WhiteHat Security Sentinel Service

Size: px
Start display at page:

Download "WhiteHat Security Sentinel Service"

Transcription

1 WhiteHat Security Sentinel Service User Guide Version 3.0 September 2010

2 Contents Preface... 4 Intended audience...4 How to use this guide...4 Administrators...4 Security Operators...4 Developers...4 Viewers...5 Need help?...5 Resources...5 WhiteHat Security Customer Support...5 Getting Started... 6 Task overview...6 Logging in to Sentinel...7 Navigating in Sentinel...8 Creating and managing site groups...10 Setting up and managing user accounts...11 User roles Managing users Creating a new user Modifying a user s settings Deleting a user Editing your Sentinel account settings preferences Public Key API Web Key Managing Your Sites Interpreting site findings...19 Site Summary info boxes Hostnames and links Setting up your site credentials...20 F5 Web Application Firewall (WAF) Credentials Adjusting a site's priority level, scan speed, and industry...22 Managing Sentinel Scans WhiteHat Security IP Addresses...24 How long do scans take to complete?...24 Scheduling scans...25 Editing a scan Stopping a Scan Exporting scan schedules...27 Viewing recent scan activity...28 Scan status indicators If a site has not been scanned Managing Your Site Vulnerabilities What vulnerabilities does Sentinel scan for?...35

3 Viewing site vulnerabilities...37 Retesting site vulnerabilities...39 Generating Reports Creating a new vulnerability report...41 Using the Sentinel Open XML API Glossary Sentinel interface terms...45 Business logic vulnerabilities...48 Technical vulnerabilities...52 F5 Web Application Firewall (WAF) terms...57 General web application security terms...57

4 Preface Intended audience This guide shows assigned Administrators, Security Operators, Developers, and Viewers how to use WhiteHat Sentinel to find and fix vulnerabilities on their website. How to use this guide Depending on your assigned role, this guide helps you: Get in and around WhiteHat Sentinel Set up Sentinel user accounts Manage your sites and user site access Schedule scans and manage scan credentials Interpret scan reports Perform optional operations, such as managing your F5 WAF credentials and using the WhiteHat Sentinel open XML API Administrators If you are an assigned Administrator, you have full control of all of your Sentinel operations and this entire guide applies to your activities. Security Operators If you are a Security Operator, you may want to read: Getting Started: Logging in to Sentinel, Navigating Sentinel Editing your Sentinel account settings Developers Managing Your Sites Managing Sentinel Scans Managing Your Site Vulnerabilities Generating Reports Using the Sentinel Open XML API If you re a Developer, you may want to read: Getting Started: Logging in to Sentinel, Navigating Sentinel, Editing your Sentinel account settings Managing Your Site Vulnerabilities: Retesting site vulnerabilities Generating Reports page 4 of 58

5 Viewers If you re a Viewer, you may want to read: Getting Started: Logging in to Sentinel, Navigating Sentinel, Editing your Sentinel account settings Generating Reports Need help? Resources For more help, you can: Look up terms in the Glossary at the end of this user guide. Log in to your Sentinel account and click the Resources tab for a complete glossary, FAQs, white papers, API integration instructions, and other information about web security. Click the info buttons on each web page for help on certain topics. WhiteHat Security Customer Support To contact WhiteHat Security Customer Support: Go to the WhiteHat Support Portal: Send us at: support@whitehatsec.com Call from 6:00 AM 7:00 PM Pacific Time, Monday through Friday (excluding holidays). WhiteHat Support Plus is available in three service levels the Standard Support level is free, and you can upgrade to Silver Support or Gold Support according to your needs. To see what level is best for you, go to: page 5 of 58

6 Getting Started Ensure scanning success in 3 steps! Who can do this? Administrator and Security Operator You have received your confirmation and created a password you re in! Right? Well, yes. But scanning doesn t start until you tell it to and let us in. There are three important steps you absolutely must take to get scans running on your sites. Be sure to: Log in to the Sentinel Interface. Configure your sites, including setting up credentials to allow us to scan. (Administrator only) Set up a scan schedule for each site to start and continue scanning. Task overview The basic steps for setting up and using WhiteHat Sentinel are: 1. Log in as a new user. This is initially done by the first assigned Administrator and by additional users as defined by their roles. 2. Manage your sites, including setting up credentials and site groups. (Administrator) 3. Set up user accounts. (Administrator) 4. Schedule and start scans. (Administrator and Security Operator) 5. Review vulnerabilities. (All users) 6. Generate reports. (All users) 7. Integrate our open XML API into your ticketing system. (Optional Administrators and Security Operators) 8. Manage F5 WAF credentials. (Optional Administrators and Security Operators) Getting Started takes you through steps one through four. page 6 of 58

