HIPAA and Meaningful User Audit Reports Using Splunk
|
|
|
- Patricia Haynes
- 10 years ago
- Views:
Transcription
1 Copyright 2013 Splunk Inc. HIPAA and Meaningful User Audit Reports Using Splunk Ant Lefebvre Senior Systems Engineer, Middlesex Hospital #splunkconf
2 About Middlesex Hospital!! We offer a complete range of medical services Some of ConnecMcut s highest quality and pament samsfacmon ramngs 25 Networked Offsite LocaMons 9 Primary Care Offices 3 Emergency Departments! Named to 100 Top Hospitals list two years running! Named to HealthCare s Most Wired List 2012 &
3 Who Am I?! Systems Engineer! Network Engineer! Security / Compliance! Wireless! IT Director! IT Consultant! Splunker 3
4 Splunk for Hospital Network OperaMons
5 Challenges in Healthcare VirtualizaMon Management ApplicaMon Performance Event Log CorrelaMon Global View of Environment 5
6 Hospital s Visibility Gap! Windows event viewer is not easy to navigate! TroubleshooMng mulmple hosts means opening each log individually! CorrelaMng event Mmes in mulmple systems a manual process! Host down or off network made it impossible to access logs! Took hours or days to find root cause(s) for end user device issues Wasted (me and effort to track down issues 6
7 Splunk Solves Visibility Gap Steps to success: 1. Downloaded free demo 2. Globally installed Splunk Universal Forwarders on Windows server and client operamng systems 3. Indexed Windows event log data 4. Instantly gained visibility into windows environment like never before Troubleshoo(ng (me now a frac(on of what it used to be
8 Splunk Enterprise in ProducMon! Finding new use cases every day! Audit consolidamon One tool to monitor all systems! Event correlamon Is the issue happening everywhere? When?! Recognize anomalous acmvimes Something strange going on?! Add new log sources See what shakes out No need to purchase addi(onal products. Index the data in Splunk Enterprise! 8
9 Middlesex Splunk Enterprise Success Stories Mystery wireless disconnects persisted for years; using Splunk Enterprise searched on User ID / tablet name at drop Mmes; discovered crashing process on Citrix server at dropping event Mme! Mystery name resolumon issues; connecmng to wrong workstamons when using hostname; *error* search found DNS record scavenging was accidentally off amer AD/DNS server migramon Started to index firewall traffic logs; using Splunk Enterprise and Google Maps app discovered a Health library machine connected to an internamonal bot net; no business need to communicate with Peru Used Splunk Enterprise to discover slowest boomng computers to priorimze new PC rollout; transacmons from first boot service start to last boot service to start User files vanish. File audit tool gave no insight; Splunk search for user id AND delete finds over 300 events in an hour over the weekend; user accidentally deleted one too many folders The list goes on and on 9
10 Botnet Computer 10
11 Blocking Streaming HDTV Through Firewall 11
12 Boot Times Table 12
13 Found File DeleMon Incident 13
14 Table of Files Deleted Report 14
15 Program Intelligence into Apps/Dashboards! Created useful dashboards for operamons/helpdesk team! Don t need to know Splunk search commands to use! Help less knowledgeable staff troubleshoot environment issues! Each new dashboard is created in- house; no need for addimonal purchase; no need to ask for product enhancement or feature from vendors! Single point of reference for mulmple uses The Splunk Admin can create point and click knowledge 15
16 Citrix Disconnect Dashboard 16
17 Power Dashboard 17
18 Windows NPS RADIUS Dashboard 18
19 Print Server Log Dashboard 19
20 Print User to IP CorrelaMon Print logs do not contain where user prints from Windows Event logs show where user last logged in 20
21 Viral Spread of Splunk Enterprise Word of Splunk Enterprise capability to audit systems and solve mysteries tricked through other IT staffers AddiMonal systems I didn t even know we had were added to Splunk Enterprise 21
22 IT Director s Challenge! A system to audit our Electronic Health Record access! A single solumon to audit mulmple systems! Easy to manage! Cost is always a factor! We have two opmons. Which one is beqer?! The answer: OpMon 3 Splunk! 22
23 HIPAA and Meaningful Use
24 Healthcare Jargon! EMR/EHR Electronic PaMent Records! HIPAA The Health Insurance Portability and Accountability Act of 1996! HITECH Act Health InformaMon Technology for Economic and Clinical Health Act! Meaningful Use Goal is to not just adopt an EHR, but to leverage it to achieve significant improvements in care! Cerner Middlesex Hospital s Primary EHR! Results Middlesex Hospital s home grown EHR lookup applicamon! eclinicalworks Middlesex Hospital s Primary Care / Family PracMce / MulMspecialty EHR 24
25 Sweetening the Deal Managing EHRs! Federal reimbursement for having cermfied technologies to audit Electronic Health Record (EHR) access, enforce Meaningful Use! EHR provider offers specialized (and expensive) point solumon Only shows who s logged in to app! Experiment: EHRs into Splunk no problem Splunk provides audi(ng capabili(es & delivers opera(onal intelligence. 25
26 Raw EHR Audit Data <audit_list><audit_version>1</audit_version><event_dt_tm> :30:06.00</event_dt_tm><outcome_ind>0</ outcome_ind><user_name>system</user_name><prsnl_id> </prsnl_id><prsnl_name>SYSTEM</prsnl_name><role>DBA</ role><role_cd> </role_cd><enterprise_site>hnam</enterprise_site><audit_source>test/default Logical Domain</ audit_source><audit_source_type>274986</audit_source_type><network_acc_type>1</network_acc_type><network_acc_id>mhscnpap</ network_acc_id><context><![cdata[mzq2nzgyotc3fdi3ndk4nnwynzmwmjj8mjy1mte4fdi0fa==]]></context><application>scs Netting Server</ application><task>update SCS Netting Task</task><request>scs_get_proc_server_netting</request><appl_ctx> </ appl_ctx><perform_cnt>24</perform_cnt><event_list><event_name>maintain Order</event_name><event_type>Tasks</ event_type><participants><participant_type>system Object</participant_type><participant_role_cd>Order</ participant_role_cd><participant_id_type>order</participant_id_type><participant_id> </ participant_id><participant_name>blood, Timed Study collect, 08/23/13 5:00:00, Lab Collect</participant_name><data_life_cycle>Origination/ Amendment</data_life_cycle><person_id> </person_id><person_name>BCMA, Dana</person_name><vip_display></ vip_display><encounter_id> </encounter_id><encounter_org>middlesex HOSPITAL</encounter_org><medical_service>Medical Services</medical_service><location>CCU</location><encounter_confid_level></encounter_confid_level><admit_dt_tm> :53:23.00</ admit_dt_tm><discharge_dt_tm> :00:00.00</discharge_dt_tm><encounter_type>Inpatient</encounter_type><encounter_status>Active</ encounter_status><encounter_mrn>9913</encounter_mrn><encounter_fin>11452</encounter_fin><relationship_creation_reason></ relationship_creation_reason><relationship_creation_dt_tm> :00:00.00</relationship_creation_dt_tm><relationship_created_by></ relationship_created_by><relationship_creation_type></relationship_creation_type><relationship_type></ relationship_type><participant_query></participant_query><facility>middlesex HOSPI</facility><building>Middlesex Bld</ building><nurse_unit>ccu</nurse_unit><room></room><bed></bed><external_source></external_source><person_alias></ person_alias><sensitivity_codes></sensitivity_codes></participants></event_list><alt_user_name></alt_user_name><user_organization_name></ user_organization_name><user_organization_cd> </user_organization_cd><personnel_role></ personnel_role><application_number>274986</application_number><task_number>273022</task_number><request_number>265118</ request_number><prsnl_alias></prsnl_alias><user_organization_alias></user_organization_alias></audit_list>! Splunk to the rescue 26
27 Under the Hood IngesMng Cerner EHR audit data into Splunk Cerner Audit Outbound Server Cerner Listener / Splunk Universal Forwarder Splunk Indexer 27
28 Under the Hood Part 2 IngesMng Results EHR audit data into Splunk Results Backend Server FTP server / Splunk Universal Forwarder Splunk Indexer 28
29 Not Sure What Hood to Look Under IngesMng eclinicalworks EHR audit data into Splunk??? / Splunk Universal Forwarder Splunk Indexer Engage your EHR vendor EARLY! 29
30 Vision Into Our Future Compliance Officers, Auditors, ApplicaMon Staff, OperaMons Team, Infrastructure Team Splunk search heads with TAs (Technology Add - ons) and a Common Healthcare App Splunk indexing mulmple diverse, but related systems EHR, Finance, Infrastructure, Clients, Servers, the list goes on. 30
31 Middlesex Hospital s Cerner EHR App! ApplicaMon Report Categories AcMvity Audit Admin Audit Disclosure Report Login Report PaMent Record Access Suspicious AcMvity User Account Sharing VIP PaMent Access! New reports are only limited by the logs and the imaginamon 31
32 Cerner EHR App Demo Before we begin Application demo with test environment data. Application written specifically for Cerner EHR for MU2 Common Information Model in development! Get right to the facts! Compliance isn t preqy! Auditors are going to love it!! Meaningful Use of EHR logs! HIPPA violamon invesmgamon made easy Universal Healthcare App in development 32
33 What s Next?! Common InformaMon Model for Healthcare! Universal Meaningful Use and HIPAA App across mulmple systems! Onboard more systems. Greater visibility!! VMware and Citrix Apps on hqp://apps.splunk.com/ When we need to know what happened in and on our systems, We turn to splunk> 33
34 THANK YOU
Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use
Copyright 2014 Splunk Inc. Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use Ant Lefebvre [email protected] Senior Systems Engineer Middlesex Hospital About Middlesex Hospital Complete range
Savvius Insight Initial Configuration
The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure
Secret Server Splunk Integration Guide
Secret Server Splunk Integration Guide Table of Contents Meeting Information Security Compliance Mandates: Secret Server and Splunk SIEM Integration and Configuration... 1 The Secret Server Approach to
GeBng Started with Splunk MINT
Copyright 2015 Splunk Inc. GeBng Started with Splunk MINT Panos Papadopoulos Director, Product Management, Splunk Mobile App Mobile Network Datacenter 2 The Challenges of Delivering Mobile Apps Form Factor,
This document details the procedure for installing Layer8 software agents and reporting dashboards.
Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via
Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
Using Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: 2013-10-18. Copyright 2013, Juniper Networks, Inc.
Junos Pulse Windows In-Box Junos Pulse Client Quick Start Guide Published: 2013-10-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
Enterprise. Insights. Active Directory Integration: Installation and Setup Guide. v1.0.5
Enterprise Insights Active Directory Integration: Installation and Setup Guide v1.0.5 This guide explains how to install and configure the Active Directory Components provisioned and maintained from the
NetFlow Analytics for Splunk
NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...
McAfee Asset Manager Console
Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Network Metrics Content Pack for VMware vrealize Log Insight
Network Metrics Content Pack for VMware vrealize Log Insight User Manual Version 2.1 June, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction...
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Leveraging Machine Data to Deliver New Insights for Business Analytics
Copyright 2015 Splunk Inc. Leveraging Machine Data to Deliver New Insights for Business Analytics Rahul Deshmukh Director, Solutions Marketing Jason Fedota Regional Sales Manager Safe Harbor Statement
For Splunk Universal Forwarder and Splunk Cloud
Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide
LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...
Active Directory Integration: Install and Setup Guide. Insights
Active Directory Integration: Install and Setup Guide Insights This guide explains how to install and configure the Active Directory Components provisioned and maintained from the Umbrella Dashboard with
How to make a VPN connection to our servers from Windows XP
How to make a VPN connection to our servers from Windows XP Windows XP can only make a Point-To-Point Tunneling Protocol (PPTP) type of VPN connection to our servers. This requires TCP Port 1723 to be
Device LinkUP + Desktop LP Guide RDP
Device LinkUP + Desktop LP Guide RDP Version 2.1 January 2016 Copyright 2015 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM
The Benefits of Integrating File Integrity Monitoring with SIEM Security Information and Event Management (SIEM) is designed to provide continuous IT monitoring, actionable intelligence, incident response,
WinSCP for Windows: Using SFTP to upload files to a server
WinSCP for Windows: Using SFTP to upload files to a server Quickstart guide Developed by: Academic Technology Services & User Support, CIT atc.cit.cornell.edu Last updated 9/9/08 WinSCP 4.1.6 Getting started
vshield Administration Guide
vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Guide: Using Citrix for Home/ Office
Guide: Using Citrix for Home/ Office Contents Important information about disconnecting from Citrix 1 How to access Citrix Site 2 How to install Citrix Receiver for Home/ Personal Device (ipad, android
How to make a VPN connection to our servers from Windows 8
How to make a VPN connection to our servers from Windows 8 Windows 8 is able to make a newer type of VPN connection called a Secure Socket Tunnelling Protocol (SSTP) connection. This works just like a
How to make a VPN connection to our servers from Windows 7
How to make a VPN connection to our servers from Windows 7 Windows 7 is able to make a new type of VPN connection called a Secure Socket Tunnelling Protocol (SSTP) connection. This works just like a traditional
NPS Knowledge Transfer document:
NPS Knowledge Transfer document: Note this document is a complete document that includes basic/advance & expert level steps. Enayat Meer Install NPS role on primary server Add features 1 2 3 Register NPS
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
Incident Response Using Splunk for State and Local Governments
Copyright 2013 Splunk Inc. Incident Response Using Splunk for State and Local Governments Bert Hayes Solu=ons Engineer [email protected] #splunkconf Legal No=ces During the course of this presenta=on, we
View the Replay on YouTube. Sustainable HIPAA Compliance: Enhancing Your Epic Reporting. FairWarning Executive Webinar Series October 17, 2013
View the Replay on YouTube Sustainable HIPAA Compliance: Enhancing Your Epic Reporting FairWarning Executive Webinar Series October 17, 2013 Today s Panel Chris Arnold FairWarning VP of Product Management
Do I need to install anything on my computer to use the VC?
FAQs How does the Virtual computer work? Essentially, the computer accessing the Virtual computer acts as a wireless mouse and keyboard. The applications themselves are running on IT Sligo servers in a
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Monitoring Windows Event Logs
Monitoring Windows Event Logs Monitoring Windows Event Logs Using OpManager The Windows event logs are files serving as a placeholder of all occurrences on a Windows machine. This includes logs on specific
HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps
WHITE PAPER HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps Summary Summary Compliance with PCI, HIPAA, FISMA, EU, and other regulations is as critical in virtualized
FIVE WAYS WIRE DATA ANALYTICS ENABLES REAL-TIME HEALTHCARE SYSTEMS
WHITE PAPER FIVE WAYS WIRE DATA ANALYTICS ENABLES REAL-TIME HEALTHCARE SYSTEMS Abstract Healthcare organizations face a transformational shift with the rise of what Gartner has dubbed the realtime healthcare
FairWarning Mapping to PCI DSS 3.0, Requirement 10
FairWarning Mapping to PCI DSS 3.0, Requirement 10 Requirement 10: Track and monitor all access to network resources and cardholder data Logging mechanisms and the ability to track user activities are
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM TODAY S AGENDA Describe the need for SIEM Explore different options available for SIEM Demonstrate a few Use Cases Cover some caveats
NetSpective Global Proxy Configuration Guide
NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a
Understand Troubleshooting Methodology
Understand Troubleshooting Methodology Lesson Overview In this lesson, you will learn about: Troubleshooting procedures Event Viewer Logging Resource Monitor Anticipatory Set If the workstation service
READYNAS INSTANT STORAGE. Quick Installation Guide
READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
PC Monitor Enterprise Server. Setup Guide
PC Monitor Enterprise Server Setup Guide Prerequisites Server Requirements - Microsoft Windows Server 2008 R2 or 2012-2GB RAM - IIS 7.5 or IIS 8.0 (with ASP.NET 4.0 installed) - Microsoft SQL Server 2008
Installation Steps for PAN User-ID Agent
Installation Steps for PAN User-ID Agent If you have an Active Directory domain, and would like the Palo Alto Networks firewall to match traffic to particular logged-in users, you can install the PAN User-ID
HIPAA/HITECH Compliance Using VMware vcloud Air
Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the
Syslog Server Configuration on Wireless LAN Controllers (WLCs)
Syslog Server Configuration on Wireless LAN Controllers (WLCs) Document ID: 107252 Contents Introduction Prerequisites Requirements Components Used Conventions Syslog Server Support on Wireless LAN Controllers
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
Guide to the LBaaS plugin ver. 1.0.2 for Fuel
Guide to the LBaaS plugin ver. 1.0.2 for Fuel Load Balancing plugin for Fuel LBaaS (Load Balancing as a Service) is currently an advanced service of Neutron that provides load balancing for Neutron multi
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively Arrow ECS DLP workshop, Beograd September 2011 Marko Pust [email protected] 1 Agenda DLP in general What to expect from
freesshd SFTP Server on Windows
freesshd SFTP Server on Windows Configuration Steps: Setting up the Bridgestone User ID... 2 Setup the freesshd Server... 3 Login as the Bridgestone User ID using WinSCP... 5 Create Default Bridgestone
Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure
Netwrix Auditor Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure netwrix.com netwrix.com/social 01 Product Overview Netwrix Auditor
Tenable for CyberArk
HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments
How to Configure an Initial Installation of the VMware ESXi Hypervisor
How to Configure an Initial Installation of the VMware ESXi Hypervisor I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide
Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1
Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server
Configuring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
ResNet Guide. Information & Learning Services. Here to support your study and research
ResNet Guide Information & Learning Services Here to support your study and research ResNet Quick Start Guide In order to get you on-line and enjoying the service as quickly and as painlessly as possible,
This document also includes steps on how to login into HUDMobile with a grid card and launch published applications.
Office of the Chief Information Officer Information Technology Division COMPUTER SELF-HELP DESK - TRAINING TIPS AND TRICKS HUDMOBILE ON HOME MACS This document is a step-by-step instruction to check or
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
June 20, 2012. Copyright 2012 by World Class CAD, LLC. All Rights Reserved.
Windows 2008 Server Event Logs June 20, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. Event Viewer Window Nearly everything that happens to the server or the Domain can be read in a
1. Thwart attacks on your network.
An IDPS can secure your enterprise, track regulatory compliance, enforce security policies and save money. 10 Reasons to Deploy an Intrusion Detection and Prevention System Intrusion Detection Systems
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Instructions for Accessing the Hodges University Virtual Lab
Instructions for Accessing the Hodges University Virtual Lab Table of Contents Adding the VLAB as a Trusted Site... 3 Accessing the VLAB using Windows 8... 5 Using Internet Explorer and Windows 8 to Access
Configuration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
How To Set Up The Barclaycard Epdq Cardholder Payment Interface (Cpi) On Papercut (Barclay Card) On A Microsoft Card (For A Credit Card) With A Creditcard (For An Account)
Barclaycard epdq CPI Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting up and testing the Payment Gateway Module
Deploying the Splunk App for Microso> Exchange
Copyright 2014 Splunk Inc. Deploying the Splunk App for Microso> Exchange Jeff Bernt SDET Disclaimer During the course of this presentahon, we may make forward- looking statements regarding future events
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents:
Configuring and Troubleshooting Routing and Remote Access 6-1 Module 6 Configuring and Troubleshooting Routing and Remote Access Contents: Lesson 1: Configuring Network Access 6-3 Lesson 2: Configuring
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Matrix Logic WirelessDMS Email Service 2.0
Matrix Logic WirelessDMS Email Service 2.0 Version 2.0 August 2009. WHAT IS WDMS EMAIL SERVICE?...2 FEATURES OF WDMS EMAIL SERVICE...3 HOW DOES WDMS EMAIL SERVICE WORK?...4 REQUIREMENTS...5 Server Prerequesites...5
GLS Support Guide Tips and Tricks
GLS Support Guide Tips and Tricks NT14-28911, 3.0, 1/11/2014 Ascom. All rights reserved. TEMS is a trademark of Ascom. All other trademarks are the property of their respective holders. NT14-28911, 3.0,
Under the Hood of the IBM Threat Protection System
Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE [email protected] 1 You are an... IT Security Manager at a retailer
Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging
Log Management Standard Effective Date: 7/28/2015 1.0 INTRODUCTION The California State University, Chico system/application log management standard identifies event logging requirements, log review frequency,
HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES
HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES The Office of the Government Chief Information Officer of The Government of the Hong Kong Special Administrative Region issued its IT Security
M100 System File Manager Help
Copyright (c) Vuzix Corporation 2013-2014. All Rights Reserved. M100 System File Manager Help Section I) Installation of the M100 Section II) General Information Section III) Troubleshooting Section IV)
VIRTUAL SOFTWARE LIBRARY REFERENCE GUIDE
VIRTUAL SOFTWARE LIBRARY REFERENCE GUIDE INTRODUCTION The Virtual Software Library (VSL) provides remote and on-campus access to lab/course software. This approach is intended to simplify access for all
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Remote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell [email protected] Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
CallRail Healthcare Marketing. HIPAA and HITECH Compliance for Covered Entities using Call Analytics Software
CallRail Healthcare Marketing HIPAA and HITECH Compliance for Covered Entities using Call Analytics Software Healthcare 2015 HIPAA and HITECH Compliance for Covered Entities using Call Analytics Software
AVG Business SSO Connecting to Active Directory
AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
AVG Business Secure Sign On Active Directory Quick Start Guide
AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
Guide to Using Citrix at SLU (Windows)
1 Guide to Using Citrix at SLU (Windows) Section 1: Installing Citrix Client on Your Computer Page 2 Section 2: Citrix Homepage Page 9 Section 3: Troubleshooting Page 11 Section 4: Opening and Saving Files
Citrix Client Installation
Citrix Client Installation A guide to installing and using the Citrix Client for applications hosted by the Maricopa County Education Service Agency. For MCESA Internal IVEE Users Installation of the Citrix
