Symantec Security Information Manager 4.5 Reporting Guide

Size: px
Start display at page:

Download "Symantec Security Information Manager 4.5 Reporting Guide"

Transcription

1 Symantec Information Manager 4.5 Reporting Guide

2 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 1.0 Legal Notice Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation Stevens Creek Blvd. Cupertino, CA Printed in the United States of America

3 Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product feature and function. The Technical Support group also authors content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Response to provide alerting services and virus definition updates. Symantec s maintenance offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization A telephone and web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers automatic software upgrade protection Global support that is available 24 hours a day, 7 days a week Advanced features, including Account Management Services For information about Symantec s Maintenance Programs, you can visit our Web site at the following URL: Contacting Technical Support Customers with a current maintenance agreement may access Technical Support information at the following URL: Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to recreate the problem. When you contact Technical Support, please have the following information available: Product release level Hardware information Available memory, disk space, and NIC information Operating system

4 Version and patch level Network topology Router, gateway, and IP address information Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration Customer service If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: Customer service information is available at the following URL: Customer Service is available to assist with the following s of issues: Questions regarding product licensing or serialization Product registration updates such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and maintenance contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs or manuals

5 Maintenance agreement resources Additional Enterprise services If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows: Asia-Pacific and Japan: Europe, Middle-East, and Africa: North America and Latin America: Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively. Enterprise services that are available include the following: Symantec Early Warning Solutions These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur. Managed Services Consulting Services Educational Services These services remove the burden of managing and monitoring security devices and events, ensuring rapid response to real threats. Symantec Consulting Services provide on-site technical expertise from Symantec and its trusted partners. Symantec Consulting Services offer a variety of prepackaged and izable options that include assessment, design, implementation, monitoring and management capabilities, each focused on establishing and maintaining the integrity and availability of your IT resources. Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs. To access more information about Enterprise services, please visit our Web site at the following URL: Select your country or language from the site index.

6

7 Contents Technical Support Chapter 1 Chapter 2 Chapter 3 Chapter 4 Introducing Symantec Information Manager reporting About Symantec Information Manager reporting... 9 Components of Symantec Information Manager reporting About Symantec Information Manager queries About Symantec Information Manager reports Where to get more information about Symantec Information Manager Understanding Symantec Information Manager queries About the predefined System queries What you can do with Symantec Information Manager queries Using the query features Understanding Symantec Information Manager reports About Symantec Information Manager reports Using the report creation tools Example: Creating a simple network health report System queries reference All folder folder Templates folder Product folder SSIM folder folder... 63

8 8 Contents queries Custom queries Summary queries Index

9 Chapter 1 Introducing Symantec Information Manager reporting This chapter includes the following topics: About Symantec Information Manager reporting Components of Symantec Information Manager reporting Where to get more information about Symantec Information Manager About Symantec Information Manager reporting Symantec Information Manager provides a rich set of query and reporting tools that allow you to collect and present data in a format that meets the needs of your organization. are used to retrieve data from the system for viewing events, displaying information on the dashboard, and building reports. Reports are designed, previewed, and scheduled from the Information Manager console. Numerous predefined queries are provided with Information Manager that can help you get started with building your own queries and reports. The query and reporting features allow you to distill the data that Information Manager gathers into the pieces of information that are most important to you.

10 10 Introducing Symantec Information Manager reporting Components of Symantec Information Manager reporting Components of Symantec Information Manager reporting The key components of reporting are queries and reports. are accessible from the Events tab in the system console. Reports are accessible from the Reports tab in the system console. and reports are saved in the System directory under default top-level folders, which determine how the files can be used for reporting. About Symantec Information Manager queries are used to retrieve data from the system for viewing events, displaying information on the dashboard, and building reports. Reports are designed, previewed, and scheduled from the Information Manager console. Numerous predefined queries are provided with Information Manager that can help you get started with building your own queries and reports. For more information on working with queries, see the Symantec Information Manager Administrator's Guide or the Symantec Information Manager User's Guide. About the query folders Information Manager includes the following groups of queries: My Published System Folder in the directory where queries are saved. These queries are only accessible by the user who created the query. saved as My can be used in the user dashboard or My Reports. Published is a folder in the directory where queries can be saved and shared. These queries are accessible by all system users. saved as Published can be used in the dashboard or Published Reports. System is a folder in the directory where predefined queries that are distributed with Information Manager are stored. These queries are accessible by all system users, but cannot be modified. System can be used as templates for queries that are saved as My or Published in the directory. The System provided are grouped into sub-folders by topics of interest such as by product, compliance, or security.

11 Introducing Symantec Information Manager reporting Where to get more information about Symantec Information Manager 11 About Symantec Information Manager reports The Information Manager console includes an interface to design, preview, and distribute reports. You can create reports by inserting queries, graphics, and specifying other elements in a report template. For example, you could setup headers and footers, add your company logo, specify the report color scheme, select fonts, and so forth. The default, top-level folders are My Reports and Published Reports. About the Reports folders Information Manager includes the following groups of reports: My Reports Published Reports My Reports is a folder in the directory where reports can be saved. These reports are only accessible by the user who created the report. saved as My, Published, and System can be used in reports saved as My Reports. Published Reports is a folder in the directory where reports can be saved and shared. These reports are accessible by all system users. saved as Published or System can be used in reports saved as Published Reports. Where to get more information about Symantec Information Manager This guide provides an overview of the query and report creation features of Information Manager as well as a query reference to facilitate ization. For more details including step-by-step instructions on how to use the query and reports features that are available in the Information Manager console, see the the following: Symantec Information Manager User's Guide Symantec Information Manager Administrator's Guide

12 12 Introducing Symantec Information Manager reporting Where to get more information about Symantec Information Manager

13 Chapter 2 Understanding Symantec Information Manager queries This chapter includes the following topics: About the predefined System queries What you can do with Symantec Information Manager queries About the predefined System queries In the Information Manager console, on the Events page, the System folder contains numerous predefined queries that you can use as query templates. Use these templates to create ized queries that are sui for your environment. Note: You cannot edit a query in the System folder. You must first move the query to the My folder by either exporting and then importing the query into the My folder, or dragging and dropping the query into that folder. You can also edit queries in the Published folder.