7 Logging in to Sentinel Who can do this? All users, after the initial Administrator logs in and sets up user accounts (For browser requirements, from Resources, click the FAQ link.) Here is how to log in to Sentinel when your organization subscribes and assigns you as the initial Administrator or the Administrator has assigned you a user role. 1. You receive an from WhiteHat Security Support to establish access to your account. 2. Follow the link and instructions in the . Your username is the address the Administrator used in setting up your access. Note: This link is valid for 48 hours from the time the was sent. 3. To ensure username security, you receive a second with a URL to establish your password. 4. Follow the link and. enter your password information. Note: Your username and password are case sensitive. After set-up, here is how to log in: 1. Go to: 2. Enter your username and password. If you have problems logging in, check: Username and password. Both are case-sensitive in the Sentinel login screen. Spam filter settings. If you changed your password recently, make sure your spam filter settings in your account do not filter out the do-not-reply@whitehatsec.com address that sends the password confirmation . page 7 of 58

8 Navigating in Sentinel Who can do this? All users When you log in to Sentinel, you land on your Summary page. The options and menus on your page depend on your role. (For example, only Administrators see an Admin tab, and only Administrators and Security Operators see the scan schedule as a menu.) Summary Page page 8 of 58

9 Click a tab to take you to: Summary: An overview of your sites security. Findings: A list of all security problems Sentinel found in your sites. Schedule: A list of all scheduled events (such as scans). Reports: A place to input criteria for vulnerability reports. Account: Your Sentinel account information, including options. Admin: Editable user details such as roles and site accessibility. (Only Administrators can see this tab.) Resources: An API Reference, white papers, a glossary, and other help and industry references. The Pending Messages link, located next to the subject tabs and also under the Admin tab, takes you to the Account Messages page. Here you ll find info about the latest on releases and other general messages from WhiteHat Security, along with any alerts you may have about the status of your scans. page 9 of 58

10 Creating and managing site groups Who can do this? Administrators You can create site groups and manage user roles according to your organization s needs. Note: The Rename Group and Delete Group buttons appear when you select a group name. 1. Click the Admin tab. 2. Click Site Management. Grouping Sites 3. Below Site Groups, click Add New Group. A new entry is added to the Site Group list. 4. Name the site group. 5. Drag and drop sites from the All Sites list to the new group. The added sites appear below the group name. page 10 of 58

11 After you create a group name, you can: Add or remove sites to or from a site group: Drag the site name to or from the site group. Rename a site group: Select the group name and click Rename Group. Delete a site group: Select the group name and click Delete. Note: If an administrator deletes a site group, users no longer have access to that site group. Setting up and managing user accounts User roles Who can do this? Administrators The Administrator defines user roles with corresponding site access and privileges, as described below: Administrator (Admin) Security Operator Developer Viewer User Privileges Task Admin Security Operator Developer Viewer Manage users X Manage roles X Create site groups X Schedule/start scan X X Configure scan X X Retest vulnerabilities X X X Generate reports X X X X Schedule reports X X X X View vulnerabilities X X X X Set up F5 WAF credentials X X Set up open API XML X X Each service subscription can include multiple administrators. The highest privilege level within Sentinel is an administrator with All Sites access. Administrators who do not have access to all sites are limited to creating site groups and granting site access to sites that they administer. When your organization subscribes to Sentinel, WhiteHat Security creates an administrator with access to all sites, and that administrator can give all-site permissions to other administrators. Depending on your Sentinel set-up and organizational needs, access to all sites may not be required. page 11 of 58

12 Each user can have only one role and corresponding privileges to one or more sites. For example, if you are an Administrator, you have admin privileges for all sites you access; if you are a Viewer, you have Viewer privileges for all sites you access, and so on. Managing users You can add, edit, and remove the following user information from Admin > User Management. User (used as the username and is case sensitive) Title Phone number Cell phone number Time zone Country Vulnerability summary options Role (defines privilege level) Sites (that this user can access) page 12 of 58

13 Creating a new user To create a new user: 1. Click the Admin tab. Creating a New User 2. In the User List, click New. 3. In Add New User, enter the new user s information, including the role and site(s) the user can access under that role. page 13 of 58

