VoipSwitch Security Audit

Size: px
Start display at page:

Download "VoipSwitch Security Audit"

Transcription

1 VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : Server has also assigned second IP address : Firewall Checking firewall status and rules regularity. Customer claimed that there is no external firewall before server. Windows Server Firewall was turned on and configured with standard VoipSwitch rules (there were rules added for proper running Voipswitch modules). One rule named Rule allows all incoming TCP traffic which is serious risk for server's safety. 2. Access Policy Checking all access ways to the server. Checking users/passwords policy. Server had two access ways : Remote Desktop Radmin software

2 Remote desktop : on standard port open in Windows Firewall for all IP addresses password was strong Radmin software on standard port not limited for IP in Radmin software open in Windows Firewall for all IP addresses password was weak (6 letters without numbers and special chars) Users policy: Only Administrator user had access with administrator's privileges and there weren't any other users with access privileges.

3 3. Backdoor check Checking most common backdoor on Windows based system. Image File Execution Options in Registry was clear. Sethc.exe file was original. There wasn't backdoor set. 4. Antivirus Scan Microsoft Security Essentials full scaning. Microsoft Security Essentials full scan didn't point any suspicious files.

4 5. Processes Checking all unsigned processes which may affect on server's safety. Processes checked with Micrososft Process Explorer tool. There weren't any suspicious processes running. 6. Services Checking all running services which may affect on server's safety. Except Voipswitch and Radmin Server services there were no additional services added. 7. Installed applications Checking all unwanted applications which may affect on server's safety. There werent any unwanted applications installed. 8. Task Scheduler Checking all scheduled tasks which may affect on server's safety. There was task which starts unauthorized powershell script at system's startup. Script was in d:\install directory. Named as hack.ps1

5 9. Autostart Checking all autostart entries. There were two applications which start with system: Microsoft Security Essentials client Cobian application These applications were authorized by customer.

6 10. Shared Files Checking all shared spaces available from external networks. On www server space there was zipped vsportal folder. It contained config files with database credentials. Listing directory was turned off, but anyone who guessed name of file, could download it.

7 There wasn't any FTP similar service. There were no other shared/public folders. 11.Database Checking databases users privileges, database port. MySQL server database was running on 3306 port. Port was closed in Windows Firewall. There is only root user available on localhost.

8 12. Access logs Checking availability of all access logs. List of all logged IP addresses (on request). RDP : Logs are available since 1 st Dec 2012 due size of log file. All connections were only from confirmed by client IP address. Radmin : Events log was turned off. There wasn't possibility of checking logs. 13.Security of VoipSwitch modules Checking versions, settings of VoipSwitch modules. Checking passwords strength of clients. Access password to VSC3 was weak (only 5 letters, without special characters). All other clients passwords are strong. All web modules versions was the latest and stable.

9 14. Open ports External TCP port scan of server. IP: Open ports : 80,110,135,143,403,443,1720,1800,1801,1804,1935,5060,7070,9090 IP: Open ports : 80,110,135,143,403,443,1720,1800,1801,1804,1935,5060,7070, Hacking incident (if exists) Investigation based on customer's informations/suspiscions. Client didn't provide any information about hacking incidents 16. Changes on server after audit (on request) Rule named 'Rule' was deleted in Windows Firewall. Radmin access password was changed Task named 'Hack' was deleted in Task Scheduler Zipped VSPortal was removed in wwwroot2 Quota for security logs was increased Radmin access logs was turned on VSC3 password was changed

10 Security Advices 1. Access Access port should be other than default. Default ports for example access services: Remote Desktop Services (3389) Radmin (4899) VNC (5900, 5800, 5500) Access should be limited to few IP addresses All remote support connections will be established from our VPN IP / Remote access should be limited on your firewall only to / and the switch owner IP address. 2. Users policy The best if after system installation (before VoipSwitch installation) you will create separate user account than Administrator. It helps fight with any scan attack or brute-force attack, because every server has Administrator account. You may use very strong password for Administrator account and create other account with administrator's privileges for all works on server (like installations, support works, etc.). Only you should know Administrator account password and no one else. Once for month you should check users list for any not authorized changes. 3. Passwords policy Make sure that your password is strong.