14 14 Understanding Symantec Information Manager queries About the predefined System queries Figure 2-1 My folder Table 2-1 shows how the queries are organized within the System folder and describes each query group. Table 2-1 Query group All Templates Product SSIM Predefined query groups Description This general category currently contains only one query: Event Counts by Severity Last 7 Days. This group contains subgroups of queries, one subgroup for each regulatory standard. Many of these subgroups are divided into further subcategories of compliance s. This group contains event queries that you can use to meet your organization's compliance needs. Premium collectors populate these queries with data. products do not populate these queries. This group contains subgroups of queries for the most common collectors, for example, Symantec Client. These queries are specific to Information Manager, and they are organized into product function subgroups. For example, the Incidents subgroup contains queries that let you examine incident activity that is sorted in various ways.

15 Understanding Symantec Information Manager queries What you can do with Symantec Information Manager queries 15 Table 2-1 Query group Predefined query groups (continued) Description This group contains event queries, which are grouped by device s that report the events, for example, intrusion devices. In many cases, the predefined queries require editing to meet your needs. To edit a query in the My folder, you can right-click the query and select Edit Query... to change the properties for that query. For example, the default time range in a query may be the previous 7 days. If you want the query to display data for the previous 30 days, you can edit the query to meet your requirements. s must contain only alphanumeric characters. Because some predefined query names contain non-alphanumeric characters, you must edit these query names before you can import them into My or Published. To edit a query name, export the query, then open the QML file in a text editor such as Wordpad. Edit the filename in the line called <query_filename>. Then import the query file into the desired query folder. For more information, see the Symantec Information Manager Administrator's Guide or the Symantec Information Manager User's Guide. What you can do with Symantec Information Manager queries Using the query features The queries that Symantec Information Manager provides include hundreds of preconfigured, izable queries and templates that can be used to analyze business aspects such as compliance and risk management. The queries return data in a meaningful, concise, and izable format that can be viewed from the Information Manager dashboard, dropped into a report, and distributed. The query functions that Information Manager provides include hundreds of preconfigured queries that can be ized to aggregate and filter data. Symantec Information Manager uses a combination of and language to gather and filter relevant data. Using the data querying tools that Information Manager provides, you can perform tasks such as the following: Use many of the preconfigured queries without a need to ize the settings.

16 16 Understanding Symantec Information Manager queries What you can do with Symantec Information Manager queries Customize an existing query by dropping it into the My folder and changing the parameters. Use the Query Wizard to create a new query that focuses on the data fields and settings you choose. The Query Wizard can be used to create a query that returns event or summary data, or it can be used to create a new query using. Import and export queries that can be saved or shared. Publish queries to other Information Manager users. Organize queries into query groups that are relevant to your organization. Change the appearance of the query results by changing the chart properties. For more information on working with queries, see the Symantec Information Manager Administrator's Guide.

17 Chapter 3 Understanding Symantec Information Manager reports This chapter includes the following topics: About Symantec Information Manager reports Using the report creation tools About Symantec Information Manager reports Symantec Information Manager provides a rich set of report creation tools that allow you to represent multiple, related sets of query data in the format you choose. To create a report, you can use the Information Manager reports page to assemble the data that you want to present, and format the document to meet your company standards. A report can be as simple as a single query with no formatting, or as complex as dozens of queries that are wrapped in a branded, organized format. Using the reports features, you can create reports by inserting queries, graphics, and other elements in a report template. Examples of izations include the ability to add graphics such as your company brand, add header and footer information, create a specific color scheme, select fonts, and so forth.

18 18 Understanding Symantec Information Manager reports About Symantec Information Manager reports Figure 3-1 Reports Design view

19 Understanding Symantec Information Manager reports About Symantec Information Manager reports 19 After you have created a report, you can share the report format with other users by publishing it. By default, a report is private in the Information Manager interface, meaning that it is only visible to the user that created it. Publishing a report places the report in the Published Reports folder, which makes it available to other Information Manager users. After a report has been placed in the Published Reports folder, you can use the features on the Distribute tab to schedule and send a report to the recipients you specify. To distribute the report, you can schedule a report for delivery to specified recipients. You can also export the report as an.rml file which can then be distributed to be imported by another user, or saved as a backup copy. Figure 3-2 Reports Distribute view

20 20 Understanding Symantec Information Manager reports Using the report creation tools The flexibility of the reports feature provides a means to create ized reports that describe multiple sets of data in a single document. Most organizations employ a combination of query information to determine the overall state of the network. For example, an auditor may need to see a report that describes both the number of computers that are compliant with specific PCI regulations, as well as vulnerability data for those computers. Using the reporting tools provided, Information Manager reports can be ized to reflect a meaningful correlation of that data in report. For more infomation on working with reports, see the Symantec Information Manager Administrator's Guide or the Symantec Information Manager User's Guide. Using the report creation tools Using the completely izable report creation tools that Information Manager provides, you can create concise reports that represent security data in an understandable format. Using queries to populate an Information Manager report, you can create any report that you need, from compliance reports that are branded with your company logo to risk management reports that summarize the most important security risks on the network. The Reports tab in the Information Manager console allows you to design, preview, save, and distribute reports that you create. A report can be as simple as a single query dropped onto a page, or as complex as a full-featured report that includes the company brand, relevant contextual information, and multiple queries that are within the scope of the report. For more information on working with the report creation features, see About Symantec Information Manager reports Example: Creating a simple network health report The following example describes a real-world situation for which the Information Manager query and reporting features can be effectively used. In the scenario, the security administrator must compile a series of reports that describe the overall health of the network. Identify the requirements As part of the request from management, the security administrator must compile a report from Information Manager that includes visual representations of the following: Top 10 viruses

21 Understanding Symantec Information Manager reports Using the report creation tools 21 Top 20 security threats Viruses detected viruses Most vulnerable computers in the enterprise Times of day that firewalls are under the most stress Divide the requirements into logical groups The data for each item in the request can be acquired using the queries that are available in the Information Manager console. By analyzing the requirements, the security administrator divides the list into the following categories: Antivirus queries Vulnerability data queries data queries Intrusion detection (IDS) queries Identify and ize the applicable queries in Information Manager Information Manager provides queries that supply the data that is needed. Each of the queries are fully izable. In this case, the the security administrator adjusts the following settings where necessary: Visual representation of data Filter based on specific product To adjust the queries, the security administrator moves each query to the My folder and adjust the parameters. To move a query to the My folder, in the left pane of the Events page, drag and drop the query from the System folder to the My folder. In this case, the security administrator creates a subfolder named Sample network health queries in the My folder, and stores the copy of each query in this subfolder.

