Microsoft Access Applications and Sarbanes-Oxley Compliance
|
|
|
- Maximilian Farmer
- 9 years ago
- Views:
Transcription
1 A Bunker Hill White Paper 501 Delancey Street San Francisco, CA (415) Microsoft Access Applications and Sarbanes-Oxley Compliance By Ron Tornambe, CTO Allen Dutra, CFO/CPA Date 9/24/2006
2 Contents TUIntroductionUT... 2 TUProblem StatementUT... 2 TUOptionsUT... 2 TUBunker Hill SolutionUT... 3 TUImplementationUT... 3 TUSummaryUT... 6 Introduction This paper presents a practical and expedient approach to converting Microsoft Access applications to comply with Sarbanes-Oxley regulations. Problem Statement The widespread use of Access applications in most organizations presents management with considerable operational and security challenges. The Sarbanes-Oxley Act has far-reaching implications on the use and perhaps future role of Microsoft Access applications in the organization. Data stored in Microsoft Access Jet databases is inherently unsafe. Even the most secure Access databases, those that employ user-level security and encryption, are easily compromised. There are a number of companies that offer inexpensive software that retrieves lost or forgotten Access user and password information, even for encrypted Access databases, effectively cracking them open. Organizations dedicated to SOX compliance are faced with the task of identifying all Microsoft Access applications that contain sensitive data and taking corrective action to prevent unauthorized use. Options Since Access data cannot be protected, it must be stored in a secure DBMS repository, like DB2, Oracle or SQL Server. There is no way around this requirement. The following is a non-exhaustive list of alternatives for securing Access applications. Date
3 Find a Replacement Purchase software from third party vendors that meet the functional and security requirements of the existing Access applications. Redevelop the Application In some cases it might make sense to just bomb, bulldoze and start over as Buckminster Fuller once remarked when asked about what he would do to improve Los Angeles..Net or Java Conversion Convert the Access applications to IT standard technologies, like Java or.net and Oracle or SQL Server, while retaining the basic database design and front-end interface. Retain the Access Front-End Convert the MS-Access database to a secure DBMS platform and modify the application front-end to operate with the DBMS and conform to SOX compliance standards. Bunker Hill Solution This paper will focus on the last option for the following reasons: Benefit 1 Saves time and resources; requires far less development time than any other alternative. Benefit 2 Least disruptive to normal day-today operations; involves no user retraining or learning curves nor major shifts in development staffing or technologies. Benefit 3 Functionality that implements SOX compliance provisions can be added to Access applications as easily as ones developed using other frameworks, like.net or Java. Implementation I. MS-Access Database Conversion The first step is to convert the MS-Access database to a secure DBMS. The following is a high-level overview of the conversion process. The Access design is replicated using the target DBMS Data Definition Language constructs and data is loaded. To optimize performance, Access queries may be converted to views and/or procedures on the target DBMS. In order to retain the functionality of the original Access application front-end, the DBMS tables are linked into Access using ODBC, replacing the original Access tables. Any converted queries are integrated into the new Access application, preserving the look-and-feel and operation of the original GUI. Some may argue that using ODBC is less secure than ADO/OLEDB since some connection information is stored in the Windows registry and can be viewed using the ODBC Administrator. The only pertinent saved connection information is the Server Name which is not much of a clue for those attempting a break-in. For those who remain unconvinced, the ODBC DSN registry entries can be created by the application program just before the initial connection is established and removed directly afterwards.
4 II. Define a Security Strategy For an application to be secure, it must ensure that all data it owns can only be changed using its GUI. A complete audit trail of all changes made by users of the application must be recorded. The security approach presented here is based on the concept of Application Users (AU) and the Application Supervisor (AS). The security strategy can be applied to any application and is not limited to Sarbanes-Oxley. Note that if the application connects to the DBMS over an extranet, a corporate VPN or other DBMS provided secure socket layer must be utilized to protect passwords and data from sniffers (programs that inspect data traveling over unsecured links). It is assumed that only the DBA or Password Management group has full control of assigning User-IDs and Passwords and that measures that provide accountability are in place. Application Users The Application Users (AU) group are assigned database User-IDs with roles that do not grant any privileges to application related objects (tables, views, etc.). They are only assigned Execute privilege on a single stored procedure. Application Supervisor The Application Supervisor (AS) account is setup specifically for use with an Access application. It should never be used outside of the application. A role that grants all privileges required to operate the application and update the database is assigned to the AS. The AS Password (PWD) is stored using modern cryptography algorithms supplied by the DBMS vendor that are specifically designed to prevent hackers from deciphering data. Since the application retrieves the AS PWD at runtime, the PWD can be changed as frequently as desired to minimize the risk of intrusion. Application User Login Form A new Application User Login form is added to the Access application and is designated as the form that opens when the application is started. The form accepts the UID and PWD of Application Users. After the AU is authenticated, the program calls the aforementioned stored procedure that returns the AS UID and decrypted PWD. The AS UID and PWD are used to supply ODBC connection information required by the Access application. Note that User-IDs and Passwords are not stored anywhere within the source code or design objects of the Access application or in the Window s registry or file system. After the AS connection is established, an entry is added to a table that contains the application s session-id and the AU UID. The triggers that implement the audit trail will use this information to associate the AU with the transaction details and prevent unauthorized users from updating data.