11 Strong means: has at least seven letters doesn't contain a name or dictionary wordis different from other/previous passwords contains characters from each of four groups: uppercase letters, lowercase letters, numbers, symbols on the keyboard except letters and numbers Password can't be longer than 127 characters. Password should be changed at least once for month. Do not provide logins or passwords in Tickets Comments and s. Change your access username/password once Voipswitch Support have completed their work and the ticket has been closed. 4. Updates Every system need to be updated, due new features or fixing old. Also in security, there are many updates which improve server's safety. All the latest updates should be installed. You should schedule restars of server if needed. 5. Firewall As your server has public IP address, everyone can check it on the Internet. Everyone can send ports scan or any brute force (to break your passwords) or flood attack (to block your network). Nowadays it's unacceptable to not use a firewall on the server. 6. Antivirus Application Every Windows based server has Internet Explorer browser. If you don't have installed the latest updates, browsing the Internet on server is pretty dangerous. Antivirus application will help check if any unauthorized software is on server (even by mistake). We recommend Microsoft Security Essentials application. Don't install any 3rd party applications if you are not sure that are safe.

12 7. Few advices for VPS modules. After fresh VoipSwitch installation process, change Admin password into VSM/VSC. Don't create users with passwords shorter than 6 characters. Remember that Wholesale Clients may be authorized not only by IP address and set strong password for them too. Check Logs window on VoipSwitch application - you will notice any unauthorized register or call attempts there.

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. 1. Setting up your network to allow incoming connections on ports used by Eyemax system. Default ports used by Eyemax system are: range of ports 9091~9115

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1

Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1 Getting Started Guide Cloud Server powered by Mac OS X Getting Started Guide Page 1 Getting Started Guide: Cloud Server powered by Mac OS X Version 1.0 (02.16.10) Copyright 2010 GoDaddy.com Software, Inc.

More information

VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com

VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com VERSION 9.02 INSTALLATION GUIDE www.pacifictimesheet.com PACIFIC TIMESHEET INSTALLATION GUIDE INTRODUCTION... 4 BUNDLED SOFTWARE... 4 LICENSE KEY... 4 SYSTEM REQUIREMENTS... 5 INSTALLING PACIFIC TIMESHEET

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

SECURING YOUR REMOTE DESKTOP CONNECTION

SECURING YOUR REMOTE DESKTOP CONNECTION White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY

More information

EZblue BusinessServer The All - In - One Server For Your Home And Business

EZblue BusinessServer The All - In - One Server For Your Home And Business EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Application Note: FTP Server Setup on computers running Windows-7 For use with 2500P-ACP1

Application Note: FTP Server Setup on computers running Windows-7 For use with 2500P-ACP1 Application Note: FTP Server Setup on computers running Windows-7 For use with 2500P-ACP1 The CTI 2500P-ACP1 is capable of transferring data files to a remote FTP Server. This document provides information

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

Server Installation, Administration and Integration Guide

Server Installation, Administration and Integration Guide Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management

More information

EZblue BusinessServer The All - In - One Server For Your Home And Business

EZblue BusinessServer The All - In - One Server For Your Home And Business EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan

More information

Nixu SNS Security White Paper May 2007 Version 1.2

Nixu SNS Security White Paper May 2007 Version 1.2 1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle

More information

Securing Remote Desktop for Windows XP

Securing Remote Desktop for Windows XP Securing Remote Desktop for Windows XP http://www.mobydisk.com/./techres/securing_remote_desktop.html Remote Desktop, Unsafely Many people use the Windows XP Professional remote desktop feature to gain

More information

Service & Support. How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client.

Service & Support. How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client. Cover How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client FAQ August 2012 Service & Support Answers for industry. Question This entry is from the Siemens Industry

More information

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Virtual Code Authentication User s Guide. June 25, 2015

Virtual Code Authentication User s Guide. June 25, 2015 Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other

More information

RemotelyAnywhere. Security Considerations

RemotelyAnywhere. Security Considerations RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

Grandstream Networks, Inc. UCM6100 Security Manual

Grandstream Networks, Inc. UCM6100 Security Manual Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL

More information

Global TAC Secure FTP Site Customer User Guide

Global TAC Secure FTP Site Customer User Guide Global TAC Secure FTP Site Customer User Guide Introduction This guide is provided to assist you in using the GTAC Secure FTP site. This site resides in the Houston Remote Services Center (RSC), and is

More information

Remote Administration

Remote Administration Contents Preparing The Server 2 Firewall Considerations 3 Performing Remote Administration 4 Additional Notes 5 Mobile Application Administration 6 Managing Users In The iphone App 8 Maxum Development

More information

LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide

LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...

