LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide

Size: px
Start display at page:

Download "LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide"

Transcription

1 LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide Document Release: September 2011 Part Number: LL ELS This manual supports LogLogic Microsoft DHCP Release 1.0 and later, and LogLogic Software Release 5.1 and later until replaced by a new edition.

2 2011 LogLogic, Inc. Proprietary Information Trademarks This document contains proprietary and confidential information of LogLogic, Inc. and its licensors. In accordance with the license, this document may not be copied, disclosed, modified, transmitted, or translated except as permitted in writing by LogLogic, Inc. LogLogic and the LogLogic logo are trademarks or registered trademarks of LogLogic, Inc. in the United States and/or foreign countries. All other company or product names are trademarks or registered trademarks of their respective owners. Notice The information contained in this document is subject to change at any time without notice. All warranties with respect to the software and accompanying documentation are set our exclusively in the Software License Agreement or in the Product Purchase Agreement that covers the documentation. LogLogic, Inc. 110 Rose Orchard Way, Suite 200 San Jose, CA Tel: Fax: U.S. Toll Free:

3 Contents Preface About This Guide Technical Support Documentation Support Conventions Chapter 1 Configuring LogLogic s Microsoft DHCP Log Collection Introduction to Microsoft DHCP Prerequisites Configuring Microsoft DHCP for Audit Logging Changing the Path of the Audit Log File Audit Log File Rotation Policy Configuring Microsoft DHCP for Operational s Installing and Configuring Project Lasso Enabling the LogLogic Appliance to Capture Log Data Configuring the LogLogic Appliance for Data and File Collection Automatically Identifying a Microsoft DHCP Device Adding Microsoft DHCP Device Creating File Transfer Rules Verifying the Configuration Chapter 2 How LogLogic Supports Microsoft DHCP How LogLogic Captures Microsoft DHCP Log Data Supported Microsoft DHCP Log Data LogLogic Real-Time Reports LogLogic Search Filters Chapter 3 Troubleshooting and FAQ Troubleshooting Problems Retrieving Log Files Using Configured File Transfer Rules Frequently Asked Questions Appendix A Reference LogLogic Support for Microsoft DHCP s Microsoft DHCP Log Configuration Guide 3

4 4 Microsoft DHCP Log Configuration Guide

5 Preface About This Guide The LogLogic Appliance-based solution lets you capture and manage log data from all types of log sources in your enterprise. The LogLogic support for Microsoft Dynamic Host Configuration Protocol (DHCP) enables LogLogic Appliances to capture logs from machines running Microsoft DHCP. Once the logs are captured and parsed, you can generate reports and create alerts on Microsoft DHCP s operations. For more information on creating reports and alerts, see the LogLogic User Guide and LogLogic Online Help. Technical Support LogLogic is committed to the success of our customers and to ensuring our products improve customers' ability to maintain secure, reliable networks. Although LogLogic products are easy to use and maintain, occasional assistance might be necessary. LogLogic provides timely and comprehensive customer support and technical assistance from highly knowledgeable, experienced engineers who can help you maximize the performance of your LogLogic Appliances. To reach LogLogic Customer Support: Telephone: Toll Free LOGS Local EMEA or APAC: + 44 (0) or +44 (0) support@loglogic.com You can also visit the LogLogic Support website at: When contacting Customer Support, be prepared to provide: Your name, address, phone number, and fax number Your company name and company address Your machine type and release version A description of the problem and the content of pertinent error messages (if any) Documentation Support Your feedback on LogLogic documentation is important to us. Send to DocComments@loglogic.com if you have questions or comments. Your comments will be reviewed and addressed by the LogLogic technical writing team. In your message, please indicate the software name and version you are using, as well as the title and document date of your documentation. Microsoft DHCP Log Configuration Guide 5

6 Conventions LogLogic documentation uses the following conventions to highlight code and command-line elements: A monospace font is used for programming elements (such as code fragments, objects, methods, parameters, and HTML tags) and system elements (such as filenames, directories, paths, and URLs). A monospace bold font is used to distinguish system prompts or screen output from user responses, as in this example: username: system home directory: home\app A monospace italic font is used for placeholders, which are general names that you replace with names specific to your site, as in this example: LogLogic_home_directory\upgrade\ Straight brackets signal options in command-line syntax. For example: ls [-AabCcdFfgiLlmnopqRrstux1] [-X attr] [path...] 6 Microsoft DHCP Log Configuration Guide

7 Chapter 1 Configuring LogLogic s Microsoft DHCP Log Collection This chapter describes configuration steps that enable a LogLogic Appliance to capture Microsoft DHCP logs. The configuration steps assume that you have a functioning LogLogic Appliance that can be configured to capture Microsoft DHCP log data. Introduction to Microsoft DHCP Prerequisites Configuring Microsoft DHCP for Audit Logging Configuring Microsoft DHCP for Operational s Enabling the LogLogic Appliance to Capture Log Data Verifying the Configuration Introduction to Microsoft DHCP The LogLogic Appliance enables you to capture Microsoft DHCP audit and operational log data. Audit log events can capture critical information about Microsoft DHCP server that is essential to meet compliance requirements. For example, Microsoft DHCP provides options to audit server startup, shutdown, and restart status. It also gives information related to the server s authorization status with Active Directory and records lease, renew, and update actions with the Domain Name System (DNS) database. Operational log event information is posted in Windows System logs. These logs contain information related to DHCP server configuration changes and its status information. Note: LogLogic support is limited to Windows Server 2003, 2008 events. For more information, see Supported Microsoft DHCP Log Data on page 19. Microsoft DHCP audit logs are captured via file pull using a file transfer rule. Microsoft DHCP operational logs are captured by LogLogic s open source Windows Collector, Project Lasso. The Windows Collector can run in one of the following modes, Agent Mode, Collector Mode, or both (i.e., a hybrid mode). Regardless of the mode used, all collected operational logs are forwarded to the LogLogic Appliance using Syslog via UDP or TCP. The configuration procedures for Microsoft DHCP and the LogLogic Appliance depend upon your environment, what logs you want to capture, and how the Windows Collector is configured (if applicable). For more information, see How LogLogic Captures Microsoft DHCP Log Data on page 18 and the LogLogic Windows Collector Guide (Project Lasso). Microsoft DHCP Log Configuration Guide 7

