Windows network services for Samba folks
|
|
|
- Abigail Blake
- 10 years ago
- Views:
Transcription
1 Windows network services for Samba folks Jean-Baptiste Marchand Hervé Schauer Consultants 1
2 Agenda SMB/CIFS implementation MSRPC implementation Network authentication Interesting tools References 2
3 SMB/CIFS architecture kernel-mode components Client-side: redirector Server-side: server (srv.sys) User-mode services rdr.sys (NT), mrxsmb.sys (W2K and >) lanmanserver and lanmanworkstation configuration of kernel-mode components 3
4 SMB/CIFS transport Typical SMB/CIFS transports NetBT (TCP port 139) or raw (TCP port 445) NetBios over TCP/IP driver (netbt.sys) Ports: UDP 137 and 138, TCP 139 and 445 (kernel mode) NetBT: one device per network adapter (NetBT_Tcpip_) raw SMB: unique device (NetbiosSmb) MSKB # ( SmbDeviceEnabled registry value (NetBT\Parameters\) 4
5 TCPView TCPView (sysinternals) displays processes that owns a TCP or UDP endpoint System process: endpoints opened by a driver 5
6 raw SMB preferred over NetBT transport If both transports are active, the redirector resets the TCP connection to port 139 (NetBT) to port NetBT and raw SMB transport 6
7 Transport configuration {server,redirector} transport configuration GUI: network adapter properties server: File and Printer Sharing for Microsoft Networks redirector: Client for Microsoft networks server and redirector: Enable NetBIOS over TCP/IP CLI: net config srv, net config rdr Raw SMB redirector transport always available even with Client for Microsoft networks disabled 7
8 net config and nbtstat 8
9 Using the redirector Establishing an SMB session: use records net use command Ex: net use * \\unc_name\share (cached credentials) Ex: net use * \\ \myshare /u:jbm * (alternate credentials) Ex: net use \\ \IPC$ /u: * (null session) net use : enumerate use records in the current logon session SMB sessions are established (and reestablished) seamlessly, once a use record is active 9
10 net use 10
11 LSA credentials cache Local Security Authority credentials cache {LM,NT} hashes caching in each logon session Used by the MSV1_0 (NTLM) authentication package And by Kerberos as well, once a TGT has expired and is no longer renewable Transparent network authentication current username and password are seamlessly reused Alternate credentials can be specified with net use 11
12 Redirector sessions cache Sessions cache Established sessions are seamlessly used Ex: using a remote administration tool on a remote machine Any session established to the IPC$ share of the remote machine will be reused Administration trick: Establish a session with administrator credentials (using net use) to IPC$, before using remote administration tools 12
13 Sessions cache internals A session is uniquely identified by Server: server name Client: logon session id and network address A different server name must be used to establish multiple sessions (with different credentials) to a given server System error 1219 (The credentials supplied conflict with an existing set of credentials) Trick: using NetBIOS name, IPv4 address or fqdn DNS name to establish multiple sessions to the same server, with different credentials 13
14 Multiple SMB sessions 14
15 File server administration Administration (net command) Shares management: net share Sessions management: net sessions displays a list of established SMB sessions can disconnect any session (/delete) displays a list of accessed local resources can close any shared resource (/close) Shared resources management: net files 15
16 SMB session (IPC$) 16
17 MSRPC Microsoft implementation of DCE RPC Transport independent TCP/IP, IPX/SPX, NETBEUI,... Used in all versions of Windows NT, at all levels Typical use: NT domains, remote administration, DCOM SMB transport (Windows-specific), using named pipes as DCE RPC endpoints DCE RPC Protocol Data Units (PDUs) are sent over named pipes, using SMB commands 17
18 Named pipes Inter-Process Communication (IPC) mechanism Locally or over the network (using SMB) Implemented by a file system driver npfs.sys (Ex: \Device\NamedPipes\lsass) Named pipes enumeration pipelist (sysinternals.com) 18
19 Named pipes (Windows 2K) 19
20 Named pipes (Windows XP) 20
21 npfs aliases Named pipes aliases \pipe\lsass aliases \pipe\ntsvcs aliases: Npfs\Aliases registry value Windows NT, 2K, XP, Server 2003: \pipe\{netlogon, lsarpc, samr} Windows NT, 2K: \pipe\{srvsvc, wkssvc, eventlog, browse, msgsvc, svcctl, w32time (W2K only)} Windows XP, Server 2003: \pipe\{eventlog, svcctl} \pipe\lanman (used by RAP calls) is not a real named pipe 21
22 npfs aliases (NT, 2K, {XP, 2K3}) 22