5 Application Users are then able to operate the application with full privileges. III. Implement an Audit Trail An essential component of the security strategy is the implementation of an audit trail that logs all AU database insert, update and delete transactions. To implement the audit trail, a new table will need to be created for each application table. The new table will include all fields from the associated application table as well as OperationCode, AU UID, Session- ID, and Timestamp. Since the audit tables do not include any keys, indexes, or constraints, inserts will require minimal overhead. Triggers must be created for insert, update and delete operations on all tables. The triggers ensure that users belong to registered applications and save all data pertaining to the transaction in the associated audit table. The OperationCode will be set to I or D to denote the type of transaction saved; Insert or Delete. Note that database Update transactions are implemented by adding both Delete and Insert records to the associated audit trail table. The Delete record contains the data before the update is applied and the Insert contains the updated record. The Application User s User ID associates the audit trail transactions with the AU responsible for the changes. An example of a trigger that implements the audit trail follows. This example is implemented using DB2, but is also easily implemented using MS-SQL and Oracle. After an application connects to the DBMS, it registers itself by adding an entry to the following table that records the session-id of the application and the AU UID. Note this entry is removed from the table when the application is closed. TCREATE TABLE NORTHWIND.APPLICATION_USERS ( APPL_ID VARCHAR(128), USER_ID VARCHAR(40) ) ; The audit trail table associated with the application s SHIPPERS table follows. CREATE TABLE NORTHWIND.AT_SHIPPERS ( OP_CODE CHAR, USER_ID VARCHAR(40), APPL_ID VARCHAR(128), TRANS_TIME TIMESTAMP, SHIPPERID INTEGER, COMPANYNAME VARCHAR(40), PHONE VARCHAR(24) ) ; Insert Trigger Example The triggers serve as gatekeepers of application data. Only transactions from currently registered application users are accepted. CREATE TRIGGER NORTHWIND.AT_SHIPPERS_INS AFTER INSERT ON NORTHWIND.SHIPPERS REFERENCING NEW_TABLE AS INS_TABLE FOR EACH STATEMENT MODE DB2SQL BEGIN ATOMIC DECLARE APPUSERID VARCHAR(40); SET APPUSERID = ( SELECT USER_ID FROM NORTHWIND.APPLICATION_USERS WHERE APPL_ID=APPLICATION_ID() ); IF APPUSERID IS NULL THEN SIGNAL SQLSTATE '75001' ('Connection expired due to inactivity. Application must be restarted.');
6 ELSE INSERT INTO NORTHWIND.AT_SHIPPERS SELECT 'I', APPUSERID, APPLICATION_ID(), CURRENT TIMESTAMP, INS_TABLE.* FROM INS_TABLE; END IF; END ; The trigger fires when an insert operation is issued for the SHIPPERS table. It first attempts to retrieve the USER_ID from the APPLICATION_USERS table by supplying the session-id of the user that initiated the transaction. If the session-id does not exist, then either the user s ODBC connection has expired or an unauthorized user has attempted to tamper with data. In either case, the transaction is canceled; the database is not altered and no audit trail entry is recorded. If the session-id is found, an entry is added to the associated audit trail table. IV. Secure the Access Application Although creating an Access MDE file removes all editable source code and disables viewing the particulars of Access Form and Report designs, additional actions must be taken to secure Access applications from unintended and potentially malicious uses. must also be prevented from displaying the Database Window, which exposes database table and query design information that may contain User-IDs or even Passwords. As a general rule, any built-in menu items or buttons that are not essential to the operation of the application should be removed. Since ODBC implements connection pooling, connections expire after they have been idle for 60 seconds. The default can be changed by setting the OPTimeout entry of the ODBC driver in the Window s registry. Although setting the OPTimeout value to a short interval will prevent unauthorized persons from commandeering users workstations while unattended, timeouts that require users to repeat the logon procedure may be more frequent and prove counterproductive. Summary By implementing the steps outlined in this paper, Microsoft Access applications can expediently and cost-effectively be converted to comply with Sarbanes-Oxley regulations. Since the Access databases are converted to robust DBMS, the additional benefits of scalability, improved disaster-recovery, and manageability are also realized. Most Access applications include built-in menus and toolbars that include items that can be used to compromise security. For example, the link to the Startup form can be used to alter options that were set to prevent application misuse. Users
ADO and SQL Server Security
ADO and SQL Server Security Security is a growing concern in the Internet/intranet development community. It is a constant trade off between access to services and data, and protection of those services