8 Prerequisites Prior to configuring Microsoft DHCP and the LogLogic Appliance, ensure that you meet the following prerequisites: Microsoft DHCP Service installed on Windows Server 2003, 2008 with SP1 or SP3 Administrative access on the DHCP server For operational logs: Project Lasso Release 4.0 or later installed on the DHCP server. For more information, see the LogLogic Windows Collector Guide (Project Lasso). For audit logs: 3rd-party FTP, FTP(S), HTTP(S), CIFS, SCP, and/or SFTP server software installed for any platform that does not have these capabilities by default. For more information, see Configuring the LogLogic Appliance for Data and File Collection on page 11. LogLogic Appliance running Release 5.1 or later installed with a Log Source Package that includes Microsoft DHCP Server support Administrative access on LogLogic Appliance Configuring Microsoft DHCP for Audit Logging Audit logging is configured by default on a Microsoft DHCP server. Make sure that your configuration matches the one described in the following steps. To enable Microsoft DHCP server logging: 1. Log in to the Microsoft DHCP server. 2. From the Windows Start menu, select Settings > Control Panel. 3. Double-click Administrative Tools. 4. Double-click DHCP. The DHCP console appears. 5. Expand the tree on the left, and select the applicable DHCP server from the list. 6. On the Action menu, click Properties. 7. On the General tab, select the Enable DHCP audit logging checkbox. 8. Click OK. 8 Microsoft DHCP Log Configuration Guide

9 Figure 1 DHCP Console Changing the Path of the Audit Log File Only the directory path in which the Microsoft DHCP server stores audit log files can be modified using the DHCP console, and not the filename. The DHCP server service bases the name of the audit log file on the current day of the week, as determined by checking the current date and time at the server. For example, when the DHCP server starts, if the current date and time is: Monday, April 7, 2011, 04:56:42 P.M. Then the server audit log file is nameddhcpsrvlog-mon. To change the path of the audit log file: 1. Log in to the Microsoft DHCP server. 2. From the Windows Start menu, select Settings > Control Panel. 3. Double-click Administrative Tools. 4. Double-click DHCP. The DHCP console appears. 5. Expand the tree on the left, and select the applicable DHCP server from the list. Microsoft DHCP Log Configuration Guide 9

10 6. On the Action menu, click Properties. 7. Click the Advanced tab. 8. Edit Audit log file path as necessary and click OK. Audit Log File Rotation Policy Microsoft DHCP server rotates the files based on days. By default, at 12:00 a.m. local time on the server machine, the DHCP server closes the existing log and moves it to the log file for the next day of the week. For example, if the day of the week changes at 12:00 a.m. from Wednesday to Thursday, the log file named DhcpSrvLog-Wed is closed and the file named DhcpSrvLog-Thu is opened and used for logging events. If the disk is full, the DHCP server closes the current file and ignores further requests to log audit events until either 12:00 a.m. or until the disk is no longer full. The disk is considered full if either of the following conditions is true: Disk space on the server machine is lower than the required minimum amount for DHCP audit logging. By default, if the amount of disk space remaining on the server disk reaches less than 20 MegaBytes (MB), audit logging is halted. The current audit log file is larger than one-seventh of the size for the combined total of all audit logs currently stored on the server. Configuring Microsoft DHCP for Operational s Microsoft DHCP server operational events are posted in the Windows Viewer. The events are located in the System logs under the DHCP server with DHCP as the source. These events can be captured by LogLogic Appliance using Project Lasso. Installing and Configuring Project Lasso The Microsoft DHCP logs are collected and transported using Project Lasso. Project Lasso is used to collect and transfer Windows logs to the LogLogic Appliance. By default, the Project Lasso program directory is located at: C:\Program Files\Lasso Project Lasso spools log messages if the connection to the Appliance is temporarily lost. By default, the following directory contains all spooled log messages: C:\Program Files\Lasso\LassoRepository\Spool You can change the host machine and event log identification information by editing the hostlist.ini configuration file in Project Lasso. You can change the spool log location and other Lasso monitoring parameters by editing the Lasso.ini file. For the complete installation and configuration procedures for Project Lasso, including information on the Lasso.ini and hostlist.ini files, see the LogLogic Windows Collector Guide (Project Lasso). 10 Microsoft DHCP Log Configuration Guide

11 Enabling the LogLogic Appliance to Capture Log Data The following sections describe how to enable the LogLogic Appliance to capture Microsoft DHCP log data. Configuring the LogLogic Appliance for Data and File Collection The LogLogic Appliance recognizes Microsoft DHCP operational events in Syslog format via the Syslog Listener. The Appliance captures Microsoft DHCP audit events using file pull functionality via a file transfer rule. The deployment method you use to collect Microsoft DHCP file-based data depends on what events you want to capture. Microsoft DHCP Data Collection for Operational s If you are trying to capture operational event data, you need to use the following deployment method for file collection: 1. Properly configure Microsoft DHCP to generate operational events (see Configuring Microsoft DHCP for Operational s on page 10). 2. Properly configure Project Lasso on a remote Host Server (see Installing and Configuring Project Lasso on page 10). 3. On the LogLogic Appliance, make sure that the Microsoft DHCP device was correctly auto-identified. For more information, see Automatically Identifying a Microsoft DHCP Device on page 12. Microsoft DHCP File Collection for Audit s If you are trying to capture audit event data, you need to use the following deployment method for file collection: 1. Configure a remote Host Server with file transfer capability to capture log files from the Microsoft DHCP host machine. The following procedure explains, at a high-level, how to configure your environment to capture file-based log messages via SFTP. LogLogic recommends using SFTP for Windows-based systems, or SCP for Unix-based systems, to securely transfer files to the LogLogic Appliance from your log source. However, you can use any of the LogLogic-supported protocols in your environment (i.e., FTP(S), HTTP(S), SCP, etc.). Note: For more information on each supported protocol, including whether a Public Key Copy is needed and what search methods (i.e., CSV, Wildcard) are available, see the LogLogic Administration Guide. a. Make sure that a destination directory (i.e., log directory) exists and is accessible on the host machine where Microsoft DHCP is installed. The destination directory should contain the original log files that Microsoft DHCP generates. b. Transfer the Microsoft DHCP log files to a separate publishing directory on the remote Host Server. You can use a script or 3rd-party software that makes a copy of or moves the log files from the destination directory (i.e., log directory) to the publishing directory. In addition, if you are using a script, you can specify the schedule for when the script runs (e.g., hourly, daily, or weekly). Microsoft DHCP Log Configuration Guide 11

