NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES
|
|
|
- Lynette Robinson
- 10 years ago
- Views:
Transcription
1 NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES
2 Introduction Les Chafin; Infrastructure Engineering Manager» HPES NASA ACES Responsible for:» Active Directory, Exchange Engineering Team 2
3 Agenda NASA Consolidated Active Directory (NCAD) Active Directory Domain Disaster Recovery OU Structure Active Directory Management Suite» ADMS Directory and Resource Administrator (DRA)» ADMS Group Policy Administrator (GPA) Security Monitoring of Active Directory (SMAD) 3
4 NCAD NCAD Enterprise Program» Active Directory Domain» Active Directory Management Suite (ADMS)» Security Monitoring of Active Directory (SMAD) 4
5 Active Directory Domain ndc.nasa.gov Single Forest; Single Domain 2008 R2 Forest and Domain Functional Level Centralized Management Domain Controllers Located at Every Center» Redundant DC s At least two at every center» NASA System» ASA Data Center Networks NASA IP Address Management (IPAM) DNS Primary» Underscore Zones Delegated 5
6 Continuity of Operations AD Fully Redundant» Every DC has a Writable Copy of AD Database NCAD Core Systems Backed Up Core Active Directory Roles Fully Transferable Disaster Recovery» Fully Exercised Every 3 Years 6
7 OU Structure Active Directory Account Management Provided by NASA Identity, Credential, and Access Management (ICAM) Team Typical Accounts OU Configuration Domain.nasa.gov» Accounts cc1 cc2 cc3 Note: cc = Two Letter NASA Center Code 7
8 OU Structure Typical NASA Center Level OU Configuration cc» cc-org1 cc-orggroups cc-orgsrv cc-orgws» cc-org2 cc-org2groups cc-org2srv cc-org2ws Note: cc = Two Letter NASA Center Code 8
9 Active Directory Management Suite (ADMS) Provides NASA Systems Administrators with the Ability to Manage AD Objects No Native AD Rights Required by NASA Systems Administrators Provides Audit Trail and Change Tracking Components:» NetIQ Directory and Resource Administrator (DRA)» NetIQ Group Policy Administrator (GPA) 9
10 DRA Role Based Administration Proxies Rights to Manage AD Objects Core Support Infrastructure» Primary DRA Server» Agency Accessible Web Consoles DRA Server Located at Each Center» Web Console» Scripting Capability Smart Card Access 10
11 DRA Roles Agency Roles» Agency Help Desk» Account Administrators Center OU Roles» System Administrator» Account Administrator 1» Computer Support Specialist 1 and 2» Help Desk» Group Membership Management Center Sub OU Roles» System Administrator» Account Administrator 1» Computer Support Specialist 1 and 2» Group Membership Management 11
12 DRA OU Roles Create/ Type of Privileged User Roles Password Reset Add/ Delete from Groups Help Desk x (ND GG ADMS cc HD) Create/Delete Computer Accounts Delete Groups Account Administrator 1 (ND GG ADMS cc Acct1) X (User Accounts) Computer Support Specialist 1 x (ND GG ADMS cc CS1) Computer Support Specialist 2 x x (ND GG ADMS cc CS2) (Computer accounts) System Administrator (OU Admin) x x x x (ND GG ADMS cc SA) Group Membership Role (Controls membership in named security groups) (in OU and GPO groups) X (User and Computer in Named Groups only) 12
13 GPA Role Based Administration Manage and Track Changes to Group Policy Objects» Changes Reviewed and Approved before Export to AD» Allows Roll Back to Previous Version GPO s Exported to Domain After Core Team Review Centralized Infrastructure 13
14 GPA Roles GPO Importer/Editor» Center Level Role» Edit or Import GPO s in the database GPO Approver» Center Level Role» Approves GPO Changes for Their Center GPO Export» Role Held by Members of NASA Core AD Core Team» Export Approved GPO s After Review 14
15 SMAD Security Monitoring for Active Directory (SMAD)» Provides Centralized Security Log Management» Event Monitoring, Correlation, Alerting, and Response» Security Reporting Designed to Monitor and Alert» NASA Consolidated Active Directory (NCAD)» Active Directory Management System (ADMS) environments» Security Monitoring for Active Directory (SMAD) system self monitoring 15
16 SMAD Overview Server Communicates via IPSEC Tunnel to Clients» Uses AES Encryption for all Log Traffic All Data is Digitally Signed Before Stored SMAD Protections» Limited Direct Access» Self Monitoring» Separation of Roles» File Integrity Checking» Process Checking» Change Monitoring» Privileged User Monitoring Investigations» Incident Response» Tracking for Support Groups Throughout Agency» Additional Active Directory Team Internal Investigations» SMAD Team Works with NCAD and Centers Incident Response Teams 16
17 SMAD Overview: Components SMAD Comprised of Three COTS Components» NetIQ Security Manager (SM) Real-time Monitoring of System Changes and User Activity Detection of threats and intrusions Security event management and correlation Central log management Incident response automation» NetIQ Change Guardian for Active Directory (CGAD) Monitors AD and provides alerting for unmanaged changes Software module for SM» NetIQ Change Guardian for Windows (CGW) Monitors OS level, files and directories, file shares, registry and system processes and provides alerting Software module for SM 17
18 SMAD Components: Logical Architecture 18
