2 240 Networking Basics Project Manual Project 11.1 Overview Outcomes What you ll need Completion time Precautions Understanding Key Concepts Network security is a critical issue on any network. Networks are constantly under attack, from the Internet and other external sources as well as internally from network users. New types of attacks are continually being created. New viruses and other types of malicious software turn up daily. Understanding the terms and technologies related to security is an important part of security management. During this project, you will match various security-related terms to the definitions and descriptions of how they are used. After completing this project, you will know how to: identify key terms and concepts related to network security To complete this project, you will need: the following worksheet 20 minutes None The worksheet includes a list of security-related networking terms on the left and descriptions on the right. Match each term with the description that it most closely matches. You will not use all descriptions. Each description can be used only once. DES A. Attack that attempts to disrupt a network or its servers by flooding them with packets RC4 B. Firewall filtering method that passes packets that match sessions initiated on the internal network DoS C. Term referring to any type of malicious software Spyware D. Situation where one failure is the direct cause of other failures Trojan E x term referring to a client needing authentication Worm F. List of communication sessions between stations inside and outside the firewall that is maintained on the firewall Malware G. Self-propagating form of malicious software
3 Network Security 241 Threat H. Protected area of a network between the internal network and the Internet Supplicant I. Encryption standard used with WEP Cascading failure J. Process of sending packets with a fake source address Certificate K. Program that is expected to do one thing but actually does something else DMZ L. Term used to refer to the WAP during 802.1x authentication Dynamic state list M. Any potentially adverse occurrence that can harm the network or its data, interrupt network services, or cause a monetary loss IP Spoofing N. Secure identifier issued to a company, computer, or person that proves they are who they say they are O. Symmetric key encryption standard originally developed by IBM P. Software that monitors and records computer activity Project 11.2 Overview Using Auditing and Event Logs You can configure auditing to automatically track selected network activities, even failed attempts to perform audited activities. Auditing can be set up individually on computers or, when configuring auditing for network computers on an Active Directory domain, through Group Policy. In Windows 2008, everything is divided into Roles and Features. Roles are major changes to a server. Features are, more or less, Add/Remove Windows components. The Group Policy Management Console, which we use in this exercise, is installed as a Feature. Audit events, as well as other types of events, are tracked in the Windows Event Logs. You should review the contents of the Event Logs on a periodic basis and whenever you have computer or network problems. During this project, you ll set up auditing. You ll also review Event Log contents and save the contents of an Event Log to create a permanent record.
4 242 Networking Basics Project Manual Outcomes What you ll need Completion time Precautions After completing this project, you will know how to: configure auditing manage Event Logs review Event Log contents To complete this project, you will need: the following worksheet a computer running Windows 7 Professional or Windows 7 Enterprise a domain controller running Windows Server minutes The instructions in this project assume you are working on a two-node network with one computer running Windows 7 Professional or Windows 7 Enterprise and one computer running Windows Server If these computers are part of a larger classroom network, your instructor will provide you with alternate instructions. If working on an existing network, you must review the project steps with your network administrator. Your network administrator may need to make changes or additions to the instructions. Part A: Configure Auditing Policy You configure auditing for your domain during Part A. You should be logged on to the computer running Windows Server 2008 as Administrator at the start of this project. When you installed Windows 2008 and promoted it to a Domain Controller, Group Policy Management Console wasn t in your Administrative Tools. 1. Open the Start menu, and select Administrative Tools and then Server Manager. If not already expanded, expand your domain. 2. Scroll down to Features/Add Features and select Group Policy Management.
5 Network Security Click Next and Install, as shown in Figure Figure 11-1: Installing Group Policy Management Console 4. At the Server Manager window, expand Group Policy Management, Forest, Domains, Busicorp.com, and select Default Domain Policy as in Figure Figure 11-2: Default Domain Controllers Policy 5. Right-click on Default Domain Policy and choose Edit. 6. Under Computer Configuration, expand Windows Settings, Security Settings, and Local Policy. Select Audit Policy, as shown in Figure Your policy settings may differ from those shown in the figure.
