3VR SmartRecorder TM. IT Requirements. 3VR Video Intelligence Platform. June 2011
|
|
|
- Adelia Gilmore
- 10 years ago
- Views:
Transcription
1 3VR SmartRecorder TM IT Requirements 3VR Video Intelligence Platform IT REQUIREMENTS WHITE PAPER June 2011 Applies to: 3VR Software Version: VRSR-ITREQ-R5 3VR, Inc 475 Brannan Street, Suite 430 San Francisco, CA Tele: Sales: Fax: VR, Inc. 3VR and the 3VR logo are either trademarks or federally registered trademarks of 3VR, Inc. Specifications herein subject to change without notice.
2 Contents 1. Summary 3 2. IT Security with 3VR Operating System Applications Network Services Ports SMTP Physical Access Antivirus Client Applications Vulnerability Testing 6 3. Systems Management with 3VR Systems and User Management Extraordinary Maintenance Account Systems Health Monitoring Updates/Upgrades Management Plan 8 4. Client Application Management About 3VR Client Applications Where to Find Client Applications Client Application System Requirements Licensing 3VR Client Applications 9 5. Data Redundancy with 3VR RAID Settings Backup 9 6. Bandwidth Utilization with 3VR Bandwidth Consumption Bandwidth Throttling 10 About 3VR 11 2
3 1. Summary The purpose of this paper is to detail the capabilities and hardened security measures built into 3VR systems to address the IT requirements of today s security buyers. 3VR has invested heavily to ensure that all of their 3VR VIP appliances are as secure as possible against virus threats and external attacks. Of particular importance are the following 3VR features: 3VR systems conform to industry-leading information security baselines and pose equal or lesser risk than alternative appliances, workstations or operating systems on the market. The 3VR system is built upon a modular version of Microsoft Windows (either Windows Embedded Standard or Windows Embedded Standard 7) and is implemented in a way to strictly avoid components that present security risks such as Internet Explorer, Internet Information Server, File Transfer Protocol or Telnet clients which have historically represented vulnerabilities. All 3VR software applications communicate using proprietary protocols that minimize the risk of intruder access. 3VR appliances require only four open ports for network communication with client applications and the 3VR Enterprise Appliance. In five years of widespread commercial deployment, 3VR has not generated any security compromises. 3
4 2. IT Security with 3VR 2.1 Operating System 3VR systems use a modular version of Microsoft Windows Embedded Standard or Microsoft Windows Embedded Standard 7 (WES). 3VR version is our latest software release and is current with all of the latest operating system patches and security hotfixes. 3VR s specific configuration of WES significantly reduces security risks as described in the appropriate sections below. 2.2 Applications 3VR VIP Appliance applications: MySQL 3VR Recording Systems: Shell (3VR proprietary) ContentServer (3VR proprietary) PipelineManager (3VR proprietary) Controller (3VR proprietary) OpCenter (3VR proprietary) SystemManager (3VR proprietary) 3VR Enterprise Appliance applications: MySQL 3VR Recording Systems Shell (3VR proprietary) EnterpriseServer (3VR proprietary) Controller (3VR proprietary) OpCenter (3VR proprietary) SystemManager (3VR proprietary) Interconnects between 3VR applications are by proprietary protocol. This eliminates the attack vectors that viruses use to attack systems. To attack the 3VR system, adversaries would have to build complex protocols. The 3VR appliance is also protected against denial of service attacks. 4
5 2.3 Network Services 3VR has created an appliance that is highly resistant to network-based attacks. The applications most commonly exploited by attackers are not present on 3VR systems. These include Internet Explorer, Internet Information Server, File Transfer Protocol (FTP), and Telnet servers and clients. 3VR does not use any form of file sharing for storage on the appliance. To further protect the system, 3VR has built-in a software firewall which restricts traffic to only the allowed ports. With this set of security measures in place, the 3VR appliance uses only two types of service: 3VR proprietary protocols and Microsoft Message Queuing (MSMQ) with proprietary payload formats. Each of these methods supports authentication with one-way hash-based encryption. 3VR believes the only potential risk is pirating the Device Update Agent and launching an artificial upgrade. This complicated task, however, would require reverse engineering 3VR s proprietary protocols. The actual threat is low as the expertise is rare and the value of doing so is minimal. 