All about auditing in the Informix Server. Mark Jamison IBM Session F08
|
|
|
- Gwendolyn Weaver
- 9 years ago
- Views:
Transcription
1 All about auditing in the Informix Server Mark Jamison IBM Session F08 1
2 Agenda Audit Overview Who to Audit What to Audit What to do with Audit Log Files Other Ways to Audit What NOT to do and Why 2
3 Audit Overview IDS Audit is based on EVENTS and USERS. Configurat ion file $INFORMIXDIR/aaodir/adt cfg[.nn] AD TM O D E 1 # Auditing m ode AD TPATH /auditlog # D irectory w here audit trails w illbe w ritten AD TSIZE # M axim um size of any single audit trailfile AD TERR 0 # Error m ode onaudit Change/view audit configurat ion Creat e/modify audit masks onshowaudit Show audit log dat a 3
4 Audit Tasks and Roles Audit is based on events Detailed in Appendix A Security Guide There are lots of events masks help manage them DBSSO - Database System Security Officer Defines/maint ains audit masks onaudit group of dbssodir defines role default informix AAO Audit Analysis Officer turns auditing on and off sets up and maintains the audit configuration reads and analyzes audit-trail data onshowaudit group of aaodir defines role default informix 4
5 Audit Configurat ion INFORMIXDIR/aaodir/adt cfg file AD TM O D E 1 # Auditing m ode AD TPATH /auditlog # D irectory w here audit logs w illbe w ritten AD TSIZE # M axim um size of any single audit trailfile AD TERR 0 AD TRO W S 0 # Row levelaudit m ode If you make a change using onaudit, new file will be adt cfg.nn where nn is t he SERVERNUM from ONCONFIG On server startup, server will look for adtcfg.nn first. Changes you make will persist. Multiple IDS instances running from same INFORMIXDIR will have their own audit configurat ion. Make sure t hat ADTPATH is secure no world access Show current audit configurat ion onaudit -c 5
6 ADTMODE 0 = auditing disabled 1 = auditing on 3 = auditing on; audits all DBSSO actions 5 = auditing on; audits all DBSA actions 7 = auditing on; audits all DBSSO and DBSA actions 11.x OS Audit ing (ADTMODE 2,4,6,8) no longer support ed When DBSSO and/or DBSA actions are being audited, ALL their event s are audit ed, masks do NOT apply i.e. event s in _exclude mask are st ill audit ed If <user> is DBSA, <user> mask is ignored 6
7 Audit Log Files Audit log files are named DBSERVERNAME.nn DBSERVERNAME from ONCONFIG When t he file reaches ADTSIZE, t he next log file is creat ed (nn+1) IF that file already exists, the number is skipped. This process is repeat ed unt il an unused name is found. Audit will NOT write on top of existing files. When the server is restarted, it will always try to start with file.0 If you have existing audit log files, they will all be skipped and you will be back where you left off. HOWEVER If you remove old audit log files IDS will start at 0. It doesn t do any good to leave the last file when you cleanup. Audit log files should be backed up. They compress easily 7
8 Who to Audit All DBSA actions should probably be audited. This means that the DBSA should be not be accessing the data ADTMODE 5 or 7 All DBSSO actions should probably be audited. ADTMODE 3 or 7 Users with special access. _default audit mask _rolename audit mask 8
9 Audit Masks Only the DBSSO can make audit masks Template mask names start with _ (underscore) character. Up to 8 characters. onaudit a u _dbuser e CRTB,ALTB,DRTB There are 3 defined global masks _default _require _exclude They must be created to have values, by default they are empty Display exist ing audit masks onaudit -o 9
10 Audit USER masks After you make template masks you can use these to make individual user masks. A user uses their named audit mask. if it doesn t exist, use _default onaudit a u user r basemask e [+-]CRTB,ALTB,DRTB Fevent = only FAILED event Sevent = only SUCCESSFUL event event = Fevent + Sevent [+]event adds event -event removes event The audit mask used for a session is calculated at the beginning of the session. (user or _default) + _require - _exclude 10
11 What to Audit Which events are audited is controlled by audit masks. If you were to enable ALL the audit events: In normal operation 98%+ of events are going to be: RDRW, INRW, UPRW, DLRW row level mnemonics Overhead for the vast amount of events is small. You should audit the events you consider important. 11
12 ADTROW S configuration parameter to cont rol select ive row-level audit ing of t ables 0 for auditing row-level events on all tables 1 to allow control of which tables are audited. Row-level events DLRW, INRW, RDRW, and UPRW are audited only on tables for which the AUDIT flag is set 2 to turn on selective row-level auditing and also include t he primary key in audit records 12
