New Zealand National Cyber Security Centre
|
|
|
- Collin Caldwell
- 10 years ago
- Views:
Transcription
1 Unclassified New Zealand National Cyber Security Centre Application Whitelisting With Microsoft Applocker June 2012 V1.0.5
2 Application Whitelisting with Microsoft Applocker Cyber Security Plan As outlined in the New Zealand Cyber Security Plan (CSP), crown entities are currently working to adopt the top 4 of the top 35 mitigations identified by the Australian Defence Signals Directorate s (DSD) research into reported incidents. Full details of the top 35 mitigation strategies can be found here: Specifically, the top 4 threat mitigation strategies being implemented in the first phase of the CSP are: Patching all applications employed by agencies. Patching operating system vulnerabilities Minimising users with administrative account privileges on networks Application whitelisting to prevent the execution of unauthorised programmes. Application whitelisting is one of the best available protections against malware. This document aims to outline how this affordable, highly efficient anti-malware protection can be utilised whilst maintaining minimal oversight costs. Disclaimer The use of Applocker is not NCSC or GCSB policy. This document is intended as a reference / guideline for configuration and management of Applocker. NCSC accepts no liability or responsibility to any person or organisation as a consequence of any loss or any other issues that may arise while using this document. The users of this document are recommended to use a test environment which is able to be recovered or rebuilt in the unlikely event of issues. 2
3 Overview The origins of Software Restriction Policies date back to Server 2000 and XP: Software Restriction Policies (SRP), in Windows XP and Windows Vista, gave IT administrators a mechanism to define and enforce application control policies. However, SRP could become a management burden in a very dynamic desktop environment where applications were installed and updated on a constant basis because the application control policies predominantly used hash rules. With hash rules, a new hash rule needs to be created every time an application is updated. 1 The US National Security Agency (NSA) produced a guide on general application whitelisting using SRP in The NSA guide is available here: Initial adoption of whitelisting by using SRP was limited, as initial versions required significant effort to maintain whitelisted applications and patching requirements. Applocker is a revision of earlier versions of SRP, and was released as a new feature available in Windows 7 Enterprise, Windows 7 Ultimate, and server 2008R2, and was designed to streamline application whitelisting. Applocker An Overview Applocker provides a 4x3 approach to protection. It can be set to protect four primary file types; executable, script, DLL file types and Microsoft Install (MSI) files, and is capable of providing three protection types; Signed, Hashes and Path protections
4 File types: Executable Script DLL Microsoft Install Files (MSI) Protection types: Signed(Primary feature) Hashes Path Important: By default DLL protection is not enabled - it must be enabled manually upon setup. Enabling DLL protection is pivotal in realising the security gains of whitelisting, as a significant portion of the malicious code found in the cyber environment, is distributed as DLL. Limitations There are some limitations to Applocker, as whitelisting is performed while loading controlled files from media (such as disk) to memory, but does not perform whitelisting protection when injecting controlled files directly into memory, as is often seen during exploitation. Applocker Management Tools Applocker employs standard Microsoft management tools which many system administrators will be familiar with: Group Edit; gpedit.msc which is used to manage the rules Event viewer; eventvwr.msc which is used to monitor logs As an additional streamlining practise, it is also recommended that system administrators configure event logs to be sent to a Syslog server to allow centralised log management and alerting. 4
5 Getting Started This section will demonstrate an example of how a set up and configure Applocker. Step 1 - Enabling DLL Protection To recognise the protection benefits offered by Applocker, it is important as a first step to enable DLL protection. To do so; 1. Start gpedit (Start/(in search) gpedit.msc). You will need administrator rights to run gpedit (Ctrl right-click and select run as Administrator). 2. Navigate to Computer Configuration/Windows Settings/Security Settings/Application Control Policies/Applocker/Configure rule enforcement. This will open the Applocker Properties window. 3. Select the Advanced tab. 4. Select Enable DLL rule collection. 5. Click Apply. 5
6 Step 2 - Enable Enforcement Following on from the previous step, whilst in Applocker Properties, auditing should be enabled; 1. Select the tab Enforcement For all rule types, enable Configured 2. Select Audit only For all rule types, select Audit only. 3. Click OK to apply and close the Properties. The above picture shows an example of enabled rule sets configured for Audit only. Important:: You should always start with Audit and test your rules before fully enabling enforcement or you may lock yourself out of Windows. Example of Executable Rules This section aims to provide an easy to implement and administer Applocker configuration, which will focus on approved software publishers rather than approved/whitelisted individual applications. As a result, most of the rule examples provided are geared towards whitelisting rules by publisher. The example below demonstrates a whitelisting setup focused on a publisher oriented rule set: 6
7 Automatic Rule Creation To minimize the risk of missing individual applications it is recommended, when setting up rules, to use the automatically find and create rules option. Important: Do not create the default rules - the default rules are set to allow anything in the system folder and program folders to be executed, including possible malicious software. 1. Select Executable Rules under Applocker in gpedit.msc. 2. Right click and select Automatically generate rules. 3. In Folder and permissions, select your system folder. 4. In rule preferences, base the rules on Publisher and File Hash (file hash is used for unsigned files). 7
