In this post we ll lock down the server even more, adding google authenticator and auditd.
|
|
|
- Derek Hudson
- 9 years ago
- Views:
Transcription
1 1 of 7 12/1/2014 1:14 PM This is some sort of part two of Creating a baseline Ubuntu server ( a baseline ubuntu server/), so read that first and check back afterwards. In this post we ll lock down the server even more, adding google authenticator and auditd. Let s start with modifying /etc/login.defs: LOG_OK_LOGINS yes SULOG_FILE /var/log/sulog Set the default shell to /bin/false in both /etc/default/useradd and /etc/adduser.conf. Modify /etc/skel/.bashrc: HISTSIZE=10 HISTFILESIZE=0 Stricter /etc/fstab mount options: ~# egrep v "# swap" /etc/fstab awk '{print $2,$4}' / errors=remount ro /boot defaults,nodev,nosuid,noexec /home defaults,nodev,nosuid,noexec /usr defaults,nodev /var/log defaults,nodev,noexec /tmp defaults,nosuid,nodev,noatime,size=100m,mode=1700 /var/tmp defaults,nosuid,nodev,noatime,noexec,size=100m,mode=1700 Remove suid bits: chmod s /bin/fusermount /bin/mount /bin/su /bin/umount /usr/bin /bsd write /usr/bin/chage /usr/bin/chfn /usr/bin/chsh /usr/bin/mlocate /usr/bin/mtr /usr/bin/newgrp /usr/bin/traceroute6.iputils /usr/bin/wall Verify that all network connected services except sshd are in Apparmor enforce mode with apparmor_status verbose
2 2 of 7 12/1/2014 1:14 PM netstat anlp inet We ll be using the Google authenticator for two factor authentication. sudo aptitude update && sudo aptitude install libpam googleauthenticator Run google authenticator as the user with sudo. Choose Disallow multiple uses of the same authentication token, Do not increase the time window and Enable rate limiting. Add auth required pam_google_authenticator.so to the top of the Primary block in /etc/pam.d/common auth Since we got an encrypted $HOME we need to move the pam_google_authenticator.so secret. auth required pam_google_authenticator.so secret=/etc/auth/${user} /.google_authenticator ( Set up the directories: ~# mkdir p /etc/auth/${user} ~# chmod 0755 /etc/auth ~# chown R ${USER}:${USER} /etc/auth/${user} ~# chmod R 0700 /etc/auth/${user} ~# cat /home/${user}/.google_authenticator > /etc/auth/${user} /.google_authenticator ~# chmod 0600 /etc/auth/${user}/.google_authenticator Don t forget to install and set up the Google authenticator app.
3 3 of 7 12/1/2014 1:14 PM And finally we ll install auditd The Linux Audit daemon. ~# sudo aptitude update && sudo aptitude install auditd Edit /etc/default/grub to include audit=1 as part of GRUB_CMDLINE_LINUX: GRUB_CMDLINE_LINUX="audit=1" ~# update grub Add auditd rules to /etc/audit/audit.rules: # # Rules grabbed from /4629/simple example auditd configuration ( exampleauditd configuration) # First rule delete all D # Increase the buffers to survive stress events. # Make this bigger for busy system # Increase the buffers to survive stress events. # Make this bigger for busy systems b 1024 ## special files a exit,always F arch=b64 S mknod S mknodat k specialfiles ## Mount operations a exit,always F arch=b64 S mount S umount2 k mount ## changes to the time ## a exit,always F arch=b64 S adjtimex S settimeofday S