12 Note: LogLogic recommends that you define a clean-up process to handle old log files that accumulate over time. 2. On the LogLogic Appliance, add Microsoft DHCP to the Appliance as a new device. For more information, see Adding Microsoft DHCP Device on page Create a file transfer rule and specify SFTP as the Protocol. For more information, see Creating File Transfer Rules on page 14. IMPORTANT! SCP and SFTP have limitations in their ability to pull a large number of files (100 or more). LogLogic recommends that you compress the files into a single file (such as.tar or tar.gz) before the files are pulled by the LogLogic Appliance. 4. File transfer rules using SFTP as the protocol require a public key copy from the LogLogic Appliance. You need to copy the Appliance s public key to the remote Host Server. For more information on public key copy, see the LogLogic Administration Guide. Automatically Identifying a Microsoft DHCP Device IMPORTANT! The Microsoft DHCP device is auto-identified when operational events are captured by Project Lasso. However, you must add the device manually if you are capturing audit events by file pull via file transfer rule. For more information, see Adding Microsoft DHCP Device on page 13. With the auto-identification feature, the LogLogic Appliance recognizes Microsoft DHCP operational log messages in Syslog format using Project Lasso. As the Syslog messages come into the Appliance, they are automatically identified and a new Microsoft DHCP device type is added to the log source device list. Default values are used for certain properties, such as the device name. To enable auto-identification in the LogLogic Appliance: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Administration > System Settings. The General tab appears. 3. For Auto-identify Log Sources, select Yes. 4. Click Update. Once the automatically identified device is added, you can edit its properties. IMPORTANT! Do not change the auto-identified Device Type and Host IP information. To edit an existing Microsoft DHCP device: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Management > Devices. The Devices tab appears. 3. Click on an existing Microsoft DHCP device in the list and click Modify Device. The Modify Device tab appears. 4. Edit the device fields as needed, then click Update Device. 12 Microsoft DHCP Log Configuration Guide

13 Adding Microsoft DHCP Device IMPORTANT! You must add the Microsoft DHCP device manually if you are capturing audit events by file pull via file transfer rule. The device is auto-identified when operational events are captured by Project Lasso. For more information, see Automatically Identifying a Microsoft DHCP Device on page 12. LogLogic captures Microsoft DHCP audit log files using file pull functionality via file transfer rule. You must add the server as a new device so LogLogic can properly handle the log file data to make it available through reports and searching. Once you have successfully added the Microsoft DHCP device, you must configure file transfer rules for file collection. For more information, see Configuring the LogLogic Appliance for Data and File Collection on page 11. To add Microsoft DHCP as a new device: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Management > Devices. The Devices tab appears. 3. Click Add New. The Add Device tab appears. 4. Type in the following information for the device: Name Name for the Microsoft DHCP device Description (optional) Description of the Microsoft DHCP device Device Type Select Microsoft DHCP from the drop-down menu Host IP IP address of the Microsoft DHCP appliance Enable Data Collection Select the Yes radio button Refresh Device Name through DNS Lookups (optional) Select this checkbox to enable the Name field to be automatically updated. The name is obtained using a reverse DNS lookup on the configured refresh interval. The DNS name overrides any manual name you assign. Microsoft DHCP Log Configuration Guide 13

14 Figure 2 Adding a Device to the LogLogic Appliance 5. Click Add. 6. Verify that your new device appears in the Devices tab and that Enabled is set to Yes. After you add the new device, you can configure the LogLogic Appliance by setting up file transfer rules. For information on configuring the LogLogic Appliance to capture Microsoft DHCP log messages, see Configuring the LogLogic Appliance for Data and File Collection on page 11. Creating File Transfer Rules Note: Creating a file transfer rule is only required if you are capturing Microsoft DHCP audit events. After you add your Microsoft DHCP device, you can create a file transfer rule for the log files. File transfer rules enable the LogLogic Appliance to pull files from the host machine or remote Host Server publishing the Microsoft DHCP log files. LogLogic supports the following wildcards: * (asterisk),? (question mark), and [...] (open and close brackets) using directory queries. If you use wildcards, you must enable directory listing on your host machine or remote Host Server. Examples: file /foo/file, /bar/*.log /foo?/bar*/*.aud, /foo1/file1.tar.gz, /foo1/file2.z /foo[2-8]/bar*/net*.log LogLogic can pull and decompress archive files, extract individual files from the archive files, and then process the individual files. The following file types are supported:.tar.bz2,.tar.gz, tar.z,.tgz,.taz,.tar,.gz,.z,.z,.zip,.zip. For more information, see the LogLogic Administration Guide. 14 Microsoft DHCP Log Configuration Guide

15 To create a file transfer rule: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Management > Devices. 3. Select the File Transfer Rules tab. 4. Add a rule for the Microsoft DHCP log files you want to capture by completing the following steps: a. From the Device Type drop-down menu, select the machine where Microsoft DHCP is installed. b. From the Device drop-down menu, select the appropriate Microsoft DHCP device. Note: If you have added only one Microsoft DHCP device, the device name is automatically added. c. Click Add Rule then enter the appropriate information for the following required fields: Rule Name Name of the transfer rule (e.g., Microsoft DHCP log files) Protocol Specify the appropriate protocol (e.g., SFTP, SCP, FTP(S), etc.) Note: LogLogic recommends using a secure file transfer protocol, such as SFTP for Windows-based devices or SCP for UNIX-based devices. If you are using SFTP or SCP, you must copy the Appliance s public key to the machine where the logs are located. For more information, see Configuring the LogLogic Appliance for Data and File Collection on page 11 and the LogLogic Administration Guide. User ID Specify only if the protocol requires a User ID Password/Verify Password Specify only if required for the User ID Files Full path (after the IP address) to the Host Server where the Microsoft DHCP log files are located. For example: /publishing directory/dhcp/dhcpsrvlog* To capture all logs in a specific directory specify the asterisk (*) wildcard. For example: /publishing directory/dhcp/*.zip The server can be the host machine where the device is installed or a remote Host Server with file transfer functionality. For more information, see Configuring the LogLogic Appliance for Data and File Collection on page 11. File Format Select Microsoft DHCP Audit Log from the drop-down menu Collection Time Specify the time you want to retrieve the log file Use Advanced Duplication Detection Select the Yes radio button if you want the LogLogic Appliance to check for duplicate data while capturing the Microsoft DHCP logs. Enable Select the Yes radio button to enable the file transfer rule d. Click Add. Microsoft DHCP Log Configuration Guide 15

16 Figure 3 Add File Transfer Rule Tab Verifying the Configuration The section describes how to verify that the configuration changes made to Microsoft DHCP and the LogLogic Appliance are applied correctly. To verify the configuration: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Dashboards > Log Source Status. The Log Source Status tab appears. 3. Locate the IP address for each Microsoft DHCP device. 16 Microsoft DHCP Log Configuration Guide

17 If the device name (Microsoft DHCP) appears in the list of devices, then the configuration is correct. If the device does not appear in the Log Source Status tab, check the Microsoft DHCP logs for events that should have been sent. If events were detected and are still not appearing on the LogLogic Appliance, verify the Microsoft DHCP configuration, the Project Lasso configuration (for operational logs), and the LogLogic Appliance configuration. You can also verify that the LogLogic Appliance is properly capturing log data from Microsoft DHCP by trying to view the data in the reports. LogLogic recommends checking the reports to make sure that the data obtained is valid and matches expectations. For more information, see LogLogic Real-Time Reports on page 20. If the device name appears in the list of devices but operational or audit log data for the device is not appearing within your reports, see Troubleshooting on page 23 for more information. Microsoft DHCP Log Configuration Guide 17

18 Chapter 2 How LogLogic Supports Microsoft DHCP This chapter describes LogLogic s support for Microsoft DHCP. LogLogic enables you to capture log data to monitor Microsoft DHCP events. How LogLogic Captures Microsoft DHCP Log Data Supported Microsoft DHCP Log Data LogLogic Real-Time Reports LogLogic Search Filters How LogLogic Captures Microsoft DHCP Log Data LogLogic s open source Windows Collector, Project Lasso, is used to collect Microsoft DHCP operational logs stored in Windows System Log. The operational logs are converted into text format by Project Lasso and sent to the Syslog Listener of the LogLogic Appliance via UDP or TCP. The LogLogic Appliance uses file pulling to capture Microsoft DHCP audit log messages. By default, audit logs are stored in text format under the following directory: Windows\System32\Dhcp The log files are named as DhcpSrvLog-day of week. LogLogic enables you to capture the log data in text format from a remote file system using FTP(S), HTTP(S), SCP, etc. Log files unchanged since the last pull are filtered out from collecting to eliminate duplication. File pulling maintains a record of log files identified on the database to allow conversion. All log messages are pulled from the specified path where the converted log files are stored. Note: LogLogic enables you to collect Microsoft DHCP log messages at a configurable time (e.g., every x minutes, at an hourly interval, daily at a specified time, or weekly at a specified date and time). Figure 4 on page 19 provides a deployment example for capturing Microsoft DHCP operational and audit log messages. For audit logs, an SFTP server is used as a remote Host Server in the example. If the host machine for the log source has built-in SFTP, SCP, FTP(S), HTTP(S), etc., server functionality, a remote Host Server is not a mandatory component. For more information, see Configuring the LogLogic Appliance for Data and File Collection on page 11. For operational logs, a remote Host Server with Project Lasso installed and operating in Collector Mode is used as an example. For more information, see the LogLogic Windows Collector Guide (Project Lasso). 18 Microsoft DHCP Log Configuration Guide

19 Figure 4 Microsoft DHCP, Project Lasso (Collector Mode), a remote SFTP Host Server, and the LogLogic Appliance Components and Processes Once the data is captured and parsed, you can generate reports. In addition, you can create alerts to notify you of issues on Microsoft DHCP. For more information on creating reports and alerts, see the LogLogic User Guide and LogLogic Online Help. Note: When a log file is transferred, each file contains a timestamp which consists of a date and time. The timestamp refers to the file creation date and time for a particular message in the file. For a listing of LogLogic supported date and time formats, see the LogLogic Administration Guide. Supported Microsoft DHCP Log Data LogLogic enables you to capture Microsoft DHCP audit and operational log data. Microsoft DHCP audit logs are comma-delimited text files with each log entry representing a single line of text. For example, an audit log file entry contains the following fields in the order presented: ID, Date, Time, Description, IP Address, Host Name, MAC Address Table 2 on page 41 lists the Microsoft DHCP audit events that are supported by the LogLogic Appliance. Microsoft DHCP related operational events are recorded in the Windows System Log. This includes, by default, major activities that potentially affect the operating system (e.g., Microsoft DHCP service startup, shutdown, errors, and change of configuration options). Table 1 on page 28 lists the Microsoft DHCP operational events that are supported by the LogLogic Appliance. Note: The LogLogic Appliance captures all messages from the Microsoft DHCP logs, but includes only specific messages for report/alert generation. For more information, see Appendix A Reference on page 27 for sample log messages for each event and event to category mapping. Microsoft DHCP Log Configuration Guide 19

20 LogLogic Real-Time Reports LogLogic provides pre-configured Real-Time Reports for Microsoft DHCP log data. The following Real-Time Reports are available: DHCP Activity Displays events related to all DHCP activity DHCP Denied Activity Displays events related to DHCP requests that were denied DHCP Granted/Renewed Activity Displays events related to DHCP requests that were granted or renewed To access LMI 5 Real-Time Reports: 1. In the top navigation pane, click Reports. 2. Click Network Activity. The following Real-Time Reports are available: DHCP Activity DHCP Denied Activity DHCP Granted/Renewed Activity You can create custom reports from the existing Real-Time Report templates. For more information, see the LogLogic User Guide and LogLogic Online Help. LogLogic Search Filters LogLogic provides pre-configured Search Filters for Microsoft DHCP log data. Search Filters are used to filter report data and create alerts. To access Search Filters: 1. From the navigation menu, select Search. 2. Select Search Filters. The following Search Filters are available: Microsoft DHCP: Audit - Change & Configuration Management Displays details for the following activities reported within the DHCP audit logs: Network Configuration Changes Privilege Change Status User Account Changes Application Configuration Changes Windows Registry Changes Microsoft DHCP: Audit - Continuity & Availability Management Displays details for the following activities reported within the DHCP audit logs: System Restarts Backup Status System Errors 20 Microsoft DHCP Log Configuration Guide

21 Microsoft DHCP: Audit - Rogue Server Detection Displays details for all activities related to rogue server detection reported within the DHCP audit logs Microsoft DHCP: Audit - Security & Threat Management Displays details for the following activities reported within the DHCP audit logs: IDS Activity Top Attacking IP Addresses Top Attacked IP Addresses Antivirus Protection Status Microsoft DHCP: Audit - System Health Displays details for all activities related to system health reported within the DHCP audit logs Microsoft DHCP: Audit Rogue DHCP Server detection Displays details for all activities related to rogue DHCP server detection and shutdown reported within the DHCP audit logs Microsoft DHCP: Operational - Backup & Restore Displays details for all activities related to backup and restore events reported within the DHCP operational logs Microsoft DHCP: Operational - Change & Configuration Management Displays details for the following activities reported within the DHCP operational logs: Network Configuration Changes Privilege Change Status User Account Changes Application Configuration Changes Windows Registry Changes Microsoft DHCP: Operational - Configuration Changes Displays details for all activities related to configuration changes reported within the DHCP operational logs Microsoft DHCP: Operational - Identity & Access Management Displays details for the following activities reported within the DHCP operational logs: Privilege Use by User Resource Access Database Data Access User Authentication Status Microsoft DHCP: Operational - Performance & Capacity Management Displays details for the following activities reported within the DHCP operational logs: System Resource Exhaustion Network Capacity Use by Application Database Table Usage Microsoft DHCP: Operational - Rogue Server Detection Displays details for all activities related to rogue DHCP server detection and shutdown reported within the DHCP operational logs Microsoft DHCP Log Configuration Guide 21

22 Microsoft DHCP: Operational - Security & Threat Management Displays details for the following activities reported within the DHCP operational logs: IDS Activity Top Attacking IP Addresses Top Attacked IP Addresses Antivirus Protection Status Microsoft DHCP: Operational - Security s Displays details for all security events reported within the DHCP operational logs Microsoft DHCP: Operational - Server Start/Stop Displays details for all activities related to server starts or stops reported within the DHCP operational logs Microsoft DHCP: Operational - System Health Displays details for all activities related to system health reported within the DHCP operational logs Microsoft DHCP: Operational Continuity & Availability Management Displays details for the following activities reported within the DHCP operational logs: System Restarts Backup Status System Errors For more information on Search Filters, reports, and alerts see the LogLogic User Guide and LogLogic Online Help. 22 Microsoft DHCP Log Configuration Guide

23 Chapter 3 Troubleshooting and FAQ This chapter contains troubleshooting information regarding the configuration and/or use of log collection for Microsoft DHCP. It also contains Frequently Asked Questions (FAQ), providing quick answers to common questions. Troubleshooting Frequently Asked Questions Troubleshooting Is your version of Microsoft DHCP supported? For more information, see Prerequisites on page 8. Is your LogLogic Appliance running Release 5.1 or later? If you are running an release prior to 5.1, you will require an upgrade. Contact LogLogic Support for more information. Are you running Project Lasso 4.0 or later? If you are running an release prior to 4.0, you might require an upgrade. Contact LogLogic Support for more information. Is the appropriate Log Source Package (LSP) installed properly? Check to make sure that the LSP that is installed includes support for Microsoft DHCP. Also make sure that the package was installed successfully. For more information on LSP installation procedures, see the LogLogic Log Source Package Release Notes. If Microsoft DHCP operational events are not appearing on the LogLogic Appliance... You can verify that your log files are received by viewing the File Transfer History. You can view the history from the Administration > File Transfer History tab. Make sure that you have properly installed and configured Project Lasso, and the no errors are present in Lasso s error log (LassoTrace.log). For more information, see the LogLogic Windows Collector Guide (Project Lasso). Also make sure that the Appliance is properly auto-identifying the device. If not, then try to add the device to the Appliance manually. For more information, see Automatically Identifying a Microsoft DHCP Device on page 12 and Adding Microsoft DHCP Device on page 13. Microsoft DHCP Log Configuration Guide 23

24 If Operational events are not displaying on the LogLogic Appliance even after configuring Microsoft DHCP and Project Lasso correctly... Microsoft DHCP sends the logs, via UDP or TCP in Syslog format, to the LogLogic Appliance. Make sure that the UDP or TCP port is enabled on the Microsoft DHCP machine. For more information on supported protocols and ports, see the LogLogic Administration Guide and the LogLogic Windows Collector Guide (Project Lasso). If Microsoft DHCP audit events are not appearing on the LogLogic Appliance... You need to verify if the LogLogic Appliance is receiving the logs correctly. For more information, see Problems Retrieving Log Files Using Configured File Transfer Rules on page 24. Problems Retrieving Log Files Using Configured File Transfer Rules If you are having general problems retrieving audit log files using your configured file transfer rules, you might need to verify that your LogLogic Appliance is receiving Microsoft DHCP audit logs as scheduled. To verify that the LogLogic Appliance is receiving logs correctly: 1. Log in to the LogLogic Appliance managing the Microsoft DHCP log data. 2. From the navigation menu, select Management > Devices. The Devices tab appears. 3. Select the File Transfer Rules tab. The File Transfer Rules tab appears with a table displaying all of your file transfer rules. 4. Find the file-based log data entries. 5. Under the Last Successful Retrieval column, watch for a successful transfer as defined by the Collection Interval mark. 6. Under the Last Attempted Retrieval column, verify that there are no failures. 7. If the Last Attempted Retrieval value is incrementing but the Last Successful Retrieval value is not changing, then the LogLogic Appliance is not receiving logs correctly. If this problem occurs, then complete the following steps: a. Verify the path to your log files. If necessary, make appropriate changes. b. Verify your user name and password. If necessary, make appropriate changes. Alternatively, you can run an Index Search against Microsoft DHCP as follows to check log collection: 1. From the navigation menu, select Search > Index Search. 2. Specify the LogLogic Appliance as the Device Type and choose the appropriate Source Device. 3. Enter your Boolean Search query. For example: To return file collector-related logs, type engine_filecollector To return only Microsoft entries, type engine_filecollector and Microsoft Entries can be found in the /loglogic/status/filecollector_status file. 24 Microsoft DHCP Log Configuration Guide

25 Frequently Asked Questions How does the LogLogic Appliance collect logs from Microsoft DHCP? For operational log collection, an open source Windows Collector, Project Lasso, is required in order to read the.evt files from the Windows machine, convert them into text format, and forward them via Syslog using UDP or TCP to the LogLogic Appliance. The LogLogic Appliance functions as the Syslog server. For more information, see How LogLogic Captures Microsoft DHCP Log Data on page 18. What access permissions are required? To configure logging on Microsoft DHCP, the Windows user must have administrative permissions. How do I configure logging on Microsoft DHCP? For audit logs, follow the procedures on Configuring Microsoft DHCP for Audit Logging on page 8. Also make sure that you have properly configured the LogLogic Appliance for file collection. For more information, see Configuring the LogLogic Appliance for Data and File Collection on page 11. For operational logs, follow the procedures on Configuring Microsoft DHCP for Operational s on page 10. Also make sure that you have properly installed and configured Project Lasso. For more information, see Installing and Configuring Project Lasso on page 10 and the LogLogic Windows Collector Guide (Project Lasso). Microsoft DHCP Log Configuration Guide 25

