Designing and Developing an Application for Incident Response Teams
|
|
|
- Ophelia Phillips
- 9 years ago
- Views:
Transcription
1 Designing and Developing an Application for Incident Response Teams Kees Leune and Sebastiaan Tesink Tilburg University, The Netherlands FIRST 2006, Baltimore, MD, USA High-quality Internet for higher education and research
2 Overview The Problem Objectives The solution: AIRT Related work Recent improvements Summary 2 High-quality Internet for higher education and research
3 Context Tilburg University CSIRT established in March, ,000 managed nodes on-campus 3,000 nodes in student houses using cable-modems 2,000 nodes in student houses using direct glassfiber connections Campus-wide wireless access for all faculty, staff and students. Cable modems were causing 95% of incidents; exposed directly to the Internet in our main IP range (not a good plan) 3 High-quality Internet for higher education and research
4 Problem analysis Seven incident responders, all part-time. Consequence: Tracking problem Which incidents are being handled, and how? Coordination problem Who does what? 4 High-quality Internet for higher education and research
5 Starting development Need for a tool to support day-to-day operations. Regular ticketing systems (Top Desk and Request Tracker) did not provide much improvement. Specialized incident response tool: RTIR was too much RT and not enough IR. Need to tap in many existing databases to find information (MAC address registrations, LDAP, other internal databases). 5 High-quality Internet for higher education and research
6 Development Objectives Ability to record incidents and take initial actions in less than 30 seconds (average) after an incident handler becomes aware of the report. that is generated and sent automatically should be received and processed automatically as much as possible. Application should be web-based and available under an Open license. Application must be able to interact with existing data sources, tools and programs. 6 High-quality Internet for higher education and research
7 Importance of incoming PREPARE Estimated 95% or more comes in the form of Detect Triage Respond PROTECT Carnegie Mellon's Incident Management Process 7 High-quality Internet for higher education and research
8 vs. Information Automated reporting originating from known sources, containing data in known formats 85%-95% Unknown sources and/or unknown formats The actual message is NOT all that important-- it is the information contained in the message in which we are interested 8 High-quality Internet for higher education and research
9 AIRT Features Comprehensive incident management console, Outgoing mail using mail templates, including support for PGP signed mail and automatic actions, Import queue to automatically process data from known (and trusted) sources. AIRT ships with support for MyNetwatchman, Spamcop, IDMEF, etc. Export queue to (securely) run commands on the host operating system, Maintains original incident identifiers, Extensive search abilities (by IP address, hostname, incident number, network range), Detects repeat offenders, Open and extensible. 9 High-quality Internet for higher education and research
10 AIRT Basics Incident data: Basic incident data: incident type, and incident status, and incident state, and logging. A number of IP addresses, which belong to a network, which is managed by a constituency, which has constituency contacts. Each IP address plays a certain role in the incident. A number of users. 10 High-quality Internet for higher education and research
11 Incident Overview The incident overview provides a comprehensive overview of the current state of the constituency. Features: Display of incident ID, Constituency, host name, Status, State, Type, Date (including ordering) Filtering by status/state/type Mass creation of incidents Mass update of incidents Mass processing of outgoing (template-based) 11 High-quality Internet for higher education and research
12 Screenshot incident overview cons-1 airt.nl cons-1 cons-1 airt.nl cons-2 cons-2 cons-2 cons-1 cust-1 external external airt.nl cust-1 external cust-2 cons-1 cust-2 cust-2 12 High-quality Internet for higher education and research
