WINDOWS LOGGING CHEAT SHEET - Win 7/Win 2008 or later
|
|
|
- Avis Flynn
- 10 years ago
- Views:
Transcription
1 This Windows Logging Cheat Sheet is intended to help you get started setting up basic and necessary Windows Audit Policy and Logging. By no means is this list extensive; but it does include some very common items that should be enabled, configured, gathered and harvested for any Log Management Program. Start with these settings and add to it as you understand better what is in your logs and what you need. DEFINITIONS:: ENABLE: Things you must do to enable logging to start collecting and keeping events. CONFIGURE: Configuration that is needed to refine what events you will collect. GATHER: Tools/Utilities that you can use locally on the system to set or gather log related information AuditPol, WEvtUtil, Find, etc. HARVEST: Events that you would want to harvest into some centralized Event log management solution like syslog, SIEM, Splunk, etc. RESOURCES: Places to get information on EventID s - Better descriptions of Event OD s Most of the Event ID s Google! But of course IIS Error Codes IIS Error Codes - Good Article MS Adv Security Audit Policy Descriptions ENABLE:: ENABLE:: 1. LOCAL LOG SIZE: Increase the size of your local logs. Don t worry you have plenty of disk space, CPU is not an issue a. Application, Security & System to 32k or larger b. PowerShell logs too c. Whatever else you want as well 2. LOCAL SECURITY POLICY: Change Security Options Audit: Force audit policy subcategory settings to ENABLE. This sets the system to force use of the Advanced Audit Policies 3. GROUP POLICY: All settings mentioned should be set with Active Directory Group Policy in order to enforce these settings enterprise wide. There are cases where the Local Security Policy would be used. 1. DNS LOGS: Enable DNS Logging. Capture what DNS queries are happening. systemroot\system32\dns\dns.log a. EventID = 2. DHCP LOGS: Add your DHCP Logs %windir%\system32\dhcp. This will allow you to detect rogue systems on your network that fall outside your naming convention. a. EventID = 10 New IP address was leased April 2015 ver 1.3 MalwareArchaeology.com Page 1 of 6
2 Windows Audit Policy settings may be set by the Local Security Policy, Group Policy (preferred) or by command line using AuditPol.exe. Be sure to select Configure the following audit events box on items that say No Audit or the policy will not apply. Any that are left blank will break the GPO and auditing will not be applied. 1. SYSTEM AUDIT POLICIES: In order to capture what you want and need the following Advanced Audit Policies must be set. You may expand these to your specific needs, but here is a place to start. List out the System audit policy Command: AuditPol /get /category:* Category/Subcategory Setting Account Logon Credential Validation Success and Failure Kerberos Authentication Service No Auditing Kerberos Service Ticket Oper No Auditing Other Account Logon Events Success and Failure Account Management Application Group Management Success and Failure Computer Account Management Success and Failure Distribution Group Management Success and Failure Other Acct Management Events Success and Failure Security Group Management Success and Failure User Account Management Success and Failure Detailed Tracking DPAPI Activity No Auditing Process Creation Success and Failure Process Termination Success and Failure RPC Events Success and Failure DS Access Detailed Directory Service Repl No Auditing Directory Service Access No Auditing Directory Service Changes Success and Failure Directory Service Replication No Auditing Logon/Logoff Account Lockout Success IPsec Main Mode No Auditing IPsec Quick Mode No Auditing IPsec Extended Mode No Auditing Logoff Success Logon Success and Failure Network Policy Server Success and Failure Other Logon/Logoff Events Success and Failure Special Logon Success and Failure SYSTEM AUDIT POLICIES: Continued To set an item: Auditpol /set /category:"account Management" /success:enable /failure:enable Category/Subcategory Setting Object Access Application Generated Success and Failure Certification Services Success and Failure Detailed File Share Success File Share Success and Failure File System Success Filtering Platform Connection Success (Win FW) Filtering Platform Packet Drop No Auditing Handle Manipulation No Auditing Kernel Object Success and Failure Other Object Access Events No Auditing Registry Success SAM No Auditing Policy Change Audit Policy Change Success and Failure Authentication Policy Change Success and Failure Authorization Policy Change Success and Failure Filtering Platform Policy Change Success (Win FW) MPSSVC Rule-Level Policy Change No Auditing Other Policy Change Events No Auditing Privilege Use Non Sensitive Privilege Use No Auditing Other Privilege Use Events No Auditing Sensitive Privilege Use Success and Failure System IPsec Driver Success and Failure Other System Events Failure Security State Change Success and Failure Security System Extension Success and Failure System Integrity Success and Failure Global Object Access Auditing ignore for now April 2015 ver 1.3 MalwareArchaeology.com Page 2 of 6