2.4 Ports Models Protocol Port Program Purpose All systems in an TCP 1801 mysuc.exe (MSMQ) Synchronization Enterprise environment VIP Appliance TCP 2500 ContentServer.exe Live video All TCP 3001 Shell.exe Logging All TCP 3020 Shell.exe Remote upgrade, restarts, and network settings changes VIP Appliance TCP 3043 ContentServer.exe Data access VIP Appliance TCP 3044 ContentServer.exe Bandwidth measurement (optional) Enterprise Appliance TCP 3045 EnterpriseServer.exe Enterprise management All UDP 123 ws32time.dll Network Time Protocol All UDP 3333 SystemManager.exe Find Local Servers feature While all the ports in the above list are important, users of OpCenter and SystemManager can access the appliance for normal use using only port 3043 and port 2500 (standalone VIP Appliances) or ports 3043, 2500, and 3045 (appliances connected to an Enterprise). Note that for the Enterprise Appliance, port 1801 must always permit communication between the Enterprise Appliance and connected VIP Appliances. All other ports listed above can be blocked in non-diagnostic, non-upgrade situations. 2.5 SMTP 3VR provides limited SMTP support that is constrained to eliminate risk. 3VR provides outbound-only SMTP and only when a customer specifically configures it. No SMTP forwarding is allowed. content is always automatically determined by the software. Furthermore, the SMTP client is coded directly into the application and there is no receiving code in any of 3VR s applications. 5
6 2.6 Physical Access 3VR appliances can be physically accessed in one of two ways: Logging in at the local console with a monitor, keyboard, and mouse. Logging in to the 3VR Client Applications on a laptop that is directly connected to the system with a USB network adapter. Note: This connection method is subject to the same security restrictions as a remote client. Because of 3VR s account management architecture, a malicious user does not have access to the underlying system. Moreover, even if the user somehow accessed the system, because networking services such as web client, telnet and FTP are not installed, an attack would be extremely difficult. 2.7 Antivirus 3VR ensures that viruses do not attack the system or the network by enforcing explicit signing of all software that is installed. 3VR uses SHA-1, 160-bit key for this task. Because of this, sniffing the transmission and intercepting/modifying is not a practical risk. 3VR s antivirus strategy focuses on lockdown. 3VR does not currently perform antivirus scanning. In five years of widespread commercial deployment, not a single 3VR system has been infected with a virus. 2.8 Client Applications 3VR supports a remote viewing client called OpCenter. OpCenter connects to 3VR appliances via port 3043 as explained in the Ports section. OpCenter uses the same account management plan as described in the Systems Management section. 3VR Client Applications (discussed in more detail in the section Client Application Management ) access the VIP Appliance using port 3043 for data access and port 2500 for video access. The applications access the Enterprise Appliance on port 3045 for both data and any video stored there. All of the protocols used over these ports are 3VR proprietary protocols with one-way hash based authentication. The Client Applications do not support extensions or scripting. Therefore, attacks by these mechanisms are not possible. 2.9 Vulnerability Testing 3VR runs Tenable s Nessus vulnerability test suite on every release that we ship. These tests consistently show that our system is clean with respect to known vulnerabilities. Detailed test results are available from 3VR on request. Network security personnel at various 3VR customers have run different suites with similar results. 6
7 3. Systems Management with 3VR 3.1 Systems and User Management 3VR designed its systems management solution to maximize the security of the underlying operating system and the overall network. 3VR separates login to the 3VR application from login to Windows. Passwords for user accounts are stored in a SQL database using a one-way hash. No 3VR user account has access to the operating system. Windows logins are completely disabled on 3VR appliances. 