Last Updated: July STATISTICA Enterprise Server Security
|
|
|
- Cynthia Casey
- 10 years ago
- Views:
Transcription
1 Last Updated: July 2011 STATISTICA Enterprise Server Security
2 STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server... 3 System Architecture... 3 User Authentication... 4 Identity Tokens... 5 User Account Management... 5 Web Based User Management... 6 Permissions While in the Software... 6 Consumers of Information... 6 Users Who Perform Analyses... 6 Users Who Can Deploy Scripts... 7 Administrators... 7 Access Control... 7 Special Considerations for Network Shares... 8 Communication between Computers... 8 Web Server/Client Communication... 8 PHP Security... 9 IIS Security... 9 Updates Sample Applications Unused ISAPI Extensions... 10
3 STATISTICA Enterprise Server Security Page 3 of 10 Executive Summary STATISTICA Enterprise Server provides Web-based access to STATISTICA analyses. In today s Internet world, the security of any Internet application is of primary consideration. This white paper addresses this concern as it relates to STATISTICA Enterprise Server. After an introduction and system overview, the security topics that will be discussed include user authentication, user management, access control, user permissions, and communication between computers. Included is information involving security issues with PHP, the widely used scripting language on which the Web server component of STATISTICA Enterprise Server depends. We will also discuss security issues involved when the Web server used is Microsoft Internet Information Services (IIS). Introduction to STATISTICA Enterprise Server STATISTICA Enterprise Server is a highly scalable, enterprise-level, fully Web-enabled data analysis and database gateway application system that is built on distributed processing technology and fully supports multi-tier Client-Server architecture configurations. STATISTICA Enterprise Server exposes the analytic, query, reporting, and graphics functionality of STATISTICA through easy-to-use, interactive, standard Web interfaces. Alternatively, it enables users of the desktop version ( thick client ) to offload computationally intensive analytics and database operations to the Server. It is offered as a complete, ready-to-install application with an interactive, Internet browser-based ( point-and-click ) user interface ( thin client ) that makes it possible for users to interactively create data sets, run analyses, and review output. However, STATISTICA Enterprise Server is built using open architecture and includes.net-compatible development kit tools (based entirely on industry standard syntax conventions such as VB Script, C++/C#, HTML, Java, and XML) that enables IT department personnel to customize all main components of the system or expand it by building on its foundations (e.g., by adding new components and/or company-specific analytic or database facilities). System Architecture The STATISTICA Enterprise Server architecture uses two different servers: the industry-standard Web server (IIS, Apache, etc.), which handles the traffic from the browser, and the STATISTICA Server, which processes all the analysis requests. Although the general design uses two "machines" in a typical configuration, the Web server (e.g., a UNIX-based Apache system) and at least one STATISTICA Server (optionally scalable to multiple STATISTICA Servers), in many cases, the STATISTICA Server is installed on the same machine (for example, when IIS is used as the Web host).
4 STATISTICA Enterprise Server Security Page 4 of 10 The design allows for a flexible, generic Web server implementation by using a standard scripting language on the Web server. The purpose of the Web server is to package requests from the user (received from a browser), send these to the STATISTICA Server, and then process responses from the STATISTICA Server for display to the user (on his/her browser). Communication between the Web server and the STATISTICA Server is accomplished through technology based on the industry standard XML conventions. The system is fully customizable. Customers who want to develop their own modifications or extensions of this (ready to deploy) system can use the development tool kit facilities provided to modify all aspects of the scripts that are being executed by STATISTICA (on the STATISTICA Server side) and the appearance of the user interface exposed to the end-users on the (browser-based) thin client side. Only the most standard, commonly known tools (such as VB or XML/HTML) are used to customize or expand the system. The actual Web page definitions and STATISTICA scripts to be executed are stored in a designated Repository Facility on the STATISTICA Server, and they are managed in a queue-like fashion. The system also includes a highly optimized Distributed Processing Manager that handles the incoming processing load and distributes it optimally over multiple threads of STATISTICA and multiple STATISTICA Server computers. The