22 22 Understanding Symantec Information Manager reports Using the report creation tools Figure 3-3 Sample network health queries folder For example, the security administrator decides to edit the presentation of the Top 10 Virus query. After the Top 10 Virus queries is moved into the the Critical reports subfolder, the security administrator right-clicks the query and chooses Edit Query...

23 Understanding Symantec Information Manager reports Using the report creation tools 23 Figure 3-4 Choosing Edit Query from the right-click menu In the Edit Event Query dialog box, the Filter Criteria tab shows that the query is configured to use data from the last 30 days, and it is based on the Event ID equalling Virus. The security administrator decides that these parameters meet the requirements for this report. In the Edit Event Query dialog box, on the Chart Properties tab, the security administrator decides to change the visual properties of the data. The security administrator izes the title and changes the Chart to Pie.

24 24 Understanding Symantec Information Manager reports Using the report creation tools Figure 3-5 Chart properties view For each query that is used, the security administrator repeats these steps depending on the parameters and visual options that are most effective. Prepare the report After the queries have been ized, the security administrator creates the report. To create the report the security administrator does the following: In the Reports pane, create a new report. Insert the queries in the preferred display order. Customize the header and footer. Adjust the query display elements, such as the column width that is used in each and the colors that are used in each chart. Preview the report to verify that the output is what is expected.

25 Understanding Symantec Information Manager reports Using the report creation tools 25 Figure 3-6 Reports Preview view Distribute the report After the security administrator has configured the report with the desired queries and izations, the report is distributed. To distribute the report, the security administrator does the following: Set the distribution methods. Save the report.

26 26 Understanding Symantec Information Manager reports Using the report creation tools Figure 3-7 Reports Distribute view

27 Chapter 4 System queries reference This chapter includes the following topics: queries Custom queries Summary queries The s in this section provide detailed information about the system queries. This information will be helpful as you decide which queries you want to adapt for your own use. Note: The s in this section describe the queries that are available with the current release of Symantec Information Manager, including the most recent updates. If you do not see some of these queries in the console, you may not have the most recent updates installed. You may need to run additional scripts to access all of the queries, such as the compliance queries. For more information, see the Readme documentation that is included with the most recent update. The s describe the queries in each subfolder under System. In addition, there are specialized s for several s of queries: Each query that contains in the column also has an entry in Table 4-12, which shows the field that is substituted for N in the query.

28 28 System queries reference Custom Summary Each query that contains Custom in the column also has an entry in Table 4-13, which shows the database that the query uses. Each query that contains Summary in the column also has an entry in Table 4-14, which shows the summary that the query uses. Note: The time range of some queries is expressed in relative seconds. For example, a value of equals relative seconds, or 1 day (24 hours). All folder Table 4-1 describes the contents of the All folder. Table 4-1 All folder Event Counts by Severity Last 7 Days not applicable Current -7 days / folder The folder contains subgroups of queries, one subgroup for each regulatory standard. Many of these subgroups are divided into further subcategories of compliance s. FISMA queries in the folder Table 4-2 describes the contents of the FISMA subfolder. The time range column sometimes contains the letter R followed by a number. This value represents the duration of the query as a relative number of seconds. For example, a value of R equals relative seconds, or 1 day (24 hours).

29 System queries reference 29 Table 4-2 FISMA queries in the folder FISMA Administrative Access to Systems Event Code = 733, 39770, or Windows username = Administrator and product id =3105 FISMA Application Access Event Code = or FISMA Audit Policy Changes Event Code = 1525 FISMA Disabled Accounts Event Code = 2894 FISMA File and Directory Access Event Code = 765, 38765, 38768, 38676, 3788, 3789, 3790, 3791, 3792, 20280, 11501, 12985, 1560, FISMA Logon Failures event id = or Event Code = 707, 645, 708, 785, 779, 1535, 3988, 2708, 39768, 1246, 3237, OR intrusion_action = and intrusion outcome = , OR event_detail_id= or or OR event_id = FISMA User Account Management Changes Event Code = 44111, 719, 762, 757, 2322, 2894, 758, 759, 1559, 38765, 771, 38766, 1553 OR event_class= and target_resource=/people/ and event_id is not or FISMA User Logins event id = , or Event Code= 2931, 3708, 3960, 38755, 41543, 40574, 11357, 777, 10532, 733, 623, 3103, 3733, 10423, 1564, 3105, 12775, or 4466 FISMA User Logouts vendor code =:538, event id = , or Event Code = 720, or intrusion action=

30 30 System queries reference GLBA queries in the folder Table 4-3describes the contents of the GLBA subfolder. The time range column sometimes contains the letter R followed by a number. This value represents the duration of the query as a relative number of seconds. For example, a value of R equals relative seconds, or 1 day (24 hours). Table 4-3 GLBA queries in the folder GLBA Logon Failures event id = or Event Code = 707, 645, 708, 785, 779, 1535, 3988, 2708, 39768, 1246, 3237, OR intrusion_action = and intrusion outcome = , OR event_detail_id= or or OR event_id = GLBA User Logoff event id = , or Event Code= 2931, 3708, 3960, 38755, 41543, 40574, 11357, 777, 10532, 733, 623, 3103, 3733, 10423, 1564, 3105, 12775, or 4466 GLBA User Logon vendor code =:538, event id = , or Event Code = 720, or intrusion action= HIPAA queries in the folder Table 4-4describes the contents of the HIPAA subfolder. The time range column sometimes contains the letter R followed by a number. This value represents the duration of the query as a relative number of seconds. For example, a value of R equals relative seconds, or 1 day (24 hours).

