Windows and Linux Security Audit
|
|
|
- Milton James
- 10 years ago
- Views:
Transcription
1 Journal of Applied Business Information Systems, 3(4), Journal of Applied Business Information Systems Windows and Linux Security Audit Sergiu Miclea* * Master Student at Master in Business Information Systems, West University of Timisoara, Faculty of Economics and Business Administration, Timisoara, Romania Abstract: The security audit in operating system is necessary, especially when there are multiple users using it or when the system is part of a company s network. Before heading into the security audit, you have to be aware of the fundamentals of IT security auditing, whose main objective is to assure protection of the information assets and to dispense information properly to authorized parties. In order to make the best choice when choosing an operating system and security is the most important factor, you have to know each operating system procedures for creating, logging and reporting of security audits. Finally, it is necessary to make a list comparing the most important security features of the operating systems and choosing the best solution based on it. Keywords: Security, Audit, Windows, Linux, OS, Comparison, Logging. 1. INTRODUCTION In [6], client computers are the source of more the attacks and vulnerabilities than any other computer in an enterprise. They are often left out from audits due to lack of time, money and other resources. The reason why client computers are neglected in the audits, even though they are use for attack or are attacked more than servers and they make a substantially higher percentage of overall computers in a network, is because clients don t house the data and applications, so they are ignored in lieu of servers being the target for audits. My objective is to give a new perspective on how the clients should be perceived so they can be incorporated in to the audit, making the overall security and stability of the network dramatically increased. If the security control points, scope of clients and target goals are understood, then the audit should go smoother and faster. Comparisons between Microsoft Windows and Linux operating systems have been a much debated subject when discussing about personal computer and server industry. Windows is known for retaining its extremely large sales over other operating systems, while Linux sustains its status as the most obvious choice of free software operating system. A true comparison of security between the two operating systems is difficult to obtain and it is a subject vehemently discussed between security professionals and hobbyists. So, another objective is to identify what exactly are the main differences between Microsoft Windows and Linux, in terms of security, by studying different factors like malware, open or close, response speed, user accounts, file system permissions. If the k measurements are made by two groups independently, will get two tables, each having k lines and m+n columns. The lines correspond to the k measurements and the columns correspond to the m resultative variables Y 1, Y 2,..., Y m and the n independent variables X 1, X 2,..., X n. In [10], there are a few items that constitute the most common security parameters that can be evaluated in an operating system such as: - password rules (like length, history, required) - password aging - lock-out on unsuccessful logins
2 118 Miclea, Microsoft Windows and Linux Operating Systems Security Audit - login station and time restrictions - logging of certain events - access privileges - network security 2. INFORMATION TECHNOLOGY AND SECURITY AUDIT FUNDAMENTALS In [3], IT audit constitutes of an examination of the controls within IT infrastructure. The review obtained from the evaluation gives information regarding certain aspects such as safeguarding assets, maintain data integrity and effective operation in order to achieve the company s goals. The evaluation can be performed in conjunction with financial statement audit, internal audit. The purpose of IT audit differs from financial statement audit, because the latter is adhering to standard accounting practices, while IT audit evaluates the system s internal control design and effectiveness. This may include efficiency and security protocols, development processes. center location and observing processes and procedures performed within the data center. - Issuing the review report - The data center review report should summarize the auditor s findings and be similar in format to a standard review report. The review report should be dated as of the completion of the auditor's inquiry and procedures. In [8], a computer security audit is a manual or systematic measurable technical assessment of a system or application. - Federal or State Regulators - Certified accountants, CISA. Federal OTS, OCC, DOJ, etc. - Corporate Internal Auditors - Certificated accountants, CISA. - Corporate Security Staff - Security managers, CISSP, CISM. - IT Staff - subject matter experts, oversight support. The main objective is to assure protection of the information assets and to dispense information properly to authorized parties. In [2], information security audit is an audit on the level of information security in an organization. The information security audit s processes are: - Audit planning and preparation - The auditor should be adequately educated about the company and its critical business activities before conducting a data center review. The objective of