Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:
|
|
- Estella Miles
- 8 years ago
- Views:
Transcription
1 Frequently Asked Questions Secure Log Manager Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:
2 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed to meet the requirements of managing system audit logs, SLM is equally applicable to installations with tens of systems or tens of thousands of systems. Secure Log Manager provides log management for large communities of Systems Servers and Workstation, Windows or UNIX. Secure Log Manager ensures the integrity and continuity of system log data by collecting the data into a single point, in a secure and forensically sound way, where it may be used for later analysis or forensic investigation. 2. What facilities does Secure Log Manager provide? Secure Log Manager provides a solution to the problems of secure log management by providing: A mechanism for the secure transfer of system logs from individual systems onto a central management system. The secure transfer is performed so that the logs may, if required, later be used for forensic analysis. Facilities to allow viewing of the centrally held logs Facilities for the archiving to long term storage of collected Logs Facilities for the export of logs to an ODBC database for analysis Centrally, the Secure Log Manager allows filtering, viewing, reporting and archiving of the stored logs. 3. What is supported at Release 1 of Secure Log Manager? At Release 1 Secure Log Manager addresses the requirements of managing Windows Event Logs. Agents and some supporting features are provided for logs on some UNIX platforms. Log collection and transfer for UNIX is similar to Windows, some Console and reporting features are different at this release. Features and facilities for UNIX platforms will be brought to the same level as Windows at later releases of SLM. Secure Log Manager securely collects logs from enterprise wide systems to a secure central system. Logs can be exported to an ODBC database for analysis and can also be archived to secure long terms storage. All of the handling of the logs preserves the original format so that they are suitable, if required, for forensic analysis. Frequently Asked Questions Page 1
3 4. What environment do I need for Secure Log Manager? Secure Log manager is designed to work within a Windows domain environment. The computers hosting the Collector and Consoles must be in the same Windows Trust Domain, or must have appropriate trust relationships established between their respective Windows Trust Domains. 5. What are the System requirements for Secure Log manager? See the System requirements document for the full requirements, in summary they are: Network: WINS Name Resolution, TCP/IP Name Resolution and Windows Trust Domains. Collector: Pentium III 500 MHz processor 64MB RAM. Windows NT4 Server Edition SP 6a and MDAC 2.5 or 2.6. Min 10 MB NTFS file system for software installation. Console: Pentium III 500 MHz processor 64MB RAM by 768 resolution. Windows NT4 Workstation or Server Edition SP 6a and MDAC 2.5 or 2.6. Internet Explorer 5 or later. Min of 10 MB NTFS file system for software installation. Event Loader: The event loader is an optional component of Secure Log Manager. Pentium III 500 MHz processor 64MB RAM. Windows NT4 Server Edition with SP 6a and MDAC 2.5 or 2.6. A min of 5 MB on an NTFS file system for software installation. Windows 2000 / Windows NT Agent: Pentium processor 64MB RAM. Windows 2000 Professional or Server Edition or Windows NT4 Workstation or Server Edition with SP4 or later. Min 5 of MB NTFS file system for software installation. Sun Solaris Agents: SPARC Enterprise 250 processor or better 32MbRAM. Solaris 2.6 with patch applied or Solaris 7 and 8. Min of 5 MB for software installation. Hewlett-Packard HP-UX Agents: HP9000/712 processor or better 32MB RAM. HP-UX or 11 with 32MB RAM. Min of 5 MB for software installation. 6. I use Event Log Manager (ELM), is Secure Log Manager applicable to me? YES, Secure Log Manager would be the best upgrade path for you. 7. I use Workstation Edition (WSE), is Secure Log Manager applicable to me? YES, Secure Log Manager would be the best upgrade path for you. 8. As a user of ELM or WSE am I entitled to transition to Secure Log Manager If your ELM or WSE is currently on maintenance then the transition to Secure Log Manager is covered within your existing maintenance agreement. If your maintenance has expired you will need to purchase Secure Log Manager. 9. Is IS17799 (BS7799) applicable with Secure Log Manager YES - The BS 7799 Information security management code of practice is rapidly gaining international acceptance. BS7799 gives recommendations for information security management for use by those who are responsible for initiating, implementing or maintaining security in their organization. 10. Why Secure Log Manager? For many organizations the management of audit trails is of very high importance, both from a security, legislation and an administration viewpoint. Today s operating systems, including Windows and UNIX, can produce a large amount of audit data in the system logs. There are few tools available today to provide for the reliable management of this log data. Frequently Asked Questions Page 2
