Vista Log Forensics. Dr. Rich Murphey, ACS Background Case Study. Engagement Preliminary Report Final Report Vista Event Logging
|
|
|
- Linette Briggs
- 10 years ago
- Views:
Transcription
1 Session 1 Session 2 Session 64 Vista Log Forensics Dr. Rich Murphey, ACS Background Case Study Engagement Preliminary Report Final Report Vista Event Logging Logging Service Vista Event Encoding Undocumented Internals Event Log Analysis Recovery Correlation Interpretation Shadow Copy Services Enable/Disable Provider A Provider B Controller Controller Buffers Session Control Events Provider C Windows Kernel Events Log files Logged Events Real time delivery Consumer Consumer Recover Repair Correlate 1
2 Acknowledgements Dedicated to: BitMonk (HTA/Ad Hoc) Thanks to: Jerlyn Mardis, ACS Josh Pennell, IO Active Matthew Geiger, CERT Shouts out to: MD5, Caesar HTA Fednaughty DT 2
3 Sponsor: Special Thanks To Forensics In-depth Analysis, Expert Witness Data Recovery Complex RAID, Exotic File Systems Consulting Information Security This is not: Legal Advice Suitable for testimony 3
4 Experience: Rice University Ph.D. Electrical and Computer Engineering UTMB Med. School Faculty, Physiology & Biophysics Pentasafe Security Chief Scientist Applied Cognitive Soln. Chief Scientist Expert Witness CISSP, ACE, EnCE An Author of: GNU Graphics Asterisk VOIP See Authors FreeBSD Rich Murphey Founding Core Team XFree86 man xorg grep Rich 4
5 For More Info C. R. Murphey, Automated Windows Event Log Forensics, Digital Investigation, August 2007 A peer-reviewed paper on a new tool for automating XP log recovery and analysis Digital Forensic Research Workshop, 8/13/07 HTCIA National 8/27/07 5
6 Session 1 Session 2 Session 64 Background Case Study Engagement Preliminary Results Revised Scope Vista Event Logging Events Logging Service Undocumented Internals Event Log Analysis Recovery Correlation Report Shadow Copy Services Enable/Disable Provider A Provider B Controller Controller Buffers Session Control Events Provider C Windows Kernel Events Log files Logged Events Real time delivery Consumer Consumer Recover Roadmap Repair Correlate 6
7 Case Study Steps Step 1: Define Preliminary Scope Define feasibility of the engagement. Step 2: Preliminary Report Uncover and mitigate surprises. Define capability to answer questions. Step 3: Final Report In-depth coverage. Adapt methods to answer questions. 7
8 Officer/Director calls 1 st Hurdle: Define a Scope Something bad happened. Possible contract violation. Outgoing transfer of proprietary documents. #1: Define a scope of work. Can we identify file transfer? Examine hard drives attachments File transfer, uploads Anything else? 8
9 Good news: We know what to look for. Well defined keywords, file names #2: Preliminary Report D:\OfInterest.doc In unallocated space. 2 nd Hurdle: Preliminary Report Bad News: IT deleted the user profile, and gave laptop to a new employee, six months ago, after they reformatted and reinstalled Windows Vista. 9
10 Shortcuts may contain IDs, label, size Shortcut File Shortcuts A snapshot of file s attributes, media s attributes Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov E2C3-F /11/2006 3:21:14 PM 11/3/ :12:34 AM N/A 10
11 3 rd Hurdle: Final Report How to identify outgoing file transfer? Data carve for file path, time. Where to find time stamps? Event logs Internet history Shortcuts Any where else? 11
12 Session 1 Session 2 Session 64 Background Case Study Engagement Preliminary Results Revised Scope Vista Event Logging Events Logging Service Undocumented Internals Event Log Analysis Recovery Correlation Report Shadow Copy Services Enable/Disable Provider A Provider B Controller Controller Buffers Recover Session Control Events Provider C Windows Kernel Repair Correlate Roadmap Events Log files Logged Events Real time delivery Consumer Consumer 12
13 Shortcuts may contain IDs, label, size Shortcut File Shortcuts A snapshot of file s attributes, media s attributes Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov E2C3-F /11/2006 3:21:14 PM 11/3/ :12:34 AM N/A 13
14 Windows Vista/2008 Event Logging Time, SID, Source, Severity, Message More than 50 logs by default. C:/Windows/system32/winevt/Logs/ Application.evtx HardwareEvents.evtx Internet Explorer.evtx Security.evtx Setup.evtx System.evtx. 50 more! 14
15 Component Architecture User Mode System Threads System Processes Services Applications Service Control Mgr. LSASS WinLogon Session Manager SvcHost.Exe WinMgt.Exe SpoolSv.Exe Services.Exe NTDLL.DLL Task Manager Explorer User Application Subsystem DLLs Events Environment Subsystems POSIX OS/2 Windows Backward Compatibility Occurs Here Kernel Mode I/O Mgr Device & File Sys. Drivers File System Cache Object Mgr. Plug and Play Mgr. System Service Dispatcher (kernel mode callable interfaces) Power Mgr. Security Reference Monitor Virtual Memory Processes & Threads Configuration Mgr (registry) Local Procedure Call Windows USER, GDI Graphics Drivers Kernel Hardware Abstraction Layer (HAL) hardware interfaces (buses, I/O devices, interrupts, interval timers, DMA, memory cache control, etc., etc.) PDC 06 15
16 Backward Compatibility? Backward Compatibility 16
17 Vista Event Logging 5% CPU for 20K events/sec, 200K w/transactions Logging and WMI are now just layers on top of ETW Unified: kernel/app, tracing/logging, remote/local Enable/Disable Controller Session Control Events Windows Kernel Session 1 Buffers Session 2 Session 64 Log files Logged Events Provider A Provider B Events Provider C Real time delivery Consumer Consumer PDC 06 17
18 Session 1 Session 2 Session 64 High performance tracing Event Tracing for Windows (ETW) Events from both apps and kernel Provider A Vista Logging Service Enable/Disable Buffers Provider B Controller Controller Session Control Events Provider C Windows Kernel Real time delivery Consumer Consumer Events Log files Logged Events Events are forwarded to a Collector Service and stored in local log for consumption Buffered in kernel Dynamically enable/disable No reboot or restart Selected events are delivered as they arrive Choose either push or pull subscription 18
19 Events are XML! Standards encoding System: standard properties EventData: app. defined Get events via: Query live logs & log files Subscribe to live logs Filter using XPath Internals: New, different encoding Arbitrary structure defined by each application Vista Events <Event> <System> <Provider Name="CD Burning Service" /> <EventID>310</EventID> <Level>2</Level> <Version>0</Version> <TimeCreated SystemTime=" T21:51:44.754Z" /> <EventRecordID>7664</EventRecordID> <Channel>Application</Channel> <Computer>Desktop9237</Computer> <Security UserID="S " /> </System> <EventData> <data name= control > Service Started. </data> </EventData> </Event> Events are encoded not as XML, but rather BXML! PDC 06 19
20 Vista Events On the outside <Event> <System> <Provider Name="CD Burning Service" /> <EventID>310</EventID> <Level>2</Level> <Version>0</Version> <TimeCreated SystemTime=" T21:51:44.754Z" /> <EventRecordID>7664</EventRecordID> <Channel>Application</Channel> <Computer>Desktop9237</Computer> <Security UserID="S " /> </System> <EventData> <data name= control > Service Started. </data> </EventData> </Event> On the inside Record Header Section Descriptor Section Descriptor Section Descriptor Section Header Section Body Section Header Section Body Section Header Section Body PDC 06 20
21 Record header Common attributes Timestamp, severity Number of sections Section descriptors Source Offset, length Section headers Specifies encoding of body Section body event specific data Undocumented Event Structure Record Header Section Descriptor Section Descriptor Section Descriptor Section Header Section Body Section Header Section Body Section Header Section Body 21
22 Binary XML BXML (Binary extensible Markup Lang.) A binary serialization of an XML document. developed by CubeWerx for OpenGIS Consortium. Higher performance in both space and time. More compact. String table for tags and values. Gzip whole doc or just body. Avoids resource exhaustion of DOM. 10 to 100 times faster to parse. 100 times faster for dense numeric data due to binary encoding of numbers alone. 22
23 What is BXML? Serialized numbers begins a one byte code that identifies the data type. byte enum ValueType { BoolCode = 0xF0, ByteCode = 0xF1, IntCode = 0xF4, } // boolean value // 'byte' numeric value // 'int' numeric value IntNum { // 32-bit integer value ValueType type = IntCode; int num; // value } 23
24 What is BXML? XML tags are serialized as a byte code for the type of tag, followed by a reference to the tag name in the string table. ContentElementToken { } // <element> TokenType type = ContentElementCode; Count stringref; // index of element name ElementEndToken { // </element> TokenType type = ElementEndCode; } 24
25 What is BXML? Strings are preceeded by their length. String tables are preceeded by type code and table size. String { // raw character string Count bytelength; // length in bytes byte chars[bytelength]; // characters in proper encoding } StringTableToken { // string table (fragment) TokenType type = StringTableCode; Count nstrings; // number of strings String strings[nstrings]; // values } 25
26 Why the changes? Performance, scalability, and security New event publishing API Schematized, discoverable, structured events Unified API logging uses tracing framework Logging is asynchronous Does not block the application Log size limit removed limited only by disk space Record Header Section Descriptor Section Descriptor Section Descriptor Section Header Section Body Section Header Section Body Section Header Section Body 26
27 XML events have rich information XP Events have flat structure, no parameter names Filtering and Subscriptions XPath Event[System/EventID=101] Select events - filter out noise <QueryList> <Query> <Select>Event[System/Provider=Foo]</Select> <Suppress>Event[System/Level>2]</Suppress> </Query> </QueryList> Filter across live logs, files, Vista, and XP Subscribe to a custom view of events centrally Integrates with existing tools Triggering Actions Associate a task with an event with a single click Vista Events 27
28 Vista Log Signature Vista Log Signature 4K Header starts with ElfFile Each 64K block starts with ElfChnk Size: = 1028 K bytes 28
29 Registering a Provider Providers are sources of the events Identified by unique GUID and name Specifies the location of resources for decoding <provider name="microsoft-windows-demonstration" guid="{ d6ef d } resourcefilename="wevtsvc.dll" messagefilename="wevtsvcmessages.dll" parameterfilename="wevtsvcparameter.dll" > PDC 06 29
30 Channel Definition System-defined channels are imported (System channel above) New provider-specific channels can be defined and configured <importchannel chid="c1" name="system" /> <channel chid="c2" name="microsoft-windows- Demonstration/Operational type="operational" isolation="system"> <logging> <autobackup>true</autobackup> <maxsize> </maxsize> </logging> <publishing> <level>2</level> <keywords>1</keywords> </publishing> </channel> PDC 06 30
31 Template Definition Templates define the payload shape of events Data elements define fields of events Can add user-defined XML representation for the payload <templates> <template tid="tid_helloworld"> <data name="greeting" intype="win:unicodestring" outtype="xs:string" /> </template> </templates> PDC 06 31
32 Event Manifest defines event attributes: ID (value), version, keywords, task, opcode, and level References previously declared template that defines instance data Message - a user readable string Channel - the name of the channel that transports the event to logs <event value="101" version="1" level="win:error" symbol= MyEventDescriptor keywords="el:availability task="el:eventprocessing" template= tid_helloworld" channel= C1" message="$(string.helloworld.message)" /> PDC 06 32
33 How to log an event: Logging Interface Event publishing application At compile time Write a schema Compile schema At run time Register source Create a session Send events Published Events Publishing API User mode Kernel mode Publishing API Published Events Kernel Component Schema compiler Event Schema Sessions session Logs Publisher PDC 06 33
34 Session 1 Session 2 Session 64 Background Case Study Engagement Preliminary Results Revised Scope Vista Event Logging Events Logging Service Undocumented Internals Event Log Analysis Recovery Correlation Report Shadow Copy Services Enable/Disable Provider A Provider B Controller Controller Buffers Recover Session Control Events Provider C Windows Kernel Repair Correlate Roadmap Events Log files Logged Events Real time delivery Consumer Consumer 34
35 Conduct Cutting-Edge Cutting-Edge Forensics Forensic Investigations back cover On Event Log Repair: We found no methods that were complete, and none explained the underlying principles for why the repair was needed. pg. 444 Available April 2,
36 For More Info C. R. Murphey, Automated Windows Event Log Forensics, Digital Investigation, August 2007 A peer-reviewed paper on a new tool for automating XP log recovery and analysis Digital Forensic Research Workshop, 8/13/07 HTCIA National 8/27/07 36
37 Forensic Process Models Log Analysis Roadmap Recover Repair Extract Correlate Analyze Interpret 37
38 Forensic Process Models Log Analysis Roadmap Recover Repair Extract: Step 1 Recover Data Carve for Logs, etc. Correlate Step 2 Validate Identify intact log files. Step 3 Correlate Corresponding time, files, names, Analyze Interpret 38
39 Using DataLifter: 39
40 XP log signature 16 bytes c 66 4c Signatures Vista log signature 16 bytes ElfFile padded with nulls 40
41 Step 1 Recover The Results: Step 1 Recover Run DataLifter 100 logs are recovered. Only two are viewable. 98 corrupt logs Step 2 Validate 98 logs? 41
42 New: Views, Filters Vista Event Viewer 42
43 SQL queries to identify patterns Recover Correlate Repair <QueryList> <Query> Time (UTC) 11/11/ :21 11/11/ :21 11/11/ :22 11/11/ :23 11/11/ :24 11/11/ :25 11/11/ :26 11/11/ :27 11/11/ :27 <Select Path= System > *[System/Provider= CD Burning Service ]</Select> </Query> </QueryList> Correlate Message The CD Burning service was successfully sent a start control. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the stopped state. 43
44 Shortcuts may contain IDs, label, size Shortcut File Shortcuts A snapshot of file s attributes, media s attributes Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov E2C3-F /11/2006 3:21:14 PM 11/3/ :12:34 AM N/A 44
45 Correlations indicate A CD-ROM was burned Recover Report Repair By username: Bob At: 11/11/2006 3:21 PM UTC Correlate We can uniquely identify the CD Label: Nov Volume serial number: E2C3-F184 Proprietary documents were transferred. OfInterest.doc, 1.6Mb Last Modified 11/3/ :12:34 AM UTC 45
46 Shortcuts may contain IDs, label, size Shortcut File Shortcuts A snapshot of file s attributes, media s attributes Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov E2C3-F /11/2006 3:21:14 PM 11/3/ :12:34 AM N/A 46
47 Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov E2C3-F /11/2006 3:21:14 PM 11/3/ :12:34 AM N/A Timestamp Analysis Last write time is earlier than created. Created 11/11/2006 3:21:14 PM Last write 11/3/ :12:34 AM Can indicate the time at which a file was transferred from source media. Can help identify the source file on source media. 47
48 Session 1 Session 2 Session 64 Background Case Study Engagement Preliminary Results Revised Scope Vista Event Logging Events Logging Service Undocumented Internals Event Log Analysis Recovery Correlation Report Shadow Copy Services Enable/Disable Provider A Provider B Controller Controller Buffers Recover Session Control Events Provider C Windows Kernel Repair Correlate Roadmap Events Log files Logged Events Real time delivery Consumer Consumer 48
49 "Shadow Copy tracks your every change." Automatic point-in-time copies. Incremental block level differences minimize space. Deletes older copies as needed for space (LRU). X 49
50 Legal Concerns Related to Vista Revised Federal Rules of Civil Procedure Scope of Production Historical snapshots are readily available in Vista Duty to Preserve Litigation Hold Notices Potential for Sanctions Form of Production Native files? Metadata? Point-in-time Image Snapshots? 50
51 Impact on Policy Maintenance May Complicate Corporate Policy Issues Document retention policies Complicates policy maintenance Disabling shadow copies in turn breaks backups, restore engine Metadata retention policy Ownership changes are visible now Gaps in documentation policy for Vista 51
52 Impact of Vista on Forensics FRCP: The rules have changed. Vista, in turn, changes the rules. What happens if one accepts the default system behavior? Things may never go away permanently. Vista leaves far more information than XP Changes in ownership (SID) Executives dislike surprises Risks regarding SOX compliance and litigation. 52
53 Acts like block device How Shadow Copy Works A layer between the device and file system File System Blocks Volume Shadow Copy (VSS) Service Blocks Block Device (disk) Current File System Snapshot as of Wed. 7:00 Snapshot as of Wed. 10:00 Snapshot as of Wed. 13:00 Snapshot as of Wed. 15:00 Snapshot as of Wed. 19:00 53
54 Shadow Copies Application writes data to disk Disk Before Upon write, overwritten block moves to shadow copy Shadow Before Disk After shadow copy holds only blocks that changed. Shadow After Stevenson, WinHec 06 54
55 Enabling Shadow Copies 55
56 Enabling Shadow Copies 56
57 57
58 58
59 59
60 60
61 61
62 62
63 63
64 Stevenson, WinHec 06 64
65 Stevenson, WinHec 06 65
66 Windows RE Auto-Repair Boot manager detects failure Fail over into Windows RE Computer Bluescreens Reboot Auto-launch Startup Repair No Windows Vista starts Yes Successful boot? >5 attempts? Yes Reboot Diagnose and repair computer No Cannot auto-repair (try manual) Stevenson, WinHec 06 66
67 Stevenson, WinHec 06 67
68 Tools - VSSAdmin C:\>vssadmin /? vssadmin Volume Shadow Copy Service administrative commandline tool (C) Copyright 2001 Microsoft Corp Commands Supported ---- Add ShadowStorage - Add a new volume shadow copy storage association Create Shadow - Create a new volume shadow copy Delete Shadows - Delete volume shadow copies Delete ShadowStorage - Delete volume shadow copy storage associations List Providers - List registered volume shadow copy providers List Shadows - List existing volume shadow copies List ShadowStorage - List volume shadow copy storage associations List Volumes - List volumes eligible for shadow copies List Writers - List subscribed volume shadow copy writers Resize ShadowStorage - Resize a volume shadow copy storage association 68
69 C:\Resource Kit>volrest VOLREST Timewarp Previous Version command-line tool (C) Copyright 2003 Microsoft Corp. Resource Kit VolRest Usage: VOLREST [options] FileName Options are: /? - Displays this help. /A - Includes files with specified attributes. /AD Directories (only). /AS System files. /AH Hidden files. /B - Uses bare format (no heading information or summary). /S - Includes files in specified directory and all subdirectories. /R:<DirectoryName> - Restore all previous versions in target directory. /E - Restores empty directories (use with /R). /SCT - Decorates restored file names with the shadow copy timestamp. Use with /R. For example: "foo (Wednesday, January 01, 2003, ).doc" Examples: VOLREST Z:\MYDIRECTORY\MYFILE.DOC VOLREST //server\share\mydirectory\*.doc VOLREST Z:\*.* /s /r:c:\oldfiles VOLREST Z:\*.DOC /s /r:c:\oldfiles /SCT 69
70 Session 1 Session 2 Session 64 Controller Controller Enable/Disable Session Control Events Recover Repair Windows Kernel Log files Buffers Correlate Provider A Provider B Events Provider C Real time delivery Consumer Consumer Logged Events Questions? [email protected]
71 For More Info C. R. Murphey, Automated Windows Event Log Forensics, Digital Investigation, August 2007 Digital Forensic Research Workshop, 8/13/07 GMU Forensics Symposium HTCIA National 8/27/07 71
Automated Windows Event Log Forensics
DIGITAL FORENSIC RESEARCH CONFERENCE Automated Windows Event Log Forensics By Rich Murphey Presented At The Digital Forensic Research Conference DFRWS 2007 USA Pittsburgh, PA (Aug 13 th - 15 th ) DFRWS
1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer
1! Registry Understanding the Windows Registry! A database that stores hardware and software configuration information, network connections, user preferences, and setup information Windows System Artifacts
Host-based Intrusion Prevention on Windows and UNIX. Dr. Rich Murphey White Oak Labs
Host-based Intrusion Prevention on Windows and UNIX Dr. Rich Murphey White Oak Labs Acknowledgements Niels Provos OpenBSD s systrace DT suggested this thread last year Greg Hoglund insights md5 at da ghettohackers
Chapter 5: Operating Systems Part 1
Name Period Chapter 5: Operating Systems Part 1 1. What controls almost all functions on a computer? 2. What operating systems will be discussed in this chapter? 3. What is meant by multi-user? 4. Explain
TZWorks Windows Event Log Viewer (evtx_view) Users Guide
TZWorks Windows Event Log Viewer (evtx_view) Users Guide Abstract evtx_view is a standalone, GUI tool used to extract and parse Event Logs and display their internals. The tool allows one to export all
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do
STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
Backup and Recovery Procedures
CHAPTER 10 This chapter provides Content Distribution Manager database backup and ACNS software recovery procedures. This chapter contains the following sections: Performing Backup and Restore Operations
Installing a Second Operating System
Installing a Second Operating System Click a link below to view one of the following sections: Overview Key Terms and Information Operating Systems and File Systems Managing Multiple Operating Systems
Basic ShadowProtect Troubleshooting
Level 11, 53 Walker Street North Sydney NSW 2060 Australia t +61 2 9929 9770 f +61 2 9929 9771 w www.storagecraft.com.au Basic ShadowProtect Synopsis This article describes basic ShadowProtect troubleshooting
The Meaning. Linkfiles In Forensic Examinations
The Meaning of Linkfiles In Forensic Examinations A look at the practical value to forensic examinations of dates and times, and object identifiers in Windows shortcut files. Harry Parsonage September
RECOVERING FROM SHAMOON
Executive Summary Fidelis Threat Advisory #1007 RECOVERING FROM SHAMOON November 1, 2012 Document Status: FINAL Last Revised: 2012-11-01 The Shamoon malware has received considerable coverage in the past
Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management
Administration guide Host software WinCCU Installation Complete gas volume and energy data management Contents 1 Introduction... 1 Safety first... 1 Warning... 1 Typographic conventions... 1 Product versioning...
Acronis Backup & Recovery 10 Server for Windows. Installation Guide
Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent
VX Search File Search Solution. VX Search FILE SEARCH SOLUTION. User Manual. Version 8.2. Jan 2016. www.vxsearch.com [email protected]. Flexense Ltd.
VX Search FILE SEARCH SOLUTION User Manual Version 8.2 Jan 2016 www.vxsearch.com [email protected] 1 1 Product Overview...4 2 VX Search Product Versions...8 3 Using Desktop Product Versions...9 3.1 Product
Zmanda Cloud Backup Frequently Asked Questions
Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What
PARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.
Tivoli Storage Manager Lunch and Learn Bare Metal Restore Dave Daun, IBM Advanced Technical Support
IBM Software Group Tivoli Storage Manager Lunch and Learn Bare Metal Restore Dave Daun, IBM Advanced Technical Support July, 2003 Advanced Technical Support Agenda Bare Metal Restore Basics Windows Automated
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
How to troubleshoot Microsoft Volume Shadow copy Service errors
Macrium Reflect uses a Microsoft service called Volume Shadow copy Service to enable disk images to be created and files to be backed up when in use. When VSS fails it can sometimes mean that you are unable
Active Directory 2008 Operations
The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain
DISK DEFRAG Professional
auslogics DISK DEFRAG Professional Help Manual www.auslogics.com / Contents Introduction... 5 Installing the Program... 7 System Requirements... 7 Installation... 7 Registering the Program... 9 Uninstalling
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI 12.1.3 Windows OS directory structures
IT Essentials v4.1 LI 11.4.5 Upgrade and configure storage devices and hard drives 2.3 Disk management tools In Windows Vista and Windows 7, use the following path: Start > Start Search > type diskmgmt.msc
VisionMate Flat Bed Scanner 2D Tube Barcode Reader
VisionMate Flat Bed Scanner 2D Tube Barcode Reader User s Manual Page 1 Catalog #3111 MAN-21256 Rev G Contact Information North America: Tel: 800.345.0206 email: [email protected] Europe: Tel:
Using WMI Scripts with BitDefender Client Security
Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...
H A N D L E I D I N G ONLINE BACKUP VSS - troubleshooting
FAQ: How to troubleshoot problem with Volume Shadow Copy? Pro d u c t Ve rsio n : ClearMedia ACB / OBM: All OS: Windows De sc rip tio n : Exclusively opened file on a local hard disk cannot be backed up,
Windows Server 2008 R2 Essentials
Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
Database Administration
Unified CCE, page 1 Historical Data, page 2 Tool, page 3 Database Sizing Estimator Tool, page 11 Administration & Data Server with Historical Data Server Setup, page 14 Database Size Monitoring, page 15
IBM Security QRadar Version 7.2.2. WinCollect User Guide V7.2.2
IBM Security QRadar Version 7.2.2 WinCollect User Guide V7.2.2 Note Before using this information and the product that it supports, read the information in Notices on page 47. Product information This
Acronis Backup & Recovery 10 Server for Windows. Installation Guide
Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Windows... 3 1.1.2 Management
Eventlog to Syslog v4.5 Release 4.5 Last revised September 29, 2013
Eventlog to Syslog v4.5 Release 4.5 Last revised September 29, 2013 This product includes software developed by Purdue University. The Eventlog to Syslog utility is a windows service originally created
User Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
User Manual. Copyright Rogev LTD
User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
PARALLELS SERVER 4 BARE METAL README
PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels
EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0
EUCIP - IT Administrator Module 2 Operating Systems Version 2.0 Module 2 Goals Module 2 Module 2, Operating Systems, requires the candidate to be familiar with the procedure of installing and updating
Understanding Backup and Recovery Methods
Lesson 8 Understanding Backup and Recovery Methods Learning Objectives Students will learn to: Understand Local, Online, and Automated Backup Methods Understand Backup Options Understand System Restore
EMC NetWorker VSS Client for Microsoft Windows Server 2003 First Edition
EMC NetWorker VSS Client for Microsoft Windows Server 2003 First Edition Administration Guide P/N 300-003-993 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com
Eloquence Training What s new in Eloquence B.08.00
Eloquence Training What s new in Eloquence B.08.00 2010 Marxmeier Software AG Rev:100727 Overview Released December 2008 Supported until November 2013 Supports 32-bit and 64-bit platforms HP-UX Itanium
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2003-2005
Windows security for n00bs part 1 Security architecture & Access Control
Grenoble INP Ensimag _ (in)security we trust _!! SecurIMAG 2011-05-12 Windows security for n00bs part 1 Security architecture & Access Control Description: whether you are in favor or against it, the Windows
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Version 9.0 User Guide 302-001-755 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published in USA. Published
Support Document: Microsoft SQL Server - LiveVault 7.6X
Contents Preparing to create a Microsoft SQL backup policy... 2 Adjusting the SQL max worker threads option... 2 Preparing for Log truncation... 3 Best Practices... 3 Microsoft SQL Server 2005, 2008, or
Installation and User Guide for Partners and Businesses
Installation and User Guide for Partners and Businesses Copyright 2013 SOS Online Backup Table of Contents Page Getting Ready 3 Choosing Components 4 Installing and Configuring ShadowProtect 5 Setting
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
LTFS for Microsoft Windows User Guide
LTFS for Microsoft Windows User Guide Abstract This guide provides information about LTFS for Microsoft Windows, which is an implementation of the Linear Tape File System (LTFS) to present an LTO-5 or
IFSM 310 Software and Hardware Concepts. A+ OS Domain 2.0. A+ Demo. Installing Windows XP. Installation, Configuration, and Upgrading.
IFSM 310 Software and Hardware Concepts "You have to be a real stud hombre cybermuffin to handle 'Windows'" - Dave Barry Topics A+ Demo: Windows XP A+ OS Domain 2.0 Chapter 12: File and Secondary Storage
EVENT LOG MANAGEMENT...
Event Log Management EVENT LOG MANAGEMENT... 1 Overview... 1 Application Event Logs... 3 Security Event Logs... 3 System Event Logs... 3 Other Event Logs... 4 Windows Update Event Logs... 6 Syslog... 6
The Carbonite Appliance HT10 User Guide
The Carbonite Appliance HT10 User Guide Keep business moving with the Carbonite Appliance HT10. The hybrid data solution that s just right for your clients. For assistance, reach the Carbonite Support
Microsoft Vista: Serious Challenges for Digital Investigations
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2008 Microsoft Vista: Serious Challenges for Digital Investigations Darren R. Hayes and Shareq Qureshi Seidenberg School of
ACTIVE@ UNDELETE 7.0 USER GUIDE
ACTIVE@ UNDELETE 7.0 USER GUIDE COPYRIGHT Copyright 27, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
Zinstall HDD User Guide
Zinstall HDD User Guide Thank you for purchasing Zinstall. If you have any questions, issues or problems, please contact us: Toll-free phone: (877) 444-1588 International callers: +1-877-444-1588 Support
BEST PRACTICES GUIDE: VMware on Nimble Storage
BEST PRACTICES GUIDE: VMware on Nimble Storage Summary Nimble Storage iscsi arrays provide a complete application-aware data storage solution that includes primary storage, intelligent caching, instant
SQL Server Database Administrator s Guide
SQL Server Database Administrator s Guide Copyright 2011 Sophos Limited. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by
IBM TSM for SharePoint 6.1 VSS Backup and Restore Solution Guide IBM System Storage DS6000 & DS8000 with DocAve 5.1.2.1
IBM TSM for SharePoint 6.1 VSS Backup and Restore Solution Guide IBM System Storage DS6000 & DS8000 with DocAve 5.1.2.1 Document Date: June 2009 Authors: David West i, David Hartman ii Document version:
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
CTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
CTERA Agent for Windows
User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
Datagram. Datagram SyslogAgent manual. Version 3.6
Consulting Östermalmsgatan 21, 114 26 Stockholm, Sweden Tel +46 8 544 952 00 www.datagram.se Datagram Datagram SyslogAgent manual Version 3.6 April 2011 Table of contents: Datagram SyslogAgent manual...
Windows 7: Current Events in the World of Windows Forensics
Windows 7: Current Events in the World of Windows Forensics Troy Larson Senior Forensic Program Manager Network Security, Microsoft Corp. Where Are We Now? Vista & Windows 2008 BitLocker. Format-Wipes
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
Cache Configuration Reference
Sitecore CMS 6.2 Cache Configuration Reference Rev: 2009-11-20 Sitecore CMS 6.2 Cache Configuration Reference Tips and Techniques for Administrators and Developers Table of Contents Chapter 1 Introduction...
Oracle 11g Database Administration
Oracle 11g Database Administration Part 1: Oracle 11g Administration Workshop I A. Exploring the Oracle Database Architecture 1. Oracle Database Architecture Overview 2. Interacting with an Oracle Database
Using Process Monitor
Using Process Monitor Process Monitor Tutorial This information was adapted from the help file for the program. Process Monitor is an advanced monitoring tool for Windows that shows real time file system,
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2.
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft
Backing Up and Recovering Your Server
8 Backing Up and Recovering Your Server In this chapter, you will learn to: Understand Backup and Recovery (Pages 254 262) 33n Understand Backup and Recovery Terminology (Page 255) n Use Backup and Recovery
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Version 8.2 Service Pack 1 User Guide 302-001-235 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published
Actualtests.com - The Power of Knowing
Explanation: We should use Global Security groups. QUESTION 87 You are the network administrator for Certkiller.com. Your network consists of a single Active Directory domain named Certkiller.com. All
Backup & Recovery. 10 Suite PARAGON. Data Sheet. Automatization Features
PARAGON Backup & Recovery 10 Suite Data Sheet Automatization Features Paragon combines our latest patented technologies with 15 years of expertise to deliver a cutting edge solution to protect home Windows
How To Understand The Error Codes On A Crystal Reports Print Engine
Overview Error Codes This document lists all the error codes and the descriptions that the Crystal Reports Print Engine generates. PE_ERR_NOTENOUGHMEMORY (500) There is not enough memory available to complete
C6 Easy Imaging Total Computer Backup. User Guide
C6 Easy Imaging Total Computer Backup User Guide Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation. Other product names used in this guide are recognized
Monitoring App V eg Enterprise v6
Monitoring App V eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced or
HarePoint Workflow Scheduler Manual
HarePoint Workflow Scheduler Manual For SharePoint Server 2010/2013, SharePoint Foundation 2010/2013, Microsoft Office SharePoint Server 2007 and Microsoft Windows SharePoint Services 3.0. Product version
Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08
Zen Internet Online Data Backup Zen Vault Express for Windows Issue: 2.0.08 Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installation... 5 2.1 The Setup WIzard... 5 3 The Backup Service...
MOC 20462C: Administering Microsoft SQL Server Databases
MOC 20462C: Administering Microsoft SQL Server Databases Course Overview This course provides students with the knowledge and skills to administer Microsoft SQL Server databases. Course Introduction Course
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 8.2 User Guide P/N 302-000-658 REV 01 Copyright 2007-2014 EMC Corporation. All rights reserved. Published in the USA.
EMC NetWorker Module for Microsoft Applications Release 2.3. Application Guide P/N 300-011-105 REV A02
EMC NetWorker Module for Microsoft Applications Release 2.3 Application Guide P/N 300-011-105 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
FTP Client Engine Library for Visual dbase. Programmer's Manual
FTP Client Engine Library for Visual dbase Programmer's Manual (FCE4DB) Version 3.3 May 6, 2014 This software is provided as-is. There are no warranties, expressed or implied. MarshallSoft Computing, Inc.
Acer erecovery Management
1 Acer erecovery Management Acer erecovery Management provides a fast and reliable method to restore your computer to its factory default settings or user-defined system configuration, from images stored
Backup Exec System Recovery 7.0 Best Practices
Backup Exec System Recovery 7.0 Best Practices Windows 2000/2003 Server and Active Directory Domain Controllers Updated By: Bill Felt Authored By: Aimee Barborka NOTE: As Symantec products evolve, some
Acronis Backup & Recovery 10 Server for Windows. Installation Guide
Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent
VSS installation and application
VSS installation and application Sam Lee Version 1.0 (DEC, 2010) 1 QSAN Technology, Inc. http://www.qsantechnology.com White Paper# QWP201010-P300H lntroduction This document introduces how to perform
Known Issues and Work Around
Known s and Work Around During Compass 2.0 installation, sometimes you may get a popup message.net framework/sqlexpress could not be installed. Install.Net framework/sqlexpress manually. Sometimes, migration
How To Use A Microsoft Networker Module For Windows 8.2.2 (Windows) And Windows 8 (Windows 8) (Windows 7) (For Windows) (Powerbook) (Msa) (Program) (Network
EMC NetWorker Module for Microsoft Applications Release 2.3 Application Guide P/N 300-011-105 REV A03 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
Microsoft SQL Server 2008 Administrator's Pocket Consultant
Microsoft SQL Server 2008 Administrator's Pocket Consultant William R. Stanek To learn more about this book, visit Microsoft Learning at http://www.microsoft.com/mspress/books/12755.aspx 9780735625891
Installation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)
1 Laplink DiskImage 7 Professional Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: [email protected] Laplink Software, Inc. 600 108th Ave.
Land Information New Zealand (LINZ) SALT Database. Migration from original hardware to virtualised hardware: Process Documentation
Land Information New Zealand (LINZ) SALT Database Migration from original hardware to virtualised hardware: Process Documentation Contents Migration from original hardware to virtualised hardware: Process
Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline NTFS File System Formats File System Driver Architecture Advanced Features NTFS Driver On-Disk Structure (MFT,...)
Acronis Backup & Recovery 11.5
Acronis Backup & Recovery 11.5 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows
SOLUTION GUIDE AND BEST PRACTICES
SOLUTION GUIDE AND BEST PRACTICES Last Updated December 2012 Solution Overview Combine the best in bare-metal backup with the best in remote backup to offer your customers a complete disaster recovery
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
Dr.Backup Release Notes - Version 11.2.4
Dr.Backup Release Notes - Version 11.2.4 This version introduces several new capabilities into the Dr.Backup remote backup client software (rbclient). The notes below provide the details about the new
