Auditing File and Folder Access
|
|
|
- Candace Reynolds
- 10 years ago
- Views:
Transcription
1 The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields
2 Au diting File and Folder Access... 1 Auditing Considerations... 1 Co nfiguring Auditing... 2 Command Line Auditing... 3 Mining the Security Event Log... 4 Centralized Auditing and Reporting via Third Party Tools... 5 i
3 Copyright Statement 2009 Realtime Publishers. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers or its web site sponsors. In no event shall Realtime Publishers or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via at [email protected]. ii
4 Auditing File and Folder Access The third rail of effective file server security is all about assurance. Assuring that the right users have access to data preserves availability. Assuring that everyone else stays out preserves security. Assuring that permissions on files and folders are always correctly set preserves compliance. Auditing access to Windows Server 2008 file servers is the primary mechanism through which this assurance is achieved. Auditing enables administrators to verify that security controls put in place are working properly, all the while logging access and modifications to controlled files. Auditing can be enabled via the Windows Explorer GUI, command prompt tools, and Group Policy. Like reporting on access controls, the auditing process is per server and the logging of controlled events is done to the local event log. A correctly developed auditing system provides a number of benefits to the organization. It assists in securing the enterprise by determining inappropriate access to files or folders. It provides for the maintenance of a modification history across data, applications, and operating system (OS) configurations. And it creates the necessary documentation for meeting regulatory standards. Auditing Considerations The first step in deciding to audit file server access is determining what type of events to audit. For many IT organizations, the selection of auditing categories is often defined by internal security organizations in cooperation with applicable rules of regulatory compliance. Although each compliance regulation is uniquely different in its guidance, all generally require that user and administrator actions are tracked into an auditable database. For some, that database can be your Windows servers Event Logs. The first step in this process is to designate a purpose to each audit rule. Auditing rules have several typical purposes. They can assist in securing the enterprise by determining inappropriate access to files or folders. Auditing also allows the maintenance of a modification history outside of any application specific modification tracking. This linkage between auditing rules and business goals is critically important, as there can be unintended effects when purposes are not designated to an audit rule. The first of these relates to collected events that do not further the organization s goals. Collecting these events consumes resources, leads to log maintenance issues, and makes event filtering dramatically more difficult. Therefore, discretion is required when developing an audit policy so that only the appropriate types of access tracking are monitored. The second unintended effect stems from possible legal exposure. Your organization s legal counsel should review your auditing strategy. Their legally focused review helps to ensure that the auditing purpose covers potential exposure and that the policy is defensible. 1
5 Note In short, your audit policy should collect the minimum amount of auditing information that is necessary to accomplish your business goals. Windows Server 2008 provides for auditing on folders as well as individual files. File and folder auditing can monitor access to both simple as well as special permissions as discussed in the first article of this series. For each object, assigned auditing rules can monitor for success and/or failure in exercising the users permissions. As with permissions, it is important to remember that auditing configurations are also inheritable. Thus, if extensive auditing is set up and allowed to pass down the settings to a large number of files, a great number of audit entries could be generated. Configuring Auditing Auditing must first be globally enabled before setting auditing rules on individual files and folders. Doing this across multiple machines in an environment is most commonly accomplished via Group Policy. Navigate to Computer Configuration Policies Windows Settings Security Settings Local Policies Audit Policy, as shown in Figure 1. Here, edit the Audit Object Access policy to allow the tracking of Success and/or Failure events. Figure 1: Enabling auditing via Group Policy. Once the global audit policy is enabled, configuring auditing on individual files and folders can be performed using Group Policy, Windows Explorer, or command line tools. As with the global policy, leveraging Group Policy for individual file and folder configuration ensures a comprehensive approach. Right click Computer Configuration Policies Windows Settings Security Settings File System, and select Add File to add a file or folder to the policy (see Figure 2). 2
6 Figure 2: Configuring auditing of NTFS access. After entering the file path, click Edit Security to bring forward the same Security wizard you re used to seeing when managing permissions directly in the file system. Click Advanced, and select the Auditing tab of the Advanced Security Settings window to configure audit settings using the GUI. Command Line Auditing Audit configuration from the command line is possible using the same Windows PowerShell Get ACL cmdlet discussed earlier in this series. Get ACL is used to retrieve the existing audit policy using PowerShell by supplying the audit command line switch: Get ACL c:\users\administrator\tools\ audit Select Object ExpandProperty Audit To use PowerShell to create an audit rule, the Set ACL cmdlet is required: $AclToModify = Get ACL Path c:\users\administrator\tools Audit $NewAudit = New Object System.Security.AccessControl.FileSystemAuditRule( MyLocalDomain\gshields, ReadDa ta, Success ) $ AclToModify.AddAuditRule($NewAudit) Set ACL Path c:\users\administrator\tools ACLObject $AclToModify PowerShell provides a rich mechanism for scripting the creation of audit rules; however, effectively using it requires familiarity with the.net Framework classes that manage access to the file system rules. 3
7 Mining the Security Event Log After auditing has been configured, success or failure events will be stored in the Security event log. Event log entries are stored per server, so be conscious of each server s maximum log size and how the event log is configured to react when the log size is reached. Depending on the size of the log file and the number of events, there is a danger of losing audit entries due to log size maximums being reached. Note Windows Server 2008 includes a feature called Event Log Forwarding, which allows file servers to centralize event log data onto a single server. This server can be configured to pull the event logs from the other servers or those servers can pass selected events to the central server. More information on Event Log Forwarding can be found at us/library/cc aspx. Gathering log information is only the first step. Effectively mining event log data for meaningful events requires extra effort. With the release of Windows Server 2008, Event Viewer provides several filtering options that limit the data being presented In Figure 3, you can see how a few specific settings can greatly enhance the quality of information viewed from the Security log: Logged. For a general purpose file system auditing log, this can be set at Any time. Event Level. All security audit entries will be Informational, so this filter is of relatively little use. Event Logs. All the entries dealing with auditing are contained in the Security event log. Event Sources. Microsoft Windows security auditing should be selected here. Task Category. Here, select the File System option. Keywords. The Keywords option is of little use, as all security audit entries contain the keywords Audit Success or Audit Failure. 4
8 Figure 3: Event Viewer s filtering options. Once filtered, reporting from the Event Viewer is quite limited. A selection of events can be saved to XML, text, or comma separated value files, but there is no facility for rich reporting. Additionally, reporting efforts can be hampered by the limitations of event log storage. In the most gracious scenario where all old event logs cannot be maintained in the current view, the events are archived and those archives would need to be searched individually in order to obtain information from them. Centralized Auditing and Reporting via Third Party Tools Auditing is all about assurance, but assuring effective auditing with native tools alone is a challenge. As you can see, configuring auditing via Windows Explorer or Windows PowerShell requires a number of steps and careful coordination to be effective. Each and every file share must be managed as an individual item, which increases the chance for errors or omissions in auditing. Although Group Policy assists this process, the natural dynamics of an IT environment mean that Group Policies must be regularly verified to ensure their policies remain correct over time. 5
9 IT environments with large numbers of file shares, large amounts of file storage, or highsecurity requirements may find that native solutions are insufficient for their needs. To meet regulatory compliance and provide timely security information, you may find the need to turn to third party toolsets. Their extended capabilities enable the central configuration of an audit plan, central storage of audit data, customizable reporting, alerting in the case of unauthorized access, and enhanced search features that are often necessary as environments scale. 6
Controlling and Managing Security with Performance Tools
Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance
Active Directory 2008 Operations
The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
Quickly Recovering Deleted Active Directory Objects
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory
Eradicating PST Files from Your Network
The Essentials Series: Operations Benefits of Email Archiving Eradicating PST Files from Your Network sponsored by by Jim McBee Eradicating PST Files from Your Network...1 Understanding the Disadvantages
Becoming Proactive in Application Management and Monitoring
The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...
Virtual Machine Environments: Data Protection and Recovery Solutions
The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:
The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous
Understanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
Tips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
How Configuration Management Tools Address the Challenges of Configuration Management
Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Using Web Security Services to Protect Portable Devices
Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
Isolating Network vs. Application Problems
The Essentials Series: Network Troubleshooting and Problem Identification Isolating Network vs. Application Problems sponsored by by Greg Shields Isolating Network vs. Application Problems...1 Common
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting
Steps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices. 2011 Edition Don Jones
The Definitive Guide tm To Active Directory Troubleshooting, Auditing, and Best Practices 2011 Edition Don Jones Ch apter 5: Active Directory Auditing... 63 Goals of Native Auditing... 63 Native Auditing
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 4: Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server... 57 Co mmon Operations... 57 Step 1: Prepare the Microsoft
Real World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide
ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Why Endpoint Encryption Can Fail to Deliver
Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1
Account Access Management - A Primer
The Essentials Series: Managing Access to Privileged Accounts Understanding Account Access Management sponsored by by Ed Tittel Understanding Account Access Management...1 Types of Access...2 User Level...2
The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
The Art of High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
ChangeAuditor 5.6. For Windows File Servers Event Reference Guide
ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Collaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
How to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime
Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Data Protection in a Virtualized Environment
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
Active Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
FOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS
Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Spotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high quality books
The Next-Generation Virtual Data Center
The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan
Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Lab 05: Deploying Microsoft Office Web Apps Server
Lab 05: Deploying Microsoft Office Web Apps Server DISCLAIMER 2013 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Hyper-V, Internet Explorer, Lync, PowerPoint, Silverlight, SQL
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
Realizing the IT Management Value of Infrastructure Management
The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
Security Explorer 9.5. User Guide
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
Symantec Enterprise Vault Technical Note. Troubleshooting the Monitoring database and agents. Windows
Symantec Enterprise Vault Technical Note Troubleshooting the Monitoring database and agents Windows December 2006 Symantec Enterprise Vault Troubleshooting the Monitoring database and agents Copyright
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
January 23, 2010 McAfee SaaS Email Continuity User Guide
January 23, 2010 McAfee SaaS Email Continuity User Guide COPYRIGHT Copyright 2001 2010 McAfee, Inc. All Rights Reserved. This document contains proprietary information of McAfee Inc. and is subject to
Automated Database Backup. Procedure to create an automated database backup using SQL management tools
Automated Database Backup Procedure to create an automated database backup using SQL management tools Genetec Technical Support 6/29/2009 Notice This manual, and the software that it describes, is provided
The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2
Pr oactively Monitoring Response Time and Complex Web Transactions... 1 An atomy of Common Web Transactions... 1 Asking for Decisions... 1 Collecting Information... 2 Providing Sensitive Information...
User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory
Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
Scribe Demonstration Script Web Leads to Dynamics CRM. October 4, 2010 www.scribesoft.com
Scribe Demonstration Script Web Leads to Dynamics CRM October 4, 2010 www.scribesoft.com Important Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in
Dell Statistica Document Management System (SDMS) Installation Instructions
Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
How To Protect Your Active Directory (Ad) From A Security Breach
Securing Active Directory: An Ounce of Prevention or a Pound of Cure? Abstract This technical brief reviews three tasks that should be a part of your proactive Active Directory (AD) security routine: Establishing
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
CommVault Simpana Archive 8.0 Integration Guide
CommVault Simpana Archive 8.0 Integration Guide Data Domain, Inc. 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800 Version 1.0, Revision B September 2, 2009 Copyright 2009