STATISTICA Enterprise Server software system also includes the STATISTICA Visual Basic Web Extensions. These extensions to the SVB language enable the script writer either to let the system take care of displaying the resulting graphs and spreadsheets on the automatically generated (output) Web pages, or to customize the appearance of the generated output pages by adding HTML directives as appropriate. Security and authentication is a key design feature in the STATISTICA Enterprise Server application system. At the beginning of the session, users "sign on" to the system with their user names and passwords. System administrators are able to control access to data sources and scripts based either on user or group permissions. The highest level of the access privilege allows advanced users (or administrators) to execute virtually arbitrary scripts (e.g., in order to perform system administration or maintenance operations). That level requires a designated (highest) access privilege because, due to the general nature and power of the STATISTICA Visual Basic language, it gives access (to the authorized users) to all resources on the network. Note that this system can be integrated with the "traditional" (i.e., non-web-based) STATISTICA concurrent network or a STATISTICA enterprise system authentication scheme so that a corporate customer can install, for example, a 50-user (total) STATISTICA enterprise system or a concurrent network with 20 licenses accessible via the STATISTICA Enterprise Server. User Authentication STATISTICA Enterprise Server uses the NT security model for both user authentication and for restricting access to files in the STATISTICA repository. Access to the server is contingent on membership in local groups that are created by during installation. Since STATISTICA Enterprise Server
5 STATISTICA Enterprise Server Security Page 5 of 10 uses the NT security model, it can be integrated with existing Domain and Active Directory network configurations. There are two modes of authentication supported. By default, a user is always required to enter an account name and password to log on to the server. The password is encrypted by the client before it is submitted to the server. The encryption algorithm is designed to keep casual examination of network traffic by network sniffing devices from easily displaying plaintext passwords. While this protection may be sufficient in many circumstances, an increased level of security can be achieved by using the Secure Sockets Layer (SSL) protocol, which is described later in this document. Installations that use Internet Information Services (IIS) on a local intranet to host the STATISTICA Web files can additionally enable Integrated Login. When Integrated Login is configured, an attempt is made to authenticate you by passing your network security context to the STATISTICA Enterprise Server. If the detected account is a member of the appropriate local groups, you will be passed through without the need to enter the information manually. No password information is submitted by the client when Integrated Login is used. Identity Tokens Once a user is authenticated, a unique identifier called an Identity Token is created. The Identity Token is what represents the session; any further communication between the client and the server will include this identifier. Once a session is ended, the corresponding Identity Token is no longer valid and cannot be reused. A session ends when the user selects to be logged off the server or when the session times out. A session will time out, if a user closes the browser window or browses to a new page and does not return to the STATISTICA interface within the time-out period. The amount of time it takes a session to expire is configurable by STATISTICA administrators. User Account Management Access to the STATISTICA Enterprise Server is determined by local groups that exist on the machine on which the STATISTICA Server is installed. The minimum requirement to access any resources on a STATISTICA Enterprise Server is to be a member of the local group SWS_USER; every account is a member of this group. Membership in the STATISTICA Server s local group Users is not required to log on to STATISTICA Enterprise Server. Local and domain accounts can be members of SWS_USER. When local accounts are used, the account password is validated against the STATISTICA Server s local account database. Domain accounts are validated against the appropriate domain controller. To ease administration in a domain environment, it is common for a global group to be added to the local group SWS_USER. This enables user management to be performed using traditional domain management tools instead of needing to add users directly to the local group on the STATISTICA Enterprise Server. The same thing can be done with the other local groups, for example, the SWS_ADMIN group may have only one member, SWS_ADMIN_GLOBAL, which is a global group contained within the Active Directory.
6 STATISTICA Enterprise Server Security Page 6 of 10 Web Based User Management While traditional Windows tools can be used to manage STATISTICA Enterprise Server accounts, you are also provided with a Web-based interface for managing these same accounts. Administrators can make use of this Web-based interface by logging on to the STATISTICA Enterprise Server. From this interface, they can create new users or add existing NT accounts to the STATISTICA Enterprise Server user pool. Additionally, administrators can create user-defined groups, which are simply local groups on the STATISTICA Server that begin with the prefix SWSU_. These groups are convenient for grouping together related users when defining who may access specific documents in the Repository. Permissions While in the Software Every STATISTICA Enterprise Server user must be a member of the local group SWS_USER. There are several other local groups created by the installer in addition to SWS_USER that can be used to assign roles to users. Different roles a user might have include consumers of information, users who perform analyses, users who can deploy scripts, and administrators. Consumers of Information Often there are users who are not interested in performing the analyses themselves but instead are interested in viewing already prepared reports and drilling down on the information further. The product appropriate for this type of user is the STATISTICA Enterprise Server Knowledge Portal; it enables your colleagues, employees, and/or customers (with appropriate permissions) to log on and quickly and efficiently get access to the information they need by reviewing predefined reports (optionally organized into structured repositories). Additionally, the STATISTICA Enterprise Server Interactive Knowledge Portal offers options to the portal visitors to define and request new reports, run queries and custom analyses, drill down and up, and slice/dice data (optionally via OLAP), and gain insight from any resources made available to them by the portal designers or administrators. Once an account is a member of the local group SWS_USER, they have access to all of the advanced statistical modules licensed on the STATISTICA Server. Two additional groups, SWS_PORTAL and SWS_PORTALINTERACTIVE, define an account as just a portal user. Once an account is made a member of one of the portal groups, each log on is automatically redirected to the streamlined Knowledge Portal interface where the user is able to access the reports to which they have been given access. Users Who Perform Analyses There are different degrees of power that can be given to users who perform analyses. Membership in the local group SWS_BATCHABLE allows users to queue jobs to be run by the server in batch mode. Jobs run in batch mode continue to execute even when the user is not logged on to the server. A user
7 STATISTICA Enterprise Server Security Page 7 of 10 with batch rights could potentially place a larger strain on server resources by submitting an unreasonable amount of batch jobs to be run by the server. The local group SWS_DOWNLOADFILES defines which users are allowed to copy documents from the Repository to their local machine. The local group SWS_UPLOADDATA allows users to utilize the Upload Document to Server facility to place data files in the Repository from their local machines. Users Who Can Deploy Scripts One important restriction on the group SWS_UPLOADDATA is that it does not give the user the ability to upload SVB macros. Only users who are a member of the local group SWS_UPLOADSCRIPTS can upload this type of file. It is important that this distinction between SVB macros and other uploads be made because SVB macros run in the same context as the STATISTICA Server and, therefore, have full access to the same resources that the LocalSystem account does. If you give users the ability to upload scripts, you are potentially giving them full access to the server on which STATISTICA Enterprise Server is installed. Administrators SWS_ADMIN is the local group that gives an account administrative access to STATISTICA Enterprise Server. Administrators have the ability to control access to all items in the Repository. Since all other group membership is implied when a user is a member of SWS_ADMIN, an administrator is able to create batch jobs, upload/download data files and upload scripts even if they aren t explicit members of those groups. If Knowledge Portal or Knowledge Portal Interactive users are made members of SWS_ADMIN, they will no longer be considered portal users since that is considered a restriction in access. Access Control The Repository is the main data store used in STATISTICA Enterprise Server. All user data, configuration files, results pages, analysis and user interface script files, and other kinds of information reside there. The Repository sits on top of the NTFS file system. Because STATISTICA Enterprise Server uses an integrated security model, it uses NTFS to enforce access to files stored within the repository. Restricting users from accessing specific files is as easy as changing the NTFS permissions. Additionally, the STATISTICA Enterprise Server Repository Manager goes beyond the NTFS permissions and ensures that users cannot modify system files they are not supposed to, even if the NTFS permission allows it. A powerful Web-based interface is provided to STATISTICA Enterprise Server users that enables them to define NTFS permissions for files and directories to which they have access. For regular users, this would be their user directory and items they have access to in the Shared folder. Administrators can define permissions to other users documents as well. It is recommended to use the Web-based interface to control these NTFS permissions because some of the complexity of required permissions is
8 STATISTICA Enterprise Server Security Page 8 of 10 managed automatically. If permissions are modified outside of the STATISTICA Enterprise Server interface, keep in mind that LocalSystem and SWS_ADMIN should always be given full access to all items. Special Considerations for Network Shares It is sometimes desirable to define a network file share that points directly to the Repository so that files can be copied to a mapped drive instead of having to be uploaded through the client s Web browser. Uploading files through the Web browser is a comparatively inefficient method of transferring files and is usually only desirable when the client does not have local network access to the server. By creating a network share inside the Repository, users can take advantage of the existing network file sharing services and seamlessly share data files between the concurrent network version of STATISTICA and STATISTICA Enterprise Server. However, by allowing users direct access to the Repository, they are now able to bypass the built-in security provided by the STATISTICA Enterprise Server Repository Manager, including its restrictions on uploading scripts. The solution to this security concern is to make use of the Repository directory Files\Shared. Because of special restrictions defined in RepositoryConfig.xml, it is safe to share this directory on your network. SVB macros can never be run from that directory, and if an SVB macro is placed in the directory, it will not be exposed to any user that is not a member of the local group SWS_UPLOADSCRIPTS, nor can it be copied to any other directory. No other directories in the Repository outside of the Files\Shared directory should be made available, as this would allow anyone with access to that share to run potentially malicious macros on the server. Communication between Computers A STATISTICA Enterprise Server installation has two channels of communication that can be potential security holes. The first is the communication between the client s browser and the Web server, the other is the communication between the Web server and the STATISTICA Server. Web Server/Client Communication As mentioned earlier, if Integrated Login is not used, the password that the user logs on with is submitted in encrypted form to the server. This, however, is the only information that is encrypted by STATISTICA Enterprise Server. Sensitive results or other data could be intercepted by network packet sniffing devices. If your Web server is only available to clients inside your firewall, this may not be a concern. If your STATISTICA Enterprise Server is accessible to the public and secure communication is a requirement, the solution to this problem is to enable the Secure Sockets Layer (SSL) protocol on your Web server. When SSL is enabled on the Web server, all communication between the client and the Web server will be encrypted. To enable SSL on your Web server, an SSL certificate must be obtained from one of the certificate authorities (CAs), such as VeriSign or Thawte. Popular Web server software
9 STATISTICA Enterprise Server Security Page 9 of 10 such as IIS and Apache support the installation of SSL certificates. Web Server/STATISTICA Server Communication The other potential security risk involves installations where the STATISTICA Enterprise Server Web files reside on a different computer than the STATISTICA Server. STATISTICA Enterprise Server uses SOAP, an XML-based protocol, to communicate between the Web server and the STATISTICA Enterprise Server executables. This SOAP communication is not encrypted, and as a result, any communication between the client and the STATISTICA Enterprise Server will be sent in unencrypted form when it passes from the Web server to the STATISTICA Server. This is true even when an SSL certificate is installed on the Web server machine. This is not an issue when the STATISTICA Enterprise Server Web files and the STATISTICA Server are on the same computer, because the traffic never shows up on the network. Even if the data is sensitive, if the computers are both within your firewall, the fact that this data is not encrypted may not be an area of concern. Future plans include securing communication between the Web server and the STATISTICA Server when they are not on the same machine in order to accommodate cases where the Web server and STATISTICA Server are in two separate physical locations. Check with StatSoft for the availability of this feature if it is a design requirement. PHP Security PHP is a powerful server side scripting language utilized by the STATISTICA Enterprise Server Web server component. It is always important to use the latest release of PHP as each new release addresses newly discovered vulnerabilities. The STATISTICA Enterprise Server installer includes the latest release of PHP as well as a PHP configuration file with the settings that are appropriate for correct operation in a production environment. The PHP scripts installed with STATISTICA Enterprise Server translate client Web browser requests into the SOAP protocol-based messages that are used to communicate with the STATISTICA Server. As with all aspects of STATISTICA Enterprise Server, we have made every effort to ensure that the scripts we distribute are as secure as possible. The PHP online manual contains a section devoted to security considerations for PHP. Most of the information on this site relates to scripting, but there are two sections regarding installation on a UNIX/Apache server that should be given consideration. IIS Security While the STATISTICA Enterprise Server can be hosted by virtually all Web server software, IIS is the most common choice. A new installation of IIS is not safe for a production Web server. Below are a few steps that should be taken to help ensure the safety of your server. While these recommendations will help to secure your Web server, StatSoft, Inc. makes no guarantees that following the recommendations will make your server completely secure. Responsibility for the security of your Web server is the responsibility of the customer.
10 STATISTICA Enterprise Server Security Page 10 of 10 Updates There are known security vulnerabilities that can be addressed by updating your installation with the latest security patches. These updates can also be installed through the Windows Update service: It is important to stay current with new security updates. Microsoft has released a tool called Microsoft Baseline Security Analyzer (MBSA) that helps system administrators with this task. Sample Applications There are several sample applications installed with IIS that are there to demonstrate features of the software. Their location is readily known and, therefore, they are frequently targeted by hackers. These example applications are located in the directory scripts in your Web root (often c:\inetpub\wwwroot\scripts). These example files are not intended for a production server and should be removed. Unused ISAPI Extensions There are many ISAPI extensions enabled by IIS that are not needed by most Web sites. The fact that they are present makes your site vulnerable to buffer overflows that can result in denial of service attacks and even allows access to your server. Removal of these unused ISAPI extensions can be done by hand in the Internet Services Manager, or you can use the IIS Lockdown Tool from Microsoft, a highly recommended tool. Also part of the IIS IIS Lockdown Tool is the URLScan Security Tool, which can intercept maliciously formed HTTP requests that hackers use to gain access to your server.
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
Security IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
How To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Using Microsoft s Free Security Tools Help Secure your Windows Systems taken from Web and Other Sources by Thomas Jerry Scott November, 2003
Using Microsoft s Free Security Tools Help Secure your Windows Systems taken from Web and Other Sources by Thomas Jerry Scott November, 2003 The following chart shows the name and download locations for
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
E-Commerce for IT Advanced. Louis Aguila & Matt Burt
Advanced Louis Aguila & Matt Burt Class Objectives To explore Microsoft Internet Information Services (IIS) use and troubleshooting Basic E-Commerce site setup in IIS Use of Application Pools and settings
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity
Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
PROPALMS TSE 6.0 March 2008
PROPALMS March 2008 An Analysis of and Terminal Services: Contents System Administration... 2 Server Management... 3 Application Management... 5 Security... 7 End User Experience... 8 Monitoring and Reporting...
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
CheckPoint FireWall-1 Version 3.0 Highlights Contents
CheckPoint FireWall-1 Version 3.0 Highlights Contents Abstract...2 Active Network Management...3 Accounting... 3 Live Connections Report... 3 Load balancing... 3 Exporting log records to Informix database...
Perceptive Content Security
Perceptive Content Security Best Practices Perceptive Content, Version: 7.1.x Written by: Product Knowledge, R&D Date: June 2015 2015 Perceptive Software. All rights reserved. Perceptive Software is a
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index
Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Security Guidelines for MapInfo Discovery 1.1
Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
F5 BIG-IP: Configuring v11 Access Policy Manager APM
coursemonster.com/uk F5 BIG-IP: Configuring v11 Access Policy Manager APM View training dates» Overview This three day course gives networking professionals a functional understanding of the BIG-IPÂ APM
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Microsoft Baseline Security Analyzer
The (MBSA) checks computers running Microsoft Windows Server 2008 R2 for common security misconfigurations. The following are the scanning options selected for Cisco Unified ICM Real-Time Distributor running
WS_FTP: The smarter way to transfer files
WS_FTP: The smarter way to transfer files DATA WEB PAGES IMAGES VIDEO GRAPHICS WS_FTP: A Complete and Secure Data Management Solution The files that you transfer every day over the Internet are vulnerable
RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
Qlik Sense Enabling the New Enterprise
Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology
CMP3002 Advanced Web Technology
CMP3002 Advanced Web Technology Assignment 1: Web Security Audit A web security audit on a proposed eshop website By Adam Wright Table of Contents Table of Contents... 2 Table of Tables... 2 Introduction...
http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Chapter 2 Editor s Note:
[Editor s Note: The following content was excerpted from the free ebook The Tips and Tricks Guide to Securing Windows Server 2003 (Realtimepublishers.com) written by Roberta Bragg and available at http://www.netiq.com/offers/ebooks.]
Deploying F5 to Replace Microsoft TMG or ISA Server
Deploying F5 to Replace Microsoft TMG or ISA Server Welcome to the F5 deployment guide for configuring the BIG-IP system as a forward and reverse proxy, enabling you to remove or relocate gateway security
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
SAS 9.3 Intelligence Platform Middle-Tier Administration Guide Third Edition
SAS 9.3 Intelligence Platform Middle-Tier Administration Guide Third Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2012. SAS 9.3 Intelligence
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
Deployment Guide AX Series with Citrix XenApp 6.5
Deployment Guide AX Series with Citrix XenApp 6.5 DG_XenApp_052012.1 TABLE OF CONTENTS 1 Introduction... 4 1 Deployment Guide Overview... 4 2 Deployment Guide Prerequisites... 4 3 Accessing the AX Series
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
A Roadmap for Securing IIS 5.0
This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
Tableau Server Security. Version 8.0
Version 8.0 Author: Marc Rueter Senior Director, Strategic Solutions, Tableau Software June 2013 p2 Today s enterprise class systems need to provide robust security in order to meet the varied and dynamic
Talk Internet User Guides Controlgate Administrative User Guide
Talk Internet User Guides Controlgate Administrative User Guide Contents Contents (This Page) 2 Accessing the Controlgate Interface 3 Adding a new domain 4 Setup Website Hosting 5 Setup FTP Users 6 Setup
Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
1 (11) Paperiton DMS Document Management System System Requirements Release: 2012/04 2012-04-16
1 (11) Paperiton DMS Document Management System System Requirements Release: 2012/04 2012-04-16 2 (11) 1. This document describes the technical system requirements for Paperiton DMS Document Management
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
MCTS Self-Paced Training Kit (Exam 70-643): Configuring Windows Server 2008 Application Platform
MCTS Self-Paced Training Kit (Exam 70-643): Configuring Windows Server 2008 Application Platform J.C. Mackin and Anil Desai PREVIEW CONTENT This excerpt contains uncorrected manuscript from an upcoming
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
Remote Vendor Monitoring
` Remote Vendor Monitoring How to Record All Remote Access (via SSL VPN Gateway Sessions) An ObserveIT Whitepaper Daniel Petri March 2008 Copyright 2008 ObserveIT Ltd. 2 Table of Contents Executive Summary...
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
Implementation Guide. Version 10
Implementation Guide Version 10 Synthesis Enterprise Portal Implementation Guide Part Identification: RPIGSEP10 ReliaSoft Corporation Worldwide Headquarters 1450 South Eastside Loop Tucson, Arizona 85710-6703,
Forward proxy server vs reverse proxy server
Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
The governance IT needs Easy user adoption Trusted Managed File Transfer solutions
Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Setting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
FileMaker Server 9. Custom Web Publishing with PHP
FileMaker Server 9 Custom Web Publishing with PHP 2007 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker,
End User Guide The guide for email/ftp account owner
End User Guide The guide for email/ftp account owner ServerDirector Version 3.7 Table Of Contents Introduction...1 Logging In...1 Logging Out...3 Installing SSL License...3 System Requirements...4 Navigating...4
GTS Software Pty Ltd. Remote Desktop Services
GTS Software Pty Ltd Remote Desktop Services Secure web access to GTS Software applications CONTENTS Overview... 2 What GTS can provide with Remote Desktop Services... 2 Main Features... 3 RD Web Access...
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Jitterbit Technical Overview : Microsoft Dynamics CRM
Jitterbit allows you to easily integrate Microsoft Dynamics CRM with any cloud, mobile or on premise application. Jitterbit s intuitive Studio delivers the easiest way of designing and running modern integrations
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
MCTS Self-Paced Training Kit (Exam 70-643): Configuring Windows Server 2008 Application Platform
MCTS Self-Paced Training Kit (Exam 70-643): Configuring Windows Server 2008 Application Platform J.C. Mackin and Anil Desai PREVIEW CONTENT This excerpt contains uncorrected manuscript from an upcoming
Novell Access Manager SSL Virtual Private Network
White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...
BillQuick Web i Time and Expense User Guide
BillQuick Web i Time and Expense User Guide BQE Software Inc. 1852 Lomita Boulevard Lomita, California 90717 USA http://www.bqe.com Table of Contents INTRODUCTION TO BILLQUICK... 3 INTRODUCTION TO BILLQUICK
Implementing PCoIP Proxy as a Security Server/Access Point Alternative
Implementing PCoIP Proxy as a Security Server/Access Point Alternative Overview VMware s Horizon Security Server and Access Point provides secure access to sessions over an unsecured WAN and/or Internet
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.
An Analysis of Propalms TSE and Microsoft Remote Desktop Services
An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