clock_settime k time ## cron configuration & scheduled jobs w /etc/cron.allow p wa k cron w /etc/cron.deny p wa k cron w /etc/cron.d/ p wa k cron w /etc/cron.daily/ p wa k cron w /etc/cron.hourly/ p wa k cron w /etc/cron.monthly/ p wa k cron w /etc/cron.weekly/ p wa k cron w /etc/crontab p wa k cron w /var/spool/cron/crontabs/ k cron ## user, group, password databases w /etc/group p wa k etcgroup w /etc/passwd p wa k etcpasswd w /etc/gshadow k etcgroup w /etc/shadow k etcpasswd w /etc/security/opasswd k opasswd
4 4 of 7 12/1/2014 1:14 PM ## monitor usage of passwd w /usr/bin/passwd p x k passwd_modification #Monitor for use of tools to change group identifiers w /usr/sbin/groupadd p x k group_modification w /usr/sbin/groupmod p x k group_modification w /usr/sbin/addgroup p x k group_modification w /usr/sbin/useradd p x k user_modification w /usr/sbin/usermod p x k user_modification w /usr/sbin/adduser p x k user_modification ## login configuration and information w /etc/login.defs p wa k login w /etc/securetty p wa k login w /var/log/faillog p wa k login w /var/log/lastlog p wa k login w /var/log/tallylog p wa k login ## network configuration w /etc/hosts p wa k hosts w /etc/network/ p wa k network ## system startup scripts w /etc/inittab p wa k init w /etc/init.d/ p wa k init w /etc/init/ p wa k init ## library search paths w /etc/ld.so.conf p wa k libpath ## local time zone w /etc/localtime p wa k localtime ## kernel parameters w /etc/sysctl.conf p wa k sysctl ## modprobe configuration w /etc/modprobe.conf p wa k modprobe ## pam configuration w /etc/pam.d/ p wa k pam w /etc/security/limits.conf p wa k pam w /etc/security/pam_env.conf p wa k pam w /etc/security/namespace.conf p wa k pam w /etc/security/namespace.init p wa k pam ## postfix configuration w /etc/aliases p wa k mail w /etc/postfix/ p wa k mail ## ssh configuration
5 5 of 7 12/1/2014 1:14 PM w /etc/ssh/sshd_config k sshd ## changes to hostname a exit,always F arch=b64 S sethostname k hostname ## changes to issue w /etc/issue p wa k etcissue w /etc/issue.net p wa k etcissue ## this was to noisy currently. # log all commands executed by an effective id of 0 aka root. a exit,always F arch=b64 F euid=0 S execve k rootcmd ## Capture all failures to access on critical elements a exit,always F arch=b64 S open F dir=/etc F success=0 k a exit,always F arch=b64 S open F dir=/bin F success=0 k a exit,always F arch=b64 S open F dir=/sbin F success=0 k a exit,always F arch=b64 S open F dir=/usr/bin F success=0 k a exit,always F arch=b64 S open F dir=/usr/sbin F success=0 k a exit,always F arch=b64 S open F dir=/var F success=0 k a exit,always F arch=b64 S open F dir=/home F success=0 k a exit,always F arch=b64 S open F dir=/srv F success=0 k ## Monitor for use of process ID change (switching accounts) applications w /bin/su p x k priv_esc w /usr/bin/sudo p x k priv_esc w /etc/sudoers p rw k priv_esc ## Monitor usage of commands to change power state w /sbin/shutdown p x k power w /sbin/poweroff p x k power w /sbin/reboot p x k power w /sbin/halt p x k power ## Make the configuration immutable # e 2 Uncomment e 2 only after you re happy with the logging.