23 DCE RPC remote management interface DCE RPC mgmt interface management interface ifids tool (Todd Sabin) interface: set of related operations Implicitly supported by any DCE RPC service Identification of named pipes used as MSRPC endpoints, using ifids ifids -p ncacn_np -e \pipe\pipe_name \\UNC_name 23
24 ifids: named pipes endpoints 24
25 MSRPC supported interfaces Multiple interfaces Inside a given process, all RPC services can be accessed using any endpoint on any transport Most Windows services (daemons) are implemented in shared processes (services.exe, svchost.exe) Consequence: ifids gives the list of all interfaces of all in-process RPC services 25
26 services.exe RPC services 26
27 Network authentication SMB sessions are typically authenticated Network authentication protocols NTLM Kerberos A network logon session is established on the remote system System threads servicing clients requests run in this logon session, with the security context of the authenticated user (impersonation token) 27
28 Auditing on a server Auditing policy Audit logon events (Success/Failure) Security events Logon events Windows NT: 528 (Successful Logon) Logon Type == 3 (network logon session) Interesting fields Windows 2K>: 540 (Successful Network Logon) User Name, Domain, Logon Type (3), Authentication Package, Workstation Name (NetBIOS name), Source Network Address (Windows Server 2003) 28
29 Security event
30 Auditing on a domain controller Auditing policy: Kerberos: Audit account logon: Success/Failure Security events for domain authentications Successes: 672 (Authentication Ticket Granted), 673 (Service Ticket Granted), 674 (Ticket Granted Renewed) Failures: 675 (Pre-authentication failed), 676 (Authentication Ticket Request Failed), 677 (Service Ticket Request Failed) NTLM: 680 (Success), 681 (Failure) 30
31 Kerberos administration Kerberos logging Audit account logon auditing category Ticket granting and service tickets requests logging Event (security log) Service tickets usage logging MSKB # (system log) Kerberos tools Tickets management: klist, kerbtray, TktView 31
32 Reference tools for advanced system administration and internals digging Maintained by Mark Russinovitch (Inside Windows 2000 author), Windows NT internals expert Tools Sysinternals tools Monitoring tools: Filemon, Regmon, Tokenmon, TDImon... Administration tools: Process Explorer, Pstools, TCPView... 32
33 Monitoring file systems with Filemon Filemon Can monitor all Windows file systems accesses (NTFS, NPFS (named pipes), MSFS (mailslots)) Can be used to debug many file systems related problems Ex: permissions problems Can monitor local redirector accesses 33
34 Filemon: example 34
35 Monitoring registry accesses with Regmon Regmon Can log all registry accesses at system boot Can also be used to discover undocumented registry values Ex: starting a driver or service with net start while regmon is running Sometimes, the (driver or service) Parameters\ key must be manually created, to see queries for undocumented values 35
36 kd (kernel debugger) kd (Microsoft Debugging tools) Some useful commands Resuming execution: kd> g Displaying stack backtrace: kd> k Examining foo.sys driver symbols: kd> x foo!* Setting a breakpoint for bar() function: kd> bp foo!bar Executing a single instruction: kd> t or kd> p 36
37 srv.sys: SMB implementation 37
38 References Books Inside Windows 2000, Mark Russinovitch & David Salomon. Microsoft Press. Programming Windows Security, Keith Brown. Addison Wesley. DCE/RPC over SMB: Samba and Windows NT Domain Internals, Luke Kenneth Casson Leighton. MTP. Implementing CIFS, Christopher R. Hertel. Prentice Hall (soon). Available online: 38
39 References Internals tools dcedump, ifids Sysinternals tools ( Filemon, Regmon, Process Explorer, PsTools, TCPView... Todd Sabin s tools (razor.bindview.com) RPC tools, PipeACL tools, ACL tools SPIKE (Dave Aitel, 39
40 References Kerberos tools klist and kerbtray ( windows2000/techinfo/reskit/tools/existing/{klisto,kerbtray-o}.asp) TktView ( samples.htm) 40
41 References Documentation Security events Audit Account Logon Events ( Articles/Index.cfm?ArticleID=19677) Tracking Logon and Logoff Activity in Win2K ( 41
42 Questions? Thank you! 42
Windows network services internals HiverCon 2003
Windows network services internals HiverCon 2003 Jean-Baptiste Marchand Jean-Baptiste Marchand Agenda TCP/IP stack SMB/CIFS MSRPC References 2 / 92 Copyright Hervé Jean-Baptiste
MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand <[email protected]>
MSRPC NULL sessions Exploitation and protection Jean-Baptiste Marchand Jean-Baptiste Marchand Agenda - 2 - Introduction to NULL sessions NULL sessions internals Tools to