14 The user s address must be unique. Once set up, an account address cannot be edited or reused. However, if the account is deleted, it can be reactivated by having the account main point of contact call WhiteHat Security Support. Select All, None, or one or more site name. To select more than one site: On a PC, press the Control key and select the site names. On a Mac, press the Command key and select the site names. 4. Click Create User. Modifying a user s settings You can modify any settings other than the user s address: 1. Click the Admin tab. 2. In the User List, click the username. 3. In User Details, enter the new information. 4. Click Save. Since the user s address is used as their username, to change the address, you need to delete the account and create a new one with the correct address: 1. Click the Admin tab. 2. In the User List, click the username. 3. Click Delete. 4. Follow the instructions for creating a new user, including re-establishing their roles and sites. Deleting a user Once deleted, a user cannot access Sentinel. If the user tries to log in and clicks the Forgot Username or Password? link on the log in screen, they are granted access to a WhiteHat Security demo account with no displayed websites. The administrator must create an account with a new address or contact White Hat Security Support to reestablish the previous account. To delete a user: 1. Log in to your Sentinel account. 2. Click the Admin tab. 3. In the User List, click the username. 4. Click Delete. page 14 of 58

15 Editing your Sentinel account settings Who can do this? All users From the Account tab, you can modify your account information, including: Contact information Time zone preferences Password Public key (Administrators and Security Operators only) Open XML API web key (Administrators and Security Operators only) To edit your account settings: 1. Log in to your Sentinel account. 2. Click the Account tab. 3. Modify your account information and click Save. If you re generating a Web API key, click Save and Generate Web API Key. You can use session cookies as an alternative to using a Web API key. For details, go to Resources > API Reference > API Cookie Authentication or go here: preferences In the Preferences field, choose how often you want to receive status summaries. Select Daily to receive summaries every day, including weekends. Select Weekly to receive summaries once a week. Public Key Select Monthly to receive summaries once a month. Select whether to include your host names in your summaries. (Deselect this option for added security.) In the Public Key field, you can create or edit a key that allows you to send a scheduled report via encrypted . If your mail server uses PGP (Pretty Good Privacy) keys to send secure data across unsecured networks, click Edit Key to paste or edit your PGP key. API Web Key Who can do this? Administrators and Security Operators If you are integrating the open XML API into your system, you need a Web API key to authenticate your API requests. Your key is generated automatically when you go to Account and click Save and Generate Web API Key. Never share your Web API key with anyone. This key could allow others to access your vulnerability information. Our support team will never ask for your Web API key. page 15 of 58

16 You can also validate API requests by presenting a valid authentication cookie in your API requests. Upon a successful login, the browser returns a cookie named APID. The APID cookie expires at the end of a session (upon logout). For more about using our open XML API, go to Resources > API Reference. page 16 of 58

17 Managing Your Sites Who can do this? Administrators Before scheduling your first vulnerability scan, review your account site information. Additional information may be required before Sentinel can scan your sites, such as a set of credentials to gain access to secure sites. You can set the scan schedule and time zone for all sites from Summary > Executive Summary > Site Overview. For individual site information and activity, from the Summary page, click the site name. This brings you to the Site Summary page, where you can view and adjust the site s summary, including site credentials, vulnerability findings, and site-specific activities. page 17 of 58

18 Site Summary Page page 18 of 58

19 Interpreting site findings Site Summary info boxes The boxes at the top of each site s summary page give you a quick overview of your site s completed scan number, priority, global rank, and industry rank. Scans completed in last 30 days: The number of scans that have finished in the preceding 30 days. Priority: The site s importance to your business, on a scale of 1 to 10. A change in priority affects the score of all vulnerabilities found on this site. Global rank: Indicates your site s approximate percentile rank against all sites that have been scanned at least twice. The percentage represents the percentage of sites that contain more vulnerabilities than your site. For example, if your site s global ranking is 20%, then 80% of all WhiteHat-scanned sites are more secure. Sites that have not yet been globally ranked are labeled Unranked. Industry rank: Indicates your site s approximate rank against all sites within your vertical market that have been scanned at least twice. Note: This box appears only if WhiteHat Security has scanned at least 10 sites in your industry more than once. To change the priority, scan speed, or industry rank: 1. From the Site Summary page, click the Settings link. 2. Adjust the settings. 3. Click Update. Hostnames and links The hostname is the base URL that we have under contract for a site. The scanner finds and tests only links that have the same base URL. This keeps scanning for your account to approved sites. For example, if a site has a hostname of only links that follow the structure are tested. (For example: and so on.) A site may also have one or more associated hostnames. An associated hostname is a URL that is different from the base URL, but is part of or the same as the application found on the main hostname. For example, a site may have sign-on and user account management pages on a URL such as secure.site.com, when the main hostname we have for the account is simply In this case, secure.site.com must be added as an associated hostname since it is considered to be part of the same account. To create an associated host name, contact WhiteHat Security Support. As your website continues to add features and functions, when you create links from the original site, the scanner finds them and marks them for testing during the next scheduled scan. All findings from this testing are reported in the next scan. For this and other reasons, we strongly recommend that you set scan schedules to run frequently and until completion. This ensures ongoing site coverage as you add new web code. page 19 of 58

20 Setting up your site credentials WhiteHat Security uses credential sets to log in to your sites and reach pages and forms that are not accessible to unauthenticated end users. Credential sets include: Username Password Login Entrance URL Destination URL (after a successful login) Other Login Notes (information about this site or users that WhiteHat Threat Research Center (TRC) engineers will need when setting up scanning or doing business logic testing) There are two uses for the credential sets: Scanning Credentials (all users). WhiteHat's automated scanning technology covers pages and forms throughout the site. Scans are limited to only one credential, so we encourage you to provide a super user login that allows us to visit the entire site. Business Logic Credentials (Sentinel PE users only). WhiteHat s Threat Research Center (TRC) engineers use these credentials to manually verify vulnerabilities, examine interactions among user roles, and see if website information leaks from one user to another. For instance, your site may behave differently for admin users, returning customers, prospects, or high-value shoppers. Labeling each credential pair ( admin, gold-card-customer, and such) helps our TRC engineers match credentials to business situations. The number of credentials you enter and how they are used depends on whether you have a Sentinel BE, SE, or PE account. Credentials should allow maximum access (such as admin or super user) to the site functions. Credentials are optional, but provide better scan coverage than having no credential. We strongly recommend assigning credentials. Sentinel Basic Edition (BE) account users enter one credential. This is used for automated scanning. Sentinel Standard Edition (SE) account users can enter one or two credentials, both used for automated scanning. The second credential is recommended as back up in case the first credential isn t accepted during scanning. Sentinel Premium Edition (PE) account users can enter one or more credentials. The first is used for automated scanning; the second is recommended as back up in case the first credential isn t accepted. Subsequent credential sets are used by WhiteHat s TRC engineers to perform Business Logic analysis. To create site credentials, follow these steps after logging in: 1. Click the Summary tab. 2. From Site Overview, select the site. 3. In the Site Summary page, click the Credentials link. page 20 of 58

21 Entering Credentials 4. Enter a Username and Password. 5. In the Login Entrance URL field, enter the URL where the scanner will enter these credentials. 6. In the Destination URL field, enter the URL that displays after a successful login, if applicable. (Not all websites change the URL as part of their authentication methodology.) 7. (Optional) In the Other Login Notes field, enter information to distinguish this account from others that have varying levels of access to the web application. (Examples: You need to have cookies turned on or Site asks for your pet s name. Answer: Lassie. ) 8. Click Done, or click Add a Credential if you have more than one credential for the scanner to use. You can now enter the second half of the pair, with a different username and password but similar permissions. PE users can also assign roles and credential pairs for Business Logic testing. page 21 of 58

22 Site Credentials (Example) After you have set up credentials, the Credential page includes the following state information: Valid means we have confirmed that these credentials work. Under Review means we have not yet tested these credentials or put them to work in automated scans. Invalid means we have had trouble logging into your site, or otherwise cannot get the login to work. The last user to change/edit information, and when changes were made. F5 Web Application Firewall (WAF) Credentials Who can do this? Administrator, Security Operator WhiteHat Sentinel integrates with the F5 Application Security Manager (ASM), a web application firewall that applies a security policy to protect against website attacks. Sentinel users can update their F5 ASM security policy on a per-vulnerability basis from within the Sentinel interface, which mitigates the risk of website exploitation while the vulnerability is addressed with an application code or system update. To add or modify F5 WAF credentials, go to Account > Manage F5 Credentials link. To add a new F5 ASM device and proper credentials, click the New credential link. To modify credentials, from the Actions column, click Edit. Adjusting a site's priority level, scan speed, and industry You can specify your site s priority level, scanning frequency, and the industry to which your site belongs. To edit your site settings: 1. Log in to your Sentinel account. 2. From Summary > Executive Summary > Site Overview, click the site name. page 22 of 58

23 3. Click the Settings link. 4. In the Priority field, select a level from 1 (Low) to 10 (Urgent). Level 5 is the default for all sites added to Sentinel. Note: Changing this number also affects the Score of all individual vulnerabilities discovered on this site. 5. In the Scan Speed field, select whether you want the scanner to send: Slow: Up to two HTTP requests per second Medium: Up to four requests per second (default) Fast: Unlimited requests per second 6. In the Industry field, select the closest match to your site's vertical market. 7. Click Update. page 23 of 58

24 Managing Sentinel Scans Who can do this? Administrators and Security Operators WhiteHat Security IP Addresses To enable us to scan your website, your security team may need our IP addresses: /27: This is a range of 30 addresses for Sentinel Service PE testing, disaster recovery ranges, and so on /30: This is a range of two addresses. These IP ranges are used for backup/disaster recovery: /28: This is a range of 14 addresses /28: This is a range of 14 addresses. How long do scans take to complete? WhiteHat Sentinel scans run "low and slow," meaning they should have no discernible effect on your website's performance. WhiteHat Security scans some of the most complex and mission critical websites in the world without causing performance issues. Scan time depends on various factors, such as: Size and complexity of the website Input number The number of pages to assess Web server speed (page load time) Amount of business logic within the website Length of scan windows provided by the customer Initial scans for the average WhiteHat-monitored site may take a day or less, but very large sites may take as long as a few weeks to complete. Note: Sentinel SE and PE users, keep in mind that findings appear in your interface after they have been verified by a TRC engineer. page 24 of 58

25 Scheduling scans For your first few scans, we recommend scheduling your scans to run during non-peak hours and continuously during the weekend. Once you have confirmed that there is no impact by scans during those time periods, we recommend running scans continuously, which means 24 hours a day, with a fresh scan starting as soon as the current one completes. Schedules take effect right away. If your schedule allows scanning in the current hour, it will start (or continue). It can take up to 10 minutes for scans to stop or start. You will see the current scan status (after you refresh your browser window) as it changes. If you turn off scanning in the current hour, it will start again the next time an allowable hour arrives. There are no options for fractional hour scheduling or setting scans to start on a future calendar date. For simplicity, we have included primary global time zones, but not every unique combination of time zone/savings time. Contact support@whitehatsec.com to log an enhancement request for additional time zones. To schedule a scan: 1. Go to one of the following areas: Summary > Executive Summary Summary > Executive Summary > Site Overview <site name> Schedule 2. For the selected site, in the Scan Schedule column, select a schedule. Continuous: Enables scanning at all times. This is the recommended option. Nights and Weekends, 8P-6A: Enables scanning between 8:00 PM and 6:00 AM during weekdays and continuously during weekends. Be sure you select a corresponding time zone to determine exactly when 8:00 PM is in that geography. The time zone option defaults to the time zone you picked for yourself on the Account tab, but can also be set for each site from the Time Zone column to the right of the Scan Schedule column. Not Scheduled/Stopped: When you first set up your sites, they are set to Not scheduled/stopped. Be sure to schedule regular scans for each site, so WhiteHat Sentinel can continue to monitor for any threats. Customize: You can create your own custom scan schedule, as follows. When you select Customize, you can either create a schedule (recommended) or run the scan once. Schedule scanning time A grid shows all of the hours in a week. The rows represent days (starting with Sunday) and the columns represent hours (starting with 0:00-0:59, or Midnight to 1:00 AM). page 25 of 58

26 Customizing Scan Times By default, all hours show a green check mark, specifying that scanning is permitted during that hour. If you leave all cells with green check marks, this is the same as a continuous scan. You can click individual cells, changing them to red X's. Red X's signify that scanning is not permitted during that hour. To change multiple cells, you can: Click and drag your mouse around the interface. Click a row or column header to change an entire row/column. Click a second time to toggle between green check marks and red X s. The time zone selected should match where your system is or the clock to which your hours refer. The default is the time you chose in your user profile on the Account page. For example: You work in New York and the time zone under the Account tab is set for Americas/New York. Your web server is in Americas/Los Angles. If you leave the setting defaulted to New York, the scan will run/not run in Eastern Standard Time. If you change it to Los Angeles, the scan will run/not run in Pacific Standard Time, regardless of your default setting. Name the scan schedule something meaningful, such as NYSE non-trading hours. page 26 of 58

27 Once you create a schedule, it appears on the list as long as one or more sites are using it. Custom schedules created for one site can be re-used for additional sites. Editing a scan To edit an established scan: 1. From the Scan Schedule list, select Customize. 2. Edit the schedule as necessary. 3. Save the schedule under the previous name or give it a new name. Scanning only once Note: We recommend against scanning once without an ongoing schedule, since this leaves your site unprotected after that single scan completes. When you select this option, all hourly/daily scheduling windows are disabled. The scan starts immediately and runs continuously until it completes, for one time only. To run one scan, from Scan Schedule > Customize, click Run scan once continuously until completion. Stopping a Scan To disable all scanning for a site, or stop a running scan, select Not scheduled/ Stopped. You cannot pause and restart a scan while it is running. A status of Not scheduled/stopped leaves your site unprotected, so we do not recommend leaving sites in this state. You may get frequent reminders that this site needs a new scan schedule. Exporting scan schedules For a comma-separated values (CSV) file with schedule information for all of your sites: 1. Click the Schedule or Summary tab. 2. Below the Site Overview, click the Download CSV link. Download CSV Link By default, the file is named scheduled_scans.csv. This file may show more than one row for each site, since it lists each contiguous block of hours that the scan will run. For instance, each nightly scan window may have its own entry. page 27 of 58

28 Viewing recent scan activity As described below, you can view the following scan activity details for all of your sites or each site individually: Vulnerability scan started indicates a newly scheduled scan cycle has begun. Vulnerability scan completed indicates the total scan cycle has finished. Vulnerability scan paused, end of scan period reached appears only for scans that run during limited hours, and indicates the scheduled time duration has reached its limit for the day. For instance, a scan scheduled to run from midnight to 6 a.m. pauses at 6 a.m. It automatically resumes during the next window of time in your scan schedule (such as midnight in the above example). Vulnerability scan paused by WhiteHat Security means that the WhiteHat Security TRC team paused the scheduled scan. Vulnerability scan resuming is also used for limited-hour scans, and indicates the scheduled time in which the paused scan picked up where it left off. All sites WhiteHat Sentinel tracks all activities and events related to your account. To view a list of activities for all sites on your account in the last 90 days: 1. Click the Summary tab. 2. Click the Recent Activities link. 3. View your list of activities, listed by date. For a full archive, click the see complete history link. Individual sites To view activities for individual sites: 1. From the Summary page, click the name of the site. 2. From the Site Summary page, either: Click the Activities link. You see the site's scan activity over the past 90 days. To view all activity, click see complete history. Scroll to the bottom of the page to view the site's 10 most recent activities. To view the 90-day history, click the show all... see complete history link. From there, to view the complete archive, click see complete history. Tested URLs and additional hostnames Sentinel discovered 1. Go to Summary > [site name]. 2. On the site summary page, in the box next to the last chart (the site name is at the top of the list), scroll down to the Link Info section. 3. To see if a particular part of your site has been tested, click View all links found in your current scan or View all pages tested in your current scan. If the section of the site you are concerned with appears in any of these URL lists, it has been tested. page 28 of 58

Attack Vector Detail Report Atlassian

Attack Vector Detail Report Atlassian Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes cdavies@atlassian.com The Attack Vector Details report provides details of vulnerability

More information

Web Application Report

Web Application Report Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012

More information

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration Hosted VoIP Phone System Admin Portal User Guide for Call Center Administration Contents Table of Figures... 4 1 About this Guide... 6 2 Accessing the Hosted VoIP Phone System Administration Portal...

More information

2,000 Websites Later Which Web Programming Languages are Most Secure?

2,000 Websites Later Which Web Programming Languages are Most Secure? 2,000 Websites Later Which Web Programming Languages are Most Secure? Jeremiah Grossman Founder & Chief Technology Officer 2010 WhiteHat Security, Inc. WhiteHat Security Founder & Chief Technology Officer

More information

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014 QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

Online Vulnerability Scanner Quick Start Guide

Online Vulnerability Scanner Quick Start Guide Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.

More information

Web Application Vulnerability Testing with Nessus

Web Application Vulnerability Testing with Nessus The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP rikjones@computer.org Rïk A. Jones Web developer since 1995 (16+ years) Involved with information

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE

TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE .trust TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE 2007 Table of Contents Introducing Trustwave Vulnerability Management 3 1 Logging In and Accessing Scans 4 1.1 Portal Navigation and Utility Functions...

More information

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Web App Security Audit Services

Web App Security Audit Services locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System

More information

Columbia University Web Security Standards and Practices. Objective and Scope

Columbia University Web Security Standards and Practices. Objective and Scope Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements

More information

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd. Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive

More information

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal This Application Note provides instructions for configuring Apps settings on the Cisco OnPlus Portal and Autotask application settings

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

POINT OF SALES SYSTEM (POSS) USER MANUAL

POINT OF SALES SYSTEM (POSS) USER MANUAL Page 1 of 24 POINT OF SALES SYSTEM (POSS) USER MANUAL System Name : POSI-RAD System Release Version No. : V4.0 Total pages including this covering : 23 Page 2 of 24 Table of Contents 1 INTRODUCTION...