More information

Security Advice for Instances in the HP Cloud

Security Advice for Instances in the HP Cloud Security Advice for Instances in the HP Cloud Introduction: HPCS protects the infrastructure and management services offered to customers including instance provisioning. An instance refers to a virtual

More information

Summer Webinar Series

Summer Webinar Series Summer Webinar Series Cisco ASA AnyConnect VPN with AD Christopher Rose Sr. Client Network Engineer [email protected] Webinar Links: www.mcnc.org/cne-webinars Agenda Review the security implications of remote

More information

First Steps after Installation Guide

First Steps after Installation Guide First Steps after Installation Guide Index 1. Login to your IVR 2. License activation 3. Security Recommendations 4. Configure your first SIP extension or device 5. Configure your first SIP trunk 6. Configure

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

M2M Series Routers. Port Forwarding / DMZ Setup

M2M Series Routers. Port Forwarding / DMZ Setup Introduction Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. Many internet services and applications use designated

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

Immotec Systems, Inc. SQL Server 2005 Installation Document

Immotec Systems, Inc. SQL Server 2005 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

Running the Tor client on Mac OS X

Running the Tor client on Mac OS X Running the Tor client on Mac OS X Note that these are the installation instructions for running a Tor client on Mac OS X. If you want to relay traffic for others to help the network grow (please do),

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Parallels. for your Linux or Windows Server. Small Business Panel. Getting Started Guide. Parallels Small Business Panel // Linux & Windows Server

Parallels. for your Linux or Windows Server. Small Business Panel. Getting Started Guide. Parallels Small Business Panel // Linux & Windows Server Getting Started Guide Parallels Small Business Panel for your Linux or Windows Server Getting Started Guide Page 1 Getting Started Guide: Parallels Small Business Panel, Linux & Windows Server Version

More information

5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next.

5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next. Installing IIS on Windows XP 1. Start 2. Go to Control Panel 3. Go to Add or RemovePrograms 4. Go to Add/Remove Windows Components 5. At the Windows Component panel, select the Internet Information Services

More information

Getting Started With Your Virtual Dedicated Server. Getting Started Guide

Getting Started With Your Virtual Dedicated Server. Getting Started Guide Getting Started Guide Getting Started With Your Virtual Dedicated Server Setting up and hosting a domain on your Linux Virtual Dedicated Server using cpanel. Getting Started with Your Virtual Dedicated

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

FIREWALL POLICY November 2006 TNS POL - 008

FIREWALL POLICY November 2006 TNS POL - 008 FIREWALL POLICY November 2006 TNS POL - 008 Introduction Network Security Services (NSS), a department of Technology and Network Services, operates a firewall to enhance security between the Internet and

More information

1 Accessing E-mail accounts on the Axxess Mail Server

1 Accessing E-mail accounts on the Axxess Mail Server 1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

How to Access UF Health Jacksonville VPN services

How to Access UF Health Jacksonville VPN services How to Access UF Health Jacksonville VPN services To access VPN services go to the hospital website at http://ufhealthjax.org/. Click on the For Employees link at the bottom of the screen. Under Remote

More information

EIOBoard Intranet Installer Guide

EIOBoard Intranet Installer Guide Savance 1111 W. Oakley Park Rd. Ste 103, Commerce Township, MI 48390 Phone: 248-478-2555 Fax: 248-478-3270 www.eioboard.com [email protected] www.savance.com 2013 Table of Contents System Requirements

More information

Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7

Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7 Emdeon Remote Desktop Services Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7 Minimum Requirements 1. A high-speed Internet connection. DSL or Cable Internet are recommended.