3 1. FILE AUDIT: Select directories you want to monitor file activity. Right-Click directory Properties Security Advanced Auditing Edit Add EVERYONE (check names), OK - a. Apply onto THIS FOLDER ONLY (or what you want) b. Create file / write data Successful c. Create folders / append data - Successful 2. DIRS TO AUDIT: a. \Perflogs b. \ProgramData c. \Program Files d. \Program Files (x86) e. \Windows f. \System g. \System32 h. \System32\drivers i. \System32\Wbem j. \Users\Public\* k. \Users\XYZ\AppData\Local l. \Users\XYZ\AppData\Locallow m. \Users\XYZ\AppData\Roaming n. \Windows\Web Whatever else you want to audit 3. To apply these audit settings it is a by system manual method or you can use PowerShell, subinacls(warning) 4. WEvtUtil: Use this utility to configure your log settings a. WevtUtil gl Security List settings of the Security Log b. WevtUtil sl Security /ms: Set the Security Log size to the number of bytes c. WevtUtil sl Security /rt:false Overwrite as needed 1. REGISTRY AUDIT: Select Registry Keys you want to monitor changes to. Right-Click a Key Permissions Advanced Auditing Add EVERYONE (check names), OK. a. Apply onto THIS KEY ONLY (or what you want) b. Select Set Value, Create Subkey, Create Link, Delete, Write DAC & Write Owner to start c. Be careful setting auditing to Keys and subkeys as this can generate a lot of data 2. KEYS TO AUDIT: a. HKCU & HKLM\Software\Microsoft\Windows\CurrentVersion i. Run ii. RunOnce b. HKLM\System\CurrentControlSet i. Services (noisy) c. HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows i. AppInit_Dlls value 3. REG.EXE: Use this utility to query what is in a Key or the data within a key or value a. Query a Key and all values - Reg query "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" b. Query a value of a Key - Reg query "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v malware April 2015 ver 1.3 MalwareArchaeology.com Page 3 of 6
4 GATHER:: 1. AUDITPOL: Use this utility to view your current log settings a. List all Policies categories: AuditPol /List /Subcategory:* b. List what is SET: AuditPol /get /category:* c. List what is SET for a subcategory: AuditPol /get /category:"object Access 2. Reg.exe: Use this utility to query the registry a. Changes to AppInit_Dlls - reg query "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v AppInit_Dlls b. Changes to Services Keys - reg query "HKLM\System\CurrentControlSet\Services" c. Changes to Machine Run Key - reg query "HKLM\Software\Microsoft\Windows\CurrentVersion\Run d. Changes to Machine RunOnce Key - reg query "HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce e. Changes to User Run Key - reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run f. Changes to User RunOnce Key - reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce g. 3. SC.exe: Use this utility to query the services (sc /? For help) a. List all services in any state sc.exe query state= all (Note: space after the = sign) b. Look for a specific service sc.exe query state= all find /I telnet c. After finding the Display_Name then look for the Service_Name to get the short name GATHER:: 1. WEvtUtil: Use this utility to query your logs a. WevtUtil qe Security query the Security Log for events i. Lots of flags here so read help WevtUtil -? ii. /c:5 = Read 5 events iii. /rd:true = newest events first iv. /f:text = format text, also can do XML b. Success & Failed Logons - WevtUtil qe Security /q:"*[system[(eventid=4624 or EventID=4625)]]" /c:5 /rd:true /f:text >Parsed\%computername%_Logon_Events_Win7.log c. User Account Change - WevtUtil qe Security /q:"*[system[(eventid=4738)]]" /c:5 /rd:true /f:text >Parsed\R_%computername%_User_Account_Change_Win7.log d. New Service Installed - WevtUtil qe Security /q:"*[system[(eventid=7045)]]" /c:5 /rd:true /f:text >Parsed\R_%computername%_New_Service_Installed_Win7.log e. User Account Changes - wevtutil qe Security /q:"*[system[(eventid=4725 or EventID=4722 or EventID=4723 or EventID=4724 or EventID=4726 or EventID=4767)]]" /c:10 /f:text 2. Filtering Log Results: Use this method to filter lines within the logs a. Registry Changed Find entries with Object Name - WevtUtil qe Security /q:"*[system[(eventid=4657)]]" /c:5 /rd:true /f:text find /i"object Name" b. File or Registry Changed Find entries with Object Name - WevtUtil qe Security /q:"*[system[(eventid=4663)]]" /c:50 /rd:true /f:text find /i "Object Name" c. Files Find new files with Wbem - WevtUtil qe Security /q:"*[system[(eventid=4663)]]" /c:50 /rd:true /f:text find /i "wbem" April 2015 ver 1.3 MalwareArchaeology.com Page 4 of 6