31 System queries reference 31 Table 4-4 HIPAA queries in the folder HIPAA > Administrative Safeguards Open Incident Aging status <> 2 all sql HIPAA > Administrative Safeguards Closed Incidents by Disposition WHERE STATUS = 2 N/A sql HIPAA > Administrative Safeguards Open vs Closed Incident Count by Creation Date Last 7 Days case when status = 0 or status = 1 or status = 2 creation_time >= (current timestamp - 7 DAYS) sql HIPAA > Administrative Safeguards Opened Incident Count by Creation Date case when status = 0 or status = 1 creation_time >= (current timestamp - 7 DAYS) sql HIPAA Account Information Failed status id and Event Code = 42488, HIPAA Account Integrity Failed status id and Event Code = HIPAA Audit Logs Access Event Code =38764 or HIPAA Configuration and Policy Changes Event Code = 1525 HIPAA Configuration and Policy Changes on Windows Vendor signature=:612 HIPAA File Attributes and Watch Failed compliance status = and Event Code = or 41708

32 32 System queries reference Table 4-4 HIPAA queries in the folder (continued) HIPAA Logon Failures event id = or Event Code = 707, 645, 708, 785, 779, 1535, 3988, 2708, 39768, 1246, 3237, OR intrusion_action = and intrusion outcome = , OR event_detail_id= or or OR event_id = HIPAA Network Integrity and Complexity Failed Event Code = 42476, 42485, 42493, and compliance status = HIPAA OS Patches Failed Event Code= and compliance status= HIPAA Object Access event id = , , , , , , , , , OR Event Code = 39745, 39744, 39746, HIPAA Password Changes Event Code = 718 HIPAA Privilege Use Event Code = 733, 734, 39770, 42823, 41543, or product = 3105 and windows user=administrator HIPAA Strong Authentication and Password Policy Failed Event Code = 41460, or and compliance status= HIPAA System Auditing Failed Event Code = and compliance status= HIPAA User Logins event id = , or Event Code= 2931, 3708, 3960, 38755, 41543, 40574, 11357, 777, 10532, 733, 623, 3103, 3733, 10423, 1564, 3105, 12775, or 4466

33 System queries reference 33 Table 4-4 HIPAA queries in the folder (continued) HIPAA User Logouts vendor code =:538, event id = , or Event Code = 720, or intrusion action= ISO17799 queries in the folder Table 4-5 describes the contents of the ISO17799 subfolder. The time range column sometimes contains the letter R followed by a number. This value represents the duration of the query as a relative number of seconds. For example, a value of R equals relative seconds, or 1 day (24 hours). Table 4-5 ISO17799 queries in the folder ISO17799 Administrative Access to Systems Event Code = 733, 39770, or Windows username = Administrator and product id =3105 ISO17799 Disabled Accounts Event Code = 2894 ISO17799 Logon Failures event id = or Event Code = 707, 645, 708, 785, 779, 1535, 3988, 2708, 39768, 1246, 3237, OR intrusion_action = and intrusion outcome = , OR event_detail_id= or or OR event_id = PCI queries in the folder Table 4-6describes the contents of the PCI subfolder. The time range column sometimes contains the letter R followed by a number. This value represents the duration of the query as a relative number of seconds. For example, a value of R equals relative seconds, or 1 day (24 hours).

34 34 System queries reference Table 4-6 PCI queries in the folder PCI > Antivirus Management All Risk Events event id = PCI > Antivirus Managemen All Virus Events per Hour event_id= Summarizer PCI > Antivirus Managemen Antivirus Disabled Event Code = 3825 PCI > Antivirus Managemen Daily Virus Definitions Successful Last 30 Days event_id=92004 CURRENT TIMESTAMP - 30 DAYS sql PCI > Antivirus Managemen Infected Computers per Hour event id = or Summarizer PCI > Antivirus Managemen Top 15 Users Triggering Risks Last 7 Days event = chart PCI > Antivirus Managemen Top 15 Users Triggering Viruses Last 7 Days event = chart PCI > Antivirus Managemen Total Client AV Version Count count(product_version) as "Total Client Count" sql PCI > Antivirus Managemen Virus Definition Updates Per Hour event_id=92004 >= CURRENT TIMESTAMP - 1 DAY sql PCI > Encrypt Transmissions HTTPS Connections source port = 443 or destination port = 443 or destination service = HTTPS AND event id = or PCI > Encrypt Transmissions Network Traffic Encryption Checks Event Code = 42536

35 System queries reference 35 Table 4-6 PCI queries in the folder (continued) PCI > Encrypt Transmissions Network Traffic Encryption Failed Event Code = and compliance status = PCI > Encrypt Transmissions VPN Client Connections Accepted During the Day event id = PCI > Encrypt Transmissions VPN Client Connections Failed During the Day event_id= PCI > Maintain Dropped or Denied Connections event id = or R PCI > Maintain Alerts or Failures Event Code = or 3969 PCI > Maintain Configuration Changes Event Code = 3974 or 3964 PCI > Maintain Failed Authentication Events Hourly Tally event id = Summarizer PCI > Maintain Intrusion Detection Events event id = PCI > Maintain Successful Authentication Events Hourly Tally event id = Summarizer PCI > Maintain Information Policy Information Policy Checks Event Code = or 42486

36 36 System queries reference Table 4-6 PCI queries in the folder (continued) PCI > Maintain Information Policy Information Policy Failed Event Code = or AND PCI > Maintain Information Policy Device Policy Modifications Event Code = 42916, 42915, or PCI > Protect Stored Data Administrative Access to Systems Event Code = 733, 39770, or Windows username = Administrator and product id =3105 PCI > Protect Stored Data Database Configuration Change Checks Event Code = PCI > Protect Stored Data Database Configuration Change Failed Event Code = and compliance status id= PCI > Protect Stored Data Database Failed Logins product 3214 or 3234 or 3213 or 3229 or 3282 and intrusion_action= and intrusion_outcome= PCI > Protect Stored Data Database Failed Logins Top 5 Destination Hosts product 3214 or 3234 or 3213 or 3229 or 3282 and intrusion_action= and intrusion_outcome= chart PCI > Protect Stored Data Database Failed Logins Top 5 Usernames product 3214 or 3234 or 3213 or 3229 or 3282 and intrusion_action= and intrusion_outcome= chart PCI > Protect Stored Data Database Rights Granted Event Code = 3587