8 5. Select Reduce number of rules. 6. Review and select Create. 7. Repeat the process for each directory where applications are installed. Typical directories to generate rules for include: c:\windows, c:\program files, and c:\program files(x86). The picture above shows an example of discovered programs. Edit and Consolidate Rules To minimise the number of rules when whitelisting applications by publisher, it is possible to create one rule for each publisher and change all fields except the publisher to a wildcard, *, which allows any applications signed by approved publisher to run. Delete any duplicate rules for the same publisher. Note: Some publishers may use more than one Certificate. If that is the case, you will need multiple rules for that publisher. 8
9 The picture below shows an example where a single application rule has been changed to a publisher rule. Rule creation for DLL, Scripts and MSI For DLL files - repeat the process as for EXE files. For Scripts - perform a risk review. Allowing scripts can introduce an element of risk to systems, so it is recognisable that whitelisting should be thoroughly considered. The list below contains some of the key issues which should be considered: What damage could a malicious script cause? What scripts are safe to run? In what locations can scripts run? 9
10 Who can write/create scripts in whitelisted locations? What type of whitelisting should be used (signed, path, hash)? Other risks/considerations? Note: Some programs do use scripts as part of their operation. A typical script that should be whitelisted is the Logon Script. For MSI (and exe installers) specify who can install. By limiting the MSI installation privileges this setup will provide better protection and minimise the risk, of a malicious script or an exploit with administrator privileges, installing software. 1. Create a safe location such file share or somewhere on a local drive. 2. Create a rule allowing a specific administrator to install files from this location. Keep this account disabled and only enable it when you need to install software. Review and Test Before going live with a rule set defined in Applocker, it is essential that systems administrators review and test the Applocker rules. 1. Review all rules 2. Ensure Enforcement is set to log 3. Start Applocker by starting the service Application identity. 4. Configure the service Application identity to automatically start. 5. Start/Stop applications, services and reboot the system. 6. Frequently review the logs with event viewer to check for issues (see the next chapter for details). If Applocker indicates that it is blocking unknown applications, DLLs & scripts, assess each instance for appropriateness and create new rules as required. 10
11 7. Windows uses hidden file system mounts in the system folder. You may get errors/warnings for missing files that don t exist. If this happens, search for the file, typically located somewhere else in the system folder. 8. Create new rules only as required. 9. Repeat the review process until there are no errors or warnings. Note: Not all software vendors call dll files.dll. Important: Be mindful of malware when setting up Applocker. If unsure about a particular application, script or DLL, check with the software provider or Microsoft. If you are checking for information on the Internet, be conscious of malicious websites providing false information about the legitimacy of files. Some sites are also injecting drive by malware. Log review Use Event Viewer to review the logs. Start event viewer and navigate to Application and Services Logs/Microsoft/Applocker. Under Applocker there are two groupings, EXE and DLL, and MSI and Scripts. Apply a filter using Filter Current Log to only display Critical, Error, and Warning events. The picture below shows an example of event viewer displaying a DLL being blocked. Note the extension of the file. 11
12 Going Active Once rules have been reviewed and there are no more warnings or errors, Applocker whitelisting can go active. Prior to doing so, make sure you have backups and/or the capability to perform a roll back just in case Windows is unable to start. To go active/live: 1. Open Applocker configure rule enforcement to get the Applocker Properties. 2. Change rule enforcement to Enforce rules and click OK. 3. Reboot. 4. Review the Applocker logs. 5. Create more rules as required. 12
13 The picture above shows the Applocker Properties set to Enforce rules. Other information Some important points to remember are: In Active Directory Restrict access to Applocker rules (It is important to limit who can review and create rules for Applocker). Ensure SCCM/WSUS can deploy patches. Never access the internet from an account that has administrator rights. If possible use application virtualization such as App-V or similar in combination with Applocker. Always use an up-to-date anti-virus solution. 13
14 Always use a properly configured firewall. A desktop/laptop can be part of Active Directory with a firewall blocking all incoming traffic (patching/remote management may need specific rules). Disable or uninstall any unnecessary services. Disable sharing and NetBios protocols. Enable Data Execution Prevention (DEP) for all programs. Set User Account Control (UAC) settings to highest level. Disable remote assistance and remote desktop connections (unless required for remote support in a corporate environment). Disable Autorun. If possible use sandbox capable/enabled applications that access the Internet. Contact Information Contact and other information about NCSC can be found on our website 14
Microsoft Corporation. Status: Preliminary documentation
Microsoft Corporation Status: Preliminary documentation Beta content: This guide is currently in beta form. The AppLocker team greatly appreciates you reviewing the document and looks forward to receiving
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
National Security Agency
National Security Agency Information Assurance Directorate Vulnerability Analysis and Operations Systems and Network Analysis Center Application Whitelisting using Software Restriction Policies Version
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Times have Changed & A/V Executives Agree An A/V product as your sole endpoint protection solution isn t enough.