6 244 Networking Basics Project Manual Note: You can also open the Security Settings portion of Default Domain Controllers Policy by opening the Start menu, selecting Administrative Tools and then Local Security Policy. This gives you access to the Security Settings policies only. You can also do this by opening the Group Policy Management Console from Administrative Tools. Figure 11-3: Audit Policy 7. Right-click on Audit logon events and select Properties and the Explain tab, as indicated in Figure Figure 11-4: Audit Logon Events
7 Network Security Read the description. What is the advantage of logging failed attempts on a domain controller? 9. What type of valid actions, those not related to a security breach, might generate the same? 10. Take time to read the remaining audit policies in the Help window and answer the following questions: a. When would an Audit logon event be generated on domain controller? b. What types of events are generated by the Audit system events policy? 11. Click OK to close the Explain window. 12. Double-click Audit account logon events, enable the policy if not enabled, and check both Success and Failure. Click OK. 13. Double-click Audit account management, enable the policy if not enabled, and check both Success and Failure. Click OK. 14. Double-click Audit Directory Service Access events, enable the policy if not enabled, and check both Success and Failure. Click OK. 15. Double-click Audit logon events, enable the policy if not enabled, and check both Success and Failure. Click OK. 16. Double-click Audit policy change, enable the policy if not enabled, and check both Success and Failure. Click OK. 17. Double-click Audit system events, enable the policy if not enabled, and check both Success and Failure. Click OK. Note: Do not close Group Policy Management Console. Part B: Configure Security Policies for Audit Logs In Part B, you will view and modify policies that affect security logs. 1. Under Local Policies, click User Rights Assignment. 2. Scroll down, locate, and select Manage auditing and security logs, as shown in Figure 11-5.
8 246 Networking Basics Project Manual Figure 11-5: Manage auditing and security logs rights assignment 3. Double-click to open the policy. What users have the right to manage auditing and security logs? 4. What is the potential risk of granting this right to other users or groups? 5. Under Local Policies, click Security Options.
9 Network Security Locate and select Audit: Shut down system immediately if unable to log security audits, as shown in Figure Figure 11-6: Security Options 7. What is the potential risk of enabling this policy? 8. Double-click and enable the policy, and then click OK. 9. Select Event Log, as shown in Figure 11-7.
10 248 Networking Basics Project Manual Figure 11-7: Event Log policies 10. Right-click Maximum security log size and select Properties and the Explain tab. What is the default log size on your domain controller? 11. In the Help window, select and review Retain security log and Retention method for security log. 12. Close the Help window. 13. Double-click Retain security log and check Define this policy setting.
11 Network Security What is the default period? 15. Click OK. 16. What policy setting will be enabled automatically? 17. Click OK. 18. What is the potential risk if you don t archive the security log every week? 19. Close Group Policy Management Editor and then click OK to close Server Manager. 20. Exit Active Directory Users and Computers. Part C: Generate and View Events In Part C, you will generate Account Logon events and view them in Event Viewer. You will use your domain controller. 1. Log off your domain controller. 2. Press Ctrl + Alt + Del to display the logon dialog. 3. Enter the password for Administrator incorrectly and click OK. 4. Click OK to clear the warning. 5. Enter the password for Administrator correctly and click OK. 6. Open the Start menu, and select Administrative Tools and then Event Viewer. 7. Select Security. You should see entries similar to those shown in Figure 11-8.
12 250 Networking Basics Project Manual Figure 11-8: Security log 8. Locate and double-click the most recent Failure Audit event. What does it tell you? 9. What is given as the client address? 10. What does this tell you and why?
13 Network Security Click Cancel. 12. Launch Active Directory Users and Computers. 13. Position the windows so you can see both Event Viewer and Active Directory Users and Computers. 14. Right-click Users and choose New User. 15. Fill in the dialog box, as shown in Figure 11-9, and then click Next. Figure 11-9: Test User 16. Enter and confirm as the password and click Next. 17. Click Finish. 18. In the Event Viewer window, right-click Security and choose Refresh. 19. Double-click the bottom Account Management event (the first Account Management event after the events generated by the Administrator logon), as shown in Figure
14 252 Networking Basics Project Manual Figure 11-10: Account management events 20. Double-click the event. What does it tell you? 21. Click the Up arrow until you get to the next Account Management event. What does this event tell you? 22. Click the Up arrow and review through the remaining Account Management events. 23. After reviewing the events, click Cancel. 24. Close Active Directory Users and Computers and Event Viewer.