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9) Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning

More information

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

Last update: February 23, 2004

Last update: February 23, 2004 Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to

More information

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015 QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup

More information

Access Softek, Inc. Mobile Finance Manager (MFM)

Access Softek, Inc. Mobile Finance Manager (MFM) Access Softek, Inc. Mobile Finance Manager (MFM) User Guide for Windows Mobile Devices Table Of Contents 1. Introduction...1 1.1. Product Features - Convenient and Secure...1 2. Installing MFM...2 3. Using

More information

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without

More information

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started with Mechanics

More information

Salesforce Customer Portal Implementation Guide

Salesforce Customer Portal Implementation Guide Salesforce Customer Portal Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

Licensing Guide BES12. Version 12.1

Licensing Guide BES12. Version 12.1 Licensing Guide BES12 Version 12.1 Published: 2015-04-02 SWD-20150402115554403 Contents Introduction... 5 About this guide...5 What is BES12?...5 Key features of BES12... 5 About licensing...7 Steps to

More information

Important Information

Important Information June 2015 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015 Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%

More information

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked. This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out

More information

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

EMC Documentum Webtop

EMC Documentum Webtop EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights

More information

Student ANGEL FAQs. General Issues: System Requirements:

Student ANGEL FAQs. General Issues: System Requirements: Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first

More information

FileMaker Server 13. FileMaker Server Help

FileMaker Server 13. FileMaker Server Help FileMaker Server 13 FileMaker Server Help 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,

More information

Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)

Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9) Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Perimeter Service... 3 Subscription and Activation... 3 Multi Scanner Support...

More information

ASRM Career Center. The ASRM Career Center can be accessed from the ASRM Homepage:

ASRM Career Center. The ASRM Career Center can be accessed from the ASRM Homepage: ASRM Career Center The ASRM Career Center can be accessed from the ASRM Homepage: All Job Seeker links are on the left. Click here to get Employer links You must create an account before doing anything

More information

FileMaker Server 14. FileMaker Server Help

FileMaker Server 14. FileMaker Server Help FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Assets, Groups & Networks

Assets, Groups & Networks Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Online Bill Payment & Presentment User Guide

Online Bill Payment & Presentment User Guide Table of Contents Alerts and Notifications... 4 Add an email Notification...4 Cancel an email Notification...5 Automatic Payments... 6 Add a Standard Automatic Payment Rule...6 Add an Automatic Payment

More information

Dashboard Admin Guide

Dashboard Admin Guide MadCap Software Dashboard Admin Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

Nipper Studio Beginner s Guide

Nipper Studio Beginner s Guide Nipper Studio Beginner s Guide Multiple Award Winning Security Software Version 2.1 Published March 2015 Titania Limited 2014. All Rights Reserved This document is intended to provide advice and assistance

More information

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

Verizon Business National Unified Messaging Service Enhanced Service Guide

Verizon Business National Unified Messaging Service Enhanced Service Guide USER GUIDE Voice Verizon Business National Unified Messaging Service Enhanced Service Guide What Is Unified Messaging? Verizon Business National Unified Messaging Service is an interactive voicemail system

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Hosted Fax Mail. Hosted Fax Mail. User Guide

Hosted Fax Mail. Hosted Fax Mail. User Guide Hosted Fax Mail Hosted Fax Mail User Guide Contents 1 About this Guide... 2 2 Hosted Fax Mail... 3 3 Getting Started... 4 3.1 Logging On to the Web Portal... 4 4 Web Portal Mailbox... 6 4.1 Checking Messages

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Admin Guide Virtual Private Server (VPS) MailStreet Hosting Control Panel (CP)

Admin Guide Virtual Private Server (VPS) MailStreet Hosting Control Panel (CP) Admin Guide Virtual Private Server (VPS) MailStreet Hosting Control Panel (CP) DOCUMENT REVISION DATE: September 1, 2009 Virtual Private Server (VPS) Admin Guide / Table of Contents Page 2 of 87 Table

More information

Cloudfinder for Office 365 User Guide. November 2013

Cloudfinder for Office 365 User Guide. November 2013 1 Contents Getting started with Cloudfinder for Office 365 1... 3 Sign up New Cloudfinder user... 3 Sign up Existing Cloudfinder user... 4 Setting the Admin Impersonation... 4 Initial backup... 7 Inside

More information

Configuring MailArchiva with Insight Server

Configuring MailArchiva with Insight Server Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any

More information

ACHieve Access 4.3 User Guide for Corporate Customers

ACHieve Access 4.3 User Guide for Corporate Customers ACHieve Access 4.3 User Guide for Corporate Customers January 2015 Citizens Bank 1 February 2015 Table of Contents SECTION 1: OVERVIEW... 4 Chapter 1: Introduction... 5 How to Use This Manual... 5 Overview

More information

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal This Application Note explains how to configure ConnectWise PSA (Professional Service Automation) application settings and Cisco