19 SMAD Statistics SMAD Entered Production Status 8/12/08 6 SMAD Production Servers 92 SMAD Agents 361,677,155 Events per week (Week of July 23 rd 2012)» AN Average of 51,668,165 Events/Day» Approx. 5,000 Alerts/Day Warnings, Errors, Critical Errors, Security Breaches, etc» PEAK 83 million Events/Day Security Log Archive Data» 7+ TB of Compressed Forensic Data 19
20 Questions? 20
21 Backup Slides 21
22 NCAD Operations ACES Data Center Operations Monitoring Team» 24x7 NCAD Patch Support» Windows Server Update Services (WSUS)» Patch Monthly based on MS Patch Release Schedule Server Health Monitoring» System Centers Operations Manager (SCOM) Centralized Anti-Virus Management» Symantec Endpoint Manager» Symantec Endpoint Client 22
23 ESD Helpdesk 24x7 Support DRA Agency Helpdesk Role Account Unlock, Password Reset, Account Enable 23
24 SMAD : Purpose Cont. SMAD helps meet requirements of FISMA and NIST Standards of security review, reporting, and remediation planning. Of particular mention for log management, SP Guide for the Security Certification and Accreditation of Federal Information Systems» Within SP are multiple controls that recommend regular review and monitoring of audit logs, especially within the Audit & Accountability Controls set, and Access Controls set. SP » Section NIST accepts and recommends Federal Agencies to utilize systems that normalize and centralize logs for faster response to incidents and remediation.» Section NIST specifies that host-based intrusion detections (HIDS) products are particularly helpful in finding patterns that humans cannot easily see such as correlating entries from multiple logs that relate to a single incident. Specifies that log analysis should be proactive not reactive. To achieve this logs must be reviewed in real-time or near-real-time manner. Without sound processes the value of the logs is significantly reduced Introduction of SMAD Services 24
25 SMAD Components: Reporting Data Flow 25
26 Alert Response Process Alert- Console and KB Populated with known issues Unknown conditions escalated to SMAD SA and SMAD SE SMAD SA receives alerts or call from NISC Investigates and evaluates condition Creates starting SIP Initiates IR Procedure 2011 Introduction of SMAD Services 26
27 IR process IR Process can be internally or externally initiated Ticket filed with NISC Incident opened at SOC MSFC and center ITSM(s) notified Data given to ITSM Incident Closed with SOC Ticket Closed Resolution Phase KB Updated Rules Updated Other policy, procedure changes if needed 2011 Introduction of SMAD Services 27
28 IR process SMAD SLA s First 30 minutes following a notification of a new alert : Staff is responsible to acknowledge the alert and decide if the alert is a false positive or requires further investigation First 1 hour following notification: SMAD Must assign a staff member to investigate the alert using NAF / ADMS Support Staff as needed First 1 hour following classification of Alert as an incident: Severity and classification of incident with SOC by US-Cert Standards Center(s) involved in the incident. (Including MSFC ITSM and OCSO) SOC must be notified and an incident number assigned Within 14 days: Alert must be resolved, and all technical person(s) completed their remediation activities SMAD SA or SE will create a SMAD Incident Package (SIP). SIP contains reports, events, alerts and attachments for investigation During this time the internal SMAD Resolution State will be set to Level 4 to keep the alerts active for 30 days. Within 21 Days: Closeout procedure completed. All Tickets closed / Incident Closed at SOC Any restored logs to the log archive server have been detached and space allocated back to system All items marked Level 4 are now marked resolved 2011 Introduction of SMAD Services 28
29 Rules Overview Default Rule Set Each module provides default rules 3,600 rules were evaluated Rules were enabled, disabled, customized Rule re-writes for correctness and reduce false positives DRA and DMA Managed / Unmanaged Changes Use of account tracked external to program Vulnerability Manager / Intrusion Manager Scripts analyze registry Services and Ports monitored CGAD / CGW Managed / unmanaged changes Track authorized / unauthorized changes 2011 Introduction of SMAD Services 29
30 Rules Overview Cont. Antivirus Check points Self Monitoring Heartbeat active Self log checking Archive Rule for Security Logs Correlation / Collection Activity Collects Suspicious Activity OU Move Logon Failure then Disabling Account Multiple Failed logons Logon Failure followed by Log Clearing Successful Attacks Failed logon followed by account creation Account granted act as operating system Failed admin logon followed by service account logon Multiple account lockout User Enabled and Disabled in Rapid Succession 2011 Introduction of SMAD Services 30
31 Rules Overview Cont. Customization Standard Accounts Defined High Profile Groups and Users Defined NetIQ Optimization Rules updated to properly handle user & workstation accounts Custom Enhancement during Incident Resolution Example: GPO Incident at a center GPG Reports available needed better solution New CGGP Solution only supports 32Bit DC s Custom Alerts SM Event Manager to detect event CGW to detect changes within /sysvol/ 2011 Introduction of SMAD Services 31
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Published: June 02, 2011 Language(s): English Audience(s): IT Professionals Level: 200
6425C - Windows Server 2008 R2 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Introduction This five-day instructor-led course provides in-depth training on configuring Active Directory Domain Services
Configuring and Troubleshooting Windows 2008 Active Directory Domain Services
About this Course Configuring and Troubleshooting Windows This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting Active Directory Domain
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Active Directory About this Course This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting (AD DS) in and R2 environments. It covers core
Reports, Features and benefits of ManageEngine ADAudit Plus
Reports, Features and benefits of ManageEngine ADAudit Plus ManageEngine ADAudit Plus is a web based Active Directory change audit software. It provides comprehensive reports on almost every change that
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows Server
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
www.etidaho.com (208) 327-0768 Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services 5 Days About this Course This five-day instructor-led course provides in-depth
Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services About this Course This five-day instructor-led course provides to teach Active Directory Technology Specialists
MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services
MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course Code: M6425 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Overview This five-day instructor-led course
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Reports, Features and benefits of ManageEngine ADAudit Plus
Reports, Features and benefits of ManageEngine ADAudit Plus ManageEngine ADAudit Plus is a web based Active Directory change audit software. It provides comprehensive reports on almost every change that
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Details Course Outline Module 1: Introducing Active Directory Domain Services This module provides
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Details Course Code: Duration: Notes: 6425C 5 days This course syllabus should be used to determine whether
Security Policy for External Customers
1 Purpose Security Policy for This security policy outlines the requirements for external agencies to gain access to the City of Fort Worth radio system. It also specifies the equipment, configuration
How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425 Course Outline Module 1: Introducing Active Directory Domain Services This module provides an overview of Active Directory
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425B Course Length: 5 Days Course Overview This five-day course provides to teach Active Directory Technology
NETWRIX IDENTITY MANAGEMENT SUITE
NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
Managing and Maintaining a Microsoft Windows Server 2003 Environment
Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Five Days, Instructor-Led About this course This five-day instructor-led course provides in-depth training
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government
Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft
AV-006: Installing, Administering and Configuring Windows Server 2012
AV-006: Installing, Administering and Configuring Windows Server 2012 Career Details Duration 105 hours Prerequisites This course requires that student meet the following prerequisites, including that
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course OutlineModule 1: Introducing Active Directory Domain Services This module provides an overview
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
SINGLE COURSE. 136 Total Hours. After completing this course, students will be able to:
NH204-1314 Designing and Implementing Server Infrastructure 136 Total Hours COURSE TITLE: Designing and Implementing Server Infrastructure COURSE OVERVIEW: After completing this course, students will be
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Course 6425C: Five days
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425C: Five
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Outline SSS6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory
Outline SSS6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory Duration: Four consecutive Saturdays About this Course This instructor-led course provides the knowledge and skills
Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
Securing Active Directory Presented by Michael Ivy
Securing Active Directory Presented by Michael Ivy Presenter: Michael Ivy Consultant, Rook Security Michael Ivy Thank you for being here today August 20, 2014 Brief Overview Securing NTDS and Replication
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425C Course Length: 5 Days Course Overview This five-day course provides in-depth training on implementing,
JIJI AUDIT REPORTER FEATURES
JIJI AUDIT REPORTER FEATURES JiJi AuditReporter is a web based auditing solution for live monitoring of the enterprise changes and for generating audit reports on each and every event occurring in the
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
Installing, Configuring, and Managing a Microsoft Active Directory
Installing, Configuring, and Managing a Microsoft Active Directory Course Outline Part 1: Configuring and Managing Active Directory Domain Services Installing Active Directory Domain Services Managing
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Domain Services Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 02 June 2011 200 Windows
Designing and Implementing a Server Infrastructure
Course 20413C: Designing and Implementing a Server Infrastructure Course Details Course Outline Module 1: Planning Server Upgrade and Migration This module explains how to plan a server upgrade and migration
Top 10 Security Hardening Settings for Windows Servers and Active Directory
SESSION ID: CRWD-R04 Top 10 Security Hardening Settings for Windows Servers and Active Directory Derek Melber Technical Evangelist ADSolutions ManageEngine @derekmelber Agenda Traditional security hardening
70-640 R4: Configuring Windows Server 2008 Active Directory
70-640 R4: Configuring Windows Server 2008 Active Directory Course Introduction Course Introduction Chapter 01 - Installing the Active Directory Role Lesson: What is IDA? What is Active Directory Identity
Designing and Implementing a Server Infrastructure
Page 1 of 7 Overview This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and deploy a physical and logical Windows Server 2012 Active Directory Domain Services
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows
Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Training Name Installing and Configuring Windows Server 2012
Training Name Installing and Configuring Windows Server 2012 Exam Code 70 410 At Course Completion After completing this course, students will be able to: Install and configure Windows Server 2012. Describe
ManageEngine Desktop Central Training
ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
Automate PCI Compliance Monitoring, Investigation & Reporting
Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently
MS 20413A: Designing and Implementing a Server Infrastructure
MS 20413A: Designing and Implementing a Server Infrastructure Description: Days: 5 Prerequisites: This 5-day instructor-led course provides you with the skills and knowledge needed to plan, design, and
Security and Rights Delegations for the Password Reset PRO Master Service Applies to software versions 2.x.x and 3.x.x
Security and Rights Delegations for the Password Reset PRO Master Service Applies to software versions 2.x.x and 3.x.x Password Reset PRO Master Service Delegated rights required for running the Password
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table
BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure)
VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT mcsa (70-413) Microsoft certified system administrator (designing & implementing server infrasturcure) www.vnlinfotech.com MODULE 1 : Considerations for Upgrades
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.
Overcoming Active Directory Audit Log Limitations Written by Randy Franklin Smith President Monterey Technology Group, Inc. White Paper 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
CorreLog Alignment to PCI Security Standards Compliance
CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
ADSelfService Plus Client Software Installation Guide
ADSelfService Plus Client Software Installation Guide ( I n s t a l l a t io n t h r o u g h A DS e l f S e r v ic e P l u s w e b p o r t a l a n d M a n u a l I n s t a l l a t io n ) 1 Table of Contents
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
Using NetIQ Security and Administration Products to Ensure HIPAA Compliance March 25, 2002. Contents
Using NetIQ Security and Administration Products to Ensure HIPAA Compliance March 25, 2002 Contents HIPAA Overview...1 NetIQ Products Offer a HIPAA Solution...2 HIPAA Requirements...3 How NetIQ Security
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
20413C: Designing and Implementing a Server Infrastructure
20413C: Designing and Implementing a Server Course Details Course Code: Duration: Notes: 20413C 5 days This course syllabus should be used to determine whether the course is appropriate for the students,
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Active Directory Objectives
Exam Objectives Active Directory Objectives Exam 70 640: TS: Windows Server 2008 Active Directory, Configuring This certification exam measures your ability to manage Windows Server 2008 Active Directory
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
MS 70-411 Exam Objectives Administering Windows Server 2012 R2
MS 70-411 Exam Objectives Administering Windows Server 2012 R2 Below are the exam objectives for Administering Windows Server 2012 R2 Exam 70-411 Tasks measured as per latest update implemented in January
Managing and Maintaining Windows Server 2008 Servers
Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