13 For row-level audit control AUDIT must be enabled on the table. CREATE TABLE WITH AUDIT ALTER TABLE ADD AUDIT ALTER TABLE DROP AUDIT 13
14 What to do with the Audit Log Files Audit log files should be written to a secure directory only DBAAO need access Audit log files should be backed up prompt ly An excellent candidat e for compression Audit subsystem creates an event when a new log file is used This allows immediat e act ion on t he previous file Details about the Audit Trail Switch Event Alarm: Class ID: 72 Severit y: 3 Class Message: Audit trail is switched to a new file Message: This message displays when the database server switches to a new audit trail file. See t he event alarms document at ion in IBM Informix Dynamic Server Administ rat or s Reference 14
15 Audit Analysis - onshowaudit Only t he AAO can run onshowaudit The onshowaudit utility lets you extract information from an audit trail. You can direct this utility to extract information for a particular user or database server or both. This information enables you to isolate a particular subset of data from a pot ent ially large audit t rail. The records are formatted for output. By default, onshowaudit displays the extracted information on stdout You can redirect the formatted output to a file or pipe You can specify that onshowaudit reformat the output so you can load it into an Informix database table. onshowaudit - l 15
16 Audit Analysis - onshowaudit By default, onshowaudit looks in INFORMIXDIR/aaodir/adtcfg to find t he locat ion (ADTPATH) of t he audit log files. Caution: If you have made changes to the audit configuration using onaudit or if you have multiple server instances in the same INFORMIXDIR t his is probably NOT what you want. If you want the ADTPATH from adtcfg.<nn> onshowaudit n <nn> It also expects that ONCONFIG is set so it can find DBSERVERNAME, i.e. the audit log file base name. If you have audit log files from mult iple servers in t he same direct ory onshowaudit s <servername> 16
17 onshowaudit cont. You can use onshowaudit to see all the audit records for a part icular user. onshowaudit u username If you have more than one server with audit files in t he same direct ory. onshowaudit s server To look at the contents of a particular file onshowaudit f filename 17
18 Audit ing in Clust ers IDS 11 introduced the concept of Shared Disk Servers (SDS) Audit was enabled in t his configurat ion in xC6 Some differences: Audit Masks need only be created at the primary (or writable SDS) Audit configurat ion is independent for each node onaudit p l e n affects only 1 server. separat e servernum adt cfg.nn files. a single adtcfg can be used. Act ions are audit ed on t he server where t hey act ually occur. e.g. if a writable secondary executes insert into this is actually executed by a proxy thread on the primary. INRW audit record is in t he primary server s audit log file. Username and host name show t he act ual client informat ion. 18
19 St rat egies for Audit Analysis Event Failure The audit record could indicate that a user is attempting access sensitive data to which they do not have the correct privileges to access the data. Particular Events Creating and dropping databases could be an effort to copy sensitive data to an unprotected location. Database creator as DBA can grant access to anyone. Insider Attack Careful auditing might point out an attack in progress or provide evidence that a specific individual accessed t he disclosed informat ion. Browsing Users who search through stored data to locate or acquire information without a legit imat e need are browsing. 19
20 Other ways to Audit - Guardium Guardium provides the most widely-used solution for ensuring the integrity of corporate information and preventing information leaks from the data center. The enterprise security platform prevents unauthorized or suspicious activities by privileged insiders, potential hackers, and end-users of enterprise applications such as PeopleSoft, SAP, Business Intelligence, and in-house syst ems. At the same time, the Guardium solution optimizes operational efficiency with a scalable, multi-tier architecture that automates and centralizes compliance controls across your entire application and database infrastructure. 20
21 Guardium Guardium creates a continuous, fine-grained audit trail of all database activities, including the who, what, when, where, and how of each transaction. The Guardium solution contextually analyzes and filters this audit stream in real-time to provide proactive controls and deliver the specific information required by auditors. 21
22 Some alternatives to Audit that don t work St ored procedures wit h recording Easy to bypass especially on read. Select Triggers Easy t o evade Select Triggers. 22