26 26 Microsoft DHCP Log Configuration Guide

27 Appendix A Reference This appendix lists the LogLogic-supported Microsoft DHCP events. The Microsoft DHCP event table identifies events that can be analyzed through LogLogic reports. All sample audit log messages were captured by LogLogic s file pull functionality. All sample operational log messages were captured by LogLogic s Syslog Listener. LogLogic Support for Microsoft DHCP s The following list describes the contents of each of the columns in the tables below. ID Microsoft DHCP event identifier Agile Reports/Search Defines if the Microsoft DHCP event is available through the LogLogic Agile Report Engine or through the search capabilities. If the event is available through the Agile Report Engine, then you can use LogLogic s Real-Time Reports and Summary Reports to analyze and display the captured log data. Otherwise, all other supported events that are captured by the LogLogic Appliance can be viewed by performing a search for the log data. Title/Comments Description of the event Category Category of events such as Audit or Operational Type Type of event such as Success, Failure, etc. Sample Log Message Sample Microsoft DHCP log messages in text format Note: A Media Access Control (MAC) address or Globally Unique Identifier (GUID) can be present in the log as a client machine unique identifier. Microsoft DHCP Log Configuration Guide 27

28 Table 1 Microsoft DHCP Operational s ID Agile Reports /Search Title/Comments Category Type Sample Log Message Search The DHCP service is shutting down due to the following error: % Search The DHCP service encountered the following error when backing up the database: % Search The DHCP service failed to restore the database. The following error occurred: % Search The DHCP service failed to restore the DHCP registry configuration. The following error occurred: % Search Scope, %1, is %2 percent full with only %3 IP addresses remaining Search The DHCP service will now terminate because the existing database needs conversion to Windows 2000 format. The conversion via the jetconv process, has initiated. Do not reboot or stop the jetconv process. The conversion may take up to 10 minutes depending on the size of the database. Terminate DHCP now by clicking OK. This is required for the database conversion to succeed. NOTE: The DHCP service will be restarted automatically when the conversion is completed. To check conversion status, look at the Application event log for the jetconv process. Operational Error The log format for this event is supported by the LogLogic Operational Error <13>Feb 20 12:15: MSWinLog 0 System 1339 Tue Feb 20 10:01: DhcpServer Unknown User N/A Error LAB None 0000: 2d 4e N.. The DHCP service encountered the following error when backing up the database: An error occurred while accessing the DHCP database. Look at the DHCP server event log for more information on this error. 845 Operational Failure The log format for this event is supported by the LogLogic Operational Failure The log format for this event is supported by the LogLogic Operational The log format for this event is supported by the LogLogic Operational <13>Feb 13 12:30: MSWinLog 0 System Thu Feb 08 10:13: DhcpServer Unknown User N/A Information LOGLOGIC-SRV1 None 0000: The DHCP service will now terminate because the existing database needs conversion to Windows 2000 format. The conversion via the jetconv process, has initiated. Do not reboot or stop the jetconv process. The conversion may take up to 10 minutes depending on the size of the database. Terminate DHCP now by clicking OK. This is required for the database conversion to succeed. NOTE: The DHCP service will be restarted automatically when the conversion is completed. To check conversion status, look at theapplication event log for the jetconv process Microsoft DHCP Log Configuration Guide

29 ID Agile Reports /Search Title/Comments Category Type Sample Log Message Search The audit log file cannot be appended Search The audit log file could not be backed up. The following error occurred: %1 Operational <13>Feb 13 12:30: MSWinLog 0 System Thu Feb 08 10:13: DhcpServer Unknown User N/A Information LOGLOGIC-SRV1 None 0000: The audit log file cannot be appended Operational Error The log format for this event is supported by the LogLogic Search The DHCP service successfully restored the database. Operational S u c c e s s <13>Feb 13 12:30: MSWinLog 0 System Thu Feb 08 10:13: DhcpServer Unknown User N/A Information LOGLOGIC-SRV1 None 0000: The DHCP service successfully restored the database Search The DHCP service is not servicing any clients because none of the active network interfaces have statically configured IP addresses, or there are no active interfaces Search The DHCP/BINL service running on this machine has detected a server on the network. If the server does not belong to any domain, the domain is listed as empty. The IP address of the server is listed in parentheses.% Search The DHCP/BINL service on the local machine has determined that it is not authorized to start. It has stopped servicing clients. The following are some possible reasons for this: This machine belongs to a workgroup and has encountered another DHCP Server (belonging to a Windows Administrative Domain) servicing the same network. An unexpected network error occurred. Operational Error <13>Feb 13 12:30: MSWinLog 0 System Thu Feb 08 11:04: DhcpServer Unknown User N/A Error LOGLOGIC-SRV1 None 0000: The DHCP service is not servicing any clients because none of the active network interfaces have statically configured IP addresses, or there are no active interfaces Operational <13>Feb 13 12:30: MSWinLog 0 System Thu Feb 08 10:13: DhcpServer Unknown User N/A Information LOGLOGIC-SRV1 None 0000: The DHCP/BINL service running on this machine has detected a server on the network. If the server does not belong to any domain, the domain is listed as empty. The IP address of the server is listed in parentheses { } O p e r a t i o n a l F a i l u r e < 1 3 > F e b : 2 8 : M S W i n E v e n t L o g 0 S y s t e m 1099 Fri Feb 16 17:25: DhcpServer Unknown User DHCP/BINL service on the local machine has determined that it is not authorized to start. It has stopped servicing clients. The following are some possible reasons for this: This machine belongs to a workgroup and has encountered another DHCP Server (belonging to a Windows Administrative Domain) servicing the same network. An unexpected network error occurred. 381 Microsoft DHCP Log Configuration Guide 29