13 Import queue The AIRT import queue allows data from different sources to be automatically processed and relevant information to be extracted from the incoming mail. 13 High-quality Internet for higher education and research
14 14 High-quality Internet for higher education and research
15 Search facilities AIRT provides a number of search facilities to quickly find all data required to adequately respond to complaints: Search by IP address Search by address Search by network range Search by incident ID (internal and external) 15 High-quality Internet for higher education and research
16 16 High-quality Internet for higher education and research
17 Related work Standards IODEF Overly complex and elaborate. Subset of IODEF can be implemented as import filter. CAIF Still in development, used for storing security announcements. CAIF import filter is viable. IDMEF Under development at IETF; simple XML-based standard for incident respose alert representation. Possible candidate to replace XIRL. 17 High-quality Internet for higher education and research
18 Related Work Products Request Tracker for Incident Response. ticketing system with web-based front-end. Most well-known competitor to AIRT. Operates on top of general RT product, enhanced with several securityrelated functions. SIRIOS: Modular application framework designed for (CSIRTs) with main focus on incident management and vulnerability handling. SIRIOS is based on OTRS and is sponsored by CERT-Bund, the German governmental CERT. 18 High-quality Internet for higher education and research
19 Improvements since paper was authored IDMEF import filter, Ability to associate actions with sending mail templates, Ability to associate external incident identifiers with AIRT incidents, Mass sending of , Export queue, Numerous bug fixes, Various interface enhancements. 19 High-quality Internet for higher education and research
20 Summary and conclusions AIRT provides an incident management system that is based on the notion of an 'incident'. Provides easy integration with existing products. Adopts Open standards where possible. Currently in use with a number of CSIRTs in The Netherlands (SURFnet-CERT, UvA-CERT, UvT-CERT, CERT-UT). Being evaluated by several others worldwide. 20 High-quality Internet for higher education and research
21 Thanks AIRT has been developed with the support of SURFnet, the Dutch National Research and Education Network High-quality Internet for higher education and research
22 Kees Leune Contact Information Tilburg University, Infolab P.O. Box LE Tilburg The Netherlands 22 High-quality Internet for higher education and research
SIRIOS the Framework for CERTs
SIRIOS the Framework for CERTs Thomas Klingmüller Federal Office for Information Security (BSI) Germany 17th FIRST Conference 2005 - Singapore June 26 July 1, 2005 Abstract SIRIOS Framework for CERTs BSI
Open Source Incident Management Tool for CSIRTs
An Agency Under MOSTI Open Source Incident Management Tool for CSIRTs Adli Wahid Head, Malaysia CERT (MyCERT) CyberSecurity Malaysia Copyright 2008 CyberSecurity Malaysia Agenda About MyCERT Where do incidents
OTRS: Issue Management System Meets Workflow of Security Team Pavel Kácha, 2007 CESNET, z. s. p. o.
HOMO Vulnerabilis Aghast Awarensis Dexterous Securis OTRS: Issue Management System Meets Workflow of Security Team Pavel Kácha, 2007 CESNET, z. s. p. o. History postmaster@, hostmaster@, abuse@ Mailbox
RT for Incident Response (RTIR)
RT for Incident Response (RTIR) Andy Bone JANET-CERT Manager What is RTIR A tool for incident handling Currently in Beta Why Change History Increasing volume of incidents Requirement for multiple person
RFC 2350 CSIRT-TEHTRIS [CERT-TEHTRIS]
RFC 2350 CSIRT-TEHTRIS [CERT-TEHTRIS] 1 Document information... 2 1.1 Date of Last Update... 2 1.2 Distribution List for Notifications... 2 1.3 Locations where this Document May Be Found... 2 1.4 Authenticating
RT and RT for Incident Response
RT and RT for Incident Response I represent a software vendor We sell support, training, consulting and customization for RT, RTIR and RTFM This talk could be dangerously close to a sales pitch. I m not
Request Tracker for Incident Response (RTIR)