23 IDS Securit y Guide Read and follow the IDS Security Guide ht t p://www-01.ibm.com/support/knowledgec 23
24 Questions? 24
Guardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
Enterprise Security Solutions
Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class
Guardium7: Windows Event Log Capture All files needed for this exercise are in the TSE FTP Folder : Run script: read_events.pl:
Guardium7: Windows Event Log Capture Guardium V7 - July 2009 Rodrigo Bisbal Highlights: Detect Active Directory account events such as: user creation, modification & deletion, failed domain logins, logins,
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
Application Monitoring for SAP
Application Monitoring for SAP Detect Fraud in Real-Time by Monitoring Application User Activities Highlights: Protects SAP data environments from fraud, external or internal attack, privilege abuse and
NIST 800-53 Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats
NIST 800-53 Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats Highlights Full suite of database security applications: Automate & simplify NIST 800-53 controls
Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions
Database Auditing & Security Brian Flasck - IBM Louise Joosse - BPSolutions Agenda Introduction Drivers for Better DB Security InfoSphere Guardium Solution Summary Netherlands Case Study The need for additional
Audit Trail Administration
Audit Trail Administration 0890431-030 August 2003 Copyright 2003 by Concurrent Computer Corporation. All rights reserved. This publication or any part thereof is intended for use with Concurrent Computer
Enterprise Database Security & Monitoring: Guardium Overview
Enterprise Database Security & Monitoring: Guardium Overview Phone: 781.487.9400 Email: [email protected] Guardium: Market-Proven Leadership Vision Enterprise platform for securing critical data across
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
IBM Sterling Control Center
IBM Sterling Control Center System Administration Guide Version 5.3 This edition applies to the 5.3 Version of IBM Sterling Control Center and to all subsequent releases and modifications until otherwise
Upgrade: SAP Mobile Platform Server for Windows SAP Mobile Platform 3.0 SP02
Upgrade: SAP Mobile Platform Server for Windows SAP Mobile Platform 3.0 SP02 Windows DOCUMENT ID: DC80003-01-0302-01 LAST REVISED: February 2014 Copyright 2014 by SAP AG or an SAP affiliate company. All
Obtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
Real-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
Oracle Database Security. Paul Needham Senior Director, Product Management Database Security
Oracle Database Security Paul Needham Senior Director, Product Management Database Security Safe Harbor Statement The following is intended to outline our general product direction. It is intended for
IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop
Planning a data security and auditing deployment for Hadoop 2 1 2 3 4 5 6 Introduction Architecture Plan Implement Operationalize Conclusion Key requirements for detecting data breaches and addressing
Securely maintaining sensitive financial and
How the Guardium Platform Helped Dell IT Simplify Enterprise security By Phil Neray Addison Lawrence David McMaster Venugopal Nonavinakere Safeguarding data is critical for many organizations, but auditing
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Solutions for securing and auditing Oracle database Edgars Ruņģis Technology Consultant Why Are Databases Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Enterprises
WebSphere Application Server security auditing
Copyright IBM Corporation 2008 All rights reserved IBM WebSphere Application Server V7 LAB EXERCISE WebSphere Application Server security auditing What this exercise is about... 1 Lab requirements... 1
User Guide. SysMan Utilities. By Sysgem AG
SysMan Utilities User Guide By Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective holders. 2013 Sysgem AG, Lavaterstr. 45, CH-8002 Zürich,
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Oracle Database Security
Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION
Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION MOST OF THE IMPORTANT DATA LOSS VECTORS DEPEND ON COPYING files in order to compromise
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
REPRINT. Release 1.22. Reference Manual. IBM iseries (AS/400) Developed and Distributed by
REPRINT Release 1.22 Reference Manual IBM iseries (AS/400) Developed and Distributed by WorksRight Software, Inc. P. O. Box 1156 Madison, Mississippi 39130 (601) 856-8337 FAX (601) 856-9432 Copyright WorksRight
Connector for Microsoft Office SharePoint Server. ados.com. www.therefore.net. 2009 Therefore Corporation, all rights reserved.