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
Oracle Database 10g Express
Oracle Database 10g Express This tutorial prepares the Oracle Database 10g Express Edition Developer to perform common development and administrative tasks of Oracle Database 10g Express Edition. Objectives
Linking Access to SQL Server
Linking Access to SQL Server Why Link to SQL Server? Whilst Microsoft Access is a powerful database program it has its limitations and is best suited to creating desktop applications for individual users
Setting Up Your Team-SQL Database for ORACLE 8.05
Setting Up Your Team-SQL Database for ORACLE 8.05 Once you have your Oracle Server in place, and have the SQL client software installed on all Team Client PCs, you are ready to set up your Team-SQL for
Online account access
User guide Online account access The best way to manage your accounts, pay bills and stay connected to your finances. osufederal.com 800-732-0173 A quick and easy guide to online account access Table of
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Sysax Multi Server User manual
Sysax Multi Server User manual Table of Contents 1. Introduction to Sysax Multi Server... 1 1.1. Introduction to Sysax Multi Server... 2 2. Minimum System Requirements... 4 2.1. System Requirements...
DBMoto 6.5 Setup Guide for SQL Server Transactional Replications
DBMoto 6.5 Setup Guide for SQL Server Transactional Replications Copyright This document is copyrighted and protected by worldwide copyright laws and treaty provisions. No portion of this documentation
Oracle Database Security
breaking through barriers to progress By Raman Jathar an award winning '2004 Future 50 Company' 18650 W. Corporate Drive Suite 120 Brookfield, WI 53045 262.792.0200 Database Security Lately, database security
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
PUBLIC Password Manager for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP1 Document Version: 1.0 2015-10-02 PUBLIC Password Manager for SAP Single Sign-On Implementation Guide Content 1 Password Manager....4 2 Password Manager Installation Guide....5
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Matisse Installation Guide for MS Windows. 10th Edition
Matisse Installation Guide for MS Windows 10th Edition April 2004 Matisse Installation Guide for MS Windows Copyright 1992 2004 Matisse Software Inc. All Rights Reserved. Matisse Software Inc. 433 Airport
Teleran PCI Customer Case Study
Teleran PCI Customer Case Study Written by Director of Credit Card Systems for Large Credit Card Issuer Customer Case Study Summary A large credit card issuer was engaged in a Payment Card Industry Data
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft SQL Server Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event Source: SQL Server Versions:
The release notes provide details of enhancements and features in Cloudera ODBC Driver for Impala 2.5.30, as well as the version history.
Cloudera ODBC Driver for Impala 2.5.30 The release notes provide details of enhancements and features in Cloudera ODBC Driver for Impala 2.5.30, as well as the version history. The following are highlights
Oracle WebCenter Content
Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: [email protected] Introduction In May 2011, US Data Management (USDM) was
Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard
White Paper Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard Abstract This document describes how PowerBroker Identity Services Enterprise and Microsoft Active Directory
INTRODUCING ORACLE APPLICATION EXPRESS. Keywords: database, Oracle, web application, forms, reports
INTRODUCING ORACLE APPLICATION EXPRESS Cristina-Loredana Alexe 1 Abstract Everyone knows that having a database is not enough. You need a way of interacting with it, a way for doing the most common of
SPECIALIST PRACTICE MANAGER
INSTALLATION GUIDE FOR SPECIALIST PRACTICE MANAGER using a MICROSOFT SQL SERVER DATABASE Updated October 2009 All rights reserved. No reproduction, transmission, transcription, storage in a retrieval system,
Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007
Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007 SIEMENS AG Industry Sector Industry Automation D-76181 Karlsruhe, Federal Republic of Germany E-mail: [email protected] Fax: +49
SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
Guide to Upsizing from Access to SQL Server
Guide to Upsizing from Access to SQL Server An introduction to the issues involved in upsizing an application from Microsoft Access to SQL Server January 2003 Aztec Computing 1 Why Should I Consider Upsizing
Setting up an MS SQL Server for IGSS
Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3
Crystal Reports Installation Guide
Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks
WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
FileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
Identikey Server Windows Installation Guide 3.1
Identikey Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
ODBC Client Driver Help. 2015 Kepware, Inc.
2015 Kepware, Inc. 2 Table of Contents Table of Contents 2 4 Overview 4 External Dependencies 4 Driver Setup 5 Data Source Settings 5 Data Source Setup 6 Data Source Access Methods 13 Fixed Table 14 Table
"SQL Database Professional " module PRINTED MANUAL
"SQL Database Professional " module PRINTED MANUAL "SQL Database Professional " module All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or
White Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
Division of IT Security Best Practices for Database Management Systems
Division of IT Security Best Practices for Database Management Systems 1. Protect Sensitive Data 1.1. Label objects containing or having dedicated access to sensitive data. 1.1.1. All new SCHEMA/DATABASES
Converting InfoPlus.21 Data to a Microsoft SQL Server 2000 Database
Technical Bulletin Issue Date August 14, 2003 Converting InfoPlus.21 Data to a Microsoft SQL Server 2000 Database Converting InfoPlus.21 Data to a Microsoft SQL Server 2000 Database...2 Introduction...
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
How To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations
orrelog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:[email protected] CorreLog, SQL Table Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part
FileMaker Security Guide
TECH BRIEF FileMaker Security Guide The Key to Securing Your Solutions Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5
Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
FDA 21 CFR Part 11 Features
FDA 21 CFR Part 11 Features Introduction... 2 Remarks... 3 General... 3 Electronic Records (Event Logger, Alarms, Reports)... 3 Electronic Signatures (Security System)... 3 Security System... 4 Security
MySQL Security for Security Audits
MySQL Security for Security Audits Presented by, MySQL AB & O Reilly Media, Inc. Brian Miezejewski MySQL Principal Consultat Bio Leed Architect ZFour database 1986 Senior Principal Architect American Airlines
U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management
U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management Disclaimer These materials are subject to change without notice. SAP AG s compliance analysis with respect to SAP software
Enable Audit Events in MS SQL Server EventTracker v6.x, v7.x
Enable Audit Events in MS SQL Server EventTracker v6.x, v7.x Publication Date: July 17, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract Databases are critical components
Advantages of Server-side Database Auditing. By SoftTree Technologies, Inc.
Advantages of Server-side Database Auditing By SoftTree Technologies, Inc. Table of Contents Advantages of server-side auditing... 3 Does server-side auditing create a performance hit on the audited databases?...
Testing Web Applications for SQL Injection Sam Shober [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected] Abstract: This paper discusses the SQL injection vulnerability, its impact on web applications, methods for pre-deployment and
Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA)
Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA) Compliance with 21 CFR Part 11 Introduction Part 11 in Title 21 of the Code of Federal
Setting Up ALERE with Client/Server Data
Setting Up ALERE with Client/Server Data TIW Technology, Inc. November 2014 ALERE is a registered trademark of TIW Technology, Inc. The following are registered trademarks or trademarks: FoxPro, SQL Server,
ODBC Driver Guide. Installation and Configuration. Freezerworks Unlimited Version 6.0
ODBC Driver Guide Installation and Configuration Freezerworks Unlimited Version 6.0 PO Box 174 Mountlake Terrace, WA 98043 www.freezerworks.com [email protected] 425-673-1974 877-289-7960 U.S. Toll
Aradial Installation Guide
Aradial Technologies Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document
Tutorial: How to Use SQL Server Management Studio from Home
Tutorial: How to Use SQL Server Management Studio from Home Steps: 1. Assess the Environment 2. Set up the Environment 3. Download Microsoft SQL Server Express Edition 4. Install Microsoft SQL Server Express
Online Giving User Guide for Church Members
User Guide for Church Members Pub 111, February 2011 2009-2011 ParishSOFT LLC, all rights reserved. ParishSOFT grants licensed users the right to unlimited duplication of this publication for internal
Best Approaches to Database Auditing: Strengths and Weaknesses. [email protected]
Best Approaches to Database Auditing: Strengths and Weaknesses [email protected] Agenda Why are audit records of Database Operations required in some cases? And why is collecting them difficult?