Active Directory network protocols and traffic
HERVÉ SCHAUER CONSULTANTS Cabinet de Consultants en Sécurité Informatique depuis 1989 Spécialisé sur Unix, Windows, TCP/IP et Internet Windows Security OSSIR group 13th September S 2004 Active Directory
Active Directory network protocols and traffic
samba experience 2005 Göttingen, Germany 4 th May 2005 Active Directory network protocols and traffic Jean-Baptiste Marchand Jean-Baptiste Marchand Introduction Agenda Active
Fingerprinting Through RPC
Fingerprinting Through RPC Hidenobu Seki [email protected] Agenda Information gathering for RPC troubleshooting Microsoft RPC Interface IDs of Windows RPC services Info gathering without authentication
Web. Security Options Comparison
Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.
Windows Server 2008/2012 Server Hardening
Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible
Solaris CIFS Service CIFS. Alan Wright [email protected]
Solaris CIFS Service CIFS Alan Wright [email protected] Solaris CIFS Service Windows Interoperability opensolaris First-class Solaris Citizen kernel based protocol (a la NFS) file system (vfs and zfs) support
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Windows servers. NT networks
Windows servers The NT security model NT networks Networked NT machines can be: Primary Domain controller Centralizes user database/authentication Backup Domain controller Domain member Non-domain member
Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS
SonicOS User Identification Using the Domain Controller Security Log Contents Supported Platforms... 1 Event Viewer... 1 Configuring Group Policy to Enable Logon Audit... 2 Events in Security Log... 4
Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services
Univention Corporate Server Operation of a Samba domain based on Windows NT domain services 2 Table of Contents 1. Components of a Samba domain... 4 2. Installation... 5 3. Services of a Samba domain...
Security Options... 1
Effective Server Security Options Period: Last 20 week(s) Generated: For: Brian Bartlett [email protected] By: Ecora Auditor Professional 4.5 - Windows Module 4.5.8010.20310 Using: Customized FFR Definition
How To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Default configuration for the Workstation service and the Server service
Article ID: 887429 - Last Review: November 30, 2007 - Revision: 2.4 Overview of Message Block signing INTRODUCTION This article describes Message Block (SMB) signing. SMB signing is a security mechanism
Nessus scanning on Windows Domain
Nessus scanning on Windows Domain A little inside information and Nessus can go a long way By Sunil Vakharia [email protected] Version 1.0 4 November 2003 About this paper This paper is not a tutorial
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities
Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways
REMOTE ADMINISTRATION TOOLS: A COMPARATIVE STUDY
- 8 JATIT. All rights reserved. REMOTE ADMINISTRATION TOOLS: A COMPARATIVE STUDY Anis Ismail, Mohammad Hajjar, Haissam Hajjar Department of Computer Network and Telecommunications Engineering University
OV Operations for Windows 7.x
OV Operations for Windows 7.x Common questions about OV Operations for Windows Security Setup, Users and groups Whitepaper V.1.01 August 6, 2003 New: Updated for OV Operations for Windows 7.20 Troubleshoot
Samba and Vista with IPv6
Samba and Vista with IPv6 Dr David Holder CEng MIET MIEEE [email protected] - All rights reserved Quick Poll Who is using IPv6? Who is using IPv6 in a production environment? Who wants to use IPv6
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
EMC VNX Series. Configuring and Managing CIFS on VNX. Version VNX1, VNX2 P/N 300-014-332 REV. 03
EMC VNX Series Version VNX1, VNX2 Configuring and Managing CIFS on VNX P/N 300-014-332 REV. 03 Copyright 1998-2015 EMC Corporation. All rights reserved. Published in USA. Published March, 2015 EMC believes
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable
About Microsoft Windows Server 2003
About Microsoft Windows Server 003 Windows Server 003 (WinK3) requires extensive provisioning to meet both industry best practices and regulatory compliance. By default the Windows Server operating system
Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005
Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005 Revision 1.3: Cleaned up resources and added additional detail into each auditing table. Revision 1.4:
Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)
Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) March, 2013 Ref. 03.10 Kepware Technologies Table of Contents 1. Overview... 1 1.1 What is DCOM?... 1 1.2 What is OPCEnum?... 1 2. Users and