Request Tracker for Incident Response (RTIR) Kevin Falcone Best Practical Solutions RT/RTIR RT RTIR Extending RTIR Future development of RTIR REQUEST TRACKER RT is a ticketing system Bugtracking Helpdesk
RT and RT for Incident Response
RT and RT for Incident Response Carlos Fuentes Bermejo RTIR WG - Primary Technical Contact RedIRIS IRIS-CERT - Security Specialist Si habla español Couldn t be here today :( Jesse Vincent Designed RT and
Building CSIRT Capabilities
Building CSIRT Capabilities CERT CSIRT Development Team CERT Training and Education Center CERT Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2005 by Carnegie Mellon
RTIR incident handling work-flow
RTIR incident handling work-flow JANET CSIRT JANET(UK) WI/JCSIRT/003 Page 1 of 18 INTRODUCTION Request Tracker for Incident Response (RTIR) is the incident handling and ticketing system used by JANET CSIRT,
How To Create A Distributed Virtual Network Control System
Network Management Framework: A Distributed Virtual NOC Architecture Octavian Rusu RoEduNet Iasi Branch Iasi, Romania [email protected] Abstract Today s networks superpose multiple sets of services belonging
SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012
SES / CIF Internet2 Combined Industry and Research Constituency Meeting April 24, 2012 Doug Pearson Technical Director, REN-ISAC [email protected] Background on REN-ISAC The REN-ISAC mission is to
IT Support Tracking with Request Tracker (RT)
IT Support Tracking with Request Tracker (RT) Archibald Steiner AfNOG 2013 LUSAKA Overview What is RT? A bit of terminology Demonstration of the RT web interface Behind the scenes configuration options
ServiceDesk Plus On-Demand Comparison Document ServiceDesk Plus v8 vs ServiceDesk Plus On- Demand ENTERPRISE VERSIONS
ServiceDesk Plus On-Demand Comparison Document ServiceDesk Plus v8 vs ServiceDesk Plus On- Demand ENTERPRISE VERSIONS This document gives a feature wise comparison between the enterprise editions of ServiceDesk
Using the BWSD Help Desk Website
Accessing the Help Desk Website Using the BWSD Help Desk Website Open your web browser and go to http://helpdesk.bwschools.net:8080/ The Help Desk login screen will be displayed. 1. You should not have
CERT/CC Overview & CSIRT Development Team Activities
CERT/CC Overview & CSIRT Development Team Activities Georgia Killcrece CSIRT Development Team CERT Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 October 2006
933 COMPUTER NETWORK/SERVER SECURITY POLICY
933 COMPUTER NETWORK/SERVER SECURITY POLICY 933.1 Overview. Indiana State University provides network services to a large number and variety of users faculty, staff, students, and external constituencies.
DANCERT RFC2350 Description Date: 10-10-2014 Dissemination Level:
10-10-2014 Date: 10-10-2014 Dissemination Level: Owner: Authors: Public DANCERT DANTE Document Revision History Version Date Description of change Person 1.0 10-10-14 First version issued Jan Kohlrausch
CSIRT Introduction to Security Incident Handling
CSIRT Introduction to Security Incident Handling P. Jacques Houngbo AIS 2013Technical Workshops Lusaka, Zambia, June 2013 If you think technology can solve your security problems, then you don t understand
Naverisk 2013 R3 - Road Map
Naverisk 2013 R3 - Road Map This document summarizes the new features and enhancements in the 2013 R3 release of Naverisk. Continuing the Naverisk rapid release program, we have taken partner feedback
3 Simple Steps to Take Charge of Your Network Access Security
Simple s to Take Charge of Your Network Access Security Are you feeling the pain of an increasingly dynamic and growing network? Are you in control of who and what is connected to your network? Are you
Vulnerability Assessment Report Format Data Model
I3E'2005 Vulnerability Assessment Report Format Data Model Dr.D.Polemi G.Valvis Issues Attack paradigm Vulnerability exploit life cycle Vulnerability assessment process Challenges in vulnerability assessment
Managed Incident Lightweight Exchange (MILE)
Managed Incident Lightweight Exchange (MILE) Overview and Particpation Kathleen Moriarty Global Lead Security Architect EMC Corporate CTO Office 1 Agenda IETF s Managed Incident Lightweight Exchange (MILE)
Table of Contents INTRODUCTION...2 HOME PAGE...3. Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...