37 System queries reference 37 Table 4-6 PCI queries in the folder (continued) PCI > Protect Stored Data Database Successful Logins product 3214 or 3234 or 3213 or 3229 or 3282 and intrusion_action= and intrusion_outcome= PCI > Protect Stored Data Database Successful Logins Top 5 Destination Hosts product 3214 or 3234 or 3213 or 3229 or 3282 and intrusion_action= and intrusion_outcome= chart PCI > Protect Stored Data Database Successful Logins Top 5 Usernames product 3214 or 3234 or 3213 or 3229 or 3282 and intrusion_action= and intrusion_outcome= chart PCI > Protect Stored Data Database Users Added product 3214 or 3234 or 3213 or 3229and Event Code = 722 PCI > Protect Stored Data Database Users Removed product 3214 or 3234 or 3213 or 3229and Event Code =758 OR vendor signature = DROP USER PCI > Protect Stored Data Failed Logins event id = OR vendor code = :529, :530, :531, :532, :533, :534, :535, :536, :537, :539, :675, :676, :681 AND intrusion action= and intrusion outcome = PCI > Protect Stored Data Failed Logins Top 5 Destination Hosts event id = OR vendor code = :529, :530, :531, :532, :533, :534, :535, :536, :537, :539, :675, :676, :681 AND intrusion action= and intrusion outcome = chart

38 38 System queries reference Table 4-6 PCI queries in the folder (continued) PCI > Protect Stored Data Failed Logins Top 5 Usernames event id = OR vendor code = :529, :530, :531, :532, :533, :534, :535, :536, :537, :539, :675, :676, :681 AND intrusion action= and intrusion outcome = chart PCI > Protect Stored Data Strong Authentication and Password Policy Checks Event Code = 41460, or PCI > Protect Stored Data Strong Authentication and Password Policy Failed Event Code = 41460, or and compliance status= PCI > Protect Stored Data Suspicious Database Traffic Events Event Code = 41389, or 3518 PCI > Regularly Test Systems and Processes Scan Conclusion Events Event id PCI > Regularly Test Systems and Processes Incident Overview For Last Week N/A current timestamp - 7 days sql PCI > Regularly Test Systems and Processes Incidents Created Over Past Week status as "Status" current timestamp - 7 days sql

39 System queries reference 39 Table 4-6 PCI queries in the folder (continued) PCI > Regularly Test Systems and Processes Incidents Created Today N/A date (creation_ time + current timezone) = current date sql PCI > Regularly Test Systems and Processes Most Detected CVE Codes CVE_ID, N/A sql PCI > Regularly Test Systems and Processes Most Detected Vulnerability Codes VULNERABILITY_ID N/A sql PCI > Regularly Test Systems and Processes Open Incident Aging status <> 2 all sql PCI > Regularly Test Systems and Processes Open Incident Aging by Assignee Table status <> 2 all sql PCI > Regularly Test Systems and Processes Open Incidents By Assignee severity >= 1 and status < 2 sql PCI > Regularly Test Systems and Processes Open and Closed Incidents For Assignee Today when status = 0 or status = 1 or status = 2 DATE (CREATION_TIME + CURRENT TIMEZONE) = CURRENT_DATE) sql

40 40 System queries reference Table 4-6 PCI queries in the folder (continued) PCI > Regularly Test Systems and Processes Open vs Closed Incident Count by Creation Date Last 7 Days case when status = 0 or status = 1 or status = 2 creation_ time >= (current timestamp - 7 DAYS) sql PCI > Regularly Test Systems and Processes Recent Events Vulnerability eventclass= , or PCI > Regularly Test Systems and Processes Time to Resolve Incidents Over Last Day CLOSED_TIME IS NOT NULL CREATED_ TIME >= (current timestamp - 1 Days) sql PCI > Regularly Test Systems and Processes Vulnerability Scans Commenced event_id= PCI > Restrict Access to Data Access Control Device Denied Events product Event Code 3988 or 785 or or 785 PCI > Restrict Access to Data Failed Logins event id = OR vendor code = :529, :530, :531, :532, :533, :534, :535, :536, :537, :539, :675, :676, :681 AND intrusion action= and intrusion outcome =

41 System queries reference 41 Table 4-6 PCI queries in the folder (continued) PCI > Restrict Access to Data Failed Logins Top 5 Destination Hosts event id = OR vendor code = :529, :530, :531, :532, :533, :534, :535, :536, :537, :539, :675, :676, :681 AND intrusion action= and intrusion outcome = chart PCI > Restrict Access to Data Failed Logins Top 5 Usernames event id = OR vendor code = :529, :530, :531, :532, :533, :534, :535, :536, :537, :539, :675, :676, :681 AND intrusion action= and intrusion outcome = chart PCI > Restrict Access to Data File Ownership and Permissions Checks Event Code = PCI > Restrict Access to Data File Ownership and Permissions Failed Event Code = and compliance status id = PCI > Restrict Access to Data Monitored System Object Created product=3248 and vendor signature = Object creation PCI > Restrict Access to Data Monitored System Object Deleted product=3248 and vendor signature = Object deleting or Deleted Element PCI > Restrict Access to Data Monitored System Object Modified product=3248 and vendor signature = Object changed or Object modification PCI > Restrict Access to Data Privileged Account Review Checks Event Code = 42488

42 42 System queries reference Table 4-6 PCI queries in the folder (continued) PCI > Restrict Access to Data Privileged Account Review Failed Event Code = and compliance status= PCI > Restrict Access to Data Successful Logins event id = or , OR Event Code = 1564, 3733, 3105 OR intrusion action = and intrusion outcome= PCI > Restrict Access to Data Successful Logins Top 5 Destination Hosts event id = or , OR Event Code = 1564, 3733, 3105 OR intrusion action = and intrusion outcome= chart PCI > Restrict Access to Data Successful Logins Top 5 Usernames event id = or , OR Event Code = 1564, 3733, 3105 OR intrusion action = and intrusion outcome= chart PCI > Restrict Access to Data System Access Restrictions Checks Event Code = PCI > Restrict Access to Data System Access Restrictions Failed Event Code = and compliance status= PCI > Restrict Physical Access Network Access Control Protection Checks Event Code = PCI > Restrict Physical Access Network Access Control Protection Failed Event Code = and compliance status= PCI > Secure Systems and Applications Most Detected CVE Codes CVE_ID, N/A sql PCI > Secure Systems and Applications Most Detected Vulnerability Codes VULNERABILITY_ID N/A sql