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection Description Lab flow At the end of this lab, you should be able to Discover how to harness the power and capabilities
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
Symantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
Installation Guide - Client. Rev 1.5.0
Installation Guide - Client Rev 1.5.0 15 th September 2006 Introduction IntraNomic requires components to be installed on each PC that will use IntraNomic. These IntraNomic Client Controls provide advanced
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions
Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions 1 Agenda What is Application Whitelisting (AWL) Protection provided by Application
Additional Security Considerations and Controls for Virtual Private Networks
CYBER SECURITY OPERATIONS CENTRE APRIL 2013 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES
A Roadmap for Securing IIS 5.0
This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to
Top 4 Strategies to Mitigate Targeted Cyber Intrusions
CYBER SECURITY OPERATIONS CENTRE JULY 2013 Top 4 Strategies to Mitigate Targeted Cyber Intrusions Mandatory Requirement Explained Including technical implementation advice for a Windows environment CONTENTS
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
APT Detection with Whitelisting and Log Monitoring
APT Detection with Whitelisting and Log Monitoring Aaron Beuhring Kyle Salous About Us Kyle Salous is a 10-year Info Sec vet, covering a broad spectrum of subjects. He has a BS in Information Security
THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS
THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS BeyondTrust Solution Overview October 2014 Table of Contents Introduction... 3 BeyondTrust Solutions... 6 The BeyondInsight
DriveLock Quick Start Guide
Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
Outpost Network Security
Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Configuration for Professional Client Access
In a network environment, in order for the clients to access the data over the network, you will need to set up a network share to the data file. CREATING A NETWORK SHARE There may be slight differences
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Personal Folders Backup
Personal Folders Backup The Personal Folders Backup tool is designed for use in Outlook 2000 and later and the operating systems that support each respective Outlook version. The tool provides a quick
Advanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
Managed Antivirus Quick Start Guide
Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
Specific recommendations
Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It
GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET
FACTSHEET When setting up a small business there can be many areas of uncertainty, but getting your IT or computer systems right and connected does not need to be one of them. If your company is either
ManageEngine Desktop Central Training
ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
NetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
October 2014. Application Control: The PowerBroker for Windows Difference
Application Control: The PowerBroker for Windows Difference October 2014 1 Table of Contents Introduction... 4 The Default-Deny Approach to Application Control... 4 Application Control s Dependence on
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
MailStore Outlook Add-in Deployment
MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.
McAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
Universal Management Service 2015
Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright
K7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
Password Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
Upgrading Client Security and Policy Manager in 4 easy steps
Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security
1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS
1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS From the Start menu, point to All Programs, point to Microsoft SQL Server 2005, point to Configuration Tools, and then click SQL Server Configuration
NETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
Server Installation, Administration and Integration Guide
Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management
Data and Network Security
Data and Network Security Configuring and Using Tektronix Products in Secure Environments Global Operations, Quality and Compliance, Software Engineering Tektronix, Inc. November 12, 2010 Introduction...2
Abila MIP. Installation Guide
This is a publication of Abila, Inc. Version 2015.x Copyright 2014 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks
MANAGED FIREWALL SERVICE. Service definition
MANAGED FIREWALL SERVICE Service definition Page 1 of 4 Version 1.2 (03/02/2015) NSMS Managed Firewalls Service Definition Understanding of a firewall service The function of any firewall service is to
StruxureWare Power Monitoring 7.0.1
StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions
Distributing EmailSMS v2.0
Distributing EmailSMS v2.0 1) Requirements Windows 2000/XP and Outlook 2000, 2002 or 2003, Microsoft.NET Framework v 2).NET Framework V 1 Rollout Microsoft.NET Framework v1 needed to run EmailSMS v2.0.