6 6 of 7 12/1/2014 1:14 PM ( Recommended reading: CIS Ubuntu LTS Server Benchmark ( /ubuntu/cis_ubuntu_12.04_lts_server_benchmark_v1.0.0.pdf) [PDF] Guide to the Secure Configuration of Red Hat Enterprise Linux 5 ( guidei731.pdfhttp://) [PDF] PCI DSS v3.0 available at /documents.php ( /documents.php)
7 7 of 7 12/1/2014 1:14 PM BLOG AT WORDPRESS.COM. THE TONAL THEME. Follow Build a website with WordPress.com
## Remove any existing rules -D
This file contains a sample audit configuration. Combined with the system events that are audited by default, this set of rules causes audit to generate records for the auditable events specified by the
Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting
Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,
Network Infrastructure Security Recommendations
Hardening Red Hat Enterprise Linux Ensure that file systems with user-writeable directories (ie /home, /tmp, /var/tem) are mounted on separate partitions. Ensure updates are applied as soon as they become
Unit objectives IBM Power Systems
User-level security Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 9.0 Unit objectives After completing this unit, you should be able to: Describe
Intrusion Detection using the Linux Audit Framework. Stephen Quinney <[email protected]> School of Informatics University of Edinburgh
Intrusion Detection using the Linux Audit Framework Stephen Quinney School of Informatics University of Edinburgh the only secure computer is one that s unplugged... Two Distinct
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..
RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and
Distributed File System
Petru Maior University, Târgu-Mureș Science Department Information Technolgy Master Course Distributed File System Students: Bardosi Florin Cifor Crina Danciu Ioana Hintea Dan Alexandru Table of Contents
Local File Sharing in Linux
Local File Sharing in Linux Would you like to share files among multiple users on the same Linux system? Surprisingly, this is trickier to accomplish than it appears, so here is a method that works. The
How To Harden An Hp Server For A Long Time
Linux Security on HP Servers: General Security Topics Technical introduction This white paper discusses general security technologies available in Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise
Unifying Authorization Models
Unifying Authorization Models Merging /etc/group and 'Domain Users' Gerald Carter Centeris [email protected] http://www.samba.org/ Slide 1 Copyright G. Carter, 2006 Outline http://samba.org/~jerry/slides/lwny07_2up.pdf
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
Linux Server Configuration Guidelines
Linux Server Configuration Guidelines This document is meant to be a living document and intended to accompany more detailed, step- by- step resources. Suggestions in this document are taken from administrators
Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
CA and SSL Certificates
1 For this exercise you must again be root. Login and obtain root privileges: sudo su 2 Create a working directory only accessible to root: mkdir ~/ca cd ~/ca chmod og rwx. 3 Install openssl if necessary
# Windows Internet Name Serving Support Section: # WINS Support - Tells the NMBD component of Samba to enable its WINS Server ; wins support = no
Sample configuration file for the Samba suite for Debian GNU/Linux. This is the main Samba configuration file. You should read the smb.conf(5) manual page in order to understand the options listed here.
Linux System Administration. System Administration Tasks
System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,
USEFUL UNIX COMMANDS
cancel cat file USEFUL UNIX COMMANDS cancel print requested with lp Display the file cat file1 file2 > files Combine file1 and file2 into files cat file1 >> file2 chgrp [options] newgroup files Append
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Connectivity using ssh, rsync & vsftpd
Connectivity using ssh, rsync & vsftpd A Presentation for the 2005 Linux Server Boot Camp by David Brown David has 15 years of systems development experience with EDS, and has been writing Linux based
IT6204 Systems & Network Administration. (Optional)
Systems & Network Administration (Optional) INTRODUCTION This is one of the Optional courses designed for Semester 6 of the Bachelor of Information Technology Degree program. This course on Systems & Network
Auditing and Hardening Unix Systems Using CIS benchmarks on SUSE Linux
Auditing and Hardening Unix Systems Using CIS benchmarks on SUSE Linux André Carrington, P.Eng, CISSP, CISM Unix experience: 13 years SunOS; NeXTSTEP; Sun Interactive; Wyse Unix; BSD; Solaris; QNX; HP-UX;
Laboration 3 - Administration
Laboration 3 - Administration During this laboration we will learn how to install, configure and test servers that will allow you to have access remote machines, copy files between computers and file sharing.