3VR also provides single sign-on capabilities, so that an administrator can centrally access and modify system and camera configurations on any specific 3VR system across an enterprise. The administrator can also centrally manage users privileges and passwords. Users access rights can be restricted as follows: By machine(s). A user can be granted access to certain specific machines or to a group of machines in a region. For example, a user may be given access only to machines in the Northeast Region. By capability. For example a user may be restricted to viewing video only. By default, 3VR does not force password changes. However, the administrator of a 3VR Enterprise may enable password constraints to enforce one or more of the following password restrictions: Require minimum password length Require the password contain lower case, upper case, or non-alphanumeric characters Prevent simple dictionary words Prevent word variations Prevent resetting password to a previous password The administrator may also restrict user behavior in respect to user accounts changes: Block account after a given number of failed sign in attempts Require password change after a given number of days Block account after a number of days of inactivity An adversary who acquired the password for a 3VR user despite the protections above could only change data maintained by 3VR software. Since there is no system access available, there is no risk to the system or network. 3.2 Extraordinary Maintenance Account 3VR does have a special system access account used for extraordinary maintenance. This account is accessed through a double password, one supplied by the customer and one that changes daily that s built into the system. The extraordinary maintenance functions cannot be accessed unless both passwords are correctly entered. 7
8 3.3 Systems Health Monitoring 3VR provides remote health monitoring with real-time health alerts of cameras, hard drives, systems, software, and networks. Administrators can log on from a central location to monitor health of components, reducing potential downtime. 3.4 Updates/Upgrades Management Plan 3VR manages software updates and upgrades through the 3VR system software, which no one can access without the 3VR client tool and proprietary protocol. Customers can administer updates or upgrades by using 3VR s SystemManager application. Administrators can log in from a central location and easily manage the distribution of software updates and upgrades throughout a large enterprise in minutes without the need to visit each system. 4. Client Application Management 4.1 About 3VR Client Applications Standard applications: 3VR OpCenter (opcenter.exe) is a powerful video monitoring and searching application, which also includes the ability to create and track cases, develop watchlists, and configure alerts. 3VR SystemManager (systemmanager.exe) is an appliance configuration and health monitoring application; used for camera setup, user management, and system updates and maintenance. Optional applications used for specific purposes: 3VR SpotMonitor (spotmonitor.exe) is a simple application used to view multiplexed or sequential live video feeds on a TV or other monitor. 3VR EnterpriseViewer (enterpriseviewer.exe) is an application used to view multiplexed or sequential live video feeds from systems across an Enterprise Appliance. 3VR AlertViewer (alertviewer.exe) is an application that notifies the user when an alert has been triggered on the 3VR system. 3VR ReportViewer (reportviewer.exe) is an application used to run reports for the 3VR People Counting analytic. 4.2 Where to Find Client Applications 3VR Partners may download the 3VR Client Applications from the 3VR Partner Portal (partners.3vr.com). The Client Applications can also be installed from the Installation & Resource CD that ships with every 3VR unit. 3VR Technical Support can also provide software and documentation upon request ( [email protected] or telephone: Mon-Fri from 9 AM - 9 PM Eastern). 8
9 4.3 Client Application System Requirements 3VR Client Applications run on Windows XP Service Pack 2 or later, Windows Vista, or Windows 7 using the Microsoft.NET framework and Intel Performance Primitives, which are installed if necessary as part of the installation process. The installation process also installs DirectShow video filters that may be used by other applications, but otherwise the files loaded are specific to 3VR and won t interact with other applications. The most up-to-date system and network requirements are posted in more detail on our web FAQ: > Services and Support > FAQ > What are the system requirements for 3VR Client Applications?. If the 3VR system is located behind a firewall, another web FAQ details what ports need to be open in order to connect. See > Services and Support > FAQ > What ports must be open to connect to a 3VR SmartRecorder that s behind a firewall? 4.4 Licensing 3VR Client Applications The first time a 3VR Client Application is run, the user will be prompted to enter a license key. The license keys are provided by 3VR Technical Support. Once an application has been licensed, it will remain so unless the computer s operating system is reinstalled. The applications must be licensed by an administrative user on the PC, although a nonadministrator can run the applications. 