the data center is to align data center activities with the goals of the business while maintaining the security and integrity of critical information and processes. - Establishing audit objectives - The next step in conducting a review of a corporate data center takes place when the auditor outlines the data center audit objectives. Auditors consider multiple factors that relate to data center procedures and activities that potentially identify audit risks in the operating environment and assess the controls in place that mitigate those risks. - Performing the review - The next step is collecting evidence to satisfy data center audit objectives. This involves traveling to the data Figure 1. IT General and Application Controls Hierarchy An appropriate way of looking IT General (which covers all information systems operation), can be seen in Figure 1 describing the IT controls hierarchically. At the top of the triangle are IT policies defining the overall enterprise IT organization. Moving down the Figure 1
3 hierarchically are general controls for IT standards, organization of the IT function, and physical and environmental controls. The next level down groups two of the technical-level general controls: systems software controls and systems development controls and at the base of the triangle are the application-based controls. Journal of Applied Business Information Systems, 3(4), In Windows Vista, but also in Windows Server 2008, the number of auditable events has increased from nine to 53. This enabled administrators to be more selective in the number and types of events to audit. The new auditing events are not integrated with Group Policy, however, and can only be deployed by using scripts with the Auditpol.exe tool. 3. MICROSOFT WINDOWS SECURITY AUDIT In [12], there is a lot of auditing enhancement in Microsoft Windows Server 2008 R2, but also in Windows 7. These enhancements improve the level of detail in security auditing logs and simplify the deployment and management of auditing policies. Among the enhancements there are: - Global Object Access Auditing. The administrators of Windows Server 2008 R2 and Windows 7, can define SACLs (system access control lists) for file system or registry. These control lists can then be applied to every object of that type. This feature can be used to verify if critical files, folder, registry settings are protected, but it also can be used for identifying when an issue with a resource occurs. - Reason for access Reporting. ACEs (access control entries) provide the privileges on which allowing and denying access to an object decision was based. This can be used for the documentation of permissions, which allow or prevent the occurrence of a particular auditable event. - Advance audit policy settings. There are more than 50 new settings that can be used instead of the nine basic auditing settings (which can be found in Local Policies/Audit Policy) to allow administrators to more specifically target the types of activities they want to audit and eliminate the auditing activities that are not necessary that can make auditing logs difficult to manage and decipher. Windows Server 2008 R2 and Windows 7 integrated all auditing capabilities with Group Policy. This allows administrators to use GPMC (Group Policy Management Console) in order to configure, deploy and manage these settings. These new systems allow IT professionals to track when precisely defined, significant activities take place on the network. These enhancements made to Windows Server 2008 R2 and Windows 7 allow administrators to connect business rules and audit policies. Administrators can apply audit policy settings on a domain and document the compliance with rules such as: - All group administrator activity with finance information - Track files that are accesses by a per-defined group of employees. - Verify if the correct SACL is applied to every object when it is being accessed. The enhancements support the needs of IT professionals responsible with the ongoing security of an organization's physical and information assets. There are a few considerations to take into account with auditing enhancements in Windows Server 2008 R2 and Windows 7: - Create an audit policy. If you want to create and advanced Windows security auditing policy, you have to use GPMC or Local Security Policy. - Apply audit policy settings. Client computers Windows XP Windows Vista Windows 7 Categories of security auditing 53 (integrated with 9 53 events that can be Group Policy) monitored Table 1. Evolution of security auditing categories in Microsoft Windows In Table 1 can be seen that Windows XP had nine categories of security auditing events that could be monitored for success, failure or both. These auditing events have a broad scope; some actions can generate a large number of event log entries. must run Windows Server 2008 R2 or Windows 7. These are also the only systems that can provide reason for access reporting data. - Develop an audit policy model. You must use GPMC targeting a domain controller running