Configuring Secure Linux Hosts
A Perspective on Practical Security 2005 by Landon Curt Noll BOSTON NEW YORK SAN FRANCISCO SACRAMENTO CHARLOTTE WASHINGTON DC Introduction Congratulations! You have just installed Linux; an Open Source
Firebird on Linux. Author: Philippe Makowski IBPhoenix Email: [email protected] Licence: Public Documentation License Date: 2011-11-22
Author: Philippe Makowski IBPhoenix Email: [email protected] Licence: Public Documentation License Date: 2011-11-22 How to install Project packages rpm tar.gz Distributions packages Build from sources
Configuring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
SAMBA SERVER (PDC) Samba is comprised of a suite of RPMs that come on the RHEL/Fedora CDs. The files are named:
SAMBA SERVER (PDC) INTRODUCTION Samba is a suite of utilities that allows your Linux box to share files and other resources, such as printers, with Windows boxes. This lesson describes how you can make
Samba. Samba. Samba 2.2.x. Limitations of Samba 2.2.x 1. Interoperating with Windows. Implements Microsoft s SMB protocol
Samba Samba Interoperating with Windows Nick Urbanik Copyright Conditions: GNU FDL (seehttp://www.gnu.org/licenses/fdl.html) A computing department Implements Microsoft s SMB protocol
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. IMPLEMENTING A WEB SERVER Apache Architecture Installing PHP Apache Configuration Files httpd.conf Server Settings httpd.conf Main
Linux Security Guidelines Document ID: GUI-0001
s Document ID: GUI-0001 Information Technology Protective Security Services Pte. Ltd. Block K, Information Technology And State Store Building, Jalan Gadong BE1110, Negara Brunei Darussalam Tel: +(673)
Likewise Security Benefits
Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers
Monitoring Clearswift Gateways with SCOM
Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue
A SHORT INTRODUCTION TO DUPLICITY WITH CLOUD OBJECT STORAGE. Version 1.12 2014-07-01
A SHORT INTRODUCTION TO DUPLICITY WITH CLOUD OBJECT STORAGE Version 1.12 2014-07-01 PAGE _ 2 TABLE OF CONTENTS 1. Introduction....Page 03 2. System Configuration....Page 04 3. Create Backup Script....Page
X-ROAD 5 SECURITY SERVER USER'S GUIDE
X-ROAD 5 SECURITY SERVER USER'S GUIDE 5.04 VERSION HISTORY DATE VERSION DESCRIPTION 28 Oct 2010 5.0 Initial version. 2 June 2011 5.01 Numerous amendments. 13 Aug 2012 5.02 Correction to the procedure Loading
Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.
Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students
Ubuntu Professional Training Course Overview (E-learning, Ubuntu 10.04 LTS)
Ubuntu Professional Training Course Overview (E-learning, Ubuntu 10.04 LTS) 1 of 7 Ubuntu Professional Course Overview (E-learning, Ubuntu 10.04 LTS) About the Course and Objectives The Ubuntu Professional
Basic Linux & Package Management. Original slides from GTFO Security
Basic Linux & Package Management Original slides from GTFO Security outline Linux What it is? Commands Filesystem / Shell Package Management Services run on Linux mail dns web central authentication router
Installation Guide for Basler pylon 2.3.x for Linux
Installation Guide for Basler pylon 2.3.x for Linux Version 2.3.x Document ID Number: AW00100401000 Revision Date: May 27, 2011 Subject to Change Without Notice Basler Vision Technologies Installation
NATIONAL POPULATION REGISTER (NPR)
NATIONAL POPULATION REGISTER (NPR) Project Name: NPR Version No: 1.0.0 Release Date: Group Name: NPR-ECIL Version Date: LINUX SERVER INSTALLATION AND CONFIGURATION FOR JAVA BASED NPR DATAENTRY SOFTWARE
CRYPTOCard Authentication. Using PAM for Linux and Solaris. Quick Start Guide. Copyright 2002-2003 CRYPTOCard Corporation All Rights Reserved 030428
CRYPTOCard Authentication Using PAM for Linux and Solaris Quick Start Guide Copyright 2002-2003 CRYPTOCard Corporation All Rights Reserved 030428 http://www.cryptocard.com Table of Contents CHANGE HISTORY...
HP Education Services
HP Education Services HP-UX Security (H3541S) Concerned about system security? HP s updated and enhanced HP-UX Security course can help you secure your systems and mitigate risks. Designed for experienced
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT EIGHT. Ubuntu Security. www.uscyberpatriot.org
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT EIGHT Ubuntu Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM
Nessus Training Session 2 - Scanning and Reporting
Nessus Training Session 2 - Scanning and Reporting Prepared by Ramsey Dow for NWACC Contents Configuring Ubuntu for Authenticated Scanning Configuring Windows for Authenticated Scanning
A candidate following a programme of learning leading to this unit will be able to:
Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install
TFS UnixControl White Paper
White Paper Consolidate and simplify UNIX system management with TFS UnixControl TFS Technology www.tfstech.com Table of Contents Overview 3 Introduction 3 TFS UnixControl Functionality 3 System Architecture
Ubuntu 12.04 Sever Administration
Ubuntu 12.04 Sever Administration 1. Introduction to Ubuntu Linux Ubuntu Server Ubuntu Server 12.04 Server Installation Alternatives and Options Server on the Desktop Installation Desktop on the server
Basic Installation of the Cisco Collection Manager
CHAPTER 3 Basic Installation of the Cisco Collection Manager Introduction This chapter gives the information required for a basic installation of the Cisco Collection Manager and the bundled Sybase database.
Installation and Configuration Guide. NetIQ Sentinel UNIX Agent
Installation and Configuration Guide NetIQ Sentinel UNIX Agent March 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Btrfs and Rollback How It Works and How to Avoid Pitfalls
Btrfs and Rollback How It Works and How to Avoid Pitfalls Thorsten Kukuk Senior Architect SUSE Linux Enterprise Server [email protected] rm -rf /? I will be discussing what is needed for rollback: Btrfs /
Extending Remote Desktop for Large Installations. Distributed Package Installs
Extending Remote Desktop for Large Installations This article describes four ways Remote Desktop can be extended for large installations. The four ways are: Distributed Package Installs, List Sharing,
Getting Started with the Linux Intrusion Detection
1 of 7 6/18/2006 9:07 PM Getting Started with the Linux Intrusion Detection System Irfan Habib Abstract Sometimes file permissions aren't enough. LIDS gives you kernel-level access control that goes beyond
w1r3 Network Documentation
w1r3 Network Documentation Release 1.0 w1r3 Network June 08, 2014 Contents 1 Infrastructure 3 1.1 Team orientation............................................. 3 1.2 Accounts.................................................
What s New in Centrify Server Suite 2013 Update 2
CENTRIFY SERVER SUITE 2013.2 DATA SHEET What s New in Centrify Server Suite 2013 Update 2 The new Centrify Server Suite 2013 Update 2 (2013.2) builds on the core enhancements Centrify introduced in Server
Wavelink Avalanche Mobility Center Linux Reference Guide
Wavelink Avalanche Mobility Center Linux Reference Guide Version 5.0 amc-rg-linux-50-20100621 Revised 21/6/2010 ii Copyright 2010 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985
Creating an LDAP Directory
Systems and Network Management 1 Background Creating an LDAP Directory The ldap protocol is a standard for network directories. Some proprietary directory servers have been based on ldap, for example,
Wolfr am Lightweight Grid M TM anager USER GUIDE
Wolfram Lightweight Grid TM Manager USER GUIDE For use with Wolfram Mathematica 7.0 and later. For the latest updates and corrections to this manual: visit reference.wolfram.com For information on additional
System Administration and your Bio-Linux Machine
System Administration and your Bio-Linux Machine System Administration and your Bio-Linux Machine...1 System Administration and your Bio-Linux Machine...2 The bare minimum of Bio-Linux system administration...