5. Data Redundancy with 3VR 5.1 RAID All 3VR P-Series Appliances and Enterprise Appliances come standard with RAID, providing fault-tolerance and protection against loss of video or data in the event of disk error or disk failure. The VIP S-Series may be purchased with RAID (S-Series 40 model) or without RAID (S-Series 30 and S-Series 35). 5.2 Settings Backup All S-Series, P-Series, and Enterprise Appliances have on-board flash storage of system software and configuration settings. If the single drive on an S-Series 30/35 unit (no RAID) or more than one drive fails on an S-Series 40, P-Series, or Enterprise (RAID), the drive(s) can be replaced and the system will come back online with all of its configuration intact. Alternatively, a completely new system can be installed and the system and configuration files copied from the failed system to the new system. This ensures quick return to full functionality without extended downtime for re-installing software and re-configuring the system. 9
10 6. Bandwidth Utilization with 3VR 6.1 Bandwidth Consumption 3VR has designed its network architecture to ensure that the system minimizes resource utilization and rapidly respects bandwidth constraints even on network connections as low as a DSL. 3VR uses TCP links for video and data. We rely on TCP to provide retransmissions in case of data loss. TCP has sophisticated algorithms for congestion avoidance that allow it to efficiently use slow networks without swamping them with retransmits. Finally, 3VR naturally degrades bandwidth for live video streaming by employing adaptive frame dropping. Most importantly, all of these design elements ensure that the 3VR appliance will not engender or contribute to hysteresis. Bandwidth consumption in the application is highly dependent on load (for example, the number of faces recognized per minute). Live video, 10 fps CIF: 64 Kb/s Searching, 32 events with 3 images per event, 150 KB total per page of search results (search results are downloaded one page at a time as the user asks for them). Depending on event load, there is some amount of new event notification traffic flowing from server to client. 6.2 Bandwidth Throttling 3VR systems have a configurable bandwidth throttle that constrains the bandwidth rate from an individual 3VR appliance to remote clients. Bandwidth throttling provides quality of service (QoS) by ensuring that bandwidth is available for other applications even on slower networks. 10
11 About 3VR 3VR, Inc., the video intelligence company, enables organizations to search, mine and leverage video to bolster security, identify and mitigate fraud and better serve customers. 3VR s Video Intelligence Platform allows video surveillance systems to reach their true potential and deliver a measurable and sustainable return on investment. 3VR is the video surveillance standard for hundreds of global customers, including leading banks, retailers, governments and law enforcement agencies and owns CrimeDex, an online community of fraud, loss prevention and law enforcement professionals dedicated to stopping crime. Based in San Francisco, CA, the company is privately held with funding from DAG Ventures, Focus Ventures, In-Q-Tel, Kleiner Perkins Caulfield & Buyers, Menlo Ventures and VantagePoint Ventures. 3VR s SmartRecorder is the three-time winner of the SIA Best New Video Product Award and was named Security Product of the Year from Frost & Sullivan in 2006 and 2007, among other awards. For more information, please visit Tel: Fax: Sales: [email protected] Website: 3VR, Inc. 475 Brannan Street, Suite 430, San Francisco, CA
3VR SmartRecorder. IT Requirements. 3VR Video Intelligence Platform. 3VR Software Version 7.0
3VR SmartRecorder TM IT Requirements 3VR Video Intelligence Platform IT REQUIREMENTS WHITE PAPER 3VR Software Version 7.0 3VRVIP-ITREQ7.0-R2 3VR, Inc 475 Brannan Street, Suite 430 San Francisco, CA 94107
Symantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
Enterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink
Medical Device Security Health Group Digital Output
Medical Device Security Health Group Digital Output Security Assessment Report for the Kodak Color Medical Imager 1000 (CMI-1000) Software Version 1.1 Part Number 1G0434 Revision 2.0 June 21, 2005 CMI-1000
Hardening Guide. Installation Guide
Installation Guide About this Document The intended use of this guide is to harden devices and also provide collateral for deployment teams to deal with local network policy, configurations and specification.
Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x
Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...
G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy
For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
NovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone
GTS Software Pty Ltd. Remote Desktop Services
GTS Software Pty Ltd Remote Desktop Services Secure web access to GTS Software applications CONTENTS Overview... 2 What GTS can provide with Remote Desktop Services... 2 Main Features... 3 RD Web Access...
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
safend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
GFI Product Manual. Deployment Guide
GFI Product Manual Deployment Guide http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
PowerChute TM Network Shutdown Security Features & Deployment
PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Comodo Endpoint Security Manager SME Software Version 2.1
Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick
Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices
TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who
GFI Product Manual. Version 6.0. Getting Started Guide
GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
PLEASE NOTE: The client data used in these manuals is purely fictional.
Welcome! CAREWare Quick Start guides will walk you through the basics of setting up, managing and using the main CAREWare functions. It is intended for non-technical users who just need to get basic information
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
AVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
Chapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
inforouter V8.0 Server & Client Requirements
inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended
Backup Manager Configuration and Deployment Guide. Version 9.1
Backup Manager Configuration and Deployment Guide Version 9.1 Contents Backup Manager 3 Backup Manager Support 9 Backup Manager Configuration and Deployment 14 Defining a Backup Manager Profile 14 Configuring
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043
Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Host-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
Best Practices for DanPac Express Cyber Security
March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers
Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
1. Server 2008 - Microsoft FEP 2010 - Instalation
1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements
SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012
SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse
Burst Technology bt-loganalyzer SE
Burst Technology bt-loganalyzer SE Burst Technology Inc. 9240 Bonita Beach Rd, Bonita Springs, FL 34135 CONTENTS WELCOME... 3 1 SOFTWARE AND HARDWARE REQUIREMENTS... 3 2 SQL DESIGN... 3 3 INSTALLING BT-LOGANALYZER...
Docufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
StruxureWare Power Monitoring 7.0.1
StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop
Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Contents: Executive Summary... 1
Virtual Private Networks (VPN) Connectivity and Management Policy
Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Compulink Advantage Online TM
Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
Enterprise Manager. Version 6.2. Administrator s Guide
Enterprise Manager Version 6.2 Administrator s Guide Enterprise Manager 6.2 Administrator s Guide Document Number 680-017-017 Revision Date Description A August 2012 Initial release to support version
Blackbaud Sphere & The Raiser s Edge Integration Guide
Blackbaud Sphere & The Raiser s Edge Integration Guide 101311 Blackbaud Sphere 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means,
5nine Virtual Firewall 2.1 for Microsoft Hyper-V
KEY POINTS Secure your Hyper-V Virtual Machines & Virtual Servers Control Network Traffic In and Out of Your Virtual Machines & Virtual Servers Restrict Virtual Network Traffic Using Stateful Packet Filtering
Cyber Security: Software Security and Hard Drive Encryption
Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
2014 Electrical Server Installation Guide
2014 Electrical Server Installation Guide TITLE: 2014 Electrical Server Installation Guide DATE: September 2013 SUBJECT: ABSTRACT: Installation guide for SolidWorks Electrical 2014 on the server Guide
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card
NovaTech NERC CIP Compliance Document and Product Description Updated June 2015
NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 This document describes the NovaTech Products for NERC CIP compliance and how they address the latest requirements of NERC
Virtualization Guide. McAfee Vulnerability Manager Virtualization
Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.
Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio
