels, Inc.
HowTo: Logging, reporting, log-analysis and log server setup Version 2007nx Release 3. Log server version 2.0
Log server version 2.0 Contents 1 Setting up the log server for the appliance... 4 1.1 Registering the log server on the appliance... 4 1.2 Entering the Syslog server to the appliance... 6 2 Log server...
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