4 11. What are System Logs? UNIX System: UNIX systems generally write their audit data to log files, typically 'sulog' and 'syslog. The 'sulog' contains all attempts to change user using the UNIX 'su' command. 'Syslog' contains the other operating system audit information.' Some UNIX variants may have other system logs. Windows Event Logs: Windows (NT and 2000) writes its audit data to Event Logs, on Windows NT these are the Application, System and Security Event Log and on Windows 2000 there are additional Event Logs, including the Directory Services and File replication event logs. 12. Are Windows logs text files? No - Each Windows Event Log contains a number of structured event records. Each record has an Event ID and a source name, a reference to the application or subsystem that generated the event. The Event ID is only relevant in the context of a given source name. For example, Event ID 5 for source Secure Log Manager Agent expands to the string Service has stopped. These text strings are held within application binary files. Each application or subsystem registers its message string files with the Event Log subsystem, allowing the Windows Event Viewer to access and expand the Event ID strings. 13. Is Secure Log Manager a forensic analysis tool? NO - Secure Log Manager is not a forensic analysis tool. Secure Log Manager can be considered an important prerequisite to forensics in that it securely collects logs from all over the enterprise. Users who wish to investigate security incidents require the logs to be in a form in which they can be used for analysis and forensic use. Any user wishing to follow through to prosecution would require logs in a format that are admissible as evidence in a court of law When combined with other analysis tools 14. What does Secure Log Manager do? On each managed Windows system, the Secure Log Manager Agent monitors the size of all event logs. If a log reaches a user-defined threshold/trigger condition the log is transferred to the Secure Log Manager Collector on a central management platform using a secure store and forward mechanism. Alternatively the transfer of logs, on both Windows and UNIX, can be triggered by time, this can be at specified times, days of week, days of month 15. What are the components of Secure Log Manager Secure Log Manager implements a 3-tier architecture. On each system to be managed an Agent is installed, the agent is configured with the name of the system running the Secure Log Collector. The Collector provides the agents management and data management for Secure Log Manager and uses an ODBC database, at first release this will be an Access database and subsequent releases will support SQL Server and Oracle. The Collector is the middle tier of Secure Log Manager. One or more Consoles can connect to the Collector. Frequently Asked Questions Page 3
5 16. What is the Architecture of SLM? 17. SLM consists of the following components: Consoles - Providing a user friendly graphical interface Collector - The data storage and management component Agents - Agent(s) installed on each system to be managed 18. What is an SLM Agent? The SLM Agent is installed on each system that requires log management. The agent monitors the logs and on detection of a trigger condition will initiate the transfer of a log to the collector using a secure store and forward mechanism. Each Agent has a 'heart beat' to the Collector, the frequency being a user defined value, which allows the console to display the connection status of each Windows system being managed. Additionally, in order to ensure the integrity of the Agent, each Windows SLM Agent will initiate a self-check on a regular basis and raise a high priority alert if it detects an integrity failure. 19. What is an SLM Collector? The SLM Collector collects incoming event log files and stores them in the 'central' store. The Collector manages the data stores; these are the flat file folders and ODBC database. SLM can use MS Access, SQL Server and Oracle as its ODBC database. An optional part of the Collector is the Event Loader, which can automatically load log data onto the ODBC database on receipt from agents. A Log Browser for UNIX logs is also included as part of the Collector. The Collector includes facilities for alert management and ODBC output of NT Event Logs. 20. What is an SLM Console? The Console provides the user interface to SLM and enables log management, alert management and reporting which includes graphical reporting and trend analysis. Management reports are available showing statistics such as elapsed time from alert generation to closure. Frequently Asked Questions Page 4
