Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:

Size: px
Start display at page:

Download "Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236."

Transcription

1 Frequently Asked Questions Secure Log Manager Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:

2 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed to meet the requirements of managing system audit logs, SLM is equally applicable to installations with tens of systems or tens of thousands of systems. Secure Log Manager provides log management for large communities of Systems Servers and Workstation, Windows or UNIX. Secure Log Manager ensures the integrity and continuity of system log data by collecting the data into a single point, in a secure and forensically sound way, where it may be used for later analysis or forensic investigation. 2. What facilities does Secure Log Manager provide? Secure Log Manager provides a solution to the problems of secure log management by providing: A mechanism for the secure transfer of system logs from individual systems onto a central management system. The secure transfer is performed so that the logs may, if required, later be used for forensic analysis. Facilities to allow viewing of the centrally held logs Facilities for the archiving to long term storage of collected Logs Facilities for the export of logs to an ODBC database for analysis Centrally, the Secure Log Manager allows filtering, viewing, reporting and archiving of the stored logs. 3. What is supported at Release 1 of Secure Log Manager? At Release 1 Secure Log Manager addresses the requirements of managing Windows Event Logs. Agents and some supporting features are provided for logs on some UNIX platforms. Log collection and transfer for UNIX is similar to Windows, some Console and reporting features are different at this release. Features and facilities for UNIX platforms will be brought to the same level as Windows at later releases of SLM. Secure Log Manager securely collects logs from enterprise wide systems to a secure central system. Logs can be exported to an ODBC database for analysis and can also be archived to secure long terms storage. All of the handling of the logs preserves the original format so that they are suitable, if required, for forensic analysis. Frequently Asked Questions Page 1

3 4. What environment do I need for Secure Log Manager? Secure Log manager is designed to work within a Windows domain environment. The computers hosting the Collector and Consoles must be in the same Windows Trust Domain, or must have appropriate trust relationships established between their respective Windows Trust Domains. 5. What are the System requirements for Secure Log manager? See the System requirements document for the full requirements, in summary they are: Network: WINS Name Resolution, TCP/IP Name Resolution and Windows Trust Domains. Collector: Pentium III 500 MHz processor 64MB RAM. Windows NT4 Server Edition SP 6a and MDAC 2.5 or 2.6. Min 10 MB NTFS file system for software installation. Console: Pentium III 500 MHz processor 64MB RAM by 768 resolution. Windows NT4 Workstation or Server Edition SP 6a and MDAC 2.5 or 2.6. Internet Explorer 5 or later. Min of 10 MB NTFS file system for software installation. Event Loader: The event loader is an optional component of Secure Log Manager. Pentium III 500 MHz processor 64MB RAM. Windows NT4 Server Edition with SP 6a and MDAC 2.5 or 2.6. A min of 5 MB on an NTFS file system for software installation. Windows 2000 / Windows NT Agent: Pentium processor 64MB RAM. Windows 2000 Professional or Server Edition or Windows NT4 Workstation or Server Edition with SP4 or later. Min 5 of MB NTFS file system for software installation. Sun Solaris Agents: SPARC Enterprise 250 processor or better 32MbRAM. Solaris 2.6 with patch applied or Solaris 7 and 8. Min of 5 MB for software installation. Hewlett-Packard HP-UX Agents: HP9000/712 processor or better 32MB RAM. HP-UX or 11 with 32MB RAM. Min of 5 MB for software installation. 6. I use Event Log Manager (ELM), is Secure Log Manager applicable to me? YES, Secure Log Manager would be the best upgrade path for you. 7. I use Workstation Edition (WSE), is Secure Log Manager applicable to me? YES, Secure Log Manager would be the best upgrade path for you. 8. As a user of ELM or WSE am I entitled to transition to Secure Log Manager If your ELM or WSE is currently on maintenance then the transition to Secure Log Manager is covered within your existing maintenance agreement. If your maintenance has expired you will need to purchase Secure Log Manager. 9. Is IS17799 (BS7799) applicable with Secure Log Manager YES - The BS 7799 Information security management code of practice is rapidly gaining international acceptance. BS7799 gives recommendations for information security management for use by those who are responsible for initiating, implementing or maintaining security in their organization. 10. Why Secure Log Manager? For many organizations the management of audit trails is of very high importance, both from a security, legislation and an administration viewpoint. Today s operating systems, including Windows and UNIX, can produce a large amount of audit data in the system logs. There are few tools available today to provide for the reliable management of this log data. Frequently Asked Questions Page 2

4 11. What are System Logs? UNIX System: UNIX systems generally write their audit data to log files, typically 'sulog' and 'syslog. The 'sulog' contains all attempts to change user using the UNIX 'su' command. 'Syslog' contains the other operating system audit information.' Some UNIX variants may have other system logs. Windows Event Logs: Windows (NT and 2000) writes its audit data to Event Logs, on Windows NT these are the Application, System and Security Event Log and on Windows 2000 there are additional Event Logs, including the Directory Services and File replication event logs. 12. Are Windows logs text files? No - Each Windows Event Log contains a number of structured event records. Each record has an Event ID and a source name, a reference to the application or subsystem that generated the event. The Event ID is only relevant in the context of a given source name. For example, Event ID 5 for source Secure Log Manager Agent expands to the string Service has stopped. These text strings are held within application binary files. Each application or subsystem registers its message string files with the Event Log subsystem, allowing the Windows Event Viewer to access and expand the Event ID strings. 13. Is Secure Log Manager a forensic analysis tool? NO - Secure Log Manager is not a forensic analysis tool. Secure Log Manager can be considered an important prerequisite to forensics in that it securely collects logs from all over the enterprise. Users who wish to investigate security incidents require the logs to be in a form in which they can be used for analysis and forensic use. Any user wishing to follow through to prosecution would require logs in a format that are admissible as evidence in a court of law When combined with other analysis tools 14. What does Secure Log Manager do? On each managed Windows system, the Secure Log Manager Agent monitors the size of all event logs. If a log reaches a user-defined threshold/trigger condition the log is transferred to the Secure Log Manager Collector on a central management platform using a secure store and forward mechanism. Alternatively the transfer of logs, on both Windows and UNIX, can be triggered by time, this can be at specified times, days of week, days of month 15. What are the components of Secure Log Manager Secure Log Manager implements a 3-tier architecture. On each system to be managed an Agent is installed, the agent is configured with the name of the system running the Secure Log Collector. The Collector provides the agents management and data management for Secure Log Manager and uses an ODBC database, at first release this will be an Access database and subsequent releases will support SQL Server and Oracle. The Collector is the middle tier of Secure Log Manager. One or more Consoles can connect to the Collector. Frequently Asked Questions Page 3

5 16. What is the Architecture of SLM? 17. SLM consists of the following components: Consoles - Providing a user friendly graphical interface Collector - The data storage and management component Agents - Agent(s) installed on each system to be managed 18. What is an SLM Agent? The SLM Agent is installed on each system that requires log management. The agent monitors the logs and on detection of a trigger condition will initiate the transfer of a log to the collector using a secure store and forward mechanism. Each Agent has a 'heart beat' to the Collector, the frequency being a user defined value, which allows the console to display the connection status of each Windows system being managed. Additionally, in order to ensure the integrity of the Agent, each Windows SLM Agent will initiate a self-check on a regular basis and raise a high priority alert if it detects an integrity failure. 19. What is an SLM Collector? The SLM Collector collects incoming event log files and stores them in the 'central' store. The Collector manages the data stores; these are the flat file folders and ODBC database. SLM can use MS Access, SQL Server and Oracle as its ODBC database. An optional part of the Collector is the Event Loader, which can automatically load log data onto the ODBC database on receipt from agents. A Log Browser for UNIX logs is also included as part of the Collector. The Collector includes facilities for alert management and ODBC output of NT Event Logs. 20. What is an SLM Console? The Console provides the user interface to SLM and enables log management, alert management and reporting which includes graphical reporting and trend analysis. Management reports are available showing statistics such as elapsed time from alert generation to closure. Frequently Asked Questions Page 4

6 21. What does the SLM Console User interface provide? The SLM Console provides a User Interface, which supports: Hierarchical tree view of managed SLM systems, their connection status and 'heart beat' status. Log alert notification Alert acknowledgement Simple Log browsing of Windows logs Selection of Windows log events for export to the query database Pre-defined reports and graphs on alerts and events in the query database using 'Crystal Reports Several Consoles may be run concurrently, with each connecting to the Collector and having direct or network access to the Collectors shared drive. A simple log viewer is provided at this release for UNIX logs. 22. Which Platforms supported at release SLM 1.0? Console: Windows NT 4 only Collector: Windows NT 4 only Database: Access, SQL Server, Oracle Agents: Windows NT 4, Windows 2000, Solaris 2.6, 7, 8, HP-UX and How is SLM licensed? Secure Log Manager uses the standard ISS key mechanism. The Collector is the 'controlled' Secure Log Manager component and uses a standard ISS key file. The ISS key file must include the IP address of the system on which the Collector is installed and the number of agents to be supported by the Collector. The Console and Agents do not require and ISS.KEY file. Note: This IP address for the Collector can be an address range. The IP addresses of the system on which agents are to be installed are not required. 24. Do I need a Licence to do an Evaluation? NO - For product evaluations a single agent installation can be created which does not require an ISS key. The agent must be installed on the same system as the Collector. 25. What are Secure Log Manager main features and functions? Secure Log Manager (SLM) provides log management for large communities of Systems Servers and Workstation, Windows or UNIX. Secure Log Manager ensures the continuity of system log data by collecting the data into a central point, in a secure and forensically sound way, where it may be used for later analysis or forensic investigation. Secure Log Manager securely collects logs from enterprise wide systems to a secure central system. Logs can be exported to an ODBC database for analysis and can also be archived to secure long terms storage. All of the handling of the logs preserves the original format so that they are suitable, if required, for forensic analysis. On Windows Secure Log Manager is installed using 'Install Shield ' it supports full Microsoft SMS integration for rollout and update. On UNIX simple scripts are provided for local and remote silent installation. Reporting, using 'Crystal Reports ', provides a number of standard reports and includes simple analysis of Windows Logs. Frequently Asked Questions Page 5

7 26. What is a typical Secure Log Manager installation? The Secure Log Manager installation consists of any number of Agent systems (Windows and UNIX) managed by a single Windows NT based Collector system with one or more Consoles. A Console can be installed on the Collector system or on remote Windows Systems. The Collector and Agents can run on either NT servers or workstations although for performance and connectivity reasons it is recommended that the Collector be run on an appropriately sized server together with an appropriate ODBC database. The number of Agents that can be supported by one Collector is restricted only by system constraints. 27. What Network Security is provided? The Collector is authenticated to the Agents via SSL 3.0, using 1024-bit DSS certificates, with all subsequent traffic between Agent and Collector being encrypted with 168-bit Triple DES. This ensures that the agents will not leak information on security vulnerabilities to malicious third parties. Control communications between the Consoles and Collector is via DCOM and may be optionally encrypted at the packet level using the standard DCOM facilities and NT Security Service Providers. 28. What Log Transfer options are available? Logs will be transferred to the collector: When the log size reaches a configurable percentage full, i.e. 75% At a configurable times of day, days of the week, days of the month These transfer criteria may be configured separately for each type of log. 29. Does SLM clear the logs? Before a log is transferred to the Collector it is copied to temporary store on the agents, the system s log is cleared down, preventing the loss of events that could occur if the log became full. 30. Does SLM do authentications? YES - Before any data is transferred, both the Agent and Collector confirm that the remote party is valid. Both parties also maintain sequence numbers for all system log types, so that out-of-sequence transfers can be detected. 31. Does SLM do Encryption? YES - Secure Log Manager uses an encryption algorithm for all network transfers. To further improve security, encryption keys are changed after every file transfer. 32. Does SLM consolidate data from all agents? YES - Transfer of the collected data into an ODBC database allows the consolidation, correlation and analysis of logs across the whole enterprise. 33. What does SLM do with Message Strings Files? For Windows Event Logs in order to allow the Secure Log Manager Console to display the text associated with any event ID, Secure Log Manager transfers all files containing message strings to the collector along with the Event Log files. To minimize the amount of data transferred, each file is only transferred once. Frequently Asked Questions Page 6

8 34. How does SLM transfer logs to the Collector? SLM uses a secure Store & Forward mechanism. Before transfer to the Collector, the Agent copies all log data to a spool area. Data files are only deleted from the spool area once the Collector has confirmed that the files have been correctly received and stored to disk. The Collector verifies that sufficient disk space is available before allowing the transfer of any file. 35. How does the Store and Forward work? Spooling when a log matches the transfer criteria, the Agent performs a Backup & Clear operation on the log, resulting in the log being copied to the spool area and then cleared down. A control file is generated to hold system-specific information referenced by the event log. Any message files referenced by the event log are also copied to the spool area, though each file is only transferred to the Collector once. Forwarding The Agent attempts to connect to the Secure Log Manager Collector using a secure protocol over a named pipe on Windows or sockets on UNIX. Each set of files in the spool area is forwarded to the Collector. When the Collector acknowledges the receipt of the entire set of files the spooled copy is removed. Storing The Collector stores received sets of files in a directory hierarchy representing the managed network of systems. The stored event logs can then be viewed using the Secure Log Manager Console. 36. Where can I get more information about SLM? Contact you ISS Sales representative or visit the ISS web site at Where can I get the Secure Log Manager software? Contact you ISS Sales representative or visit the ISS web site at About Internet Security Systems (ISS) Internet Security Systems, Inc. (ISS) (Nasdaq: ISSX) is the leading global provider of security management solutions for the Internet. ISS protects critical information and network resources from attack and misuse. By combining best of breed software products, market-leading managed security services, aggressive research and development, and comprehensive educational and consulting services, ISS is the trusted security provider for thousands of customers around the world. Copyright , Internet Security Systems, Inc. All rights reserved worldwide. Internet Security Systems, the Internet Security Systems logo, and The Power To Protect are trademarks and service marks of Internet Security Systems, Inc. Other trademarks and trade names mentioned are marks and names of their owners as indicated. All trademarks are the property of their respective owners and are used here in an editorial context without intent of infringement. Specifications and content are subject to change without notice. Frequently Asked Questions Page 7

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Lotus Domino Security

Lotus Domino Security An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware

More information

LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide

LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

LT Auditor+ for Windows

LT Auditor+ for Windows LT Auditor+ for Windows Quick Start Guide Documentation issue: 5.3 Copyright Blue Lance Inc. Distributed by: LT Auditor+ for Windows: Overview LT Auditor+ is a security software application that provides

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

HP Business Availability Center

HP Business Availability Center HP Business Availability Center for the Windows and Solaris operating systems Software Version: 8.05 Business Process Monitor Administration Document Release Date:September 2010 Software Release Date:

More information

PATROL Console Server and RTserver Getting Started

PATROL Console Server and RTserver Getting Started PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

etrust Audit Using the Recorder for Check Point FireWall-1 1.5

etrust Audit Using the Recorder for Check Point FireWall-1 1.5 etrust Audit Using the Recorder for Check Point FireWall-1 1.5 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational

More information

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in

More information

IBM RealSecure Server Sensor System Requirements

IBM RealSecure Server Sensor System Requirements IBM Internet Security Systems IBM RealSecure Server Sensor System Requirements Contents of This Document This document describes the system requirements for the current versions of IBM RealSecure Server

More information

Netwrix Auditor for Windows Server

Netwrix Auditor for Windows Server Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

Global PRO. NetScreen-Global PRO Security Management Systems

Global PRO. NetScreen-Global PRO Security Management Systems Global PRO NetScreen-Global PRO Security Management Systems At a glance Easy to use policy management Manage tens to thousands of devices and security policies via a distributed management system Scalability

More information

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and

More information

How To Restore An Org Server With Anor Backup For Windows 7.5.2 (Oracle)

How To Restore An Org Server With Anor Backup For Windows 7.5.2 (Oracle) Oracle Server Backup User Guide TABLE OF CONTENTS Introduction... 2 Oracle Server Backup... 3 Features... 3 Requirements for Oracle server backup... 3 How to enable ARCHIVELOG Mode... 3 System Requirements...

More information

Hardware Requirements

Hardware Requirements 300-6400 Roberts Street Burnaby BC V5G 4C9 300-6400 Roberts Street Burnaby BC V5G 4C9 Hardware Requirements Version 5.2: Last revised May 5, 2005 Microsoft, Windows and the Windows logo are trademarks,

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Proactively Managing Your NT Infrastructure with Event Log Monitor. TNT Software

Proactively Managing Your NT Infrastructure with Event Log Monitor. TNT Software Challenges of Administering Windows NT/2000 Single system providing critical services Internet server in DMZ (e.g., FTP, HTTP, SMTP) Corporate File & Print, Email or Database Server Other critical island

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may

More information

EventTracker Enterprise v7.3 Installation Guide

EventTracker Enterprise v7.3 Installation Guide EventTracker Enterprise v7.3 Installation Guide Publication Date: Sep 11, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help the users to install

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering

More information

Compaq Batch Scheduler for Windows NT

Compaq Batch Scheduler for Windows NT Compaq Batch Scheduler for Windows NT Mainframe-Caliber Automated Job Scheduling Software for Windows NT This white paper addresses extending the capabilities of Windows NT to include automated job scheduling

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

administrator are Console Users that can log on to the Web Management console and

administrator are Console Users that can log on to the Web Management console and Q and A Can I control what ObserveIT records? Yes, within the Web Console it is possible to define what the Agent records. By using inclusion or exclusion, you can control many aspects of the recording

More information

Netwrix Auditor for Exchange

Netwrix Auditor for Exchange Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

CimTrak Integrity & Compliance Suite 2.0.6.19

CimTrak Integrity & Compliance Suite 2.0.6.19 CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console App Server File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Active Directory Adapter with 64-bit Support Installation and Configuration Guide

Active Directory Adapter with 64-bit Support Installation and Configuration Guide IBM Security Identity Manager Version 6.0 Active Directory Adapter with 64-bit Support Installation and Configuration Guide SC27-4384-02 IBM Security Identity Manager Version 6.0 Active Directory Adapter

More information

System Requirements - CommNet Server

System Requirements - CommNet Server System Requirements - CommNet Page 1 of 11 System Requirements - CommNet The following requirements are for the CommNet : Operating System Processors Microsoft with Service Pack 4 Microsoft Advanced with

More information

IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1

IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1 IBM Proventia Management SiteProtector Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1 Copyright Statement Copyright IBM Corporation 1994, 2010. IBM Global Services Route

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

WEB COMPAS MINIMUM HOSTING REQUIREMENTS

WEB COMPAS MINIMUM HOSTING REQUIREMENTS WEB COMPAS MINIMUM HOSTING REQUIREMENTS For Additional Support: Northpointe Institute for Public Management T: 231.938.5959 F: 231.938.5995 www.npipm.com support@npipm.com Adult COMPAS Web Application

More information

features at a glance

features at a glance hp availability stats and performance software network and system monitoring for hp NonStop servers a product description from hp features at a glance Online monitoring of object status and performance

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

Server Manager Help 10/6/2014 1

Server Manager Help 10/6/2014 1 Server Manager Help 10/6/2014 1 Table of Contents Server Manager Help... 1 Getting Started... 7 About SpectorSoft Server Manager... 8 Client Server Architecture... 9 System Requirements... 10 Screencasts...

More information

MS SQL Server Backup - User Guide

MS SQL Server Backup - User Guide MS SQL Server Backup - User Guide TABLE OF CONTENTS Introduction... 1 Features... 1 System Requirements... 1 MS SQL Server Backup... 2 Accessing SQL Server Backup... 2 MS SQL Server Restore... 6 Accessing

More information

TREND MICROTM ServerProtectTM for EMC Celerra TM

TREND MICROTM ServerProtectTM for EMC Celerra TM TREND MICROTM ServerProtectTM for EMC Celerra TM Filers Getting Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

More information

Web Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company

Web Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company Web Filter SurfControl Web Filter 5.0 Installation Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company NOTICES NOTICES Copyright 2005 SurfControl plc. All rights reserved. No part

More information

STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes

STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended

More information

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest

More information

Symantec NetBackup Getting Started Guide. Release 7.1

Symantec NetBackup Getting Started Guide. Release 7.1 Symantec NetBackup Getting Started Guide Release 7.1 21159722 Contents NetBackup Getting Started Guide... 5 About NetBackup... 5 How a NetBackup system works... 6 How to make a NetBackup system work for

More information

QACenter Installation and Configuration Guide. Release 4.4.2

QACenter Installation and Configuration Guide. Release 4.4.2 QACenter Installation and Configuration Guide Release 4.4.2 ii Please direct questions about QACenter or comments on this document to: QACenter Technical Support Compuware Corporation 31440 Northwestern

More information

BillQuick Web i Time and Expense User Guide

BillQuick Web i Time and Expense User Guide BillQuick Web i Time and Expense User Guide BQE Software Inc. 1852 Lomita Boulevard Lomita, California 90717 USA http://www.bqe.com Table of Contents INTRODUCTION TO BILLQUICK... 3 INTRODUCTION TO BILLQUICK

More information

Altiris Helpdesk Solution 6.0 SP5 Product Guide

Altiris Helpdesk Solution 6.0 SP5 Product Guide Altiris Helpdesk Solution 6.0 SP5 Product Guide Notice Helpdesk Solution 6.0 SP5 2000-2007 Altiris, Inc. All rights reserved. Document Date: August 29, 2007 Information in this document: (i) is provided

More information

Netwrix Auditor for File Servers

Netwrix Auditor for File Servers Netwrix Auditor for File Servers Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

Heroix Longitude Quick Start Guide V7.1

Heroix Longitude Quick Start Guide V7.1 Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: support@heroix.com Notice Heroix provides

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

HSLAB Print Logger 5 Installation Guide

HSLAB Print Logger 5 Installation Guide HSLAB Print Logger 5 Installation Guide NOTE: Information and screen shots in this document are related to the Print Logger EE edition. In different editions some features may be not available. See editions

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Installation and System Configuration Version 7.0

Installation and System Configuration Version 7.0 Installation and System Configuration Version 7.0 Sage MAS 500 ERP 4AIN1050-0905 1996-2005 Sage Software, Inc. All rights reserved. The Sage Software logo and the Sage Software product and service names

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

IBM RealSecure Server Sensor System Requirements

IBM RealSecure Server Sensor System Requirements IBM RealSecure Server Sensor System Requirements Contents of This Document This document describes the system requirements for the current versions of IBM RealSecure Server Sensor components. Overview

More information

ALTIRIS HELPDESK SOLUTION 6.0 SP2 PRODUCT GUIDE

ALTIRIS HELPDESK SOLUTION 6.0 SP2 PRODUCT GUIDE ALTIRIS HELPDESK SOLUTION 6.0 SP2 PRODUCT GUIDE Notice Copyright 2000-2005 Altiris Inc. All rights reserved. Product Version: 6.0 Document Date: January 31, 2005 Bootworks U.S. Patent No. 5,764,593. RapiDeploy

More information

Total Protection for Enterprise-Advanced

Total Protection for Enterprise-Advanced System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)

More information

IBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support

IBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support Software Announcement June 1, 2004 Services Expedite software adds Secure Sockets Layer TCP/IP support Overview Services Expedite software for Microsoft Windows, AIX, and OS/400 is being enhanced to support

More information

WHITE PAPER September 2012. CA Nimsoft Monitor for Servers

WHITE PAPER September 2012. CA Nimsoft Monitor for Servers WHITE PAPER September 2012 CA Nimsoft Monitor for Servers Table of Contents CA Nimsoft Monitor for servers 3 solution overview CA Nimsoft Monitor service-centric 5 server monitoring CA Nimsoft Monitor

More information

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from

More information

Upgrade Guide. Upgrading to EventTracker v6.0. Upgrade Guide. 6990 Columbia Gateway Drive, Suite 250 Publication Date: Sep 20, 2007.

Upgrade Guide. Upgrading to EventTracker v6.0. Upgrade Guide. 6990 Columbia Gateway Drive, Suite 250 Publication Date: Sep 20, 2007. Upgrading to EventTracker v6.0 Upgrade Guide 6990 Columbia Gateway Drive, Suite 250 Publication Date: Sep 20, 2007 Columbia MD 21046 877.333.1433 Abstract The purpose of this document is to help users

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Release notes. Symantec Event Manager for Firewall. What s new. System requirements

Release notes. Symantec Event Manager for Firewall. What s new. System requirements Release notes Symantec Event Manager for Firewall What s new Symantec Event Manager for Firewall provides centralized logging, alerting, and reporting across Symantec s enterprise firewall protection solutions.

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Installation & Configuration Guide

Installation & Configuration Guide Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion

More information

Requirements & Install. Module 2 Single Engine Installation

Requirements & Install. Module 2 Single Engine Installation Requirements & Install Module 2 Single Engine Installation Requirements Requirement Minimum Optimum Processor Intel Core 2 @ 2GHz Dual Processor Xeon 3.0 GHz Memory 2 GB RAM 8 GB RAM Disk Space 2 GB 5GB

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

PC-Duo Web Console Installation Guide

PC-Duo Web Console Installation Guide PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks

More information

Synergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 20150330

Synergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 20150330 Synergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 20150330 CONTENTS Contents... 2 Overview... 2 Adept Server... 3 Adept

More information

Quick Start - NetApp File Archiver

Quick Start - NetApp File Archiver Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS GETTING STARTED Upgrade Configuration Archive Recover Page 1 of 14 Overview - NetApp File Archiver Agent TABLE OF CONTENTS

More information

Symantec AntiVirus for Network Attached Storage 5.1

Symantec AntiVirus for Network Attached Storage 5.1 Getting Started Symantec AntiVirus for Network Attached Storage 5.1 This chapter includes the following topics: About Symantec AntiVirus for Network Attached Storage 5.1 About documentation What s new

More information

Adept 2014 System Requirements

Adept 2014 System Requirements Synergis Software 200 Kelly Road, Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 080613 This document provides an overview of the Adept 2014 System requirements to

More information

24x7 Scheduler Multi-platform Edition 5.2

24x7 Scheduler Multi-platform Edition 5.2 24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Cisco Adaptive Security Device Manager Version 5.2F for Cisco Firewall Services Module Software Version 3.2

Cisco Adaptive Security Device Manager Version 5.2F for Cisco Firewall Services Module Software Version 3.2 Cisco Adaptive Security Device Manager Version 5.2F for Cisco Firewall Services Module Software Version 3.2 Cisco Adaptive Security Device Manager (ASDM) delivers world-class security management and monitoring

More information

Vector Asset Management User Manual

Vector Asset Management User Manual Vector Asset Management User Manual This manual describes how to set up Vector Asset Management 6.0. It describes how to use the: Vector AM Console Vector AM Client Hardware Inventory Software Inventory

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 9.0 Copyright 2007 Polycom, Inc. All Rights Reserved Catalog No. DOC2138C Version 9.0 Proprietary and Confidential The information

More information

File Auditor for NAS, Net App Edition

File Auditor for NAS, Net App Edition File Auditor for NAS, Net App Edition Installation Guide Revision 1.2 - July 2015 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for

More information

HP OpenView Service Desk

HP OpenView Service Desk HP OpenView Service Desk Installation Guide Software Version: 5.10 For Windows and UNIX Operating Systems Manufacturing Part Number: None Document Release Date: April 2007 Software Release Date: August

More information

CentreWare for Microsoft Operations Manager. User Guide

CentreWare for Microsoft Operations Manager. User Guide CentreWare for Microsoft Operations Manager User Guide Copyright 2006 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information

More information

Web Server (IIS) Requirements

Web Server (IIS) Requirements Web Server (IIS) Requirements Important! The Web Server (IIS) cannot be the primary or backup domain controller. Operating System Windows Server 2012 R2 Windows Server 2008 R2 (64-bit with IIS running

More information

Version 5.12 December 2014 702P02896. Xerox CentreWare Web Installation Guide

Version 5.12 December 2014 702P02896. Xerox CentreWare Web Installation Guide Version 5.12 December 2014 702P02896 Xerox CentreWare Web 2014 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and CentreWare are trademarks of Xerox Corporation in the United States and/or

More information

MRI Commercial. MRI Residential. CRE Manager. Windows Version 4.0 Installation Guide

MRI Commercial. MRI Residential. CRE Manager. Windows Version 4.0 Installation Guide MRI Commercial MRI Residential CRE Manager Windows Version 4.0 Installation Guide Stock Number: IG40WIN March 2007 2007 Intuit Inc. Any unauthorized use or reproduction of this documentation is strictly

More information

LANDESK Service Desk. Desktop Manager

LANDESK Service Desk. Desktop Manager LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,

More information

Central Security Server

Central Security Server Central Security Server Installation and Administration Guide Release 12.3 Please direct questions about {Compuware Product} or comments on this document to: Customer Support https://community.compuwareapm.com/community/display/support

More information

A CrossTec Corporation. Instructional Setup Guide. Activeworx Security Center Quick Install Guide

A CrossTec Corporation. Instructional Setup Guide. Activeworx Security Center Quick Install Guide A CrossTec Corporation Instructional Setup Guide Activeworx Security Center Quick Install Guide PREPARED BY GARY CONKLE Activeworx Basic Installation and Configuration Guide CrossTec Corporation 500 NE

More information

Setting up an MS SQL Server for IGSS

Setting up an MS SQL Server for IGSS Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3

More information

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information

Exploiting the Web with Tivoli Storage Manager

Exploiting the Web with Tivoli Storage Manager Exploiting the Web with Tivoli Storage Manager Oxford University ADSM Symposium 29th Sept. - 1st Oct. 1999 Roland Leins, IBM ITSO Center - San Jose leins@us.ibm.com Agenda The Web Client Concept Tivoli

More information

Asta Powerproject Enterprise

Asta Powerproject Enterprise Asta Powerproject Enterprise Overview and System Requirements Guide Asta Development plc Kingston House Goodsons Mews Wellington Street Thame Oxfordshire OX9 3BX United Kingdom Tel: +44 (0)1844 261700

More information

File System Auditor Release Notes

File System Auditor Release Notes File System Auditor Release Notes WHAT'S NEW IN FILE SYSTEM AUDITOR? To see what is new in File System Auditor, please see article Q14974 INFO: File System Auditor 2.x Version History in the ScriptLogic

More information

IP-guard 3 User Manual v2.0

IP-guard 3 User Manual v2.0 IP-guard 3 User Manual v2.0 Copyright TEC Solutions Limited. All rights reserved. v2.0rev20111208 Copyright Copyright Copyright 2008 TEC Solutions Limited. All rights reserved. No part of this document

More information

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS) Payment Card Industry Data Security Standard (PCI / DSS) InterSect Alliance International Pty Ltd Page 1 of 12 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance

More information