Connector for Microsoft Office SharePoint Server www.therefore.net ados.com CREDITS All rights reserved. No parts of this w ork may be reproduced in any form or by any means - graphic, electronic, or mechanical,
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER USER GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from NetWrix
Changing Passwords in Cisco Unity 8.x
CHAPTER 9 Changing Passwords in Cisco Unity 8.x This chapter contains the following sections: Changing Passwords for the Cisco Unity 8.x Service Accounts (Without Failover), page 9-1 Changing Passwords
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
REPRINT. Release 1.20 1.22. User s Guide. iseries (AS/400) Developed and Distributed by
REPRINT Release 1.20 1.22 User s Guide IBM IBM iseries iseries (AS/400) (AS/400) Developed and Distributed by WorksRight Software, Inc. P. O. Box 1156 Madison, Mississippi 39130 Phone (601) 856-8337 Fax
Oracle 11g Database Administration
Oracle 11g Database Administration Part 1: Oracle 11g Administration Workshop I A. Exploring the Oracle Database Architecture 1. Oracle Database Architecture Overview 2. Interacting with an Oracle Database
Fine Grained Auditing In Oracle 10G
Fine Grained Auditing In Oracle 10G Authored by: Meenakshi Srivastava ([email protected]) 2 Abstract The purpose of this document is to develop an understanding of Fine Grained Auditing(FGA)
Oracle Database Security Services
Oracle Database Security Services BUSINESS CHALLENGES Public announcements of major IT security breaches have become an almost daily occurrence. The causes of publicized breaches are diverse and include
PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.
PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements
An Oracle White Paper April 2014. Oracle Audit Vault and Database Firewall
An Oracle White Paper April 2014 Oracle Audit Vault and Database Firewall Introduction... 2 Oracle Audit Vault and Database Firewall Overview... 3 Auditing and Monitoring Overview... 3 Audit Vault... 4
Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska
Oracle Audit Vault and Database Firewall Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska The following is intended to outline our general product direction. It is intended for information
SQL Server Auditing. By Minette Steynberg. Audit all SQL Server activities using ApexSQL Comply
By Minette Steynberg Contents Introduction... 2 Auditing in SQL Server prior to 2008... 2 Auditing in SQL Server 2008 onwards... 2 Extended Events... 2 Auditing Components... 3 The Server Audit... 3 Audit
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Standard: Event Monitoring
Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information
8 Steps to Holistic Database Security
Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security
McAfee Network Threat Response (NTR) 4.0
McAfee Network Threat Response (NTR) 4.0 Configuring Automated Reporting and Alerting Automated reporting is supported with introduction of NTR 4.0 and designed to send automated reports via existing SMTP
Monitoring Server File Integrity With CloudPassage Halo
Contents: Monitoring Server File Integrity With CloudPassage Halo How File Integrity Monitoring Works Run a File Integrity Scan 1. Define a Server Group to Scan 2. Create or Clone a File Integrity Policy
Objectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
How To Manage A Database With Infosphere Guardium
IBM InfoSphere Guardium Managing the entire database security and compliance life cycle Leading organizations across the world trust IBM to secure their critical enterprise data. The fact is, we provide
HP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
EVENT LOG MANAGEMENT...