43 System queries reference 43 Table 4-6 PCI queries in the folder (continued) PCI > Secure Systems and Applications OS Patches Checks Event Code= R PCI > Secure Systems and Applications OS Patches Failed Event Code= and compliance status= PCI > Secure Systems and Applications Patch Management Events event id = or PCI > Secure Systems and Applications Patches Deployed event id = PCI > Secure Systems and Applications Systems Most Vulnerable to Attack count cve, vulnerability on CIA sql PCI > Secure Systems and Applications Systems Not Patched event = PCI > Track and Monitor All Access Access Logging and Monitoring Checks Event Code = 42474, 42386, PCI > Track and Monitor All Access Access Logging and Monitoring Failed status id and Event Code = 42474, 42386, PCI > Track and Monitor All Access Administrative Access to Systems Event Code = 733, 39770, or Windows username = Administrator and product id =3105 PCI > Track and Monitor All Access Audit Logs Access Event Code =38764 or 39628

44 44 System queries reference Table 4-6 PCI queries in the folder (continued) PCI > Track and Monitor All Access Failed Logins event id = OR vendor code = :529, :530, :531, :532, :533, :534, :535, :536, :537, :539, :675, :676, :681 AND intrusion action= and intrusion outcome = PCI > Track and Monitor All Access Failed Logins Top 5 Destination Hosts event id = OR vendor code = :529, :530, :531, :532, :533, :534, :535, :536, :537, :539, :675, :676, :681 AND intrusion action= and intrusion outcome = chart PCI > Track and Monitor All Access Failed Logins Top 5 Usernames event id = OR vendor code = :529, :530, :531, :532, :533, :534, :535, :536, :537, :539, :675, :676, :681 AND intrusion action= and intrusion outcome = chart PCI > Track and Monitor All Access Sensor Invalid Timestamp Incidents INCIDENT_TYPE_ID = 'Invalid Event Date Alert' CREATION_ TIME >= (current timestamp - 30 DAYS sql PCI > Track and Monitor All Access Successful Logins event id = or , OR Event Code = 1564, 3733, 3105 OR intrusion action = and intrusion outcome=

45 System queries reference 45 Table 4-6 PCI queries in the folder (continued) PCI > Track and Monitor All Access Successful Logins Top 5 Destination Hosts event id = or , OR Event Code = 1564, 3733, 3105 OR intrusion action = and intrusion outcome= chart PCI > Track and Monitor All Access Successful Logins Top 5 Usernames event id = or , OR Event Code = 1564, 3733, 3105 OR intrusion action = and intrusion outcome= chart PCI > Track and Monitor All Access User Logins event id = , or Event Code= 2931, 3708, 3960, 38755, 41543, 40574, 11357, 777, 10532, 733, 623, 3103, 3733, 10423, 1564, 3105, 12775, or 4466 PCI > Track and Monitor All Access User Logouts vendor code =:538, event id = , or Event Code = 720, or intrusion action= PCI > Unique User IDs Default Username Authentications event id= or OR Event Code= 1564, 3733,3105 or mechanisms = 11 or intrusion_action= and intrusion_outcome= AND target_resource=admin, administrator, root, guest or sa PCI > Unique User IDs Default Username Authentications Top 5 Usernames event id= or OR Event Code= 1564, 3733,3105 or mechanisms = 11 or intrusion_action= and intrusion_outcome= AND target_resource=admin, administrator, root, guest or sa chart PCI > Unique User IDs Strong Authentication and Password Policy Checks Event Code = 41460, or 42491

46 46 System queries reference Table 4-6 PCI queries in the folder (continued) PCI > Unique User IDs Strong Authentication and Password Policy Failed Event Code = 41460, or and compliance status= PCI > Unique User IDs User Account Management Changes Event Code = 44111, 719, 762, 757, 2322, 2894, 758, 759, 1559, 38765, 771, 38766, 1553 OR event_class= and target_resource=/people/ and event_id is not or PCI > Unique User IDs User Accounts Created Event Code = 722 PCI > Unique User IDs User Accounts Deleted Event Code = 758 PCI > Vendor Supplied Defaults Administrative Access to Systems Event Code = 733, 39770, or Windows username = Administrator and product id =3105 PCI > Vendor Supplied Defaults Audit Policy Changes Event Code = 1525 PCI > Vendor Supplied Defaults Default Username Authentications event id= or OR Event Code= 1564, 3733,3105 or mechanisms = 11 or intrusion_action= and intrusion_outcome= AND target_resource=admin, administrator, root, guest or sa PCI > Vendor Supplied Defaults Default Username Authentications Detected Event Code = 777, 2352 or 41376

47 System queries reference 47 Table 4-6 PCI queries in the folder (continued) PCI > Vendor Supplied Defaults Default Username Authentications Top 5 Usernames event id= or OR Event Code= 1564, 3733,3105 or mechanisms = 11 or intrusion_action= and intrusion_outcome= AND target_resource=admin, administrator, root, guest or sa chart PCI > Vendor Supplied Defaults Disabled Accounts Event Code = 2894 PCI > Vendor Supplied Defaults Disabled User Accounts with Failed Login Attempts vendor signature = :531 r PCI > Vendor Supplied Defaults Authentication Events Hourly Tally event id = or Summarizer PCI > Vendor Supplied Defaults Password Changes Event Code = 718 SOX queries in the folder Table 4-7 describes the contents of the SOX subfolder. The time range column sometimes contains the letter R followed by a number. This value represents the duration of the query as a relative number of seconds. For example, a value of R equals relative seconds, or 1 day (24 hours). Table 4-7 SOX queries in the folder SOX Administrative Access to Systems Event Code = 733, 39770, or Windows username = Administrator and product id =3105 SOX Application Access Event Code = or 39748

48 48 System queries reference Table 4-7 SOX queries in the folder (continued) SOX Audit Logs Access Event Code =38764 or SOX Audit Policy Changes Event Code = 1525 SOX Disabled Accounts Event Code = 2894 SOX File and Directory Access Event Code = 765, 38765, 38768, 38676, 3788, 3789, 3790, 3791, 3792, 20280, 11501, 12985, 1560, SOX Incident Overview for Last Week N/A current timestamp - 7 days sql SOX Incidents Created Over Past Week status as "Status" current timestamp - 7 days sql SOX Incidents Created Today N/A date(creation_time + current timezone) = current date sql SOX Logon Failures event id = or Event Code = 707, 645, 708, 785, 779, 1535, 3988, 2708, 39768, 1246, 3237, OR intrusion_action = and intrusion outcome = , OR event_detail_id= or or OR event_id = SOX Open Incident Aging by Assignee Table status <> 2 all sql SOX Open Incidents by Assignee severity >= 1 and status < 2 sql SOX Open and Closed Incidents for Assignees Today when status = 0 or status = 1 or status = 2 DATE(CREATION_ TIME + CURRENT TIMEZONE) = CURRENT_DATE) sql