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
http://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Abila MIP. Installation User's Guide
This is a publication of Abila, Inc. Version 2014.x Copyright 2013 Abila, Inc. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are registered trademarks
CaseWare Audit System. Getting Started Guide. For Audit System 15.0
CaseWare Audit System Getting Started Guide For Audit System 15.0 Copyright and Trademark Notice Copyright. 2013 CaseWare International Inc. ( CWI ). All Rights Reserved. Use, duplication, or disclosure
OUTLOOK ADDIN V1.5 ABOUT THE ADDIN
OUTLOOK ADDIN V1.5 ABOUT THE ADDIN The SpamTitan Outlook Addin v1.5 allows reporting of SPAM and HAM messages to the SpamTitan appliance, these messages are then examined by the SpamTitan Bayesian filter
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
How To Upgrade A Websense Log Server On A Windows 7.6 On A Powerbook (Windows) On A Thumbdrive Or Ipad (Windows 7.5) On An Ubuntu 7.3.2 (Windows 8) Or Windows
Websense v7.6 Install or Upgrade Checklist Greetings from Websense Technical Support. Most Websense upgrades complete successfully, and from my years of troubleshooting, I have learned a number of steps
File System Auditor Release Notes
File System Auditor Release Notes WHAT'S NEW IN FILE SYSTEM AUDITOR? To see what is new in File System Auditor, please see article Q14974 INFO: File System Auditor 2.x Version History in the ScriptLogic
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Como configurar o IIS Server para ACTi NVR Enterprise
Como configurar o IIS Server para 20101/1/26 NVR is a Windows based video surveillance software that requires Microsoft IIS (Internet Information Services) 6 or above to operate properly. If you already
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
DataCove. Installation Instructions for Search Plug-in for Microsoft Outlook 2007 & 2010 (All Users)
Installation Instructions for Search Plug-in for Microsoft Outlook 2007 & 2010 (All Users) System Requirements: Windows XP, Vista or 7 Outlook 2007 or 2010 32 bit Editions 1GB of RAM Microsoft.NET Framework
Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4
Digital Signatures User Guide Revision 1.2 build 1, Document Revision 1.12 Published 31. Octover 2011 ii Contents Copyright Disclaimer iii iii Introduction 1 System Requirements... 3 Installing the software
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
System Planning, Deployment, and Best Practices Guide
www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties
Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Sage Peachtree Installation Instructions
Sage Peachtree Installation Instructions Quick Tips for Network Install Use the following tips to help you install Sage Peachtree on a network: Always install Sage Peachtree FIRST on the computer that
ContentWatch Auto Deployment Tool
ContentWatch Auto Deployment Tool ContentWatch gives administrators the ability to easily distribute ContentProtect (or say our products) over any network. With our Unattended Installer you can install
Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29
Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your
For Splunk Universal Forwarder and Splunk Cloud
Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise
Opera 3 Installation & Upgrade Guide
Opera 3 Installation & Upgrade Guide Opera 3 Copyright Pegasus Software Limited, 2014 Manual published by: Pegasus Software Limited Orion House Orion Way Kettering Northamptonshire NN15 6PE www.pegasus.co.uk
ACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
Data Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
Microsoft SQL Database
This TechNote applies to MaxSea TimeZero Navigator and Explorer v1.9.5 and above Description: MaxSea display the following error when starting (in Navigation or Home Planning): Resolution: MaxSea TimeZero
How to deploy Arkeia Network Backup v10 on Windows Server 2008 and later with a domain
Alexandre Macard 11th January 2013 How to deploy Arkeia Network Backup v10 on Windows Server 2008 and later with a domain This step-by-step document describes how to use Group Policy to automatically distribute
Symantec LiveUpdate Administrator. Getting Started Guide
Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used
Alpha High Level Description
Alpha High Level Description Alpha is a Windows Domain Controller (DC) and Domain Name System (DNS) Server. Because Alpha was the first DC in the aia.class domain, it is also (by default) the Windows global
Important Notes for WinConnect Server VS Software Installation:
Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),
Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led
Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Course Description In this course you will learn how to reduce costs and increase efficiencies in your network. You will discover
IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide
IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server 2008 Chapter 10 Managing System Reliability and Availability Using and Configuring Event Viewer Event Viewer Houses the event logs that record information about all types
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
(Installation through ADSelfService Plus web portal and Manual Installation)
ADSelfService Plus Client Software Installation Guide (Installation through ADSelfService Plus web portal and Manual Installation) 1 Table of Contents Introduction:... 3 ADSelfService Plus Client software:...
Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005
Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure
Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded
NETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
PC Power Down. MSI Deployment Guide
PC Power Down MSI Deployment Guide 1. Introduction 1.1. Outline The client software for PC Power Down can be pushed out across a network, saving the effort of individually visiting each computer to install
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