Event Log Management EVENT LOG MANAGEMENT... 1 Overview... 1 Application Event Logs... 3 Security Event Logs... 3 System Event Logs... 3 Other Event Logs... 4 Windows Update Event Logs... 6 Syslog... 6
How to test and debug an ASP.NET application
Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult
Information Technology Policy
Information Technology Policy Enterprise Web Application Firewall ITP Number ITP-SEC004 Category Recommended Policy Contact [email protected] Effective Date January 15, 2010 Supersedes Scheduled Review
EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE
EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE A reliable, high-performance network is critical to your IT infrastructure and organization. Equally important to network performance
SQL Server 2008 Administration
SQL Server 2008 Administration Real World Skills for ITP Certification and Beyond Tom Carpenter WILEY Wiley Publishing, Inc. Contents Introduction xxi Part i Introducing SQL Server 2008 1 Chapter 1 Understanding
Sophos Endpoint Security and Control Help. Product version: 11
Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About
Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security
Database Security & Compliance with Audit Vault and Database Firewall Pierre Leon Database Security 1 Topics Encryption Authentication Authorising highly privileged users Access control by data classification
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Encrypting Informix Connections with SSL Prot ocol. Yunming Wang IBM
Encrypting Informix Connections with SSL Prot ocol Yunming Wang IBM 1 Agenda Introduction to SSL and IBM GSKit Configuring Informix Server for SSL Configuring HA Cluster connections for SSL Configuring
Feature. Multiagent Model for System User Access Rights Audit
Feature Christopher A. Moturi is the head of School of Computing and Informatics at the University of Nairobi (Kenya) and has more than 20 years of experience teaching and researching on databases and
Configuration and Utilization of the OLAP Cache to Improve the Query Response Time
Configuration and Utilization of the OLAP Cache to Improve the Query Response Time Applies to: SAP NetWeaver BW 7.0 Summary This paper outlines the steps to improve the Query response time by using the
Using Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
Tivoli Storage Manager Lunch and Learn Bare Metal Restore Dave Daun, IBM Advanced Technical Support
IBM Software Group Tivoli Storage Manager Lunch and Learn Bare Metal Restore Dave Daun, IBM Advanced Technical Support July, 2003 Advanced Technical Support Agenda Bare Metal Restore Basics Windows Automated
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
2015-16 BUDGET CALL Quick Reference Guide
2015-16 BUDGET CALL Quick Reference Guide Finance Department January 2015 This document is also available online at www.yorku.ca/finance/ TABLE OF CONTENTS Introduction... 2 Budget Submission Due Date...
SonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
Auditing UML Models. This booklet explains the Auditing feature of Enterprise Architect. Copyright 1998-2010 Sparx Systems Pty Ltd
Auditing UML Models Enterprise Architect is an intuitive, flexible and powerful UML analysis and design tool for building robust and maintainable software. This booklet explains the Auditing feature of
Overview. Edvantage Security
Overview West Virginia Department of Education (WVDE) is required by law to collect and store student and educator records, and takes seriously its obligations to secure information systems and protect
Wanos on Hyper-V Comprehensive guide for a complete lab
Wanos on Hyper-V Comprehensive guide for a complete lab This document will guide the user in setting up a Wanos appliance using Hyper-V on a Microsoft Windows Server 2012 R2. Four Virtual Machines will
Time Matters and Billing Matters Administration Guide
Time Matters and Billing Matters Administration Guide Version 14.1 2015 LexisNexis. All rights reserved. Copyright and Trademark LexisNexis, Lexis, and the Knowledge Burst logo are registered trademarks
Oracle Database 11g: Security. What you will learn:
Oracle Database 11g: Security What you will learn: In Oracle Database 11g: Security course students learn how they can use Oracle database features to meet the security, privacy and compliance requirements
Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
Dynamic Workload Console User s Guide