Table of Contents INTRODUCTION...2 HOME PAGE...3 Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...12 REQUEST...14 Request List View... 15 Creating a New Incident...
How to integrate Verax NMS & APM with Verax Service Desk
How to integrate Verax NMS & APM with Verax Service Desk Table of contents Abstract... 3 1. Configuring Service Desk notification profile in Verax Administrator Console... 4 2. Configuring incident categories
Your Help Desk evaluation is not complete until you check out the comparison between the different editions of ServiceDesk Plus and the price.
Comparison Document Your Help Desk evaluation is not complete until you check out the comparison between the different editions of ServiceDesk Plus and the price. Here is a list prepared based on customer
QUICK START GUIDE. Cisco C170 Email Security Appliance
1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
everything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service]
everything HelpDesk [Ease of Use] [100% Web Help Desk] [Business Process Automation] [World Class Customer Service] [Essential Third Party Integration] [Cross Platform Service Desk Solution] [Reporting
How to Work with HEAT Self Service
Division of Information Technology at UNCP How to Work with HEAT Self Service About This Document This document provides end-user instructions on using the HEAT Self Service (HSS) application to create,
Dell KACE K1000 Management Appliance. Service Desk Administrator Guide. Release 5.3. Revision Date: May 13, 2011
Dell KACE K1000 Management Appliance Service Desk Administrator Guide Release 5.3 Revision Date: May 13, 2011 2004-2011 Dell, Inc. All rights reserved. Information concerning third-party copyrights and
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Request For Proposal (RFP) Issued by FIRST.Org, Inc. ASSOCIATION MANAGEMENT SYSTEM. Submittal Deadline: December 18 th, 2015
Request For Proposal (RFP) Issued by FIRST.Org, Inc. ASSOCIATION MANAGEMENT SYSTEM Submittal Deadline: December 18 th, 2015 Project Completion Deadline: March 1 st, 2016 INTRODUCTION FIRST.Org, Inc. (FIRST)
Track-It! 8.5. The World s Most Widely Installed Help Desk and Asset Management Solution
The World s Most Widely Installed Help Desk and Asset Management Solution Key Benefits Easy to use! Gain full control of your IT assets, hardware and software Simplify software license management Save
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Enterprise Communication Suite
Enterprise Communication Suite Media Routes is a Canadian company incorporated in the province of Ontario and having head office in Vancouver, British Columbia, Canada. Media Routes is an in-house developer
Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7. Personalize & Change Password... 8. Reminders... 10 SERVICE CATALOG...
Table of Contents INTRODUCTION... 2 HOME PAGE... 3 Announcements... 7 Personalize & Change Password... 8 Reminders... 10 SERVICE CATALOG... 12 Raising a Service Request... 12 Edit the Service Request...
Patch and Vulnerability Management Program
Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent
Intrusion Detection Systems
Intrusion Detection Systems Advanced Computer Networks 2007 Reinhard Wallner [email protected] Outline Introduction Types of IDS How works an IDS Attacks to IDS Intrusion Prevention Systems
CERT.AZ description as per RfC 2350
CERT.AZ description as per RfC 2350 Contact Cyber Security Center (CSC) Computer Emergency Response Team (CERT) Address Block 702, Drogal lane Baku, Azerbaijan Telephone: +99412 4932056 +99412 4932057
VRDA Vulnerability Response Decision Assistance
VRDA Vulnerability Response Decision Assistance Art Manion CERT/CC Yurie Ito JPCERT/CC EC2ND 2007 2007 Carnegie Mellon University VRDA Rationale and Design 2 Problems Duplication of effort Over 8,000 vulnerability
Coordinating Attack Response at Internet Scale (CARIS)
Coordinating Attack Response at Internet Scale (CARIS) Overview and Summary Report July 2015 Kathleen Moriarty Security Area Director, IETF [email protected] Agenda Coordinating Attack Response
c360 Product Catalog
c360 Product Catalog Built on Microsoft Dynamics CRM 2011 c360 Solutions Inc 2002 Perimeter Summit Blvd Suite 700 Atlanta, GA 30319 Toll Free Product Sales 888.929.3670 E-mail [email protected] c360 PRODUCTS
jsecrm Corporate Edition
PIN No: P051163256V VAT No: 0140295M J.S. ENGINE LIMITED P.O. Box 39501 00623 NAIROBI, KENYA TEL: +254 20 3741872 FAX: +254 20 3741889 MOBILE: +254 725 990660 E MAIL: [email protected] WEB: www.jsengine.net
K7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
User Guide Secure Configuration Manager
User Guide Secure Configuration Manager January 2015 www.netiq.com/documentation Legal Notice NetIQ Secure Configuration Manager is protected by United States Patent No(s): 5829001, 7707183. THIS DOCUMENT
Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG...