4 120 Miclea, Microsoft Windows and Linux Operating Systems Security Audit Windows Server 2008 R2, in order to plan advanced security audit settings and global project access settings. - Distribute the audit policy. The GPO (Group Policy Object) can be distributed by using domain controllers running Windows server operating system. The advanced audit policy settings can be applied to systems running Windows Vista, but they must be created and applied separately by using Auditpol.exe log-on scripts. The basic audit policy settings and the advanced settings must not be combined, as they may cause unexpected results. In [13], to enable Windows Security Auditing on a system prior to Windows Vista and Windows 7 (Windows 2000 and Windows XP) you have to follow the steps: - Log-on to Windows using an administrator account. - Ensure the Group Policy snap-in is installed. - Click Start, point to Settings and then click Control Panel. - Double-click Administrative Tools. - Double-click Local Security Policies to start Local Security Settings MMC snap-in. - Double-click Local Policies to expand it, doubleclick Audit Policy. - In the right panel, double-click the policy that you want to enable or disable. - Click the Success an audited security access attempt that succeeds, and Fail audited security access attempt that fails check boxes for logging on and logging off. For example, if a user tries to access a network drive and fails, the attempt is logged as a Failure Audit event. The domain-level settings override the local policy settings. If Active Directory is enabled, administrators can monitor access to Active Directory. Connecting to the internet exposes anyone at risk. Someone could try to access a system and if there are not enhanced security measures, the hacker could steal confidential data. Account auditing gives the administrator the possibility to see who tries to break into a specific account. Whenever someone tries to access a system, an event is triggered when the access attempt was successful or failed. With account auditing settings these events can be logged by the system and the administrator is able to these log files at any time to see if the system is being accessed unauthorized. In [14], to enable account auditing on Windows 7, one must start secpol.msc tool, by using the run command from the start menu. The Local Security window will be displayed. Navigate to Local Policies, then Audit Policy and right click the Audit account log-on events policy option and choose Properties, as seen in Figure 2. Figure 2. Accessing the properties of Audit account log-on events
5 Check the check boxes corresponding to Success and Failure as seen in Figure 3. By setting them both on, the operating system will save the logs of both successful and failed attempts. Journal of Applied Business Information Systems, 3(4), Before getting into Linux security audit, I would like to point out the Linux operating system architecture. The architecture diagram as seen in Figure 4 is made of: - Linux kernel the code that connects the user application and system hardware. - Hardware controllers these are used by the kernel to interact with the hardware. - Operating system services this is software, excluding the kernel, which is considered part of the OS. For example: X Windows system, command shell. - User applications software other than the kernel and operating system services. For example: word processors, browser, and multimedia applications. Figure 3. Settings for auditing the attempts After the administrator follows the same procedure for Audit log-on events, he can see the logs of the log-in attempts with Event Viewer. To access the Event Viewer, search for event viewer on the Windows 7 start menu. In the Event Viewer, navigate to Windows Logs, then Security option and he can see the logs for both the successful and failed log-on attempts. 4. LINUX SECURITY AUDIT The best choice for auditing file events in a Linux operating system is to use the audit system of kernel version 2.6. Modern versions of Linux (2.6 and up) come with auditd daemon. This tool is responsible with writing audit records to the disk. When the tool starts up, it reads the rules specified in /etc/audit.rules. The administrator may open this file to make changes. For a successful audit procedure the administrator must use some utilities like these ones: - auditctl this utility helps with the controlling of the kernel s audit system. Using this tool, the administrator can get statuses, add or delete rules from the kernel audit system. - ausearch using this command the administrator may query the audit daemon logs for events based on the specified search criteria - aureport this tool is used for viewing reports generated based on the audit system logs. Figure 4. Linux architecture diagram
6 122 Miclea, Microsoft Windows and Linux Operating Systems Security Audit Before any auditing, it is necessary to install audit package, which contains the user utilities for storing and searching the audit records generated by the audit subsystem. These steps apply to Linux 2.6 kernel subsystem. CentOS or Red Hat and Fedora Core includes rpm package. To install the package, the administrator must use yum or up2date command. For example: # yum install audit or # upd2date install audit. To configure the auditd service to start on boot, the administrator must use the command # ntsysv or # chkconfig auditd on. The command # /etc/init.d/auditd start, starts the auditing service. The next steps should be setting a file for auditing. For example, if the administrator would like to audit a /etc/passwd file, he would type the following command: # auditctl w /etc/passwd p war k password-file. - -w /etc/passwd is used to insert a watch for the file system object at given path, in this case the passwd file. - -p war is used to set permissions filter for a file system watch. Other examples are r for read, w for write, x for execute and a for append. - -k