IBM Tivoli Workload Automation Dynamic Workload Console User s Guide Version 9 Release 1 IBM Tivoli Workload Automation Dynamic Workload Console User s Guide Version 9 Release 1 Note Before using this
Upgrade Guide BES12. Version 12.1
Upgrade Guide BES12 Version 12.1 Published: 2015-02-25 SWD-20150413111718083 Contents Supported upgrade environments...4 Upgrading from BES12 version 12.0 to BES12 version 12.1...5 Preupgrade tasks...5
Microsoft SQL Database
This TechNote applies to MaxSea TimeZero Navigator and Explorer v1.9.5 and above Description: MaxSea display the following error when starting (in Navigation or Home Planning): Resolution: MaxSea TimeZero
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Oracle Database 11g: Security
Oracle University Contact Us: +27 (0)11 319-4111 Oracle Database 11g: Security Duration: 5 Days What you will learn In Oracle Database 11g: Security course students learn how to use Oracle database features
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
ODEX Enterprise. Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2
ODEX Enterprise Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2 Copyright Data Interchange Plc Peterborough, England, 2013. All rights reserved. No part of this document may be disclosed
Onegini Token server / Web API Platform
Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s
IMF Tune v7.0 Backup, Restore, Replication
IMF Tune v7.0 Backup, Restore, Replication Contents WinDeveloper IMF Tune v7.0 Backup, Restore, Replication... 3 1. IMFTBak Requirements... 3 2. Using IMFTBak... 3 3. Backing-Up Configuration Settings...
Getting Started with Multitenancy SAP BI 4.1
September 9 11, 2013 Anaheim, California Getting Started with Multitenancy SAP BI 4.1 Christina Obry, SAP Learning Points Learn how to successfully implement the SAP BusinessObjects BI platform in a multitenant
Using Secure4Audit in an IRIX 6.5 Environment
Using Secure4Audit in an IRIX 6.5 Environment Overview... 3 Icons... 3 Installation Reminders... 4 A Very Brief Overview of IRIX System auditing... 5 Installing System Auditing... 5 The System Audit Directories...
WhiteWave's Integrated Managed File Transfer (MFT)
WhiteWave's Integrated Managed File Transfer (MFT) Spotlight on webmethods ActiveTransfer Scott Jaynes ecommerce Architect, WhiteWave Foods Ramesh Venkat Director, Product Management, Software AG 10/17/12
Configuring and Integrating Oracle
Configuring and Integrating Oracle The Basics of Oracle 3 Configuring SAM to Monitor an Oracle Database Server 4 This document includes basic information about Oracle and its role with SolarWinds SAM Adding
USM IT Security Council Guide for Security Event Logging. Version 1.1
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate
CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level. -ORACLE TIMESTEN 11gR1
CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level -ORACLE TIMESTEN 11gR1 CASE STUDY Oracle TimesTen In-Memory Database and Shared Disk HA Implementation
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive One of a series of InfoSphere Guardium Technical Talks Ernie Mancill Executive IT Specialist Logistics This tech talk is being recorded. If you
Scheduling in SAS 9.3
Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3
SteelEye Protection Suite for Windows Microsoft SQL Server Recovery Kit. Administration Guide
SteelEye Protection Suite for Windows Microsoft SQL Server Recovery Kit Administration Guide June 2013 This document and the information herein is the property of SIOS Technology Corp. (previously known
Custom Web ADI Integrators
Custom Web ADI Integrators John Peters JRPJR, Inc. [email protected] NorCal OAUG Training Day, Pres 5.12 John Peters, JRPJR, Inc. 1 Introduction John Peters, Independent Consulting in the SF Bay Area
Integrating VoltDB with Hadoop
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
NTP Software File Auditor for NAS, EMC Edition
NTP Software File Auditor for NAS, EMC Edition Installation Guide June 2012 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for NAS,
Best Practices. IBM Data Server Security. IBM Data Servers
IBM Data Servers Best Practices IBM Data Server Security Walid Rjaibi Senior Technical Staff Member Security Architect for DB2 LUW James Pickel Senior Technical Staff Member Security Architect for DB2
Auditing Data Access Without Bringing Your Database To Its Knees
Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda