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Installation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
Log Management and Intrusion Detection
Log Management and Intrusion Detection Dr. Guillermo Francia,, III Jacksonville State University Prerequisites Understand Event Logs Understand Signs of Intrusion Know the Tools Log Parser (Microsoft)
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
Resco Mobile CRM Security
Resco Mobile CRM Security Out-of-the-box Security 1. Overview The Resco Mobile CRM application (client) communicates directly with the Dynamics CRM server. The communication uses standard Dynamic CRM Web
LabChip GX/GXII with LabChip GxP Software
Regulatory Compliance LabChip GX/GXII with LabChip GxP Software Supporting Regulatory Compliance Caliper LabChip GX/GXII suite of instruments provides automated electrophoresis to analyze quality, size,
DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS
DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication
Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions
Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later
for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Document Management Getting Started Guide
Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other
PaperClip Audit System Installation Guide
Installation Guide Version 1.0 Copyright Information Copyright 2005, PaperClip Software, Inc. The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Software, Inc. All brand
AUTHENTICATION... 2 Step 1:Set up your LDAP server... 2 Step 2: Set up your username... 4 WRITEBACK REPORT... 8 Step 1: Table structures...
AUTHENTICATION... 2 Step 1:Set up your LDAP server... 2 Step 2: Set up your username... 4 WRITEBACK REPORT... 8 Step 1: Table structures... 8 Step 2: Import Tables into BI Admin.... 9 Step 3: Creating
Dream Report Version 4.5
Dream Report Version 4.5 Project Upgrade Procedure 1 P a g e Contents Introduction... 3 Upgrade Steps... 3 1. Backup of the Existing Project... 3 2. Installation of Dream Report Version 4.5... 3 3. Loading
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
4D v1x ODBC Driver INSTALLATION GUIDE
INSTALLATION GUIDE Open Database Connectivity Standard (ODBC) is an open standard application programming interface (API) used to access one or more databases from a single application. In order to set
Audit Policy Subcategories
668 CHAPTER 20 Windows Server 2008 R2 Management and Maintenance Practices These recommended settings are sufficient for the majority of organizations. However, they can generate a heavy volume of events
SIEBEL ANALYTICS SCHEDULER GUIDE
SIEBEL ANALYTICS SCHEDULER GUIDE VERSION 7.7 DECEMBER 2003 Siebel Systems, Inc., 2207 Bridgepointe Parkway, San Mateo, CA 94404 Copyright 2003 Siebel Systems, Inc. All rights reserved. Printed in the United
In this topic we will cover the security functionality provided with SAP Business One.
In this topic we will cover the security functionality provided with SAP Business One. 1 After completing this topic, you will be able to: Describe the security functions provided by the System Landscape
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
Training module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
Defense In-Depth to Achieve Unbreakable Database Security
Defense In-Depth to Achieve Unbreakable Database Security Qiang Lin, Ph.D Abstract Enterprises realize that sole reliance on generic security mechanisms does not provide the protection they need for their
Jet Data Manager 2012 User Guide
Jet Data Manager 2012 User Guide Welcome This documentation provides descriptions of the concepts and features of the Jet Data Manager and how to use with them. With the Jet Data Manager you can transform
Define ODBC Database Library using Management Console
Define ODBC Database Library using Management Console Introduction: Open database connectivity (ODBC) standards provide a common interface to a variety of databases, including AS/400, dbase, Microsoft
REGULATIONS COMPLIANCE ASSESSMENT
ALIX is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. REGULATIONS COMPLIANCE ASSESSMENT BUSINESS
Netop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
FileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
FileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
MAGIC Telephone Hybrid System - SQL Migration - using the example Wolfgang Peters 1 Overview of the SQL Migration Requirements Remarks for Windows 7 Users Hardware requirements SQL-Server Software requirements
InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures
InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures Overview One of the most popular applications of InfoCenter Suite is to help FDA regulated companies comply with
ODBC Driver Version 4 Manual
ODBC Driver Version 4 Manual Revision Date 12/05/2007 HanDBase is a Registered Trademark of DDH Software, Inc. All information contained in this manual and all software applications mentioned in this manual
Matisse Installation Guide for MS Windows
Matisse Installation Guide for MS Windows July 2013 Matisse Installation Guide for MS Windows Copyright 2013 Matisse Software Inc. All Rights Reserved. This manual and the software described in it are
Oriental Bank s NetBanking Services
Oriental Bank s NetBanking Services User Guidelines Oriental Bank s NetBanking Services have been launched to maximize the customer satisfaction. The NetBanking Services can be availed by any customer
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
MS SQL Server Database Management
MS SQL Server Database Management Contents Creating a New MS SQL Database... 2 Connecting to an Existing MS SQL Database... 3 Migrating a GoPrint MS SQL Database... 5 Troubleshooting... 11 Published April