password-file is used to set a filter key on passwd (watch). It can uniquely identify the audit records produced by the watch. When searching audit logs, the administrator must use password-file string or phrase. So, with all these commands, the administrator is monitoring a /etc/passwd file for anyone (including the syscall ) for write, append or read operations on a file. Another example is watching on etc/shadow with the arbitrary filterkey shadow-file that can generate records for reading, writing, executing and appending to shadow : # auditctl w /etc/shadow k shadow-file p rwxa The next example suppresses auditing for mount syscall exits: # audit a exit,never S mount In the next example, the command adds a watch tmp with a null filter-key that generates execute records on /tmp. This command is especially used on a webserver: # auditctl w /tmp p e k webserver-watch-tmp The next command allows an administrator to see all the system calls made by a program called sshd, which has the process id pid 1005: # auditctl a entry,always S all F pid=1005 When the administrator needs to find out who accessed a file, for example /etc/passwd, he needs to run any of the commands: # ausearch f /etc/passwd # ausearch f /etc/passwd less # ausearch f /etc/passwd i less The command -f /etc/passwd, does a simple search for the specified file. The parameter -i is used to interpret numeric entries into text. For example, an unique identifier can be converted to an account name. Running the commands generates the following output: type=path msg=audit(03/16/ :52:59.985:55) : name=/etc/passwd flags=follow,open inode= dev=08:02 mode=file,644 ouid=root ogid=root rdev=00:00 type=cwd msg=audit(03/16/ :52:59.985:55) : cwd=/webroot/home/lighttpd type=fs_inode msg=audit(03/16/ :52:59.985:55) : inode= inode_uid=root inode_gid=root inode_dev=08:02 inode_rdev=00:00 type=fs_watch msg=audit(03/16/ :52:59.985:55) : watch_inode= watch=passwd filterkey=password-file perm=read,write,append perm_mask=read type=syscall msg=audit(03/16/ :52:59.985:55) : arch=x86_64 syscall=open success=yes exit=3 a0=7fbffffcb4 a1=0 a2=2 a3=6171d0 items=1 pid=12551 auid=unknown( ) uid=lighttpd gid=lighttpd euid=lighttpd suid=lighttpd fsuid=lighttpd egid=lighttpd sgid=lighttpd fsgid=lighttpd comm=grep exe=/bin/grep In the output audit(03/16/ :52:59.985:55 ), shows the audit log time. The line uid=lighttpd gid=lighttpd shows the users in numerical format. If the administrator chooses to use -i option, the numeric data can be converted to a more approachable format. In this
7 example, the user is lighttpd and he used the grep command to open a file. The output, shows on line exe="/bin/grep" that command grep was used to access /etc/passwd file. The perm_mask=read, tells us that a file was open for reading. The log files can give a clear idea to the administrator who read the file using the grep command or made changes using vi/vim text editor. Another way to search through events is using a date and time. When using this command, if date is omitted, the date for today is used. If the time parameter is omitted, the current time is used. # ausearch ts today k password-file # ausearch ts 3/12/10 k password-file If the administrator needs to search for an event that matches an executable name, he should use -x parameter. For example, use rm command to find out who accessed /etc/passwd file: # ausearch ts today k password-file x rm # ausearch ts 3/12/10 k password-file rm Another situation that may rise is that the administrator needs to search for an event using a user name. For example, find out if user mrcorrect, with unique identifier 506 tried to open /etc/passwd file: Journal of Applied Business Information Systems, 3(4), # ausearch ts today k password-file x rm ui 506 # ausearch k password-file ui MICROSOFT WINDOWS AND LINUX SECURITY COMPARISON I believe the reason why Windows is subject to the most attacks is simply because it is the widest spread operating system. The fact of being the widest spread, alone, makes Windows a more attractive and a richer target for malware developers. Linux is also viewed as a system which derives its security from the design philosophy of UNIX. The security researchers believe that Windows monoculture contributes to levels of malware exposure that are not proportionate. This means, that because Windows operating systems are tightly binary-compatible, a single attack to the system can affect a large number of them; this is also known as cascade failure. This is in contrast with Linux operating system, which is more loosely coupled with source compatibility and different selections of software. This means that if the software is equally with bugs, the chance of one single bug affecting all of the Linux operating systems is reduced. Figure 5. File System Permissions setting in Microsoft Windows operating system
8 124 Miclea, Microsoft Windows and Linux Operating Systems Security Audit Figure 6. Linux version of file system permission setting called Bash properties Malware Open vs. Close Criteria Microsoft Windows Linux In [11], it is believe that over two million malware software target Windows operating system. Once malicious software is installed on a Windows operating system, it can, sometimes, be extremely difficult to locate and remove. Response speed to security issues User accounts A disadvantage of using Microsoft Windows is that it is a closed operating system, which means that only Microsoft employees has the source and only they can fix the security bugs. Closed systems usually offer a great response speed for bugs and vulnerabilities. However, if there are critical bugs, the fixes are released only once a month. In Windows there are login sessions, which provide standard user permissions In [9], it is believed that over 800 Linux malware applications have been discovered. Linux is an opened operating system and claims it is more secure because of the great number of people evaluating every release and working on bugs to make the system even more secure. In Linux, bugs are fixed a day after it was reported. Sometimes, they are fixed even within hours. In Linux, there is typically a simple user account. At the installation of Linux it is
9 Journal of Applied Business Information Systems, 3(4), for the logged user and prevent the user form accessing malicious software by displaying a dialog box. If the user has administrator privileges, than he only needs to press the ok button in the dialog box, but if he has normal user privileges he needs to enter the administrator credentials to access the application. File permissions Versions newer than Windows NT, support NTFS file system format which gives the opportunity to set permissions using Access Control Lists. Files System Permissions setting for Microsoft Windows operating system can be seen in Figure 5. Table 2 Microsoft Windows vs. Linux security comparison created an administrator user called root and at least another simple user account. If the logged user needs to elevate their privileges temporary they need to access sudo or su commands. These practices can be very dangerous as any error can bring serious damage to the system. Linux offers its traditional user; group and other approach to setting file system permissions. On some file systems this approach can be extended by using Access Control Lists. Bash properties setting for Linux operating System can be seen in Figure 6. In Table 2 there are the main key differences in security concepts between Microsoft Windows and Linux operating systems. 6. CONCLUSIONS I have seen that the security of client operating system has at least the same importance as that of a server computer as they are the most targeted ones and they release the most attacks targeting both servers and clients systems. Microsoft Windows security audit can be accomplished by using Local Security policies tool that can log successful or failed attempts for the configured list of events. Over the time, Windows operating system has improvement its auditing abilities evolving from nine categories of auditing events that can be monitored to 53 found in the Windows Vista and Windows 7. Viewing audit reports in Microsoft is as simple as accessing Event Viewer application from administrative panel. On the other hand, when using Linux operating system, you have to install some packages depending on the version and the distribution used. Using these packages, there are lists of terminal commands that need to be run in order to accomplish the desired audit procedure. Queries and reports based on the audit log can also be done by using specific tools from the package, for querying you may use ausearch and for reporting aureport. When comparing the security of the two operating systems based on key security elements, I saw that there is no obvious winner when it comes to security. Linux seems to be the one with the most advantages due to the fact that it is an open source operating system and it follows the Linux law, which states that Linux is more secure because any user can review its source code and contribute to fixing bugs. With Linux having the advantage of being opensource the situation balances because Microsoft Windows offers better security for account based access using its proprietary user access level control. It also offers a better file system permission security, using the NTFS file system along with Access Control Lists. REFERENCES [1] D. Challet and D. Yann, Microscopic model of software bug dynamics: closed source versus open source, International Journal of Reliability, Quality and Safety Engineering, 2005
10 126 Miclea, Microsoft Windows and Linux Operating Systems Security Audit [2] F. Gallegos and S. Senft, Technology Control and Audit (2nd ed.), Auerbach Publications, 2004 [3] R. Goodman, Technology and strategy: conceptual models and diagnostics, Oxford University Press US, 1994 [4] T. Holwerda, Ballmer: Linux Bigger Competitor than Apple, Linux_Bigger_Competitor_than_Apple, 2009 [5] M. Kalkuhl, Malware beyond Vista and XP, , 2009 [6] D. Melber, Auditing Security and Controls of Windows Server 2000 and Windows Server 2003, The Institute of Internal Auditors Research Foundation, 2005 [7] R. Moeller, IT Audit, Control, and Security (Wiley Corporate F&A), Wiley, 2010 [8] Novell, OpenXDAS, [9] L. Poettering, A Guide Through The Linux Sound API Jungle, 0pointer.de, 2004 [10] S. Sayan, Auditing OS and Database Controls, Issues/2003/Volume-3/Pages/Auditing-OS-and- Database-Controls.aspx, 2003 [11] F. Schießl, Zwei Jahre freie Software in München, 2008 [12] R. Winkler, Advanced Security Auditing in Windows 7 and Windows Server 2008 R2, ts/articles/advanced-security-auditing-inwindows-7-and-windows-server-2008-r2.aspx, 2010 [13] How to enable and apply security auditing in Windows 2000, 2006 [14] Windows 7: What is Account Auditing And How To Enable It, 2010 [15] LinuxSecurity.ppt, Linux Security, 2008
NetWrix USB Blocker Version 3.6 Quick Start Guide
NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.
Linux Audit Quick Start SUSE Linux Enterprise 10 SP1
Linux Audit Quick Start SUSE Linux Enterprise 10 SP1 NOVELL QUICK START CARD Linux audit allows you to comprehensively log and track any access to files, directories, or resources of your system and trace
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
NetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
The Linux Audit Subsystem Deep Dive. SHARE Denver Colorado Convention Center, Korbel 4b 24-Aug 2009 1100-Noon
The Linux Audit Subsystem Deep Dive SHARE Denver Colorado Convention Center, Korbel 4b 24-Aug 2009 1100-Noon Shawn Wells Red Hat, Inc Session Themes Why is Linux Auditing needed? What
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
EMC Celerra Network Server
EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
Audit account logon events
Audit account logon events Description This security setting determines whether to audit each instance of a user logging on to or logging off from another computer in which this computer is used to validate
Ecora Enterprise Auditor Instructional Whitepaper. Who Made Change
Ecora Enterprise Auditor Instructional Whitepaper Who Made Change Ecora Enterprise Auditor Who Made Change Instructional Whitepaper Introduction... 3 Purpose... 3 Step 1 - Enabling audit in Windows...
How to monitor AD security with MOM
How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Create, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
Installation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
Samba. Samba. Samba 2.2.x. Limitations of Samba 2.2.x 1. Interoperating with Windows. Implements Microsoft s SMB protocol
Samba Samba Interoperating with Windows Nick Urbanik Copyright Conditions: GNU FDL (seehttp://www.gnu.org/licenses/fdl.html) A computing department Implements Microsoft s SMB protocol
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
Monitoring Clearswift Gateways with SCOM
Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue
NetIQ Advanced Authentication Framework - Administrative Tools. Installation Guide. Version 5.1.0
NetIQ Advanced Authentication Framework - Administrative Tools Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication
ACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
Shellshock Security Patch for X86
Shellshock Security Patch for X86 Guide for Using the FFPS Update Manager October 2014 Version 1.0. Page 1 Page 2 This page is intentionally blank Table of Contents 1.0 OVERVIEW - SHELLSHOCK/BASH SHELL
The Institute of Internal Auditors Detroit Chapter Presents
1 The Institute of Internal Auditors Detroit Chapter Presents 1 MOST Suitable for all categories business and personal presentation 3 If You Have Questions If you have questions during the webcast: If
Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
EventTracker: Support to Non English Systems
EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES
INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES TECHNICAL ARTICLE November 2012. Legal Notice The information in this publication is furnished for information use only, and does not
Server & Workstation Installation of Client Profiles for Windows
C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing
DeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance
LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide
LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...
Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01
Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written
Avira Update Manager User Manual
Avira Update Manager User Manual Table of contents Table of contents 1. Product information........................................... 4 1.1 Functionality................................................................
Using Windows Administrative Tools on VNX
EMC VNX Series Release 7.0 Using Windows Administrative Tools on VNX P/N 300-011-833 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2011 -
PLANNING AND DESIGNING GROUP POLICY, PART 1
84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group
NetWrix Password Manager. Quick Start Guide
NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...
Full Disk Encryption Pre-Boot Authentication Reference
www.novell.com/documentation Full Disk Encryption Pre-Boot Authentication Reference ZENworks 11 Support Pack 4 Beta April 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect
Installation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
NetWrix Privileged Account Manager Version 4.0 Quick Start Guide
NetWrix Privileged Account Manager Version 4.0 Quick Start Guide Table of Contents Table of Contents... 2 1. Introduction... 3 1.1. What is NetWrix Privileged Account Manager?... 3 1.2. Licensing... 3
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Administrator s Guide
Attachment Save for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4 3. System
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
CYCLOPE let s talk productivity
Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution
Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.
Microsoft Windows 7 Administration Instant Reference William Panek WILEY Wiley Publishing, Inc. Introduction xix PART I: Installation 1 Chapter 1: Installing Windows 7 3 Understand Windows 7's New Features
Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3
Contents Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3 Introduction... 3 How to Register a UNIX Host in a One-Way Trust Domain Environment... 4 Creating a Windows Agentless
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.
Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Log Management and Intrusion Detection
Log Management and Intrusion Detection Dr. Guillermo Francia,, III Jacksonville State University Prerequisites Understand Event Logs Understand Signs of Intrusion Know the Tools Log Parser (Microsoft)
DeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6
Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com
CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise
Table of Contents WELCOME TO ADAUDIT PLUS... 3. Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED...
Table of Contents WELCOME TO ADAUDIT PLUS... 3 Release Notes... 4 Contact ZOHO Corp.... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED... 8 System Requirements... 9 Installing ADAudit Plus... 10 Working
WINDOWS PROCESSES AND SERVICES
OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.
2. Using Notepad, create a file called c:\demote.txt containing the following information:
Unit 4 Additional Projects Configuring the Local Computer Policy You need to prepare your test lab for your upcoming experiments. First, remove a child domain that you have configured. Then, configure
IN STA LLIN G A VA LA N C HE REMOTE C O N TROL 4. 1
IN STA LLIN G A VA LA N C HE REMOTE C O N TROL 4. 1 Remote Control comes as two separate files: the Remote Control Server installation file (.exe) and the Remote Control software package (.ava). The installation
Analyst 1.6 Software. Laboratory Director s Guide
Analyst 1.6 Software Laboratory Director s Guide Release Date: August 2011 This document is provided to customers who have purchased AB SCIEX equipment to use in the operation of such AB SCIEX equipment.
5nine Hyper-V Commander
5nine Hyper-V Commander 5nine Hyper-V Commander provides a local graphical user interface (GUI), and a Framework to manage Hyper-V R2 server and various functions such as Backup/DR, HA and P2V/V2V. It
Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
nitrobit update server
nitrobit update server Administrator's Guide 2011 analytiq consulting gmbh. All rights reserved. Page 2 nitrobit update server Administrator's Guide Content I. Introduction... 4 Overview... 4 Components
XyLoc Security Server w/ AD Integration (XSS-AD 5.x.x) Administrator's Guide
XyLoc Security Server w/ AD Integration (XSS-AD 5.x.x) Administrator's Guide Contacting Ensure Technologies Email: [email protected] Phone: (734) 547-1600 Home Office: Ensure Technologies 135 S Prospect
STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
Virtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
MS 50255B: Managing Windows Environments with Group Policy (4 Days)
www.peaklearningllc.com MS 50255B: Managing Windows Environments with Group Policy (4 Days) Introduction In course you will learn how to reduce costs and increase efficiencies in your network. You will
Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority
In this post we will see the steps for deploying the client certificate for windows computers. This post is a part of Deploy PKI Certificates for SCCM 2012 R2 Step by Step Guide. In the previous post we
Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide
EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide BitLocker Deployment Guide Document Version 0.0.0.5 http://www.wave.com ERAS v 2.8 Wave Systems Corp. 2010 Contents Contents... 2
Networking Lab - Vista Public Network Sharing
Networking Lab - Vista Public Network Sharing After completing the lab activity, you will be able to: Explain the differences between Windows XP and Windows Vista network sharing. Explain the purpose of
Password Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
Running 4D Server as a Service on Windows
Running 4D Server as a Service on Windows By Timothy Aaron Penner, Technical Services Team Member, 4D Inc. Technical Note 10-02 1 Table of Contents Table of Contents... 2 Abstract... 3 Introduction...
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0
Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Microsoft Corporation Published: September 2009 Abstract This step-by-step guide describes a sample scenario for installing Microsoft
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES
CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES TECHNICAL ARTICLE November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
Outpost Network Security
Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It
National Security Agency
National Security Agency Information Assurance Directorate Vulnerability Analysis and Operations Systems and Network Analysis Center Application Whitelisting using Software Restriction Policies Version
User's Manual. Intego Remote Management Console User's Manual Page 1
User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
Stellar Active Directory Manager
Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly
2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
Authoring for System Center 2012 Operations Manager
Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack
TZWorks Windows Event Log Viewer (evtx_view) Users Guide
TZWorks Windows Event Log Viewer (evtx_view) Users Guide Abstract evtx_view is a standalone, GUI tool used to extract and parse Event Logs and display their internals. The tool allows one to export all
Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure
Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded
Installation Guide - Client. Rev 1.5.0
Installation Guide - Client Rev 1.5.0 15 th September 2006 Introduction IntraNomic requires components to be installed on each PC that will use IntraNomic. These IntraNomic Client Controls provide advanced
SOLAARsecurity. Administrator Software Manual. 010508 Issue 2
SOLAARsecurity Administrator Software Manual 9499 400 40011 010508 Issue 2 2008. All rights reserved. SOLAAR House, 19 Mercers Row, Cambridge CB5 8BZ.United Kingdom. Telephone +44 (0) 1223 347400, Fax