Table of Contents INTRODUCTION... 2 HOME PAGE... 3 Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... 11 Raising a Service Request... 12 Edit the Service Request...
CSIRT Description for CERT OPL
CSIRT Description for CERT OPL Table of Contents 1. Document Information 2 1.1. Date of Last Update 2 1.2. Distribution List for Notifications 2 1.3. Locations where this Document May Be Found 2 1.4. Authentication
SolarWinds Log & Event Manager
Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...
Integral Party Plan Software. Implementation Options 2015
Integral Party Plan Software Implementation Options 2015 Party Plan Solutions Overview Party Plan Solutions is a software development and business consulting firm dedicated to serving direct selling companies
Network Monitoring. Sebastian Büttrich, [email protected] NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste
Network Monitoring Sebastian Büttrich, [email protected] NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste http://creativecommons.org/licenses/by-nc-sa/3.0/ Agenda What is network
Improving End-User Support with the K1000 Help Desk/Service Desk
Improving End-User Support with the K1000 Help Desk/Service Desk Nathan Fluegel, Dell KACE Director of Education Brian Burchfiel, Dell KACE Engineer Gerald Gillespie, Dell KACE Kanadian Agenda Key Service
Bomgar 10.6 License Comparison
Bomgar 10.6 License Comparison Multi-Platform Support Customer Technician/Representative Windows Windows 95-Windows 7 Server 2003 Server 2008 Windows 2000-Windows 7 Server 2003 Server 2008 Mac OS X OS
IT Service Desk Manual Ver. 2.0. Document Prepared By: IT Department. Page 1 of 12
Document Prepared By: Page 1 of 12 INDEX 1. Introduction. 3 2. Home Page..... 4 2.1 My Request Summary..... 4 2.2 Announcement....... 5 2.3 Submit your Request...... 5 2.4 Report a Problem...... 6 2.5
Your New Service Request Process: Technical Support Reference Guide for Cisco ServiceGrid
Support Guide Your New Service Request Process: Technical Support Reference Guide for Cisco ServiceGrid November 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public
Vulnerability Remediation Plugin Guide
Vulnerability Remediation Plugin Guide Plugin V 1.0 Doc Rev. 0.139 April 17, 2014 Table of Contents INTRODUCTION... 3 Background... 3 Purpose... 3 PRE-REQUISITES... 4 Supported versions of Venafi Trust
quality of service Screenshots
versasrs HelpDesk quality of service Screenshots versasrs HelpDesk Main Screen Ensures that your internal user issues remain visible until resolved. Prevents problems from falling through the cracks. Send
University System of Maryland University of Maryland, College Park Division of Information Technology
Audit Report University System of Maryland University of Maryland, College Park Division of Information Technology December 2014 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND
1.1 SERVICE DESCRIPTION
ADVANIA OPENCLOUD SERCVICE LEVEL AGREEMENT 1.1 SERVICE DESCRIPTION The service is designed in a way that will minimize Advania s operational involvement. Advania administrates the cloud platform and provides
Support Desk Help Manual. v 1, May 2014
Support Desk Help Manual v 1, May 2014 Table of Contents When do I create a ticket in DataRPM?... 3 How do I decide the Priority of the bug I am logging in?... 3 How do I Create a Ticket?... 3 How do I
1.1 SIP - No call possible
Read me System software 10.1.4 patch 2 and 10.1.5 patch 2 With system software 10.1.5 patch 2 there is a change in the FXO subsystem (POTS), which is not compatible with existing configurations. If you
Cisco Unified Attendant Console Advanced Version 10.0
Data Sheet Cisco Unified Attendant Console Advanced Version 10.0 Product Overview Manage high volumes of calls from customers, employees, and business partners smoothly and efficiently. Cisco Unified Attendant