Windows Assessment. Vulnerability Assessment Course
Windows Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Windows Security Overview
Charles Firth [email protected]. Managing Macs in a Windows World
Charles Firth [email protected] Managing Macs in a Windows World Prerequisites Familiarity with Windows Active Directory networks Interest in Macintosh OSX integration and support Basic understanding
Chapter 15 Windows Operating Systems
Understanding Operating Systems, Fifth Edition 15-1 Chapter 15 Windows Operating Systems At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics Additional
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
SMB a protocol example
SMB a protocol example of which one implementation is SaMBa David Morgan SMB Server Message Block an application layer protocol implements file ( resource ) sharing built in to Windows 1 SMB historical
Integration with Active Directory. Jeremy Allison Samba Team
Integration with Active Directory Jeremy Allison Samba Team Benefits of using Active Directory Unlike the earlier Microsoft Windows NT 4.x Domain directory service which used proprietary DCE/RPC calls,
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
NETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
Samba as an Active Directory Domain Controller
Samba as an Active Directory Domain Controller Gregory Havens II Texas A&M University [email protected] Anthony Liguori Rutgers University [email protected] C. Donour Sizemore University of Chicago
Communication Ports Used by Citrix Technologies. April 2011 Version 1.5
Communication Ports Used by Citrix Technologies April 2011 Version 1.5 Overview Introduction This document provides an overview of ports that are used by Citrix components and must be considered as part
Defense Security Service Office of the Designated Approving Authority Standardization of Baseline Technical Security Configurations
Defense Security Service Office of the Designated Approving Authority Standardization of Baseline Technical Security Configurations March 2009 Version 2.2 This page intentionally left blank. 2 1. Introduction...4
Windows security for n00bs part 1 Security architecture & Access Control
Grenoble INP Ensimag _ (in)security we trust _!! SecurIMAG 2011-05-12 Windows security for n00bs part 1 Security architecture & Access Control Description: whether you are in favor or against it, the Windows
Managing Celerra for the Windows Environment
Managing Celerra for the Windows Environment P/N 300-002-679 Rev A01 March 2006 Contents Introduction..................................................3 Windows and multiprotocol documentation....................3
RELEASE NOTES. Release Notes. Introduction. Platform. Product/version/build: Remote Control 11.00 (2012027) ActiveX Guest 11.
Release Notes Product/version/build: Remote Control 11.00 (2012027) ActiveX Guest 11.00 (2012027) Shipping date: RELEASE NOTES 30 th January 2012 Introduction These release notes contain information relating
The Win32 Network Management APIs
The Win32 Network Management APIs What do we have in this session? Intro Run-Time Requirements What's New in Network Management? Windows 7 Windows Server 2003 Windows XP Network Management Function Groups
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting 1 Active Directory Overview SS4200-E Active Directory is based on the Samba 3 implementation The SS4200-E will function
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Windows8 Internals, Sixth Edition, Part 1
Microsoft Windows8 Internals, Sixth Edition, Part 1 Mark Russinovich David A. Solomon Alex lonescu Windows Internals, Sixth Edition, Part i Introduction xvii Chapter 1 Concepts and Tools 1 Windows Operating
Windows Security Environment
Motivation Popularity, widespread use of Windows Big surface, big impact Protection via user/kernel architecture and CPU modes Multiple-users environment, same physical resources Easy to install < security
Defense Security Service Office of the Designated Approving Authority
Defense Security Service Office of the Designated Approving Authority Baseline Technical Security Configuration of Microsoft Windows 7 and Microsoft Server 2008 R2 Version 1.0 Title Page Document Name:
DCOM settings for computer-to-computer communication between OPC servers and OPC clients
DCOM settings for computer-to-computer communication between OPC servers and OPC clients 1. Introduction Under OPC DA, the "dcomcnfg" service program is used for computer-to-computer communication between
CROSSPOINTE AT SABLE SUITE 150 3102 CHERRY PALM DRIVE TAMPA, FL 33619 UNITED STATES OF AMERICA TEL: (813) 621-8001 FAX:
Network setup using MS Network Client 3.0 for DOS. You should have the MS Client install disks 1 and 2, available on the installation CD for Windows NT/2000 server, and the DOS driver disk supplied with
CONFIGURING ACTIVE DIRECTORY IN LIFELINE
White Paper CONFIGURING ACTIVE DIRECTORY IN LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Test Environment 2 Joining a Lenovo network storage device to an AD domain 3 Importing Domain Users
Adjust account settings. [/FORCELOGOFF:{minutes NO}] [/MINPWLEN:length] [/MAXPWAGE:{days UNLIMITED}] [/MINPWAGE:days] [/UNIQUEPW:number] [/DOMAIN]
Windows XP syntax [ ACCOUNTS COMPUTER CONFIG CONTINUE FILE GROUP HELP HELPMSG LOCALGROUP NAME PAUSE PRINT SEND SESSION SHARE START STATISTICS STOP TIME USE USER VIEW ] ACCOUNTS COMPUTER Adjust account
EMC Celerra Network Server
EMC Celerra Network Server Release 5.6.48 Configuring and Managing CIFS on Celerra P/N 300-007-526 REV A04 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
SerNet. Samba Status Update. Linuxkongress Hamburg October 10, 2008. Volker Lendecke SerNet Samba Team. Network Service in a Service Network
Samba Status Update Linuxkongress Hamburg October 10, 2008 Volker Lendecke SerNet Samba Team 10/2008, Volker Lendecke, SerNet Service Network GmbH, Seite 1 Volker Lendecke Co-founder SerNet - Service Network
Communication ports used by Citrix Technologies. July 2011 Version 1.5
Communication ports used by Citrix Technologies July 2011 Version 1.5 Overview Introduction This document provides an overview of ports that are used by Citrix components and must be considered as part
Configuring and Managing CIFS on VNX
EMC VNX Series Release 7.0 Configuring and Managing CIFS on VNX P/N 300-011-826 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 1998-2011 EMC
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
Advanced Certificate in Networking (Microsoft) G5J9 17. Group Award Requirements
Advanced Certificate in Networking (Microsoft) G5J9 17 Group Award Requirements Advanced Certificate in Networking (NT4) Professional Development Award (PDA) Advanced Certificate in Networking Group Award
How to Configure Active Directory based User Authentication
How to Configure Active Directory based User Authentication You Must Have: Microsoft server with Active Directory configured. Windows 2000 Server is configured as Active Directory server in this example.
Troubleshooting Kerberos Errors
Troubleshooting Kerberos Errors Abstract Microsoft Corporation Published: March 2004 This white paper can help you troubleshoot Kerberos authentication problems that might occur in a Microsoft Windows
DIGIPASS Authentication for Windows Logon Product Guide 1.1
DIGIPASS Authentication for Windows Logon Product Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions,
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure
Technical White Paper DESKTOP www.novell.com Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure * Using SUSE Linux Enterprise Desktop with Microsoft Active Directory Infrastructure
TrueEdit Remote Connection Brief
MicroPress Server Configuration Guide for Remote Applications Date Issued: February 3, 2009 Document Number: 45082597 TrueEdit Remote Connection Brief Background TrueEdit Remote (TER) is actually the same
Macintosh Clients and Windows Print Queues
Macintosh Clients and Windows Print Queues OS X Maverick, Lion Mountain, Leopard, Tiger, and Panther Pre-Configuration Requirements Ensure Macintosh machines have a valid Host A and PTR records in your
Guide to SASL, GSSAPI & Kerberos v.6.0
SYMLABS VIRTUAL DIRECTORY SERVER Guide to SASL, GSSAPI & Kerberos v.6.0 Copyright 2011 www.symlabs.com Chapter 1 Introduction Symlabs has added support for the GSSAPI 1 authentication mechanism, which
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
Service Name Startup Type Log On As. ActiveX Installer (AxInstSV) Manual Local System. Adaptive Brightness Manual Local Service
Did you tweak the Services configuration incorrectly, resulting in a system slowdown or leading to other catastrophe? And you don t remember the original configuration to revert back? You may find the
Understanding MAPI. Julien Kerihuel, <[email protected]>
Understanding MAPI Julien Kerihuel, Contents Introduction MAPI Overview MAPI Concepts Introduction Introduction This introduction provides a quick overview of the underlying
Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation
Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation Agenda Overview Components Considerations Configurations Futures Summary What is needed? Thorough understanding components,
WINDOWS PROCESSES AND SERVICES
OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.
Troubleshooting Citrix MetaFrame Procedures
Troubleshooting Citrix MetaFrame Procedures Document name Troubleshooting a Citrix MetaFrame environment v1.0.doc Author Marcel van As Last Revision Date 28 February 2006 Edited and released by: www.dabcc.com
Citrix TCP Ports Communication Ports Used By Citrix Technologies. August 2009 Version 1.0
Citrix TCP Ports Communication Ports Used By Citrix Technologies August 2009 Version 1.0 Overview Introduction This document provides an overview of TCP ports that are used by Citrix components and must
NetIQ Advanced Authentication Framework - MacOS Client
NetIQ Advanced Authentication Framework - MacOS Client Installation Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 About MacOS Client 4 System Requirements
imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000
English imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000 Version 1.0.1 731-01873A-EN Contents Overview... 1 Network... 2 Network Environments...2
Windows 7 Core Services: Application Experience. Application Information. Background Intelligent Transfer. Base Filtering Engine.
Yegor Hanov EECS710, Fall 2012 Homework Assignment 10/23/12 Assignment 2: Core Windows 7 Services I reviewed the list of active services running on my laptop during normal operation. The list [1] contains
EMC Celerra Network Server
EMC Celerra Network Server Release 5.6.46 Configuring and Managing CIFS on EMC Celerra P/N 300-007-526 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com
Oracle Database Security and Audit
Copyright 2014, Oracle Database Security and Audit Beyond Checklists Learning objectives Understand Oracle architecture Database Listener Oracle connection handshake Client/server architecture Authentication
Windows XP Exchange Client Installation Instructions
WINDOWS XP with Outlook 2003 or Outlook 2007 1. Click the Start button and select Control Panel: 2. If your control panel looks like this: Click Switch to Classic View. 3. Double click Mail. 4. Click show
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
Likewise Open Installation and Administration Guide
Likewise Open Installation and Administration Guide Last updated: March 30, 2011. Abstract This guide describes how to install and manage Likewise Open, an open source version of the Likewise agent that
Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
Apple Technical White Paper Best Practices for Integrating OS X with Active Directory
Best Practices for Integrating OS X with Active Directory OS X Yosemite v10.10 December 2014 Contents Introduction to directory services support in OS X... 3 OS X and Active Directory... 4 Impact of mobility...
FreeIPA 3.3 Trust features
FreeIPA 3.3 features Sumit Bose, Alexander Bokovoy March 2014 FreeIPA and Active Directory FreeIPA and Active Directory both provide identity management solutions on top of the Kerberos infrastructure
Troubleshooting Windows monitoring 2007 Intellipool AB
Troubleshooting Windows monitoring 2007 Intellipool AB Troubleshooting Windows monitoring 2007 Intellipool AB All rights reserved. No parts of this work may be reproduced in any form or by any means -
How-to: Single Sign-On
How-to: Single Sign-On Document version: 1.02 nirva systems [email protected] nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
Hardening IIS Servers
8 Hardening IIS Servers Overview This chapter focuses on the guidance and procedures required to harden the IIS servers in your environment. To provide comprehensive security for Web servers and applications
Getting Started Guide
Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional
ecopy ShareScan v4.3 Pre-Installation Checklist
ecopy ShareScan v4.3 Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication section describes
Introduction to PsPing - a new Microsoft Windows tool for measuring network performance. Bartek Gajda [email protected]
Introduction to PsPing - a new Microsoft Windows tool for measuring network performance Bartek Gajda [email protected] Sysinternals Suite Sysinternals Suite is a set of advanced system utilities for
Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
Introduction to Computer Security
Introduction to Computer Security Windows Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Microsoft Windows Family Tree Key security milestones: NT 3.51 (1993): network drivers and
Windows Advanced Audit Policy Configuration
Windows Advanced Audit Policy Configuration EventTracker v7.x Publication Date: May 6, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This document describes auditing