Introduction to AIX 6L System Administration Course Summary
Contact Us: (616) 875-4060 Introduction to AIX 6L System Administration Course Summary Length: 5 days Recommendation Statement: Basic computer skills Course Description: This course teaches introductory
Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu 10.04 LTS)
Deploying Ubuntu Server Edition Training Course Overview (Ubuntu 10.04 LTS) 1. Deploying Ubuntu Server Edition Course Overview About the Course and Objectives This advanced 40-hour course will provide
Chapter 7: Unix Security. Chapter 7: 1
Chapter 7: Unix Security Chapter 7: 1 Objectives Understand the security features provided by a typical operating system. Introduce the basic Unix security model. See how general security principles are
Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH
Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Tutorial Amon Ott Contents: 1 Motivation: Why We Need Better Security in the Linux Kernel 2 Overview of RSBAC 3 How
Partitioning. Files on the Hard Drive. Administration of Operating Systems DO2003. Partition = Binder with index. Write file = Insert document
Administration of Operating Systems DO2003 Mounting the file structure Devices Wecksten, Mattias 2008 Partitioning Wecksten, Mattias 2008 Files on the Hard Drive Partition = Binder with index Write file
issh v. Auditd: Intrusion Detection in High Performance Computing
issh v. Auditd: Intrusion Detection in High Performance Computing Computer System, Cluster, and Networking Summer Institute David Karns, New Mexico State University Katy Protin, The University of North
Automated Offsite Backup with rdiff-backup
Automated Offsite Backup with rdiff-backup Michael Greb 2003-10-21 Contents 1 Overview 2 1.1 Conventions Used........................................... 2 2 Setting up SSH 2 2.1 Generating SSH Keys........................................
SSH! Keep it secret. Keep it safe
SSH! Keep it secret. Keep it safe Using Secure Shell to Help Manage Multiple Servers Don Prezioso Ashland University Why use SSH? Proliferation of servers Physical servers now Virtual / Hosted System management
Requirements for Rosetta Installation. Version 4.2
Requirements for Rosetta Installation Version 4.2 CONFIDENTIAL INFORMATION DISCLAIMER The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic
Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery
Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery Objectives Develop a Backup Strategy Create Backup Files with tar Work with Magnetic Tapes Copy Data
Recommended File System Ownership and Privileges
FOR MAGENTO COMMUNITY EDITION Whenever a patch is released to fix an issue in the code, a notice is sent directly to your Admin Inbox. If the update is security related, the incoming message is colorcoded
1. Introduction to the UNIX File System: logical vision
Unix File System 1. Introduction to the UNIX File System: logical vision Silberschatz, Galvin and Gagne 2005 Operating System Concepts 7 th Edition, Feb 6, 2005 Logical structure in each FS (System V):
SUSE Manager in the Public Cloud. SUSE Manager Server in the Public Cloud
SUSE Manager in the Public Cloud SUSE Manager Server in the Public Cloud Contents 1 Instance Requirements... 2 2 Setup... 3 3 Registration of Cloned Systems... 6 SUSE Manager delivers best-in-class Linux
EMC VNX Version 8.1 Configuring and Using the Audit Tool on VNX for File P/N 300-015-126 Rev 01 August, 2013
EMC VNX Version 8.1 Configuring and Using the Audit Tool on VNX for File P/N 300-015-126 Rev 01 August, 2013 This technical note contains information on these topics: Executive summary... 2 Introduction...