6 21. What does the SLM Console User interface provide? The SLM Console provides a User Interface, which supports: Hierarchical tree view of managed SLM systems, their connection status and 'heart beat' status. Log alert notification Alert acknowledgement Simple Log browsing of Windows logs Selection of Windows log events for export to the query database Pre-defined reports and graphs on alerts and events in the query database using 'Crystal Reports Several Consoles may be run concurrently, with each connecting to the Collector and having direct or network access to the Collectors shared drive. A simple log viewer is provided at this release for UNIX logs. 22. Which Platforms supported at release SLM 1.0? Console: Windows NT 4 only Collector: Windows NT 4 only Database: Access, SQL Server, Oracle Agents: Windows NT 4, Windows 2000, Solaris 2.6, 7, 8, HP-UX and How is SLM licensed? Secure Log Manager uses the standard ISS key mechanism. The Collector is the 'controlled' Secure Log Manager component and uses a standard ISS key file. The ISS key file must include the IP address of the system on which the Collector is installed and the number of agents to be supported by the Collector. The Console and Agents do not require and ISS.KEY file. Note: This IP address for the Collector can be an address range. The IP addresses of the system on which agents are to be installed are not required. 24. Do I need a Licence to do an Evaluation? NO - For product evaluations a single agent installation can be created which does not require an ISS key. The agent must be installed on the same system as the Collector. 25. What are Secure Log Manager main features and functions? Secure Log Manager (SLM) provides log management for large communities of Systems Servers and Workstation, Windows or UNIX. Secure Log Manager ensures the continuity of system log data by collecting the data into a central point, in a secure and forensically sound way, where it may be used for later analysis or forensic investigation. Secure Log Manager securely collects logs from enterprise wide systems to a secure central system. Logs can be exported to an ODBC database for analysis and can also be archived to secure long terms storage. All of the handling of the logs preserves the original format so that they are suitable, if required, for forensic analysis. On Windows Secure Log Manager is installed using 'Install Shield ' it supports full Microsoft SMS integration for rollout and update. On UNIX simple scripts are provided for local and remote silent installation. Reporting, using 'Crystal Reports ', provides a number of standard reports and includes simple analysis of Windows Logs. Frequently Asked Questions Page 5
7 26. What is a typical Secure Log Manager installation? The Secure Log Manager installation consists of any number of Agent systems (Windows and UNIX) managed by a single Windows NT based Collector system with one or more Consoles. A Console can be installed on the Collector system or on remote Windows Systems. The Collector and Agents can run on either NT servers or workstations although for performance and connectivity reasons it is recommended that the Collector be run on an appropriately sized server together with an appropriate ODBC database. The number of Agents that can be supported by one Collector is restricted only by system constraints. 27. What Network Security is provided? The Collector is authenticated to the Agents via SSL 3.0, using 1024-bit DSS certificates, with all subsequent traffic between Agent and Collector being encrypted with 168-bit Triple DES. This ensures that the agents will not leak information on security vulnerabilities to malicious third parties. Control communications between the Consoles and Collector is via DCOM and may be optionally encrypted at the packet level using the standard DCOM facilities and NT Security Service Providers. 28. What Log Transfer options are available? Logs will be transferred to the collector: When the log size reaches a configurable percentage full, i.e. 75% At a configurable times of day, days of the week, days of the month These transfer criteria may be configured separately for each type of log. 29. Does SLM clear the logs? Before a log is transferred to the Collector it is copied to temporary store on the agents, the system s log is cleared down, preventing the loss of events that could occur if the log became full. 30. Does SLM do authentications? YES - Before any data is transferred, both the Agent and Collector confirm that the remote party is valid. Both parties also maintain sequence numbers for all system log types, so that out-of-sequence transfers can be detected. 31. Does SLM do Encryption? YES - Secure Log Manager uses an encryption algorithm for all network transfers. To further improve security, encryption keys are changed after every file transfer. 32. Does SLM consolidate data from all agents? YES - Transfer of the collected data into an ODBC database allows the consolidation, correlation and analysis of logs across the whole enterprise. 33. What does SLM do with Message Strings Files? For Windows Event Logs in order to allow the Secure Log Manager Console to display the text associated with any event ID, Secure Log Manager transfers all files containing message strings to the collector along with the Event Log files. To minimize the amount of data transferred, each file is only transferred once. Frequently Asked Questions Page 6
8 34. How does SLM transfer logs to the Collector? SLM uses a secure Store & Forward mechanism. Before transfer to the Collector, the Agent copies all log data to a spool area. Data files are only deleted from the spool area once the Collector has confirmed that the files have been correctly received and stored to disk. The Collector verifies that sufficient disk space is available before allowing the transfer of any file. 35. How does the Store and Forward work? Spooling when a log matches the transfer criteria, the Agent performs a Backup & Clear operation on the log, resulting in the log being copied to the spool area and then cleared down. A control file is generated to hold system-specific information referenced by the event log. Any message files referenced by the event log are also copied to the spool area, though each file is only transferred to the Collector once. Forwarding The Agent attempts to connect to the Secure Log Manager Collector using a secure protocol over a named pipe on Windows or sockets on UNIX. Each set of files in the spool area is forwarded to the Collector. When the Collector acknowledges the receipt of the entire set of files the spooled copy is removed. Storing The Collector stores received sets of files in a directory hierarchy representing the managed network of systems. The stored event logs can then be viewed using the Secure Log Manager Console. 36. Where can I get more information about SLM? Contact you ISS Sales representative or visit the ISS web site at Where can I get the Secure Log Manager software? Contact you ISS Sales representative or visit the ISS web site at About Internet Security Systems (ISS) Internet Security Systems, Inc. (ISS) (Nasdaq: ISSX) is the leading global provider of security management solutions for the Internet. ISS protects critical information and network resources from attack and misuse. By combining best of breed software products, market-leading managed security services, aggressive research and development, and comprehensive educational and consulting services, ISS is the trusted security provider for thousands of customers around the world. Copyright , Internet Security Systems, Inc. All rights reserved worldwide. Internet Security Systems, the Internet Security Systems logo, and The Power To Protect are trademarks and service marks of Internet Security Systems, Inc. Other trademarks and trade names mentioned are marks and names of their owners as indicated. All trademarks are the property of their respective owners and are used here in an editorial context without intent of infringement. Specifications and content are subject to change without notice. Frequently Asked Questions Page 7
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationLotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
More informationLT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide
LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...
More informationGFI Product Manual. Deployment Guide
GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
More informationLT Auditor+ for Windows
LT Auditor+ for Windows Quick Start Guide Documentation issue: 5.3 Copyright Blue Lance Inc. Distributed by: LT Auditor+ for Windows: Overview LT Auditor+ is a security software application that provides
More informationKASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
More informationHP Business Availability Center
HP Business Availability Center for the Windows and Solaris operating systems Software Version: 8.05 Business Process Monitor Administration Document Release Date:September 2010 Software Release Date:
More informationPATROL Console Server and RTserver Getting Started
PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
More informationMGC WebCommander Web Server Manager
MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information
More informationetrust Audit Using the Recorder for Check Point FireWall-1 1.5
etrust Audit Using the Recorder for Check Point FireWall-1 1.5 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational
More informationFEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
More informationIBM RealSecure Server Sensor System Requirements
IBM Internet Security Systems IBM RealSecure Server Sensor System Requirements Contents of This Document This document describes the system requirements for the current versions of IBM RealSecure Server
More informationNetwrix Auditor for Windows Server
Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationGlobal PRO. NetScreen-Global PRO Security Management Systems
Global PRO NetScreen-Global PRO Security Management Systems At a glance Easy to use policy management Manage tens to thousands of devices and security policies via a distributed management system Scalability
More informationData Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology
Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationNCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and
More informationHow To Restore An Org Server With Anor Backup For Windows 7.5.2 (Oracle)
Oracle Server Backup User Guide TABLE OF CONTENTS Introduction... 2 Oracle Server Backup... 3 Features... 3 Requirements for Oracle server backup... 3 How to enable ARCHIVELOG Mode... 3 System Requirements...