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

SonicWALL SSL VPN 3.5: Virtual Assist

SonicWALL SSL VPN 3.5: Virtual Assist SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following

More information

Executive Summary On IronWASP

Executive Summary On IronWASP Executive Summary On IronWASP CYBER SECURITY & PRIVACY FOUNDATION 1 Software Product: IronWASP Description of the Product: IronWASP (Iron Web application Advanced Security testing Platform) is an open

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

FileMaker Server 11. FileMaker Server Help

FileMaker Server 11. FileMaker Server Help FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered

More information

Evoko Room Manager. System Administrator s Guide and Manual

Evoko Room Manager. System Administrator s Guide and Manual Evoko Room Manager System Administrator s Guide and Manual 1 1. Contents 1. Contents... 2 2. Read this first! Introduction to this Guide... 6 3. User Guide... 6 4. System Architecture Overview... 8 ----

More information

ewebextra OfficeMate Integration User s Guide

ewebextra OfficeMate Integration User s Guide ewebextra OfficeMate Integration User s Guide September 2013 2013 Eyefinity, Inc. All rights reserved. Eyefinity, OfficeMate, ewebextra, and ExamWRITER are registered trademarks of Eyefinity, Inc. All

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

MultiSite Manager. User Guide

MultiSite Manager. User Guide MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Application Security Testing. Generic Test Strategy

Application Security Testing. Generic Test Strategy Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication

More information

Virtual Private Server Manual

Virtual Private Server Manual Virtual Private Server Manual How to access your VPS....Page 2 Downloading MetaTrader 4.Page 6 Automatic Performance Updates and MT4 Restart.. Page 10 Troubleshooting.Page 14 Loading an EA..Page 15 1 How

More information

VERALAB LDAP Configuration Guide

VERALAB LDAP Configuration Guide VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to

More information

Salesforce Integration

Salesforce Integration Salesforce Integration 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

GP REPORTS VIEWER USER GUIDE

GP REPORTS VIEWER USER GUIDE GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated

More information

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP) Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage

More information

Customer Portal User Guide

Customer Portal User Guide Customer Portal User Guide COPYRIGHT NOTICE ViaWest Customer Portal User Guide is published and copyrighted 2012 by ViaWest Inc. All rights reserved. No part of this manual may be reproduced in any form,

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

System Administration and Log Management

System Administration and Log Management CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities

More information

ewebextra OfficeMate Integration User s Guide

ewebextra OfficeMate Integration User s Guide ewebextra OfficeMate Integration User s Guide April 2014 2014 Eyefinity, Inc. All rights reserved. Eyefinity, OfficeMate, ewebextra, and ExamWRITER are registered trademarks of Eyefinity, Inc. All other

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

locuz.com Professional Services Security Audit Services

locuz.com Professional Services Security Audit Services locuz.com Professional Services Security Audit Services Today s Security Landscape Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer.

More information

CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide

CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM User Guide Revision D Issued July 2014 Table of Contents About CRM Migration Manager... 4 System Requirements... 5 Operating Systems... 5 Dynamics

More information

(WAPT) Web Application Penetration Testing

(WAPT) Web Application Penetration Testing (WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Frequently Asked Questions for the USA TODAY e-newspaper

Frequently Asked Questions for the USA TODAY e-newspaper Frequently Asked Questions for the USA TODAY e-newspaper Navigating the USA TODAY e-newspaper A look at the toolbar Toolbar Functions, Buttons, and Descriptions The tab marked Contents will take the e-reader

More information

Personal Call Manager User Guide. BCM Business Communications Manager

Personal Call Manager User Guide. BCM Business Communications Manager Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008

More information

Xopero Centrally managed backup solution. User Manual

Xopero Centrally managed backup solution. User Manual Centrally managed backup solution User Manual Contents Desktop application...2 Requirements...2 The installation process...3 Logging in to the application...6 First logging in to the application...7 First

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

LifeSize UVC Manager TM Deployment Guide

LifeSize UVC Manager TM Deployment Guide LifeSize UVC Manager TM Deployment Guide May 2014 LifeSize UVC Manager Deployment Guide 2 LifeSize UVC Manager Network administrators who use UVC Manager to manage video and voice communications systems

More information

Managed Security Web Portal USER GUIDE

Managed Security Web Portal USER GUIDE Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1

More information

Documentum Content Distribution Services TM Administration Guide

Documentum Content Distribution Services TM Administration Guide Documentum Content Distribution Services TM Administration Guide Version 5.3 SP5 August 2007 Copyright 1994-2007 EMC Corporation. All rights reserved. Table of Contents Preface... 7 Chapter 1 Introducing

More information