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license

More information

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0

Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Symantec Enterprise Security Manager Modules for Sybase Adaptive Server Enterprise Release Notes 3.1.0 Release 3.1.0 for Symantec ESM 6.5.x and 9.0.1 Symantec Enterprise Security Manager Modules for Sybase

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec Critical System Protection Agent Event Viewer Guide

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection Agent Event Viewer Guide The software described in this book is furnished under a license agreement and

More information

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4

Symantec Enterprise Security Manager Oracle Database Modules Release Notes. Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes Version: 5.4 Symantec Enterprise Security Manager Oracle Database Modules Release Notes The software described in this book is

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

Symantec Protection Center Enterprise 3.0. Release Notes

Symantec Protection Center Enterprise 3.0. Release Notes Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Veritas Cluster Server Getting Started Guide

Veritas Cluster Server Getting Started Guide Veritas Cluster Server Getting Started Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 21101490 Veritas Cluster Server Getting Started Guide The software described in this book is furnished

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Application Note: High Availability

More information

Symantec Security Information Manager 4.8 Release Notes

Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used

More information

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7

Symantec NetBackup Desktop and Laptop Option README. Release 6.1 MP7 TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Enterprise Security Manager Patch Policy Release Notes

Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes Symantec Enterprise Security Manager Patch Policy Release Notes The software described in this book is furnished under a license agreement

More information

Symantec Virtual Machine Management 7.1 User Guide

Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec Client Firewall Policy Migration Guide

Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1

Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 Veritas Operations Manager Package Anomaly Add-on User's Guide 4.1 November 2011 Veritas Operations Manager Package Anomaly Add-on User's Guide The software described in this book is furnished under a

More information

Symantec Response Assessment module Installation Guide. Version 9.0

Symantec Response Assessment module Installation Guide. Version 9.0 Symantec Response Assessment module Installation Guide Version 9.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Endpoint Protection Shared Insight Cache User Guide

Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and

More information

Symantec Security Information Manager 4.6 Administrator's Guide

Symantec Security Information Manager 4.6 Administrator's Guide Symantec Security Information Manager 4.6 Administrator's Guide Symantec Security Information Manager 4.6 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Security Information Manager 4.5 Administrator's Guide

Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide Symantec Security Information Manager 4.5 Administrator's Guide The software described in this book is furnished under a license agreement

More information

Symantec System Recovery 2013 Management Solution Administrator's Guide

Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

Symantec Mobile Security Manager Administration Guide

Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager Administration Guide Symantec Mobile Security Manager The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1

Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 Veritas Operations Manager LDom Capacity Management Add-on User's Guide 4.1 November 2011 Veritas Operations Manager LDom Capacity Management Add-on User's Guide The software described in this book is

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

Symantec Data Center Security: Server Advanced v6.0. Agent Guide Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and

More information

Symantec Enterprise Security Manager Modules. Release Notes

Symantec Enterprise Security Manager Modules. Release Notes Symantec Enterprise Security Manager Modules for MS SQL Server Databases Release Notes Release 4.1 for Symantec ESM 9.0.x and 10.0 For Windows 2000/2008 and Windows Server 2003 Symantec Enterprise Security

More information

Email Encryption. Administrator Guide

Email Encryption. Administrator Guide Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector for Blue Coat Proxy Quick Reference The software described in this book is furnished under a license agreement

More information

Symantec Mobile Management 7.2 MR1Quick-start Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Security Information Manager 4.8 User Guide

Symantec Security Information Manager 4.8 User Guide Symantec Security Information Manager 4.8 User Guide Symantec Security Information Manager User Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide

Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide Altiris Asset Management Suite 7.1 SP2 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Symantec Protection Engine for Cloud Services 7.0 Release Notes

Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and

More information

Altiris Asset Management Suite 7.1 from Symantec User Guide

Altiris Asset Management Suite 7.1 from Symantec User Guide Altiris Asset Management Suite 7.1 from Symantec User Guide Altiris Asset Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Security Information Manager 4.7.4 Administrator Guide

Symantec Security Information Manager 4.7.4 Administrator Guide Symantec Security Information Manager 4.7.4 Administrator Guide Symantec Security Information Manager 4.7.4 Administrator Guide The software described in this book is furnished under a license agreement

More information

Symantec Event Collector 4.3 for SNARE for Windows Quick Reference

Symantec Event Collector 4.3 for SNARE for Windows Quick Reference Symantec Event Collector 4.3 for SNARE for Windows Quick Reference Symantec Event Collector for SNARE for Windows Quick Reference The software described in this book is furnished under a license agreement

More information

Configuring Symantec AntiVirus for NetApp Storage system

Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system Configuring Symantec AntiVirus for NetApp Storage system The software described in this book is furnished under a license agreement and may be used

More information

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide

Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for SharePoint Server 2010 Configuration Guide The software

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Configuring Internal and External WebApp URLs for OWA 2007 SP4 and later Symantec Enterprise Vault: Configuring Internal and External WebApp URLs for OWA The software

More information

Symantec Critical System Protection 5.2.9 Agent Guide

Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection Agent Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec Security Information Manager 4.5 Installation Guide

Symantec Security Information Manager 4.5 Installation Guide Symantec Security Information Manager 4.5 Installation Guide PN: 10912602 Symantec Security Information Manager 4.5 Installation Guide The software described in this book is furnished under a license agreement

More information

Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide

Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Altiris Patch Management Solution for Windows 7.5 SP1 from Symantec User Guide The software described in this book is

More information

Symantec System Recovery 2011 Management Solution Administrator's Guide

Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide Symantec System Recovery 2011 Management Solution Administrator's Guide The software described in this book is furnished under a

More information

PGP CAPS Activation Package

PGP CAPS Activation Package PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 10.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.5 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note

Recovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation.

More information

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 6.0 September 2011 Symantec ApplicationHA Agent for

More information

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide

Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Microsoft Exchange 2010 Configuration Guide The software

More information

Symantec Endpoint Protection Integration Component 7.5 Release Notes

Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Symantec Endpoint Protection Integration Component 7.5 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved.

More information

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide

Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft SharePoint Server Administrator s Guide The software described in this

More information

Symantec Secure Email Proxy Administration Guide

Symantec Secure Email Proxy Administration Guide Symantec Secure Email Proxy Administration Guide Documentation version: 4.4 (2) Legal Notice Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo

More information

Symantec Management Platform Installation Guide. Version 7.0

Symantec Management Platform Installation Guide. Version 7.0 Symantec Management Platform Installation Guide Version 7.0 Symantec Management Platform Installation Guide The software described in this book is furnished under a license agreement and may be used only

More information

Altiris Monitor Solution for Servers 7.5 from Symantec User Guide

Altiris Monitor Solution for Servers 7.5 from Symantec User Guide Altiris Monitor Solution for Servers 7.5 from Symantec User Guide Altiris Monitor Solution for Servers 7.5 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide

Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide Symantec Protection for SharePoint Servers 6.0.4 Implementation Guide for Microsoft SharePoint 2003/2007 Symantec Protection for SharePoint Servers Implementation Guide The software described in this book

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide

Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide Symantec bv-control for Microsoft Exchange 9.0 Getting Started Guide The software described in this book is furnished under a license

More information

Symantec NetBackup for Lotus Notes Administrator's Guide

Symantec NetBackup for Lotus Notes Administrator's Guide Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished

More information

Symantec Event Collector 4.3 for Cisco PIX Quick Reference

Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector for Cisco PIX Quick Reference The software described in this book is furnished under a license agreement and may be used

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Setting up SMTP Archiving 11.0 Symantec Enterprise Vault: Setting up SMTP Archiving The software described in this book is furnished under a license agreement and may be used

More information

Veritas Storage Foundation Scalable File Server Replication Guide 5.5

Veritas Storage Foundation Scalable File Server Replication Guide 5.5 Veritas Storage Foundation Scalable File Server Replication Guide 5.5 Veritas Storage Foundation Scalable File Server Replication Guide The software described in this book is furnished under a license

More information

Symantec ApplicationHA agent for Internet Information Services Configuration Guide

Symantec ApplicationHA agent for Internet Information Services Configuration Guide Symantec ApplicationHA agent for Internet Information Services Configuration Guide Windows on Hyper-V 6.1 February 2014 Symantec ApplicationHA agent for Internet Information Services Configuration Guide

More information

Symantec Security Information Manager 4.7.4 User Guide

Symantec Security Information Manager 4.7.4 User Guide Symantec Security Information Manager 4.7.4 User Guide Symantec Security Information Manager 4.7.4 User Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec NetBackup AdvancedDisk Storage Solutions Guide. Release 7.5

Symantec NetBackup AdvancedDisk Storage Solutions Guide. Release 7.5 Symantec NetBackup AdvancedDisk Storage Solutions Guide Release 7.5 21220064 Symantec NetBackup AdvancedDisk Storage Solutions Guide The software described in this book is furnished under a license agreement

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Cluster Server Database Agent for Microsoft SQL Configuration

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Reporting 10.0 Symantec Enterprise Vault: Reporting The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Security Information Manager 4.7.4 Release Notes

Symantec Security Information Manager 4.7.4 Release Notes Symantec Security Information Manager 4.7.4 Release Notes Symantec Security Information Manager 4.7.4 Release Notes The software described in this book is furnished under a license agreement and may be

More information

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide

Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Windows 7.1 SP2 from Symantec User Guide The software described in this book is furnished

More information

Symantec NetBackup Plug-in for VMware vcenter Guide. Release 7.6

Symantec NetBackup Plug-in for VMware vcenter Guide. Release 7.6 Symantec NetBackup Plug-in for VMware vcenter Guide Release 7.6 Symantec NetBackup Plug-in for vcenter Guide The software described in this book is furnished under a license agreement and may be used only

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Windows Server 2003, Windows Server 2008 VCS Library Management Pack Veritas Cluster Server Library

More information

Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide

Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide Altiris Monitor Solution for Servers 7.1 SP1from Symantec User Guide The software described in this book is furnished under a license

More information

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide

Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide Symantec Mail Security for Microsoft Exchange Management Pack Integration Guide The software described in this book is furnished

More information

Symantec NetBackup PureDisk Deduplication Option Guide

Symantec NetBackup PureDisk Deduplication Option Guide Symantec NetBackup PureDisk Deduplication Option Guide Windows, Linux, and UNIX Release 6.6.5 Revision 1 The software described in this book is furnished under a license agreement and may be used only

More information

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

bv-control for Active Directory v8.50 User Guide

bv-control for Active Directory v8.50 User Guide bv-control for Active Directory v8.50 User Guide bv-control for Active Directory v8.50 bv-control for Active Directory User Guide The software described in this book is furnished under a license agreement

More information

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows

Symantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows Symantec Enterprise Vault Technical Note Administering the Monitoring database Windows December 2006 Symantec Enterprise Vault Administering the Monitoring database Copyright 2006 Symantec Corporation.

More information

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide Symantec NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 7.6 The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Client Security Administrator's Guide

Symantec Client Security Administrator's Guide Symantec Client Security Administrator's Guide Symantec Client Security Administrator's Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this

More information

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1

Symantec Enterprise Vault. Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement

More information

Symantec Backup Exec Management Plug-in for VMware User's Guide

Symantec Backup Exec Management Plug-in for VMware User's Guide Symantec Backup Exec Management Plug-in for VMware User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec AntiVirus Corporate Edition Administrator's Guide

Symantec AntiVirus Corporate Edition Administrator's Guide Symantec AntiVirus Corporate Edition Administrator's Guide Symantec AntiVirus Corporate Edition Administrator's Guide The software described in this book is furnished under a license agreement and may

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Windows Server 2003 Windows Server 2008 5.1 Service Pack 2 Veritas Storage Foundation

More information

Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server

Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Symantec Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft SQL Server Windows 6.1 February 2014 Symantec Storage Foundation and High Availability Solutions

More information