More informationHardware Requirements
300-6400 Roberts Street Burnaby BC V5G 4C9 300-6400 Roberts Street Burnaby BC V5G 4C9 Hardware Requirements Version 5.2: Last revised May 5, 2005 Microsoft, Windows and the Windows logo are trademarks,
More informationInstalling Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
More informationProactively Managing Your NT Infrastructure with Event Log Monitor. TNT Software
Challenges of Administering Windows NT/2000 Single system providing critical services Internet server in DMZ (e.g., FTP, HTTP, SMTP) Corporate File & Print, Email or Database Server Other critical island
More informationFREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
More informationEventTracker Enterprise v7.3 Installation Guide
EventTracker Enterprise v7.3 Installation Guide Publication Date: Sep 11, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help the users to install
More informationDiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
More informationEnterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
More informationCA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICE CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft SQL Server Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
More informationCompaq Batch Scheduler for Windows NT
Compaq Batch Scheduler for Windows NT Mainframe-Caliber Automated Job Scheduling Software for Windows NT This white paper addresses extending the capabilities of Windows NT to include automated job scheduling
More informationHYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2
HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and
More informationadministrator are Console Users that can log on to the Web Management console and
Q and A Can I control what ObserveIT records? Yes, within the Web Console it is possible to define what the Agent records. By using inclusion or exclusion, you can control many aspects of the recording
More informationNetwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
More informationLepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
More informationCimTrak Integrity & Compliance Suite 2.0.6.19
CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console App Server File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface
More informationIBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
More informationActive Directory Adapter with 64-bit Support Installation and Configuration Guide
IBM Security Identity Manager Version 6.0 Active Directory Adapter with 64-bit Support Installation and Configuration Guide SC27-4384-02 IBM Security Identity Manager Version 6.0 Active Directory Adapter
More informationSystem Requirements - CommNet Server
System Requirements - CommNet Page 1 of 11 System Requirements - CommNet The following requirements are for the CommNet : Operating System Processors Microsoft with Service Pack 4 Microsoft Advanced with
More informationIBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1
IBM Proventia Management SiteProtector Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1 Copyright Statement Copyright IBM Corporation 1994, 2010. IBM Global Services Route
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationWEB COMPAS MINIMUM HOSTING REQUIREMENTS
WEB COMPAS MINIMUM HOSTING REQUIREMENTS For Additional Support: Northpointe Institute for Public Management T: 231.938.5959 F: 231.938.5995 www.npipm.com support@npipm.com Adult COMPAS Web Application
More informationfeatures at a glance
hp availability stats and performance software network and system monitoring for hp NonStop servers a product description from hp features at a glance Online monitoring of object status and performance
More informationGetting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers
Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec
More informationServer Manager Help 10/6/2014 1
Server Manager Help 10/6/2014 1 Table of Contents Server Manager Help... 1 Getting Started... 7 About SpectorSoft Server Manager... 8 Client Server Architecture... 9 System Requirements... 10 Screencasts...
More informationMS SQL Server Backup - User Guide
MS SQL Server Backup - User Guide TABLE OF CONTENTS Introduction... 1 Features... 1 System Requirements... 1 MS SQL Server Backup... 2 Accessing SQL Server Backup... 2 MS SQL Server Restore... 6 Accessing
More informationTREND MICROTM ServerProtectTM for EMC Celerra TM
TREND MICROTM ServerProtectTM for EMC Celerra TM Filers Getting Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
More informationWeb Filter. SurfControl Web Filter 5.0 Installation Guide. www.surfcontrol.com. The World s #1 Web & E-mail Filtering Company