30 ID Agile Reports /Search Title/Comments Category Type Sample Log Message Search The DHCP/BINL service on the local machine, belonging to the Windows Administrative domain %2, has determined that it is not authorized to start. It has stopped servicing clients. The following are some possible reasons for this: This machine is part of a directory service enterprise and is not authorized in the same domain. (See help on the DHCP Service Management Tool for additional information). This machine cannot reach its directory service enterprise and it has encountered another DHCP service on the network belonging to a directory service enterprise on which the local machine is not authorized. Some unexpected network error occurred Search The DHCP/BINL service has determined that it is not authorized to service clients on this network for the Windows domain: %2. All DHCP services that belong to a directory service enterprise must be authorized in the directory service to service clients. (See help on the DHCP Service Management Tool for authorizing a DHCP server in the directory service) Search The DHCP/BINL service on this workgroup server has encountered another server with IP Address, %1, belonging to the domain % Search The DHCP/BINL service on this computer running Windows Server 2003, 2008 for Small Business Server has encountered another server on this network with IP Address, %1, belonging to the domain: %2. O p e r a t i o n a l F a i l u r e < 1 3 > F e b : 2 8 : M S W i n E v e n t L o g 0 S y s t e m 1099 Fri Feb 16 17:25: DhcpServer Unknown User DHCP/BINL service on the local machine, belonging to the Windows Administrative domain loglog.com, has determined that it is not authorized to start. It has stopped servicing clients. The following are some possible reasons for this: This machine is part of a directory service enterprise and is not authorized in the same domain. (See help on the DHCP Service Management Tool for additional information). This machine cannot reach its directory service enterprise and it has encountered another DHCP service on the network belonging to a directory service enterprise on which the local machine is not authorized. Some unexpected network error occurred. 381 Operational Failure <13>Feb 16 17:28: MSWinLog 0 System 1099 Fri Feb 16 17:25: DhcpServer Unknown User DHCP/BINL service has determined that it is not authorized to service clients on this network for the Windows domain: DNSDHCP.com. All DHCP services that belong to a directory service enterprise must be authorized in the directory service to service clients. 381 Operational <13>Feb 16 17:28: MSWinLog 0 System 1099 Fri Feb 16 17:25: DhcpServer Unknown User DHCP/BINL service on this workgroup server has encountered another server with IP Address, , belonging to the domain DNSDHCP.com. 381 Operational <13>Feb 16 17:28: MSWinLog 0 System 1099 Fri Feb 16 17:25: DhcpServer Unknown User DHCP/BINL service on this computer running Windows Server 2003, 2008 for Small Business Server has encountered another server on this network with IP Address, ,34, belonging to the domain: DNSDHCP.com Microsoft DHCP Log Configuration Guide

LogLogic Trend Micro OfficeScan Log Configuration Guide

LogLogic Trend Micro OfficeScan Log Configuration Guide LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and

More information

LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide

LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide Document Release: Septembere 2011 Part Number: LL600066-00ELS100000 This manual supports LogLogic General Database Collector

More information

LogLogic Cisco IPS Log Configuration Guide

LogLogic Cisco IPS Log Configuration Guide LogLogic Cisco IPS Log Configuration Guide Document Release: March 2011 Part Number: LL600072-00ELS090000 This manual supports LogLogic Cisco IPS Release 1.0 and later, and LogLogic Software Release 4.9.1

More information

LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide

LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide Document Release: September 2011 Part Number: LL600027-00ELS090000 This manual supports LogLogic Microsoft DNS Release 1.0 and later,

More information

LogLogic Cisco NetFlow Log Configuration Guide

LogLogic Cisco NetFlow Log Configuration Guide LogLogic Cisco NetFlow Log Configuration Guide Document Release: September 2011 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 1.0, and LogLogic Software Release

More information

LogLogic Microsoft Internet Information Services (IIS) Log Configuration Guide

LogLogic Microsoft Internet Information Services (IIS) Log Configuration Guide LogLogic Microsoft Internet Information Services (IIS) Log Configuration Guide Document Release: September 2011 Part Number: LL60001-00ELS090000 This manual supports LogLogic Microsoft IIS Release 1.0

More information

LogLogic Symantec Endpoint Protection Log Configuration Guide

LogLogic Symantec Endpoint Protection Log Configuration Guide LogLogic Symantec Endpoint Protection Log Configuration Guide Document Release: September 2011 Part Number: LL60005-00ELS100001 This manual supports LogLogic Symantec Endpoint Protection Release 1.0 and

More information

Juniper Secure Access SSL VPN Log Configuration Guide

Juniper Secure Access SSL VPN Log Configuration Guide Juniper Secure Access SSL VPN Log Configuration Guide Document Release: March 2012 Part Number: LL600049-00ELS01000000 This manual supports LogLogic Juniper Secure Access SSL VPN Release 1.0 and later,

More information

LogLogic Apache Web Server Log Configuration Guide

LogLogic Apache Web Server Log Configuration Guide LogLogic Apache Web Server Log Configuration Guide Document Release: September 2011 Part Number: LL60009-00ELS090001 This manual supports LogLogic Apache Web Server Release 1.0 and later, and LogLogic

More information

LogLogic Blue Coat ProxySG Syslog Log Configuration Guide

LogLogic Blue Coat ProxySG Syslog Log Configuration Guide LogLogic Blue Coat ProxySG Syslog Log Configuration Guide Document Release: September 2011 Part Number: LL600070-00ELS100000 This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic

More information

LogLogic Microsoft SQL Server Log Configuration Guide

LogLogic Microsoft SQL Server Log Configuration Guide LogLogic Microsoft SQL Server Log Configuration Guide Document Release: March 2012 Part Number: LL600028-00ELS090002 This manual supports LogLogic Microsoft SQL Server Release 2.0 and later, and LogLogic

More information

Microsoft Active Directory (AD) Service Log Configuration Guide

Microsoft Active Directory (AD) Service Log Configuration Guide Microsoft Active Directory (AD) Service Log Configuration Guide Document Release: October 2011 Part Number: LL600011-00ELS090000 This manual supports LogLogic Microsoft AD Service Release 1.0 and above,

More information

LogLogic Cisco NetFlow Log Configuration Guide

LogLogic Cisco NetFlow Log Configuration Guide LogLogic Cisco NetFlow Log Configuration Guide Document Release: March 2012 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 2.0, and LogLogic Software Release 5.1

More information

LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide

LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide Document Release: September 2011 Part Number: LL600015-00ELS090000 This manual supports LogLogic Juniper Networks

More information

LogLogic Blue Coat ProxySG Log Configuration Guide

LogLogic Blue Coat ProxySG Log Configuration Guide LogLogic Blue Coat ProxySG Log Configuration Guide Document Release: September 2011 Part Number: LL600012-00ELS100001 This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic

More information

LogLogic Microsoft Windows Server 2000/2003 Log Configuration Guide

LogLogic Microsoft Windows Server 2000/2003 Log Configuration Guide LogLogic Microsoft Windows Server 2000/2003 Log Configuration Guide Document Release: September 2011 Part Number: LL600029-00ELS090002 This manual supports LogLogic Microsoft Windows Server 2000/2003 Release

More information

LogLogic Check Point Management Station Log Configuration Guide

LogLogic Check Point Management Station Log Configuration Guide LogLogic Check Point Management Station Log Configuration Guide Document Release: September 2011 Part Number: LL600013-00ELS090000 This manual supports LogLogic Check Point Management Station Release 2.0

More information

LogLogic IBM i5/os Collector Guide

LogLogic IBM i5/os Collector Guide LogLogic IBM i5/os Collector Guide Software Release: 1.0 Document Release: December 2010 Part Number: LL600020-00EI5010001 This manual supports LogLogic IBM i5/os Collector Release 1.0 and later, and LogLogic

More information

LogLogic McAfee Firewall Enterprise (Sidewinder) Log Configuration Guide

LogLogic McAfee Firewall Enterprise (Sidewinder) Log Configuration Guide LogLogic McAfee Firewall Enterprise (Sidewinder) Log Configuration Guide Document Release: September 2011 Part Number: LL600046-00ELS900001 This manual supports LogLogic Sidewinder Release 1.2 and later,

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide

IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright

More information

LogLogic Juniper Networks JunOS Log Configuration Guide

LogLogic Juniper Networks JunOS Log Configuration Guide LogLogic Juniper Networks JunOS Log Configuration Guide Document Release: September 2011 Part Number: LL600052-00EL01000000 This manual supports LogLogic s Juniper Networks JunOS Release 1.0 and above,

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

TIBCO LogLogic Log Management Intelligence (LMI) Configuration and Upgrade Guide

TIBCO LogLogic Log Management Intelligence (LMI) Configuration and Upgrade Guide TIBCO LogLogic Log Management Intelligence (LMI) Configuration and Upgrade Guide Software Release 5.4.2 November 2013 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

DC Agent Troubleshooting

DC Agent Troubleshooting DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

RealPresence Platform Director

RealPresence Platform Director RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Remote Management System

Remote Management System RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Adaptive Log Exporter Users Guide

Adaptive Log Exporter Users Guide IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,

More information

Installing, Uninstalling, and Upgrading Service Monitor

Installing, Uninstalling, and Upgrading Service Monitor CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Transparent Identification of Users

Transparent Identification of Users Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.

More information

VMware/Hyper-V Backup Plug-in User Guide

VMware/Hyper-V Backup Plug-in User Guide VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.

More information

Available Update Methods

Available Update Methods The Spectralink 84-Series handsets support multiple methods for updating handset software. This document will detail each of those processes in order to give you the greatest flexibility when administering

More information

AV Management Dashboard

AV Management Dashboard LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data

More information

Quick Start Guide. for Installing vnios Software on. VMware Platforms

Quick Start Guide. for Installing vnios Software on. VMware Platforms Quick Start Guide for Installing vnios Software on VMware Platforms Copyright Statements 2010, Infoblox Inc. All rights reserved. The contents of this document may not be copied or duplicated in any form,

More information

White Paper. Deploying EUM. SurfControl Web Filter for MS Windows. rev. 1.1, January 2005. Enterprise Threat Protection

White Paper. Deploying EUM. SurfControl Web Filter for MS Windows. rev. 1.1, January 2005. Enterprise Threat Protection White Paper Deploying EUM SurfControl Web Filter for MS Windows rev. 1.1, January 2005 Enterprise Threat Protection ..... ACKNOWLEDGEMENTS SurfControl wishes to acknowledge the following people for their

More information

Installing Active Directory

Installing Active Directory Installing Active Directory 119 Installing Active Directory Installing Active Directory is an easy and straightforward process as long as you planned adequately and made the necessary decisions beforehand.

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage. Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

TIBCO LogLogic. Universal Collector (UC) User Guide. Software Release: 2.3.0 November 2012

TIBCO LogLogic. Universal Collector (UC) User Guide. Software Release: 2.3.0 November 2012 TIBCO LogLogic Universal Collector (UC) User Guide Software Release: 2.3.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED

More information

Virtual Managment Appliance Setup Guide

Virtual Managment Appliance Setup Guide Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy

More information

How To Back Up Your Pplsk Data On A Pc Or Mac Or Mac With A Backup Utility (For A Premium) On A Computer Or Mac (For Free) On Your Pc Or Ipad Or Mac On A Mac Or Pc Or

How To Back Up Your Pplsk Data On A Pc Or Mac Or Mac With A Backup Utility (For A Premium) On A Computer Or Mac (For Free) On Your Pc Or Ipad Or Mac On A Mac Or Pc Or Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,

More information

VRC 7900/8900 Avalanche Enabler User s Manual

VRC 7900/8900 Avalanche Enabler User s Manual VRC 7900/8900 Avalanche Enabler User s Manual WLE-VRC-20030702-02 Revised 7/2/03 ii Copyright 2003 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

KeyAdvantage System DMS Integration. Software User Manual

KeyAdvantage System DMS Integration. Software User Manual KeyAdvantage System DMS Integration Software User Manual ii Copyright Disclaimer Trademarks and patents Intended use EMC Directive Regulatory 2013 United Technologies Corporation. All rights reserved.

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

TIBCO Hawk SNMP Adapter Installation

TIBCO Hawk SNMP Adapter Installation TIBCO Hawk SNMP Adapter Installation Software Release 4.9.0 November 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR

More information

Management Center. Installation and Upgrade Guide. Version 8 FR4

Management Center. Installation and Upgrade Guide. Version 8 FR4 Management Center Installation and Upgrade Guide Version 8 FR4 APPSENSE MANAGEMENT CENTER INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2012 All rights reserved. part of this document may be produced

More information

CA Spectrum. Microsoft MOM and SCOM Integration Guide. Release 9.4

CA Spectrum. Microsoft MOM and SCOM Integration Guide. Release 9.4 CA Spectrum Microsoft MOM and SCOM Integration Guide Release 9.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Legal and Copyright Notice

Legal and Copyright Notice Parallels Helm Legal and Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 2008, Parallels, Inc.

More information

Avatier Identity Management Suite

Avatier Identity Management Suite Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Virtual Web Appliance Setup Guide

Virtual Web Appliance Setup Guide Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide 026-1010 Rev 7 06-OCT-2011 Site Manager Installation Guide Retail Solutions 3240 Town Point Drive NW, Suite 100 Kennesaw, GA 30144, USA Phone: 770-425-2724 Fax: 770-425-9319 Table of Contents 1 SERVER

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide

Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide 9034968 Published April 2016 Copyright 2016 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to

More information

Tivoli Access Manager Agent for Windows Installation Guide

Tivoli Access Manager Agent for Windows Installation Guide IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide Version 4.5.0 SC32-1165-03 IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

EMC Data Domain Management Center

EMC Data Domain Management Center EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes

More information

Worry-Free TM Remote Manager

Worry-Free TM Remote Manager Worry-Free TM Remote Manager for Small and Medium Business Agent Installation Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information