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Activity 1: Scanning with Windows Defender

Activity 1: Scanning with Windows Defender Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

University of Wisconsin System Shared Financial System (SFS) PeopleTools 8.53 Client Setup Guide

University of Wisconsin System Shared Financial System (SFS) PeopleTools 8.53 Client Setup Guide University of Wisconsin System Shared Financial System (SFS) PeopleTools 8.53 Client Setup Guide Summary This document will guide you through the process of installing and configuring the PeopleTools 8.53

More information

Customer Control Panel Manual

Customer Control Panel Manual Customer Control Panel Manual Contents Introduction... 2 Before you begin... 2 Logging in to the Control Panel... 2 Resetting your Control Panel password.... 3 Managing FTP... 4 FTP details for your website...

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

User Guide - escan for Linux File Server

User Guide - escan for Linux File Server 1 User Guide - escan for Linux File Server 2 I. Required escan for Linux RPMS / Debian packages RPM Package Name File name mwadmin mwav escan escan-rtm mwadmin-x.x-x..i386.rpm mwav-x.x-x.

More information

Security White Paper The Goverlan Solution

Security White Paper The Goverlan Solution Security White Paper The Goverlan Solution The Goverlan Administration Suite (which includes the following modules: Administration & Diagnostics, Remote Control, Scope Actions, and WMIX) is a powerful

More information

Site Monitor. Version 5.3

Site Monitor. Version 5.3 Site Monitor Version 5.3 1 1 Table of contents 1 Table of contents... 2 2 Installation... 3 2.1 Components... 3 2.1.1 Monitoring Service... 3 2.1.2 Desktop User Interface... 3 2.1.3 Web User Interface...

More information

Safety and Health Grant Program Database Remote Access Installation Guide

Safety and Health Grant Program Database Remote Access Installation Guide Safety and Health Grant Program Database Remote Access Installation Guide Version 1.01 October 29, 2011 Imagine Nation Software 8223 Yukon Hills Ct. Las Vegas, NV 89178 www.insoftware.net Contact: Michael

More information

CONTENTS. PCI DSS Compliance Guide

CONTENTS. PCI DSS Compliance Guide CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not

More information

VPS Hosting. The Guide to Bet Angel VPS. Getting started with Bet Angel VPS. Revised August 2013. Page 1

VPS Hosting. The Guide to Bet Angel VPS. Getting started with Bet Angel VPS. Revised August 2013. Page 1 The Guide to Bet Angel VPS Getting started with Bet Angel VPS Revised August 2013 Page 1 Contents VPS Hosting Connecting to a Windows Server for the first time... 3 1 Ensuring that your Server has been

More information

Cyber Security: An Introduction

Cyber Security: An Introduction Cyber Security: An Introduction Security is always a trade-off between convenience and protection. A good security policy is convenient enough to prevent users from rebelling, but still provides a reasonable

More information

MS Terminal Server Cracking

MS Terminal Server Cracking MS Terminal Server Cracking If you want to do any MS Terminal Server cracking you basically have your choice of three tools that can do it for you; TSgrinder, TScrack, and a patched version of RDesktop.

More information

How to install phpbb forum on NTU student club web server

How to install phpbb forum on NTU student club web server How to install phpbb forum on NTU student club web server This guide contains the step by step instructions to install phpbb (stable release 3.0.7- PL1) on NTU student club web server. It does not cover

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

Remote Administration

Remote Administration Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over

More information

Windows 7 Hula POS Server Installation Guide

Windows 7 Hula POS Server Installation Guide Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations Projetex 9 Workstation Setup Quick Start Guide 1 Projetex 9 Help Table of Contents Disclaimer 2 System Requirements 2 Registration/Upgrade 3 Projetex Workstation Setup 5 User Login to Projetex Workstation

More information

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4 Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access

More information

Using TS-ACCESS for Remote Desktop Access

Using TS-ACCESS for Remote Desktop Access Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources

More information

Scan to SMB(PC) Set up Guide

Scan to SMB(PC) Set up Guide Scan to SMB(PC) Set up Guide Regarding Trade Names Windows is a registered trademark of Microsoft Corporation in the U.S.A. and/or other countries. Windows XP and Windows Vista are trademarks of Microsoft

More information

Installation Instructions

Installation Instructions Installation Instructions 25 February 2014 SIAM AST Installation Instructions 2 Table of Contents Server Software Requirements... 3 Summary of the Installation Steps... 3 Application Access Levels... 3

More information

Using Remote Desktop with No-IP

Using Remote Desktop with No-IP Page 1 of 6 Lost Password? Sign-up Now!. com Support : Guides and Tips : Remote Access : Using Remote Desktop with No-IP Overview The use of Microsoft's Remote Desktop Connection to access another computer

More information

Penetration testing. A step beyond missing patches and weak passwords

Penetration testing. A step beyond missing patches and weak passwords Penetration testing A step beyond missing patches and weak passwords June 25 th, 2012 Eirik Thormodsrud Graduated from the ISG in 2006 Employed by Ernst & Young Norway ever since (5 ½ years) Manager at

More information

A D M I N I S T R A T O R V 1. 0

A D M I N I S T R A T O R V 1. 0 A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA

More information

SingTel PowerON Desktop Backup

SingTel PowerON Desktop Backup SingTel PowerON Desktop Backup User Manual Copyright 2011 F-Secure Corporation. All rights reserved. SingTel PowerON Desktop Backup Table of Contents 1. SingTel PowerON Desktop Backup Help... 1 1.1. What

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if

More information

Setting Up Your FTP Server

Setting Up Your FTP Server Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This

More information

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and

More information

Sophos Computer Security Scan startup guide

Sophos Computer Security Scan startup guide Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4

More information

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology. CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net

More information

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

McAfee.com Personal Firewall

McAfee.com Personal Firewall McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...

More information

LifeCyclePlus Version 1

LifeCyclePlus Version 1 LifeCyclePlus Version 1 Last updated: 2014-04-25 Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted.

More information

TAO Installation Guide v0.1. September 2012

TAO Installation Guide v0.1. September 2012 TAO Installation Guide v0.1 September 2012 TAO installation guide v0.1 page 2/22 This installation guide provides instructions for installing TAO. For all other aspects of using TAO, please see the user

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

SchoolBooking SSO Integration Guide

SchoolBooking SSO Integration Guide SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,

More information

Lab 1: Windows Azure Virtual Machines

Lab 1: Windows Azure Virtual Machines Lab 1: Windows Azure Virtual Machines Overview In this hands-on Lab, you will learn how to deploy a simple web page to a Web server hosted in Windows Azure and configure load balancing. Objectives In this

More information

Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions

Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions Server Prerequisites Internet Information Server (IIS). It may be enabled in Windows Features (see Enabling IIS section).

More information

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Five Steps to Improve Internal Network Security. Chattanooga ISSA Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical

More information

HOW TO USE THE File Transfer Protocol SERVER ftp.architekturaibiznes.com.pl

HOW TO USE THE File Transfer Protocol SERVER ftp.architekturaibiznes.com.pl HOW TO USE THE File Transfer Protocol SERVER ftp.architekturaibiznes.com.pl In order to access the A&B server with a view to uploading or downloading materials, any FTP client software can be used. If

More information

Introduction. Just So You Know... PCI Can Be Difficult

Introduction. Just So You Know... PCI Can Be Difficult Introduction For some organizations, the prospect of managing servers is daunting. Fortunately, traditional hosting companies offer an affordable alternative. Picking the right vendor and package is critial

More information

Simple. Control Panel. for your Linux Server. Getting Started Guide. Simple Control Panel // Linux Server

Simple. Control Panel. for your Linux Server. Getting Started Guide. Simple Control Panel // Linux Server Getting Started Guide Simple Control Panel for your Linux Server Getting Started Guide Page 1 Getting Started Guide: Simple Control Panel, Linux Server Version 2.1 (02.01.10) Copyright 2010. All rights

More information

Novell Open Workgroup Suite

Novell Open Workgroup Suite Novell Open Workgroup Suite Small Business Edition QUICK START GUIDE September 2007 v1.5 Page 1 Introduction This Quick Start explains how to install the Novell Open Workgroup Suite software on a server.

More information

ManageEngine IT360. Professional Edition Installation Guide. [[email protected]]

ManageEngine IT360. Professional Edition Installation Guide. [ims-eval@manageengine.com] ManageEngine IT360 (Division of ZOHO Corporation) ) www.manageengine.com/it360 ManageEngine IT360 Professional Edition Installation Guide [[email protected]] [This document is a guideline for installing

More information