5 1. LOG CLEAR: Watch for log clear messages a. 104 SYSTEM Log The Application or System log was cleared b SECURITY Log The audit log was cleared 2. TASKS: Watch for a Process to start and call other processes a SECURITY Log New Task Created 3. DRIVER: Watch for an issue with a driver a. 40 Issue with Driver 4. OS VERSION: What OS do machines have a Lists OS version, Service Pack and processor type 1. ACCOUNTS: Monitor for attempts to change an account password a An attempt was made to reset an accounts password. b Local Group changed c User account password changed 1. PROCESSES: Watch for a Process to start and call other processes a SECURITY Log New Process Name, look for Creator Process ID to link what process launched what 2. INSTALLER: Watch for the Windows Installer activity a Windows Installer updated the product b Windows Installer installed the product c Windows Installer removed the product 3. WINDOWS UPDATE: Watch for the Windows Update Agent activity. a. 18 = Ready, 19 = Installed, 20= Failure 4. WINDOWS TIME: Watch for the Windows Service synchronization. Make sure your sources are what they are supposed to be. a. 35 Time Service sync status and source 5. APPLICATION ERROR: Watch for application crashes. a (Application Log) Application Fault 1. SERVICES: Found in the SYSTEM log d Message=A service was installed in the system. e Message=The start type of the XYZ service was changed from auto start to disabled. f Message=The XYX service failed to start due to the following error: The service did not respond to the start or control request in a timely fashion. g Message=The XYZ service hung on starting. h Message=The XYZ service terminated with service-specific error %%2414. i Message=The XYZ service terminated unexpectedly. It has done this 1 time(s). The following corrective action will be taken in milliseconds: Restart the service. j Message=The XYZ service terminated unexpectedly. It has done this 1 time(s). k Service sent a request to Stop or Start l Service was Started or Stopped 1. AUDIT POLICY: Watch for changes to the Audit Policy that are NOT SYSTEM a System audit policy was changed 1. APPLOCKER: Watch for triggers to AppLocker events ( ) a Filename not allowed to run 2. SRP: Watch for triggers to Software Restriction Policies b. 865 Access to <filename> has been restricted April 2015 ver 1.3 MalwareArchaeology.com Page 5 of 6
6 1. NEW FILE ADDED: Watch for the creation of new files. Requires File auditing of the directory(s) that you want to monitor b Accesses: WriteData (or AddFile) c. GREAT for CryptoWare & Malware drops 1. REGISTRY: Monitor certain Keys for Add, Changes and Deletes. Setting auditing on the Specific keys is required. a A Registry value was modified 1. LOGON TYPE: Monitor for what type of logons occur a Message=An account was successfully logged on. i. Type 2 Interactive GUI ii. Type 3 Network Net Use iii. Type 4 Batch iv. Type 5 Service v. Type 7 Unlock vi. Type 8 Network Clear Text vii. Type 9 New Credentials (RDP Tools) viii. Type 10 Remote Interactive (RDP) ix. Type 11 Cached Interactive (laptops) b Message = An account failed to log on. 1. SYSTEM INTEGRITY: Watch for files with page images with bad hashes a Failed page hashes of an image file are not valid 2. FIREWALL: Windows Filtering Platform - Watch for Inbound and Outbound connections Requires Windows Firewall to be enabled a. This is the noisiest of all Events. Generating easily 9,000-10,000 events per hour per system b. Storage is required to utilize this event c Message=The Windows Filtering Platform has permitted a connection. Look for: i. Direction:, Source Address:, Source Port:, Destination Address: & Destination Port: 1. / VPN: Monitor for failed and successful logins to your VPN and Webmail application. Consider ing user if login is from a new IP not in your exclude list a. sc_status=401 Failed OWA login b. "reason = Invalid password" Failed VPN login - Cisco 1. REGISTRY: Watch for the creation or modification of new registry keys and values a Accesses: WriteData (or AddFile) i. HKLM, HKCU & HKU Software\Microsoft\Windows\CurrentVersion 1. Run, RunOnce ii. HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows 1. Watch AppInit_Dlls iii. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\EMDMgmt 1. Watch Connection time of USB Devices iv. HKLM\System\CurrentControlSet\Services 1. Watch for NEW Services v. HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR 1. Watch for NEW USB devices April 2015 ver 1.3 MalwareArchaeology.com Page 6 of 6
Audit Policy Subcategories
668 CHAPTER 20 Windows Server 2008 R2 Management and Maintenance Practices These recommended settings are sufficient for the majority of organizations. However, they can generate a heavy volume of events
WINDOWS REGISTRY AUDITING CHEAT SHEET - Win 7/Win 2008 or later
This Windows Registry Auditing Cheat Sheet is intended to help you get started with basic and necessary Registry Auditing. This cheat sheet includes some very common items that should have auditing enabled,
Windows Logging Workshop You could have and SHOULD have caught the Target Breach! Michael Gough Principal MI 2 Security.com
Windows Logging Workshop You could have and SHOULD have caught the Target Breach! Michael Gough Principal MI 2 Security.com Why are we here Someone got P0wned Windows SUCKS by default The Target breach
Advanced Audit Policy Configurations for LT Auditor+ Reference Guide
Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Contents WINDOWS AUDIT POLICIES REQUIRED FOR LT AUDITOR+....3 ACTIVE DIRECTORY...3 Audit Policy for the Domain...3 Advanced Auditing
Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS
SonicOS User Identification Using the Domain Controller Security Log Contents Supported Platforms... 1 Event Viewer... 1 Configuring Group Policy to Enable Logon Audit... 2 Events in Security Log... 4
Audit account logon events
Audit account logon events Description This security setting determines whether to audit each instance of a user logging on to or logging off from another computer in which this computer is used to validate
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
Windows 7 / Server 2008 R2 Configuration Overview. By: Robert Huth Dated: March 2014
Windows 7 / Server 2008 R2 Configuration Overview By: Robert Huth Dated: March 2014 Expectations This Windows 7 / Server 2008 R2 (Win7-2K8) presentation is a general overview of the technical security
[MS-GPAC]: Group Policy: Audit Configuration Extension
[MS-GPAC]: Group Policy: Audit Configuration Extension Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Windows Advanced Audit Policy Configuration
Windows Advanced Audit Policy Configuration EventTracker v7.x Publication Date: May 6, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This document describes auditing
Agency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005
Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005 Revision 1.3: Cleaned up resources and added additional detail into each auditing table. Revision 1.4:
70-685: Enterprise Desktop Support Technician
70-685: Enterprise Desktop Support Technician Course Introduction Course Introduction Chapter 01 - Identifying Cause and Resolving Desktop Application Issues Identifying Cause and Resolving Desktop Application
Log Management and Intrusion Detection
Log Management and Intrusion Detection Dr. Guillermo Francia,, III Jacksonville State University Prerequisites Understand Event Logs Understand Signs of Intrusion Know the Tools Log Parser (Microsoft)
LepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
Windows 7, Enterprise Desktop Support Technician
Windows 7, Enterprise Desktop Support Technician Course Number: 70-685 Certification Exam This course is preparation for the Microsoft Certified IT Professional (MCITP) Exam, Exam 70-685: Pro: Windows
WINDOWS SPLUNK LOGGING CHEAT SHEET - Win 7 - Win2012
This Windows Splunk Logging Cheat Sheet is intended to help you get started setting up Splunk reports and alerts for the most critical Windows security related events. By no means is this list extensive;
Windows Server 2008/2012 Server Hardening
Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible
1 Attack Top Attackers Report, Top Targets Report, Top Protocol Used by Attack Report, Top Attacks Report, Top Internal Attackers Report, Top External Attackers Report, Top Internal Targets Report, Top
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance
Microsoft Windows Common Criteria Evaluation Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance Microsoft
White Paper. PCI Guidance: Microsoft Windows Logging
PCI Guidance: Microsoft Windows Logging Table of Contents Introduction...3 This white paper was written by: Cayce Beames, CISSP, QSA, Technical Practice Director, Strategic Services, Intel Security Preparation
TESTBED. SekChek for Windows Security Report. System: PUFFADDER (Snake.com) 10 November 2013. SekChek IPS [email protected] www.sekchek.
TESTBED SekChek for Windows Security Report 10 November 2013 SekChek IPS [email protected] www.sekchek.com Declaration The provided observations and recommendations are in response to a benchmarking analysis
TESTBED Win2012 Server
TESTBED Win2012 Server SekChek for Windows Security Report 10 November 2013 SekChek IPS [email protected] www.sekchek.com Declaration The provided observations and recommendations are in response to a
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft Windows using Eventing Collection Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Training Guide: Configuring Windows8 8
Training Guide: Configuring Windows8 8 Scott D. Lowe Derek Schauland Rick W. Vanover Introduction System requirements Practice setup instructions Acknowledgments Errata & book support We want to hear from
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Filtering remote users with Websense remote filtering software v7.6
Filtering remote users with Websense remote filtering software v7.6 Websense Support Webinar April 2012 Websense 2012 Webinar Presenter Greg Didier Title: Support Specialist Accomplishments: 9 years supporting
[MS-GPAC]: Group Policy: Audit Configuration Extension
[MS-GPAC]: Group Policy: Audit Configuration Extension Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft SQL Server Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event Source: SQL Server Versions:
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Tracking Network Changes Using Change Audit
CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and
GENERAL... 2 SETTINGS AND CONFIGURATION... 7 USING THE LOGGING CAPABILITY... 9 LOGON SPEED...
Citrix Presentation Server FAQ FAQ DATASHEET Troubleshooting Frequently Asked Questions Table of Contents GENERAL... 2 SETTINGS AND CONFIGURATION... 7 USING THE LOGGING CAPABILITY... 9 LOGON SPEED... 12
How to monitor AD security with MOM
How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of
Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.
1348 CHAPTER 33 Logging and Debugging Monitoring Performance The Performance tab enables you to view the CPU and physical memory usage in graphical form. This information is especially useful when you
EVENT LOG MANAGEMENT...
Event Log Management EVENT LOG MANAGEMENT... 1 Overview... 1 Application Event Logs... 3 Security Event Logs... 3 System Event Logs... 3 Other Event Logs... 4 Windows Update Event Logs... 6 Syslog... 6
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Defense Security Service Office of the Designated Approving Authority
Defense Security Service Office of the Designated Approving Authority Baseline Technical Security Configuration of Microsoft Windows 7 and Microsoft Server 2008 R2 Version 1.0 Title Page Document Name:
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
NETWRIX IDENTITY MANAGEMENT SUITE
NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
Activity 1: Scanning with Windows Defender
Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders
MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
Network Detective. Using the New Network Detective User Interface Quick Start Guide. 2016 RapidFire Tools, Inc. All rights reserved.
Network Detective SQL Server Assessment Module Using the New Network Detective User Interface Quick Start Guide 2016 RapidFire Tools, Inc. All rights reserved. V20160111 Ver 3F Overview The Network Detective
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
NetSpective Logon Agent Guide for NetAuditor
NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)
This module explains how to configure and troubleshoot DNS, including DNS replication and caching.
Module 1: Configuring and Troubleshooting Domain Name System This module explains how to configure and troubleshoot DNS, including DNS replication and caching. Configuring the DNS Server Role Configuring
Network Detective. Security Assessment Module Using the New Network Detective User Interface Quick Start Guide
Network Detective Security Assessment Module Using the New Network Detective User Interface Quick Start Guide 2016 RapidFire Tools, Inc. All rights reserved. V20160111 Ver 3M Overview The Network Detective
50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum)
This course can be purchased by authorized Microsoft Learning Centers at the Courseware Marketplace web-site. Microsoft Certified Trainers (MCTs) can get a free copy at the same website. About the Course
Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
Using MailStore to Archive MDaemon Email
Using MailStore to Archive MDaemon Email This guide details how to archive all inbound and outbound email using MailStore, as well as archiving any emails currently found in the users accounts in MDaemon.
Kaseya 2. User Guide. Version R8. English
Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as
Objectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
SNARE Agent for Windows v 4.2.3 - Release Notes
SNARE Agent for Windows v 4.2.3 - Release Notes Snare is a program that facilitates the central collection and processing of the Windows Event Log information. All three primary event logs (Application,
Toolbox 3.3 Client-Server Configuration. Quick configuration guide. User manual. For the latest news. and the most up-todate.
User manual Toolbox 3.3 Client-Server Configuration Quick configuration guide For the latest news and the most up-todate information, please consult the Document history Version Comment Version 1.0 30/10/2010,
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
How to Enable the Audit of Active Directory Objects in Windows 2008 R2 Lepide Software
How to Enable the Audit of Active Directory Objects in Windows 2008 R2 Windows 2008 R2 has much more and better features than its predecessors. It also wins in the native auditing part when it comes to
VPN Remote Access Installation and Configuration Guide Operating System: Windows (XP, Vista, 7 and 8)
INFORMATION SYSTEMS SERVICE NETWORKS AND COMMUNICATIONS SECTOR VPN Remote Access Installation and Configuration Guide Operating System: Windows (XP, Vista, 7 and 8) ΥΠΣ ΕΔ/50 November 2012 A. INSTALLATION
How to - Install EventTracker and Change Audit Agent
How to - Install EventTracker and Change Audit Agent Agent Deployment User Manual Publication Date: Oct.17, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract EventTracker
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Integrating Juniper Netscreen (ScreenOS)
Integrating Juniper Netscreen (ScreenOS) EventTracker Enterprise Publication Date: Jan. 5, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide helps you
A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
MS 70-411 Exam Objectives Administering Windows Server 2012 R2
MS 70-411 Exam Objectives Administering Windows Server 2012 R2 Below are the exam objectives for Administering Windows Server 2012 R2 Exam 70-411 Tasks measured as per latest update implemented in January
Windows 7, Enterprise Desktop Support Technician
MS50331 Längd: 5 dagar Windows 7, Enterprise Desktop Support Technician Detta är den bredaste, mest djuplodande kursen för dig som arbetar som Supporttekniker och behöver vara champion på Windows när frågorna
TROUBLESHOOTING GUIDE
Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,
Windows 7. Qing Liu [email protected] Michael Stevens [email protected]
Windows 7 Qing Liu [email protected] Michael Stevens [email protected] 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
How To Connect To Ecs.Org From A Pc Or Mac Or Ipad (For A Laptop) With A Network Connection (For Mac) With The Ipad Or Ipa (For Pc Or Ipac) With An Ipa Or Ip
1) Getting a Windows username and password... 2 2) Download VPN Client... 4 3) Installing VPN... 11 4) Configure VPN... 18 5) Firewall... 20 6) Connecting using VPN... 20 7) Setting up a default connection...
FileNet P8 Platform Directory Service Migration Guide
FileNet P8 Platform Directory Service Migration Guide Release 3.5.1 November 2005 FileNet is a registered trademark of FileNet Corporation. All other product and brand names are trademarks or registered
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
"Charting the Course... MOC 20411 D Administering Windows Server 2012. Course Summary
Course Summary Description Get hands-on instruction and practice administering Windows Server 2012, including Windows Server 2012 R2, in this five-day Microsoft Official Course. This course is part two
Hosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
BorderGuard Client. Version 4.4. November 2013
BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Adaptive Log Exporter Users Guide
IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,
Configuring the Active Directory Plug-in
Wazza s QuickStart Configuring the Active Directory Plug-in Mac OS X 10.3.4 Background Using the Mac OS X 10.3.x built-in Active Directory (AD) plug-in, Mac users can authenticate with a Windows Active
CONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Cloud Attached Storage 5.0
Release Notes Cloud Attached Storage 5.0 March 2015 2015 Cloud Attached Storage 5.0 Release Notes 1 1 Release Contents Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document
NetWrix Logon Reporter V 2.0
NetWrix Logon Reporter V 2.0 Quick Start Guide Table of Contents 1. Introduction... 3 1.1. Product Features... 3 1.2. Licensing... 4 1.3. How It Works... 5 1.4. Report Types Available in the Advanced Mode...