Linux Audit Quick Start SUSE Linux Enterprise 10 SP1
Linux Audit Quick Start SUSE Linux Enterprise 10 SP1 NOVELL QUICK START CARD Linux audit allows you to comprehensively log and track any access to files, directories, or resources of your system and trace
CipherMail Gateway Installation Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Installation Guide March 26, 2015, Rev: 9094 Copyright c 2008-2015, ciphermail.com. Acknowledgments: Thanks goes out to Andreas Hödle for feedback and input
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
How To Install Storegrid Server On Linux On A Microsoft Ubuntu 7.5 (Amd64) Or Ubuntu (Amd86) (Amd77) (Orchestra) (For Ubuntu) (Permanent) (Powerpoint
StoreGrid Linux Server Installation Guide Before installing StoreGrid as Backup Server (or) Replication Server in your machine, you should install MySQL Server in your machine (or) in any other dedicated
Dell Proximity Printing Solution. Installation Guide
Dell Proximity Printing Solution Installation Guide Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates potential
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
Linux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1
[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX3.0.0.0] 1 How to Recover an infiniti/evolution Modem Software Reference idx 3.0.0.0 (12.0.0.0) Updated: November 17 th 2011 Overview Recovery Procedures
Backing up the Embedded Oracle database of a Red Hat Network Satellite
Backing up the Embedded Oracle database of a Red Hat Network Satellite By Melissa Goldin and Vladimir Zlatkin Abstract This document will help you create a backup of the Oracle database of a Red Hat Network
The commands and some parts of the driver are distributed in binary form only.
Installing the VPN Client This chapter describes how to install the VPN Client software on your workstation. You should be familiar with software installation on UNIX computers to perform this procedure.
Installing the VPN Client
CHAPTER 2 This chapter describes how to install the VPN Client software on your workstation. You should be familiar with software installation on UNIX computers to perform this procedure. The VPN Client
Computer Science and Engineering Linux Cisco VPN Client Installation and Setup Guide
Computer Science and Engineering Linux Cisco VPN Client Installation and Setup Guide Contents Installation: Ubuntu Linux 7.10 Gusty Gibbon:... 2 Installation: Redhat Enterprise 5 and Fedora 8 Linux:...
128 CERT Exercises Toolset Document for students
128 CERT Exercises Toolset 14. Exercise: Proactive incident detection 14.1 What will you learn? In this exercise you will learn how to set up and work with AbuseHelper. AbuseHelper is an open source software
Red Hat Linux Networking
The information presented should act as a guide to Red Hat Linux networking. It is intended to be accompanied with training and self study. To access most of these items you will need to have root access,
How to Set Up 2-Factor Authentication in Horizon View with Google Authenticator
How to Set Up 2-Factor Authentication in Horizon View with Google Authenticator Author: Eric Monjoin, [email protected] February 2015 Table of Contents Introduction... 3 Prerequisites.... 3 Initial setup....
Hardened Hosting. Quintin Russ. OWASP New Zealand Chapter 2011 6th December 2011
Hardened Hosting Quintin Russ OWASP New Zealand Chapter 2011 6th December 2011 1 About Me Quintin Russ Technical Director, SiteHost http://www.sitehost.co.nz [email protected] Web Developer in previous
Univention Corporate Server. Extended domain services documentation
Univention Corporate Server Extended domain services documentation 2 Table of Contents 1. Integration of Ubuntu clients into a UCS domain... 4 1.1. Integration into the LDAP directory and the SSL certificate
Privileged Account Discovery for UNIX
Prerequisites The UNIX Free Discovery Tool runs on the following operating systems and frameworks: Windows 7, 8, 8.1, and 10.NET Framework 4.5.1 or higher Scan Credentials The credentials used to scan
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
Installing and Running MOVES on Linux
Installing and Running MOVES on Linux MOVES Workgroup Wednesday June 15, 2011 Gwo Shyu Dan Stuart USEPA Office of Transportation & Air Quality Assessment and Standards Division 2000 Traverwood Drive, Ann
Create a virtual machine at your assigned virtual server. Use the following specs
CIS Networking Installing Ubuntu Server on Windows hyper-v Much of this information was stolen from http://www.isummation.com/blog/installing-ubuntu-server-1104-64bit-on-hyper-v/ Create a virtual machine