ServiceDesk Plus On-Demand QUICK START GUIDE
ServiceDesk Plus On-Demand QUICK START GUIDE ServiceDesk Plus On-Demand is an online help desk software built on the ITIL framework with integrated asset management. It is available in 15 different languages
Business Voice over IP. Customer Care and Support Guide for Migrating Customers
Business Voice over IP Customer Care and Support Guide for Migrating Customers Page 1 Contents Contents... 1 Welcome to TELUS Business Voice over IP... 2 A note about customer satisfaction... 2 BVoIP contact
Customer Interaction Solutions
FEATURE MATRIX MITEL Customer Interaction Solutions A Highly Flexible, Two-tiered Offering Mitel Customer Interaction Solutions consists of Mitel Contact Center Enterprise Edition and Mitel Contact Center
Product Comparison List
Product Comparison List Data Center Size Site Solution / Feature
VitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution
VitalQIP DNS/DHCP & IP Address Management Software and Appliance Solution May 2011 7.3 Version 1 Copyright 2011 Alcatel-Lucent 1 Table of Contents 1. Document Purpose... 3 2. What s New in VitalQIP 7.3?...
New features and highlights
New features and highlights April 2012 Würth Phoenix Group 2012 System Monitoring NetEye availability monitoring by the SMS Watchdog With the newly introduced SMS Watchdog the status of NetEye is constantly
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Ticketing Systems with RT
Network Management & Monitoring Ticketing Systems with RT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Network Management & Monitoring Ticketing Systems with RT
Network Management & Monitoring Ticketing Systems with RT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot
101 ways to use SysAid
101 ways to use SysAid Keep IT simple by letting SysAid do what it does best- help you manage your IT. Print out this handy checklist of everything you can do with SysAid, and make sure you are taking
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
ITX HELP DESK CONSULTANT PROGRAMMER I UCD / PROGRAMMER II UCD. This position is not represented by a collective bargaining unit
Position: (Working Title) Payroll Title: Number of Positions: Salary Advertised ITX HELP DESK CONSULTANT PROGRAMMER I UCD / PROGRAMMER II UCD Multiple I-$17.29-$31.13/Hr. II-$19.06-$34.30/Hr. Appointment
Network Security Monitoring
Network Security Coleman Kane [email protected] September 24, 2014 Cyber Defense Overview Network Security 1 / 23 Passive Passive 2 Alert Alert Passive monitoring analyzes traffic with the intention
ObserveIT Service Desk Integration Guide
ObserveIT Service Desk Integration Guide Contents 1 Purpose of this Document... 2 2 Overview and Architecture... 2 3 Web Services Integration... 3 4 Customizing a New Service Desk System... 4 5 Appendix:
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Feature Comparison. Help Desk. Ticket Management. Email to Ticket. Fully Customizable User Interface. Escalation Rules.
Feature Comparison Help Desk Ticket Management Email to Ticket Fully Customizable User Interface Escalation Rules Routing Rules Granular Permission Control Customizable Survey Multiple Survey Questions
CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014
CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014 Agenda 1. About CorreLog 2. Log Management vs. SIEM 3. The
McAfee Network Threat Response (NTR) 4.0
McAfee Network Threat Response (NTR) 4.0 Configuring Automated Reporting and Alerting Automated reporting is supported with introduction of NTR 4.0 and designed to send automated reports via existing SMTP
QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance
1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation
