Expunge REMOVING WINDOWS LOGIN TRACES CHAPTER. Exploit Techniques THE HACK DISSECTED
|
|
|
- Barbara Kelly
- 10 years ago
- Views:
Transcription
1 CHAPTER Expunge 5 Expunging is the process of destroying information to cover the tracks of the attacker. These steps allow a computer user to remove traces of their activity from a computer so that someone else cannot determine what was done. Every modern computer system features a logging ability that tracks when certain activities take place. These logs could encompass all of the activities taken by users on the system, and they could also log activity from the attacker. This chapter will cover a few of the basic methods to erase information and help obscure an attacker s presence on a computer system. REMOVING WINDOWS LOGIN TRACES THE HACK DISSECTED Pavel took Stepan s laptop from Vlad and blanked the three Windows event log files. Next, he changed the last logged in user registry key so that it would appear that Stepan s account was the last one used. (p. 8) Early in our story, Pavel and Vlad hack into Stepan s computer to gather details on their employer and the job that he has for them. Pavel used a Linux bootable operating system on a Universal Serial Bus (USB) drive to change the password of the Administrator account and gain control of the system. However, when he was done siphoning off the information from the laptop, he went the extra step of cleaning up after himself and removing traces that he was on the computer at that time. Exploit Techniques There are many ways in which an attacker can remove the traces of his or her actions after the attacker s work is done on a hacked system. All modern operating systems have account auditing and logging enabled in some form to log information on when users log in and log off of the system, which can help place a physical person at the 269
2 270 CHAPTER 5 Expunge keyboard during an investigation. In other cases, the computer may log all of the activities that a person performed while he or she had logged in. There may be additional locations in which data is stored, but only if the attacker knows where to look for it. Event Logs Microsoft Windows stores all notable events into a collection of log files called the event logs. These logs store information about events that occur on a regular basis from within the Windows operating system and from the applications that run on it. When viewed through the integrated Windows Event Viewer application, event logs are commonly the first area that a system administrator monitors when something goes amiss. Assuming that Stepan would return to work with the laptop in tow, Pavel expunged the records of his work on the system by completely removing the three event logs on it. Although Windows stores events into a collection of event logs, each log stores a particular type of data. There are three main log files that have been in use since the event logs first appeared in Windows NT: Application, Security, and System. 1 We ll explore the details of these individual logs in the Best Practices section under Event Logs, but suffice it to say at this point that these three logs store many types of information that a hacker would want erased. In the Windows NT and XP environments, these logs are stored in the %SystemRoot%\System32\Config directory or, for most computers, C:\Windows\ System32\Config. Here, they are named as AppEvent.evt, SecEvent.evt, and SysEvent.evt. Although most computer systems have the operating system installed onto the C: volume, there are a rare few that choose another volume; the %SystemRoot% is automatically replaced by the actual drive letter to make it work on all systems. In a Windows Vista or Windows 7 environment, these logs are stored in %SystemRoot\System32\winevt\Logs, normally seen as C:\Windows\System32\ winevt\logs. They have a different naming convention of Application.evtx, Security.evtx, and System.evtx. Typically, these files are locked by an Event Logger service running on the system, preventing a user from simply deleting the file outright. However, in a hurry, their contents can always be cleared from within the Event Viewer application itself. This is done by highlighting the log that you wish to be cleared and selecting from the pull-down menu the Action Clear Log item, as shown in Figure 5.1. This will immediately remove all entries from the specified log, but it will leave a trace event that shows that the log was cleared at the current date and time. Last Logged-In User Key Immediately after cleaning out the event logs, the story notes that Pavel cleared the last logged in user registry key. This is an actual value in the Windows registry that stores which account last logged into the computer. This information is stored in the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ Winlogon\DefaultUserName
3 Removing Windows Login Traces 271 FIGURE 5.1 Clearing a Windows Event Log FIGURE 5.2 Windows Last Logged-In User Key This registry key, shown in Figure 5.2, will record the last user name that was manually logged into the system. 2 As Pavel logged into Stepan s laptop as Administrator, that name would show up in this registry entry. To clear his trails, as Stepan would not have been able to log in as Administrator, Pavel changed this entry from Administrator to Stepan s account name. Best Practices When an attacker reviews the logs shown here, he or she finds the information stored directly in Windows by the operating system itself. As this data is needed for system purposes, it may not be possible to either block its usage or modify it. For
4 272 CHAPTER 5 Expunge example, any user who has the administrative rights to the system can open the Registry Editor and change the DefaultUserName field shown earlier. There is nothing to prevent this as long as the attacker has administrative rights to the machine. Your defenses will have to be set well ahead of this point to prevent a hacker from obtaining administrative rights in the first place. Event Logs Unlike protecting against a registry edit, there are steps that you can take to maintain the event logs in your Windows systems, even when they have been deleted or modified. But, first, let s look at what data is contained within these files. The Application log stores events created by applications running on the system. This file normally logs errors and warnings given by applications, such as when they crash or exhibit noticeable errors. An example of this is shown in Figure 5.3, where an entry is shown for a Mozilla Firefox crash. The event records the exact time and date when the application crashed, as well as basic debugging information. This information shows that Firefox crashed because of a faulting module named FOXITR~1.OCX. FIGURE 5.3 Windows Application Event Log
5 Removing Windows Login Traces 273 Tracking down that file leads to the FoxitReaderOCX.ocx plug-in for Firefox, part of Foxit Reader, a free PDF viewer from This event coincided with the Web browser opening a corrupted PDF document and subsequently crashing. The Security log is used by Windows to track security events such as account logins and logoffs, as shown in Figure 5.4. It also notes when accounts attempt to read, modify, or delete protected audit files. On a properly configured system, this log reports any activity that would trigger a security audit for suspicious behavior. The System log deals with system-level errors and warnings, such as those produced by device drivers and system services. This log will detail hardware issues, as well as when services are started and stopped. Additionally, it will display any error messages that appear at the service level, such as the DNS errors shown in Figure 5.5. While the Application, Security, and System logs are the primary source of data for system events, Microsoft has included additional new logs with each recent FIGURE 5.4 Windows Security Event Log
6 274 CHAPTER 5 Expunge FIGURE 5.5 Windows System Event Log release of Windows. Windows Vista and Windows 7 feature dozens of various event logs that cover many aspects of the operating system. For example, recent versions of Windows include one event file named Microsoft-Windows-Application- Experience%4Program-Inventory.evtx. This log, shown in Figure 5.6, will log every time an application is installed onto the computer through official setup scripts. Each entry will include the name of the application installed and its version number. This is a log entry that should be scanned regularly to audit the applications being installed by your users. In earlier versions of Microsoft Windows, the event logs were vulnerable to deletion easily from the command line. By simply stopping the Windows services associated with the event logs, a hacker could then manually delete or rename the entries. However, additional file controls within Windows Vista and Windows 7 have made it difficult for hackers to simply remove or edit the files. In the case that a hacker has cleared event logs, one of the best ways to mitigate the issue is to simply have backups of the event logs already created. The backup process can be completed using the integrated command line tool wevtutil.exe. To create a regular backup using the wevtutil utility, you can create a new scheduled task in the Windows Task Scheduler. Create a new task inside Task Scheduler
7 Removing Windows Login Traces 275 FIGURE 5.6 Windows Application Inventory Log and set the trigger to occur on a daily schedule and to repeat every 5 min indefinitely. For an action, start a batch file similar to the off for /f "tokens=2-4 delims=/" %%a in ('date /t') do (set mydate=%%c-%%a-%%b) for /f "tokens=1-2 delims=/:" %%a in ("%TIME%") do (set mytime=%%a%%b) :Above code takes the current date and time and strips out the illegal :filename characters, from questions/ wevtutil epl Security C:\Users\_Hidden\SecurityBackup- %mydate%_%mytime%.evtx This batch file, which is saved with a.bat extension and placed anywhere on your system, sets a foundation for creating your own customized script. Currently, the script retrieves the current date and time and strips out the illegal colon and slash
8 276 CHAPTER 5 Expunge characters, allowing these values to be placed into the filename. The wevtutil utility is then run to export the Security log into the file C:\Users\_Hidden\SecurityBackup- %mydate%_%mytime%.evtx, although the folder location can be changed to meet your needs. Ensure that the task is configured to run at the highest elevated privileges, to allow the script to access the Security log. After being enabled, the task will then start creating backups of your Security log in 5-min intervals. Naturally, this will eventually fill your hard drive, so you will need to modify the script to place limits or run clean-up routines. However, this is a basic example to show that it can be done. SUMMARY OF REMOVING WINDOWS LOGIN TRACES Performing an exploit is only the first step in attacking a network system. Once an attacker has gained a foothold and stolen the resources needed from a system, the attacker will attempt to clean up his or her traces to throw off any investigative efforts. We saw this through multiple examples throughout our story, and it is a tactic used widely by attackers. It is relatively easy to remove basic traces of a normal login through the Windows Registry Editor, as we discussed in this section. Although removing the basic system logs can prove more difficult, they are targeted by attackers because of the copious details they store on system-wide operations. System administrators can perform basic mitigation to help prevent many of these attacks through proper security and backups of their system logs. With a proper backup strategy, an administrator can still retrieve details of an attack even if the logs are wiped clean. FOR MORE INFORMATION For this chapter, we ve covered the basics on log scrubbing to remove traces of an attack. There are a variety of dedicated tools for this task and additional ways to protect against them. For more information, we refer you to the following Web sites: WinZapper tool: ClearLogs tool: How to Delete Corrupt Event Viewer Log Files: CorruptEventViewerLogFiles.html Back Up Your Event Logs with a Windows PowerShell Script: microsoft.com/en-us/magazine/ heyscriptingguy.aspx
9 Browser Cleanup 277 BROWSER CLEANUP THE HACK DISSECTED The sound of a car door out front announced Vlad s return. Pavel surfed to the Black Hat conference site and then cleared his browser cache before Vlad walked in. (p. 115) In our story, Pavel is just beginning to worry about his working relationship with Vlad. He fears that his life may be in danger and starts creating a contingency plan for escaping the area. At that moment, Vlad returns to their hideout and Pavel quickly cleans up his traces. He switches to the Black Hat Web site, a site that Vlad would expect him to be on, and clears his browser cache. By clearing his browser cache, Pavel removes all traces of his Web surfing history. He hides the airlines and car rental Web sites that he was browsing just minutes before. If Vlad did attempt to view Pavel s history, he would see a blank slate. Exploit Techniques Clearing the history of a Web browser has become a common technique in the daily browsing of many people. It allows for privacy while surfing the Web by removing a user s activity log so that others can t see it at a later point. 3 Additionally, by clearing away the large amount of cached data on your hard drive, clearing the history can improve Web browser performance. The typical Web browser records many aspects of our daily Web-browsing activities. Every individual Web page that you view is stored, as well as copies of every page, image, and movie that you viewed. Additionally, all typed user names and passwords and every file downloaded is also stored. Modern Web browsers give you the ability to clear out this information, as shown by the Delete Browsing History window for Internet Explorer 8 in Figure 5.7. Although these options are normally buried within the multiple pull-down menus of their respective browsers, all modern browsers feature a universal keyboard shortcut to quickly bring up the history deletion function: Ctrl + Shift + Del. Upon pressing these three keys simultaneously, the browser s history deletion window will appear. While each browser has a slightly different style to their functions, they all operate the same way. Internet Explorer 8 s feature is shown in Figure 5.7 while Mozilla Firefox and Google Chrome s are shown, in respective order, in Figure 5.8. Private Browsing Although modern browsers allow for users to clean up their browsing history before signing off, they also offer a feature to prevent the system from logging this information in the first place. Known as private browsing, though with differing names between Web browsers, the feature blocks cookies and Web browsing history from being stored to the local system. It will also not store the information you type into online forms nor cache any of the data to the hard drive.
10 278 CHAPTER 5 Expunge FIGURE 5.7 Internet Explorer 8 Delete Browsing History Window FIGURE 5.8 Mozilla Firefox and Google Chrome s Respective History Delete Windows In Internet Explorer, this feature is known as InPrivate Browsing. Although InPrivate Browsing will not store search entries or Web sites, it does cache data to the hard drive. This cached data is deleted when you close the browser, but it can be recovered through basic forensics. InPrivate Browsing is enabled by selecting Safety InPrivate Browsing from the pull-down menu. Details on Internet Explorer s InPrivate Browsing can be found at Windows7/What-is-InPrivate-Browsing.
11 Summary of Browser Cleanup 279 Mozilla Firefox also offers a Private Browsing feature with many of the same abilities. Its Private Browsing also blocks cookies and browser history from being stored to the local system. It is enabled from the pull-down menu under Tools Start Private Browsing. Greater detail on Firefox s Private Browsing is found at support.mozilla.com/en-us/kb/private+browsing. Google s Chrome browser has the same feature set as the other major Web browsers in a feature they call Incognito Mode. Their implementation of private browsing is slightly different from Internet Explorer and Firefox. Upon selecting Tools (wrench icon) New Incognito Window from the pull-down menu, a new browser window will open in private mode. Google Chrome then allows you to have a simultaneous Incognito window and a normal browsing window. Additionally, while in Incognito mode, Chrome disables all of your browser extensions and add-ons. This prevents your private information from being leaked through third-party applications. Best Practices As these options are controlled by the browser itself, it is difficult to control their use as an administrator. The one exception is Internet Explorer 7 and later versions, for which there is a group policy that allows you to disable the ability to delete browsing history. This setting can be found in the Group Policy editor under Administrative Templates Windows Components Internet Explorer Delete Browser History. Under this final folder is a setting to Turn off Delete Browsing History functionality, along with various other deletion controls. 4 For serious infractions that absolutely require determining the browser history, it may be possible to forensically recover the deleted browser cache files after they ve been erased. This would assist in helping to see what content the user downloaded, and some sites, but may be limited. For instance, in Mozilla Firefox, all history details are now stored in miniature databases that are scrubbed clean after a user has deleted his or her browsing history. SUMMARY OF BROWSER CLEANUP As many attacks are beginning to use the Web browser as an attack vector, criminals have more of a need to clean their tracks on the browser itself. Additionally, even basic research and reconnaissance activities exist within the Web browser cache that can incriminate an attacker or a researcher in the middle of their tasks. The information stored within the browser cache can pinpoint the Web pages that a user browsed, as well as the content that he or she had viewed and downloaded. Not only can this store private data but also potentially embarrassing information for the user. For basic privacy reasons, all of the major Web browsers now support the ability to scrub browser history files and statistics, although this is also taken advantage of by attackers. Although users can easily clear their personal browsing history, an attacker can also scrub the history on their own computers in the event that their equipment is
12 280 CHAPTER 5 Expunge seized by law enforcement. For businesses, your employees are also able to clear their browsing history to remove evidence of activity on unauthorized Web sites. There is little that can be done by a company to protect against this action, though. Forcing users to use a modern version of Internet Explorer, blocking any alternative browser, and disabling the ability to remove the browsing history can maintain the cache on a system that the company controls. Beyond this, the risk is always present. FOR MORE INFORMATION We ve covered much of the ability to scrub a user s history and activities from a Web browser in this chapter, as well as how to enter private browsing mode. There are a few topics that we were not able to cover here, especially in the realm of best practices. The following Web sites cover some of the various aspects of recovering data from a Web browser, as well as some of the ways in which data can still be leaked out even while private browsing is enabled. Web Browser Forensics Part 1: Web Browser Forensics Part 2: Why Private Browsing Isn t : why-private-browsing-isnt/ ENDNOTES 1. How to view and manage event logs in Event Viewer in Windows XP, Microsoft Support, ; 2007 [accessed ]. 2. DefaultUserName, ; 2010 [accessed ]. 3. Rick B. Erase Internet Explorer 8 s Browsing History, The Washington Post, ; 2010 [accessed ]. 4. Prevent users from deleting IE browsing history, Online Tech Tips, iebrowsing-history/; 2009 [accessed ].
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
KUB Website Troubleshooting
KUB Website Troubleshooting Are you having problems getting to the KUB website at http://www.kub.org/? If you type in your user ID and password and press the login button, are you routed right back to
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Complete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
How To Login To A Website On A Pc Or Mac Or Mac (For Pc Or Ipad)
What browser types are supported? Do I need to allow cookies? What are session cookies? The system is asking me to login again and says my session has timed out. What does this mean? I am locked out after
ADP Workforce Now Security Guide. Version 2.0-1
ADP Workforce Now Security Guide Version 2.0-1 ADP Trademarks The ADP logo, ADP, and ADP Workforce Now are registered trademarks of ADP, Inc. Third-Party Trademarks Microsoft, Windows, and Windows NT are
SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE
SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE Welcome To Surpass Hosting Service. This document contains instructions to help you get up and running with your new service. The instructions
Remote Access Services Microsoft Windows - Installation Guide
Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3
New Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
Lab 12: Mitigation and Deterrent Techniques - Anti-Forensic
CompTIA Security+ Lab Series Lab 12: Mitigation and Deterrent Techniques - Anti-Forensic CompTIA Security+ Domain 3 - Threats and Vulnerabilities Objective 3.6: Analyze and differentiate among types of
Computer s History Quick Start Guide & Safety Tips
How to: Check Your Computer s History Quick Start Guide & Safety Tips Copyright Web Wise Kids. 2009. All Rights Reserved WHAT IS COMPUTER HISTORY? Your computer contains records that can tell you a lot
Foxit Enterprise Reader GPO User Guide
1 Copyright 2013 Foxit Corporation. All Rights Reserved. No part of this document can be reproduced, transferred, distributed or stored in any format without the prior written permission of Foxit. Anti-Grain
User Manual for Web. Help Desk Authority 9.0
User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
How Spyware and Anti-Spyware Work
22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
Jetico Central Manager. Administrator Guide
Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number
Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.
Microsoft Windows 7 Administration Instant Reference William Panek WILEY Wiley Publishing, Inc. Introduction xix PART I: Installation 1 Chapter 1: Installing Windows 7 3 Understand Windows 7's New Features
HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE
HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
ScanShell.Net Install Guide
ScanShell.Net Install Guide Please install the software first - DO NOT PLUG IN THE SCANNER The scanner has been carefully packaged to avoid damage during transportation. Before operating the scanner, please
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4
Digital Signatures User Guide Revision 1.2 build 1, Document Revision 1.12 Published 31. Octover 2011 ii Contents Copyright Disclaimer iii iii Introduction 1 System Requirements... 3 Installing the software
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
RSA Authentication Manager 8.1 Virtual Appliance Getting Started
RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides
User Manual. Copyright Rogev LTD
User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's
Inteset Secure Lockdown ver. 2.0
Inteset Secure Lockdown ver. 2.0 for Windows XP, 7, 8, 10 Administrator Guide Table of Contents Administrative Tools and Procedures... 3 Automatic Password Generation... 3 Application Installation Guard
Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana 46240 USA
Paul McFedries Microsoft Windows9 Home Server 2011 LEASHE Third Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 Part I Unleashing Windows Home Server Configuration
PORTAL ADMINISTRATION
1 Portal Administration User s Guide PORTAL ADMINISTRATION GUIDE Page 1 2 Portal Administration User s Guide Table of Contents Introduction...5 Core Portal Framework Concepts...5 Key Items...5 Layouts...5
Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu
Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign
3 Easy Steps to Get Started
Quick Start Guide Contents 1. What is icafe Manager?... 4 1.1. Server... 4 1.2. Client Terminal... 4 2. Downloading, Registering & Activating Cafe Code... 5 2.1. Downloading icafe Manager:... 5 2.2. Registering
DocuShare User Guide
DocuShare User Guide Publication date: April 2011 This document supports DocuShare Release 6.6.1 Prepared by: erox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California 94304 USA
Event Record Monitoring and Analysis Software. Software Rev. 3.0 and Up. User s Guide
Event Record Monitoring and Analysis Software Software Rev. 3.0 and Up User s Guide 2 Contents Contents Chapter 1: About ERMAWin 4 Chapter 2: Overview 5 About this Manual 5 System Requirements 5 Installing
GPS Tracking Software Training and User Manual
GPS Tracking Software Training and User Manual Table of Contents Introduction... 4 Login Page... 4 Dashboard... 4 Create Group... 5 Edit Group... 6 Group Editor... 6 Add New Vehicle... 7 Configure Tracking...
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning
StruxureWare Data Center Expert 7.2.4 Release Notes
StruxureWare Data Center Expert 7.2.4 Release Notes Table of Contents Page # Part Numbers Affected...... 1 Minimum System Requirements... 1 New Features........ 1 Issues Fixed....3 Known Issues...3 Upgrade
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do
USER GUIDE WWPass Security for Windows Logon
USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey
Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete
Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Before you install ProSeries software for network use
Before you install ProSeries software for network use The following pages describe system requirements and other information you need to know before installing ProSeries software for network use. Important:
31 Ways To Make Your Computer System More Secure
31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Log Management and Intrusion Detection
Log Management and Intrusion Detection Dr. Guillermo Francia,, III Jacksonville State University Prerequisites Understand Event Logs Understand Signs of Intrusion Know the Tools Log Parser (Microsoft)
CONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
PureEdge Viewer Training Guide
Table of Contents Introduction PureEdge e-forms 3 Course Objectives 3 PureEdge Viewer Overview What is a PureEdge e-form? 4 The PureEdge Viewer 5 What You See in the Viewer 6 The PureEdge Toolbar 7 Toolbar
Implementing HIPAA Compliance with ScriptLogic
Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE
Content Management System User Guide
CWD Clark Web Development Ltd Content Management System User Guide Version 1.0 1 Introduction... 3 What is a content management system?... 3 Browser requirements... 3 Logging in... 3 Page module... 6 List
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Foxit Reader Deployment and Configuration
Copyright 2004-2015 Foxit Software Incorporated. All Rights Reserved. No part of this document can be reproduced, transferred, distributed or stored in any format without the prior written permission of
IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide
IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright
Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide
Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
Chapter 5: Fundamental Operating Systems
Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose
The All-In-One Browser-Based Document Management Solution
The All-In-One Browser-Based Document Management Solution General Overview of Content Central Content Central sets the standard for document management and workflow solutions. Users access and interact
Simplify Suite in a VDI Environment
Simplify Suite in a VDI Environment Before jumping onto the VDI bandwagon, ensure a smooth transition. tricerat solves the problems you may face when transitioning to VDI. Andrew Parlette, VP of Product
Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 9.0, Enterprise Edition
Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 9.0, Enterprise Edition Copyright and Trademark Notice Use of the product documented in
One of the fundamental kinds of Web sites that SharePoint 2010 allows
Chapter 1 Getting to Know Your Team Site In This Chapter Requesting a new team site and opening it in the browser Participating in a team site Changing your team site s home page One of the fundamental
Sophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
Manual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
new Business Online Technical Troubleshooting Guide
new Business Online Technical Troubleshooting Guide TABLE OF CONTENTS How to install Java 1.6 Page 3 How to install Java 1.6 without ActiveX control Page 6 How to uninstall Java Runtime Environment Page
Windows 8 Hacks O'REILLY* Preston Gralla. Beijing. Cambridge Famham. Koln Sebastopol Tokyo
Windows 8 Hacks Preston Gralla Beijing Cambridge Famham O'REILLY* Koln Sebastopol Tokyo Table of Contents Preface vii 1. Setup and Startup Hacks 1 Hack 01. Disable Windows 8's Lock Screen 1 Hack 02. Hack
Getting Started with WebEx Access Anywhere
Getting Started with WebEx Access Anywhere This guide provides basic instructions to help you start using WebEx Access Anywhere quickly. This guide assumes that you have a user account on your meeting
Introduction Wiping Transparent Wiping Transparent Wiping Reserved Space Enforcer NOTE: BCWipe Enforcer Jetico Central Manager custom wiping schemes
BCWipe Help File 1 Introduction Wiping is the term used to describe the process of securely erasing data, such as contents of a file or disk space. When files are properly wiped, data is erased beyond
Installation and configuration of Real-Time Monitoring Tool (RTMT)
Installation and configuration of Real-Time Monitoring Tool (RTMT) How to install and upgrade RTMT, page 1 Services, servlets, and service parameters on server, page 5 Navigation of RTMT, page 6 Nonconfigurable
RES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
Server & Workstation Installation of Client Profiles for Windows
C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing
Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP
Secure Your Home Computer and Router Windows 7 Abbreviated Version LeRoy Luginbill, CISSP TABLE OF CONTENTS Introduction... 2 Getting Ready... 5 Page 1 of 10 Introduction By giving the Introduction and
ATX Document Manager. User Guide
ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2010 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,
MAXA-COOKIE-MANAGER - USER MANUAL - SW-Release V 5.0 / Document Rev. 1.1
MAXA-COOKIE-MANAGER - USER MANUAL - SW-Release V 5.0 / Document Rev. 1.1 Quick Start Once installed MAXA Cookie Manager goes to work immediately to gather information about the cookies on your system and
DigitalPersona Pro. Password Manager. Version 5.x. Application Guide
DigitalPersona Pro Password Manager Version 5.x Application Guide 1996-2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
Deploying EFS: Part 2
Deploying EFS: Part 2 John Morello You can think of any Encrypting File System (EFS) deployment as having essentially two parts: the back-end design portion focusing on certificate management and recovery
Kaspersky Password Manager USER GUIDE
Kaspersky Password Manager USER GUIDE Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers you may need. Any type of reproduction or
Shakambaree Technologies Pvt. Ltd.
Welcome to Support Express by Shakambaree Technologies Pvt. Ltd. Introduction: This document is our sincere effort to put in some regular issues faced by a Digital Signature and USB Token user doing on
MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS. e-filing Guide
MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS e-filing Guide 2012-2014 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in
BLACKBOARD BASICS for ONLINE CLASSES & Classes with Online Components
BLACKBOARD BASICS for ONLINE CLASSES & Classes with Online Components Full up-to-date information can be found online beginning at: http://www.saddleback.edu/de/ Video instructions for Blackboard are online
How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
3 Backing up to Acronis Online Storage... 10 3.1 Log in to the online storage...10 3.2 Computer selection...11
User's Guide Table of contents 1 General information...3 1.1 What is Acronis True Image Online?... 3 1.2 System requirements... 3 1.3 Acronis True Image Online installation and startup... 4 1.4 Subscription
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
GP REPORTS VIEWER USER GUIDE
GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated
StruxureWare Data Center Expert 7.2.1 Release Notes
StruxureWare Data Center Expert 7.2.1 Release Notes Table of Contents Page # Part Numbers Affected...... 1 Minimum System Requirements... 1 New Features........ 1 Issues Fixed....2 Known Issues...2 Upgrade
Virtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
Zimbra to Gmail Migration
Zimbra to Gmail Migration There are two steps that you need to complete prior to having us migrate your email from Zimbra to Gmail. These steps must be completed by November 9, 2012. If you experience
Advanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
UNGASS CRIS 2008
version 1.0 UNGASS DATA ENTRY SOFTWARE: GLOBAL REPORTING 2008 TROUBLESHOOTING GUIDE Prepared by UNAIDS Evidence, Monitoring, and Policy Department UNAIDS 20, Avenue Appia 1211 Geneva 27 Switzerland Tel.
Management of Hardware Passwords in Think PCs.
Lenovo Corporation March 2009 security white paper Management of Hardware Passwords in Think PCs. Ideas from Lenovo Notebooks and Desktops Workstations and Servers Service and Support Accessories Introduction
Web Security Service
Webroot Web Security Service Desktop Web Proxy Configuration Guide Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Desktop Web Proxy Configuration Guide September
Accessing your Staff (N and O drive) files from off campus
Accessing your Staff (N and O drive) files from off campus It is possible to access your N and O drive files while you are off campus, for example whilst working from home or travelling. This document
Introduction to MS WINDOWS XP
Introduction to MS WINDOWS XP Mouse Desktop Windows Applications File handling Introduction to MS Windows XP 2 Table of Contents What is Windows XP?... 3 Windows within Windows... 3 The Desktop... 3 The
ChromQuest 5.0 Chromatography Data System
ChromQuest 5.0 Chromatography Data System Administrator Guide CHROM-97251 Revision A March 2008 2008 Thermo Fisher Scientific Inc. All rights reserved. Surveyor is a registered trademark of Thermo Fisher
National Security Agency
National Security Agency Information Assurance Directorate Vulnerability Analysis and Operations Systems and Network Analysis Center Application Whitelisting using Software Restriction Policies Version
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