Web Filter SurfControl Web Filter 5.0 Installation Guide www.surfcontrol.com The World s #1 Web & E-mail Filtering Company NOTICES NOTICES Copyright 2005 SurfControl plc. All rights reserved. No part
More informationSTEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended
More informationQuest InTrust. Version 8.0. What's New. Active Directory Exchange Windows
Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest
More informationSymantec NetBackup Getting Started Guide. Release 7.1
Symantec NetBackup Getting Started Guide Release 7.1 21159722 Contents NetBackup Getting Started Guide... 5 About NetBackup... 5 How a NetBackup system works... 6 How to make a NetBackup system work for
More informationQACenter Installation and Configuration Guide. Release 4.4.2
QACenter Installation and Configuration Guide Release 4.4.2 ii Please direct questions about QACenter or comments on this document to: QACenter Technical Support Compuware Corporation 31440 Northwestern
More informationBillQuick Web i Time and Expense User Guide
BillQuick Web i Time and Expense User Guide BQE Software Inc. 1852 Lomita Boulevard Lomita, California 90717 USA http://www.bqe.com Table of Contents INTRODUCTION TO BILLQUICK... 3 INTRODUCTION TO BILLQUICK
More informationAltiris Helpdesk Solution 6.0 SP5 Product Guide
Altiris Helpdesk Solution 6.0 SP5 Product Guide Notice Helpdesk Solution 6.0 SP5 2000-2007 Altiris, Inc. All rights reserved. Document Date: August 29, 2007 Information in this document: (i) is provided
More informationNetwrix Auditor for File Servers
Netwrix Auditor for File Servers Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationHeroix Longitude Quick Start Guide V7.1
Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: support@heroix.com Notice Heroix provides
More informationAVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationHSLAB Print Logger 5 Installation Guide
HSLAB Print Logger 5 Installation Guide NOTE: Information and screen shots in this document are related to the Print Logger EE edition. In different editions some features may be not available. See editions
More informationTable Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
More informationInstallation and System Configuration Version 7.0
Installation and System Configuration Version 7.0 Sage MAS 500 ERP 4AIN1050-0905 1996-2005 Sage Software, Inc. All rights reserved. The Sage Software logo and the Sage Software product and service names
More informationInstallation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
More informationIBM RealSecure Server Sensor System Requirements
IBM RealSecure Server Sensor System Requirements Contents of This Document This document describes the system requirements for the current versions of IBM RealSecure Server Sensor components. Overview
More informationALTIRIS HELPDESK SOLUTION 6.0 SP2 PRODUCT GUIDE
ALTIRIS HELPDESK SOLUTION 6.0 SP2 PRODUCT GUIDE Notice Copyright 2000-2005 Altiris Inc. All rights reserved. Product Version: 6.0 Document Date: January 31, 2005 Bootworks U.S. Patent No. 5,764,593. RapiDeploy
More informationTotal Protection for Enterprise-Advanced
System Requirements Total Protection for Enterprise-Advanced One integrated solution, one console, proven comprehensive protection McAfee Alert Manager 4.7.1 Free disk space 1.5 MB (complete installation)
More informationIBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support
Software Announcement June 1, 2004 Services Expedite software adds Secure Sockets Layer TCP/IP support Overview Services Expedite software for Microsoft Windows, AIX, and OS/400 is being enhanced to support
More informationWHITE PAPER September 2012. CA Nimsoft Monitor for Servers
WHITE PAPER September 2012 CA Nimsoft Monitor for Servers Table of Contents CA Nimsoft Monitor for servers 3 solution overview CA Nimsoft Monitor service-centric 5 server monitoring CA Nimsoft Monitor
More informationStep-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet
Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from
More informationUpgrade Guide. Upgrading to EventTracker v6.0. Upgrade Guide. 6990 Columbia Gateway Drive, Suite 250 Publication Date: Sep 20, 2007.
Upgrading to EventTracker v6.0 Upgrade Guide 6990 Columbia Gateway Drive, Suite 250 Publication Date: Sep 20, 2007 Columbia MD 21046 877.333.1433 Abstract The purpose of this document is to help users
More informationAudit Management Reference
www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationRelease notes. Symantec Event Manager for Firewall. What s new. System requirements
Release notes Symantec Event Manager for Firewall What s new Symantec Event Manager for Firewall provides centralized logging, alerting, and reporting across Symantec s enterprise firewall protection solutions.
More informationNETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationInstallation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
More informationIntrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
More informationRequirements & Install. Module 2 Single Engine Installation
Requirements & Install Module 2 Single Engine Installation Requirements Requirement Minimum Optimum Processor Intel Core 2 @ 2GHz Dual Processor Xeon 3.0 GHz Memory 2 GB RAM 8 GB RAM Disk Space 2 GB 5GB
More informationHP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
More informationPC-Duo Web Console Installation Guide
PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks
More informationSynergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 20150330
Synergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 20150330 CONTENTS Contents... 2 Overview... 2 Adept Server... 3 Adept
More informationQuick Start - NetApp File Archiver
Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS GETTING STARTED Upgrade Configuration Archive Recover Page 1 of 14 Overview - NetApp File Archiver Agent TABLE OF CONTENTS
More informationSymantec AntiVirus for Network Attached Storage 5.1
Getting Started Symantec AntiVirus for Network Attached Storage 5.1 This chapter includes the following topics: About Symantec AntiVirus for Network Attached Storage 5.1 About documentation What s new
More informationAdept 2014 System Requirements
Synergis Software 200 Kelly Road, Quakertown, PA 18951 +1 215.302.3000, 800.836.5440 www.synergissoftware.com version 080613 This document provides an overview of the Adept 2014 System requirements to
More information24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
More informationGetting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
More informationCisco Adaptive Security Device Manager Version 5.2F for Cisco Firewall Services Module Software Version 3.2
Cisco Adaptive Security Device Manager Version 5.2F for Cisco Firewall Services Module Software Version 3.2 Cisco Adaptive Security Device Manager (ASDM) delivers world-class security management and monitoring
More informationVector Asset Management User Manual
Vector Asset Management User Manual This manual describes how to set up Vector Asset Management 6.0. It describes how to use the: Vector AM Console Vector AM Client Hardware Inventory Software Inventory
More informationMGC WebCommander Web Server Manager
MGC WebCommander Web Server Manager Installation and Configuration Guide Version 9.0 Copyright 2007 Polycom, Inc. All Rights Reserved Catalog No. DOC2138C Version 9.0 Proprietary and Confidential The information
More informationFile Auditor for NAS, Net App Edition
File Auditor for NAS, Net App Edition Installation Guide Revision 1.2 - July 2015 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for
More informationHP OpenView Service Desk
HP OpenView Service Desk Installation Guide Software Version: 5.10 For Windows and UNIX Operating Systems Manufacturing Part Number: None Document Release Date: April 2007 Software Release Date: August
More informationCentreWare for Microsoft Operations Manager. User Guide
CentreWare for Microsoft Operations Manager User Guide Copyright 2006 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information
More informationWeb Server (IIS) Requirements
Web Server (IIS) Requirements Important! The Web Server (IIS) cannot be the primary or backup domain controller. Operating System Windows Server 2012 R2 Windows Server 2008 R2 (64-bit with IIS running
More informationVersion 5.12 December 2014 702P02896. Xerox CentreWare Web Installation Guide
Version 5.12 December 2014 702P02896 Xerox CentreWare Web 2014 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and CentreWare are trademarks of Xerox Corporation in the United States and/or
More informationMRI Commercial. MRI Residential. CRE Manager. Windows Version 4.0 Installation Guide
MRI Commercial MRI Residential CRE Manager Windows Version 4.0 Installation Guide Stock Number: IG40WIN March 2007 2007 Intuit Inc. Any unauthorized use or reproduction of this documentation is strictly
More informationLANDESK Service Desk. Desktop Manager
LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,
More informationCentral Security Server
Central Security Server Installation and Administration Guide Release 12.3 Please direct questions about {Compuware Product} or comments on this document to: Customer Support https://community.compuwareapm.com/community/display/support
More informationA CrossTec Corporation. Instructional Setup Guide. Activeworx Security Center Quick Install Guide
A CrossTec Corporation Instructional Setup Guide Activeworx Security Center Quick Install Guide PREPARED BY GARY CONKLE Activeworx Basic Installation and Configuration Guide CrossTec Corporation 500 NE
More informationSetting up an MS SQL Server for IGSS
Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3
More informationCimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
More informationExploiting the Web with Tivoli Storage Manager
Exploiting the Web with Tivoli Storage Manager Oxford University ADSM Symposium 29th Sept. - 1st Oct. 1999 Roland Leins, IBM ITSO Center - San Jose leins@us.ibm.com Agenda The Web Client Concept Tivoli
More informationAsta Powerproject Enterprise
Asta Powerproject Enterprise Overview and System Requirements Guide Asta Development plc Kingston House Goodsons Mews Wellington Street Thame Oxfordshire OX9 3BX United Kingdom Tel: +44 (0)1844 261700
More informationFile System Auditor Release Notes
File System Auditor Release Notes WHAT'S NEW IN FILE SYSTEM AUDITOR? To see what is new in File System Auditor, please see article Q14974 INFO: File System Auditor 2.x Version History in the ScriptLogic
More informationIP-guard 3 User Manual v2.0
IP-guard 3 User Manual v2.0 Copyright TEC Solutions Limited. All rights reserved. v2.0rev20111208 Copyright Copyright Copyright 2008 TEC Solutions Limited. All rights reserved. No part of this document
More informationPayment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)
Payment Card Industry Data Security Standard (PCI / DSS) InterSect Alliance International Pty Ltd Page 1 of 12 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance
More information