15 Network Security 253 Project 11.3 Overview Outcomes What you ll need Completion time Precautions Managing Account Lockout Policy Account lockout policy is one of the best tools available for preventing unauthorized access attempts. You can set the number of attempts before the account is locked, the time-out period before account locking resets itself, and the length of time the account remains locked. During this project you will configure and test account lockout policy for your domain. After completing this project, you will know how to: configure account lockout policy test account lockout policy To complete this project, you will need: a domain controller running Windows Server 2008 a computer running Windows 7 Professional or Windows 7 Enterprise to complete Project 11.2 this following worksheet 30 minutes The instructions in this project assume you are working on a two-node network with one computer running Windows 7 Professional or Windows 7 Enterprise and one computer running Windows Server If these computers are part of a larger classroom network, your instructor will provide you with alternate instructions. If working on an existing network, you must review the project steps with your network administrator. Your network administrator may need to make changes or additions to the instructions. Part A: Configure Account Lockout Policy In this part of the project, you will configure account lockout policy for the domain. You should be logged on to your domain controller as Administrator.
16 254 Networking Basics Project Manual 1. Start menu, selecting Administrative Tools and then Group Policy Management, as in Figure Figure 11-11: Default Domain Policy 2. Right-click on Default Domain Policy and select Edit.
17 Network Security Under Computer Configuration, expand Windows Settings, Security Settings, and Account Policies. Select Account Lockout, as in Figure Figure 11-12: Account Lockout policies 4. How is account lockout currently configured? 5. Double-click Account lockout duration. Click Define this policy setting and set the lockout duration 10 minutes. 6. Click OK. What other suggested values are displayed? 7. Click OK.
18 256 Networking Basics Project Manual 8. Double-click Account lockout threshold and change the value to 2, and then click OK. Your policy settings should look like Figure Figure 11-13: Account lockout enabled 9. Close the Group Policy Management Editor and exit Group Policy Management Console. 10. Launch Event Viewer and select the Security log. You are going to clear the log to make it easier to see entries generated by account lockout. 11. Select Action and then Clear all events. Click No when prompted to save the log contents. 12. What does the event that was entered tell you? Note: Do not exit Event Viewer.
19 Network Security 257 Part B: Test Account Lockout Policy You will lock a user account and generate lockout events in Part B. Shut down and restart the computer running Windows 7 Professional or Windows 7 Enterprise before starting this part of the project. 1. Attempt to log on as TUser. Enter the wrong password. What does the dialog box tell you? 2. Click OK and attempt to log on again as TUser with the wrong password. What happens? 3. Click OK and attempt to log on again as TUser with the wrong password. What happens? 4. Click OK and attempt to log on again as TUser with the correct password. What happens? 5. Click OK to clear the dialog box. Part C: Unlock the Account and Cover Your Tracks During Part C, you will unlock the user account and take actions to cover your tracks. 1. In Event Viewer, right-click Security and select Refresh. 2. Locate and open the first failure audit event. It should look similar to the example shown in Figure
20 258 Networking Basics Project Manual 3. What does this event tell you? Figure 11-14: Failure audit event
21 Network Security Click the Up arrow. What does the next event tell you? 5. Click the Up arrow until you locate the event showing the account locked out, like the example shown in Figure Figure 11-15: Account locked out event 6. Is this a successful event instead of a failed event? 7. Click Cancel. 8 Launch Active Directory Users and Computer. Select the Users container and locate Test User. 9. Right-click Test User and select Properties. 10. Select the Account tab. Notice that the account is locked, as shown in Figure
22 260 Networking Basics Project Manual Figure 11-16: Locked account 11. Check Unlock Account and then click Apply/OK. 12. Exit Active Directory Users and Computers. 13. Refresh the Security log. Should the events generated when you unlocked the account be Success or Failed Audit events, and why? 14. Open the most recent event. It should show that the account was unlocked. If not, click the Down arrow until you locate the account unlock events. 15. Using the procedures described earlier, clear the Security log. What events are now in the log?
23 Network Security What would another administrator be able to tell about the attempted security breach that just occurred? 17. What might cause an administrator to think that someone has just tried to clear his or her tracks? 18. Exit Event Viewer. Project 11.4 Overview Outcomes What you ll need Completion time Precautions Managing Password Policy User accounts and passwords are part of your first line of defense against unauthorized access. Each user should have his or her own user account. Each user account should be protected by a password, and passwords should be changed on a periodic basis. One potential problem is that many users tend to select weak, or easily guessed, passwords. You can use password policies to control password length, complexity, and how often users must change passwords. During this project, you will configure and test password policies. You will set domain policies that apply to all domain user accounts. After completing this project, you will know how to: configure password policy test password policy To complete this project, you will need: a domain controller running Windows Server 2008 a Windows 7 Professional or Windows 7 Enterprise domain member a domain user account to complete Project 11.2 the following worksheet 30 minutes The instructions in this project assume you are working on a two-node network with one computer running Windows 7 Professional or Windows 7 Enterprise and one computer running Windows Server If these computers are part of a larger classroom network, your instructor will provide you with alternate instructions. If working on an existing network, you must review the project steps with your network administrator. Your network administrator may need to make changes or additions to the instructions.
24 262 Networking Basics Project Manual Part A: Configure Password Policy In Part A, you will configure the default domain policy to set your password policy. The password policy, unless it has been changed, is at the Active Directory domain default settings. 1. Click Start, click Administrative Tools, and then choose Group Policy Management as shown in Figure earlier in this chapter. 2. Right-click on Default Domain Policy and select Edit. 3. Under Computer Configuration, expand Windows Settings, Security Settings, and Account Policies. Select Password Policy, as shown in Figure This figure also shows default password policies. Your settings should be similar. Figure 11-17: Domain password policy
25 Network Security Select Enforce password history, right-click on it, select Properties and the Explain Tab Review for each of the password policies, and then close the window. a. What is the possible risk in setting the maximum password age policy to too great a value? b. What is the possible risk in setting the minimum password length too long? c. What is the impact, if any, on existing passwords when you change password length or complexity so that they are no longer valid? d. What is the maximum value for Enforce password history? 5. Open Maximum password age, increase the value to 60, and click OK. 6. Open Minimum password length, increase the value to 8, and click OK. Your password policies should look like Figure
26 264 Networking Basics Project Manual Figure 11-18: Modified policies 7. Close the Group Policy Management Editor, and then click OK to close the domain Properties dialog box. Note: Do not exit Active Directory User and Computers.
27 Network Security 265 Part B: Test Password Policy In Part B, you will test which password policies apply when an administrator resets a user s password. Open Start/ Administrative Tools/Active Directory User and Computers. 1. Select the Users container and locate Test User. 2. Right-click Test User and select Reset Password to open the Reset Password dialog box, as shown in Figure Figure 11-19: Reset Password dialog box 3. Enter and confirm the password Password and click OK. 4. What happens? 5. Click OK. 6. Test the following passwords: P*ssword thisizmin2 One234% One234&5 ne Which passwords are accepted as valid?
28 266 Networking Basics Project Manual 8. For the remaining passwords, explain why they were not accepted. 9. Set the password to 10. Check User must change password at next logon (see Figure 11-20) and click OK. Figure 11-20: Forcing password change 11. What is the advantage to checking User must change password at next logon when resetting a user s password? 12. Which password policies are not enforced when an administrator resets a user s password and how do you know this? 13. Exit Active Directory Users and Computers.
29 Network Security 267 Part C: Test Passwords In Part C, you will test which password policies apply when a user makes password changes. You will complete this part of the project on the computer running Windows 7 Professional or Windows 7 Enterprise. If logged on to the computer, log off. 1. Press Ctrl + Alt + Del (Ctrl +Alt + Insert) to open the Log On to Windows/Other User and use TUSER, as shown in the dialog box shown in Figure Figure 11-21: Log On to Windows dialog box 2. Log on using the password What happens? 3. Why? 4. Click OK. 5. Enter password as the new password and click OK. 6. What happens? 7. How does this password violate password policy?
30 268 Networking Basics Project Manual 8. Click OK to close the warning. Enter the old password and then as the new password and click OK. 9. What happens? 10. How does this password violate password policy? 11. Click OK to close the warning. Enter the old password and as the new password and click OK. 12. What happens? 13. Click OK. 14. After logon is complete, press Ctrl + Alt + Del to open the Windows Security dialog box. 15. Click Change Password. 16. Enter the old password and as the new password (see Figure 11-22), and then click OK. 17. What happens? Figure 11-22: Change Password dialog box
31 Network Security How does this password violate password policy? 19. Click Cancel and then click Cancel again. The dialog box displayed for any password change error is shown in Figure Figure 11-23: Password complexity error 20. What is the advantage to displaying the same dialog box, no matter what error is preventing the user from changing the password? 21. What option does Test User have for changing the user account password? Project 11.5 Overview Designing for Security An important part of securing your network is being aware of potential security problems and designing your network to be secure, which includes hardening the network as a whole, as well as individual clients and servers on the network. The Internet has hundreds of sources of security information and security tools. Operating system and application manufacturers have information available online for their specific products. Other sources, such as SearchSecurity.com, provide links to information and security tools. However, you need to exercise caution and download only from known sources. Some security Web sites are actually distribution points for viruses, Trojans, and other types of attacks. During this project, you will answer questions related to network security design and securing network computers.
32 270 Networking Basics Project Manual Outcomes What you ll need Completion time Precautions After completing this project, you will know how to: recognize security threats design a network to minimize threats configure computers to minimize threats To complete this project, you will need: the following worksheet 30 minutes None Part A: Secure Network Design In Part A, you will make network design decisions based on security requirements. Some of the questions refer to the network diagram shown in Figure Figure 11-24: Sample network 1. What kind of network is network /29? 2. What types of servers would you place on that network? 3. You are using an inner firewall that implements dynamic packet filtering. How does that impact the data passed by the firewall?
33 Network Security What would be necessary to configure the network using a single firewall? 5. What are the possible entry points into the network? 6. Which is likely the biggest security risk and why? 7. The WAP supports both WEP and WPA. Which is more secure? 8. What authentication protocol does WPA use? 9. What configuration changes should you make in relation to the WAP s SSID? 10. What can you use to have the Web server identify itself and your company to visitors? 11. The network is configured as a Windows Active Directory domain. Remote users are authenticated by the domain. You suspect that domain user names have been compromised. What policies can you implement to help detect and prevent unauthorized access and how would they help?
34 272 Networking Basics Project Manual 12. The network is attacked by a flood of SYN packets. What is the general term for this type of attack? 13. What is the difference between a DoS and a DDoS attack? 14. You want to add a subnetwork as a screened subnet. What would this require? Part B: Network Server Placement In Part B, you will place network servers on a network diagram. You will use Figure with this part of the project. Figure 11-25: Another sample network Indicate on Figure where you would place the following: Public Web server Private Web server relay server Database server Domain controller/dns server NAT Proxy server
35 Network Security 273 Part C: Secure Network Computers You will make security decisions that relate to individual network computers in Part C. 1. What steps can you take to prevent virus infection? 2. What is the advantage of implementing a software-based firewall on each client computer? 3. You want to ensure that the same password policy is used for all computers in an Active Directory domain. Where should the group policy object be linked? 4. What is the potential risk if spyware is installed on a client computer? 5. What can a rootkit do if installed on a computer? 6. How is a worm propagated between computers? 7. How does a spam filter protect a computer?
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
Introduction The pcanywhere Solution Advanced Configuration Guide is provided to assist customers with advanced features once they have the Symantec Management Platform with pcanywhere Solution installed.
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION
Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
Wireless Registration Instructions Windows XP How to connect to VUWiFi 1. The first step in setting up your wireless card for VUWiFi is to open your Network Connections window. You can find this by going
Introduction En Configuring the WT-4 for ftp (Infrastructure Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a ftp server for transmission over an infrastructure
Securing Remote Desktop for Windows XP http://www.mobydisk.com/./techres/securing_remote_desktop.html Remote Desktop, Unsafely Many people use the Windows XP Professional remote desktop feature to gain
Setting up DCOM for Windows XP Research 1- Setting up DCOM for Windows XP This document has been produced as a guide to configuring DCOM settings on machines with Windows XP SP2 installed. You must make
your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Installing Configuring Contents 1 Introduction...................................................... 1 Features...........................................................
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
ILTA 2013 - HAND 6B Upgrading and Deploying Windows Server 2012 In the Legal Environment Table of Contents Purpose of This Lab... 3 Lab Environment... 3 Presenter... 3 Exercise 1 Add Roles and Features...
Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
To install the SMTP service: From the Start menu, click Control Panel. 2. Double-click Add or Remove Programs. 3. From the left pane, click Add/Remove Windows Components. 4. From the Components list, click
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders
HP ProLiant DL320 Firewall/VPN/Cache Server User Guide Running Microsoft Internet Security and Acceleration Server 2004 June 2005 (Third Edition) Part Number 341672-003 Copyright 2004, 2005 Hewlett-Packard
WatchGuard Mobile User VPN Guide Mobile User VPN establishes a secure connection between an unsecured remote host and a protected network over an unsecured network using Internet Protocol Security (IPSec).
En Configuring the WT-4 for ftp (Ad-hoc Mode) Windows XP Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Windows XP Professional SP2 ftp server
with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it
Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous
i-stat TECHNICAL BULLETIN Configuring Wireless Settings in an i-stat 1 Wireless Analyzer Before configuring wireless settings, please enable the wireless functionality by referring to the Technical Bulletin
Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded
Technical Brief AD Certificate Distribution Contents Introduction 2 Preparation 2 Server Actions 4 Active Directory Actions 5 Appendix A: Scripts zip 10 INTRODUCTION M86-Security provides a solution for
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft
Configuring Outlook 2013 For IMAP Connections VERSION 1.0 1 P a g e U A C o n n e c t C o n f i g u r i n g O u t l o o k 2013 f o r I M A P 12/2013 Configuring Outlook 2013 for IMAP Connections Overview
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
Lab A: Deploying and Managing Software by Using Group Policy Answer Key Exercise 1 Assigning Software This Answer Key provides the detailed steps for completing Lab A: Deploying and Managing Software by
PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are
Windows 7 Enterprise Desktop Support Technician Revised and Expanded Version Lab Manual EXECUTIVE EDITOR EDITORIAL PROGRAM ASSISTANT DIRECTOR OF SALES DIRECTOR OF MARKETING SENIOR PRODUCTION AND MANUFACTURING
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Introduction Effective August 20, 1997, the United States Food and Drug Administration released its Code of Federal Regulations (CFR) Title 21 Part 11: Electronic Records; Electronic Signatures (21 CFR
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
User Guide for CDC s SAMS Partner Portal Document Version 1.0 Introduction If you are reading this guide, it probably means that you have been (or will be) invited to register with the SAMS Partner Portal.
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
CHAPTER 9 Changing Passwords in Cisco Unity 8.x This chapter contains the following sections: Changing Passwords for the Cisco Unity 8.x Service Accounts (Without Failover), page 9-1 Changing Passwords
9243054 Issue 1 Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation VPN Client User s Guide 9243054 Issue 1 Reproduction, transfer, distribution or storage of part or all of
Western Technical College 10605164 Medical Networks and Operating Systems Course Outcome Summary Course Information Description Instructional Level Total Credits 4.00 Total Hours 108.00 A course studying
Arkay Remote Data Backup Client Quick Start Guide Version 184.108.40.206 September 2005 Quick Start Guide It's easy to get started with Arkay Remote Data Backup and Recovery Service. To start using Arkay Remote
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course
FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel This document describes the procedures required to configure an IPSec VPN tunnel between a WatchGuard SOHO or SOHO tc and a Check Point FireWall-1.
Internet Security Protecting Your Business Hayden Johnston & Rik Perry WYSCOM Introduction Protecting Your Network Securing Your Information Standards & Best Practices Tools & Options Into The Future Creating
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
Alpha High Level Description Alpha is a Windows Domain Controller (DC) and Domain Name System (DNS) Server. Because Alpha was the first DC in the aia.class domain, it is also (by default) the Windows global
Administrator s Guide Citrix Network Manager for MetaFrame XPe Version 1.0 Citrix Systems, Inc. Information in this document is subject to change without notice. Companies, names, and data used in examples
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure
Installation Steps for PAN User-ID Agent If you have an Active Directory domain, and would like the Palo Alto Networks firewall to match traffic to particular logged-in users, you can install the PAN User-ID
DCOM settings for computer-to-computer communication between OPC servers and OPC clients 1. Introduction Under OPC DA, the "dcomcnfg" service program is used for computer-to-computer communication between
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
Version 3.0 Table of Contents Summary... 2 System Requirements... 3 Installation... 4 Configuring Endpoint Security Console as a Networked Service...5 Adding Computers, Groups, and Users...7 Using Endpoint
NC State University 1 of 7 Windows XP with Symantec AntiVirus 10 Corporate Edition home download free antivirus now windows xp with symantec antivirus 10 corporate edition Install SAV10 on Windows XP only
DigitalPersona Privacy Manager Pro DigitalPersona Privacy Manager Pro is a centrally-managed secure communication solution for businesses. It allows sensitive documents and communications to remain private,
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate