SNARE Agent for Windows v Release Notes
|
|
|
- Raymond Patrick
- 10 years ago
- Views:
Transcription
1 SNARE Agent for Windows v Release Notes Snare is a program that facilitates the central collection and processing of the Windows Event Log information. All three primary event logs (Application, System and Security) are monitored, and the secondary logs (DNS, Active Directory, and File Replication) are monitored if available. Event information is converted to tab delimited text format, then delivered over UDP to a remote server. Snare is currently configured to deliver audit information to a SYSLOG server running on a remote (or local) machine. A configuration utility allows you to set the appropriate syslog target and priority, as well as the target DNS or IP address of the server that should receive the event information. It should be noted that many syslog servers are not designed to cope with the sorts of volume of data that multiple snare agents can potentially generate. The Snare service will automatically start after you have completed the initial configuration process. It is recommended that you configure each of your event logs to overwrite as required, as opposed to overwrite > 7 days. We also recommend that you configure appropriate access controls on the Snare registry entries using regedt32.exe - perhaps restricting the permission to read or modify the keys and values to Local or Domain Administrators only. Snare stores it s registry settings in: HKEY_LOCAL_MACHINE\SOFTWARE\InterSect Alliance\AuditService Please remember that event monitoring is a complex area in most modern operating systems, and is not often very granular. Turning on significant event monitoring for a system can often produce unpredictable results, and could seriously detract from the resources available to the rest of your system or network. We recommend that you have a good understanding of exactly what event information is going to be used for, prior to enabling event monitoring on your servers. Release notes have been adjusted to only reflect Version 4.X agent, previous release notes can be located in your client area. To skip to the release Verson 4.2.3, please click here Snare Snare Snare Snare Merged Windows agents in a new installer with in built silent install support - Added configuration export feature for silent install support (snarecore.exe -x) - Minor updates to the micro web interface service - [Vista/08/Win7] Rebuilt log collection and monitoring system - [Vista/08/Win7] Fixed bug in DomainGroupMembers which caused the agent to crash on x64 systems - [Vista/08/Win7] Added support for collecting both FRS and DFS-Replication logs - Updated installer to remove CRT dependency - [Vista/08/Win7] Fixed problem with DNS name override setting - Updated micro web server authentication (digest). WARNING: this will require you to reset the password. - Removed MD5 string from /remote web page - Added cookie support for Change Tokens
2 Snare Snare Snare Snare Snare Snare Snare Snare Snare Snare Added POST support to micro web server - Added pre-submit MD5 hashing of remote access password in /remote web page - Added quotes to string values when generating a template file (snarecore.exe -x) - Improved Windows 2000 support for new installer - Fixed objective re-order buttons - Added Remote/EnableCookies option to control the use of cookies - Fixed bug in silent deployment of remote access password - Modified DomainGroupMembers to supply either samaccountname or CommonName - Added heartbeat capability, see new HeartBeat and Agent Log option - Added Policy Change and Service tracking abilities, see new HeartBeat and Agent Log option - Added SourceName filtering - Minor Objectives Configuration interface redesign - [NT/2000/XP/2003] Added General Search Term Match Type - [Vista/08/Win7] Added Alternative Syslog Header option - [Vista/08/Win7] Added USB Auditing - Enabled TCP_NODELAY to prevent TCP buffering by the OS - Fixed Unquoted Service Path vulnerability for installs and upgrades - Switched to fixed locale for date information - Upgraded DomainUsers to search all DCs for most recent LastLogon (LastLogon and LastLogonTimestamp) - Added TLS/SSL support (see LICENSE file) - Improved Agent Admin Console interface - Updated web server - Added the ability to send logs using UTC timestamps (Config/UseUTC) - Fixed bug in SourceName filter retrieval - Added Configuration Fingerprint and Web Service Usage logs (AgentLog) - Added registry auditing configuration option - Added Group Policy support - Removed IA64 support - Add UTC timestamp option to GUI - Fix crash when TCP server down - Fix sluggish GUI response after restart/absent TCP server - Add log server status indication - Add missing audit events in Vista/08/Win7 version - Fix missing UTC times in heartbeat messages - Fix for remote configuration bug - Socket leak fix. GUI response improvement - Objectives fix for missing Directory Service events, and duplicate DNS events The release notes for version 4.2 are fairly verbose:
3 New Features for Version 4.2 Regular expression for general match support By default, Snare matches the value in an event using a basic wild-card search (i.e. using '?' for single characters, and '*' for multiple). The General Match search term in an objective may now be set to interpret the string as a Perl Compatible Regular Expression. This allows for a much more detailed and flexible search criteria to be configured. Some common useful regular expressions include: Event contains address: ([a-z0-9_\.-]+)@([\da-z\.-]+)\.([a-z\.]{2,6}) Event contains URL: (https?:\/\/)?([\da-z\.-]+)\.([a-z\.]{2,6})([\/\w \.-]*)*\/? Event contains IP address: (?:(?:25[0-5] 2[0-4][0-9] [01]?[0-9][0-9]?)\.){3}(?:25[0-5] 2[0-4][0-9] [01]?[0-9][0-9]?) Event contains hex-numbers: #?([a-f0-9]{6} [a-f0-9]{3}) This can be embellished with more specific matching to capture error numbers in tightly specific ranges. This feature allows highly targeted objectives allowing sophisticated forensic analysis and reporting, particularly when small details get lost in noisy log environments. Truncation of verbose event support Some events generated by Windows can be triggered with a high frequency and contain verbose information of repeated text which may not be of much interest to the audit subsystem. To reduce the load on the target servers, these events may be truncated at a specific point in the string text. This means the event is not discarded from an audit point of view, but reduces the amount of unnecessary message data across the network. An example of this is the Windows Logon event This occurs very regularly on a busy domain controller. Each of these messages contains a large event description which is repeated regularly (this example comes from an rsyslog logfile):
4 Feb 3 13:29:41 win08r2entx64.snare.ia#011mswineventlog#0111#011security# #011mon Feb 03 13:29: # #011Microsoft-Windows-Security-Auditing#011SNARE\WIN08R2ENTX64$#011N/A#011Success Audit#011win08r2entx64.Snare.ia#011Logon#011#011An account was successfully logged on. Subject: Security ID: S Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S Account Name: IN08R2ENTX64$ Account Domain: SNARE Logon ID: 0x403524c Logon GUID: {3D6A4CB3-AC1B-D5DD-363A -447C40BEBEB7} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: ::1 Source Port: Detailed Authentication Information: Logon Process: Kerberos Authentication Package: Kerberos Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon session is created. It is generated on the computer that was accessed. The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network). The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on. The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. As can be seen, this is a large amount of redundant information being stored in the audit server. By adding an entry to the Truncate List configuration as follows: results in the same log truncated from where the configured text This event is generated when a logon session is created begins. This event will now appear in the audit server as: Feb 3 13:38:09 win08r2entx64.snare.ia#011mswineventlog#0111#011security# #011mon Feb 03 13:37: # #011Microsoft-Windows-Security- Auditing#011SNARE\WIN08R2ENTX64$#011N/A#011Success Audit#011win08r2entx64.Snare.ia#011Logon#011#011An account was successfully logged on. Subject: Security ID: S Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S Account Name: IN08R2ENTX64$ Account Domain: SNARE Logon ID: 0x404e49f Logon GUID: {3D6A4CB3-AC1B-D5DD-363A -447C40BEBEB7} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: Source Network Address: ::1 Source Port: Detailed Authentication Information: Logon Process: Kerberos Authentication Package: Kerberos Transited Services: - Package Name (NTLM only): - Key Length: 0 <truncated 2524 bytes># Note the event now logs the number of bytes removed from the event entry. This feature can save substantial server resources including storage and cost where licenses charge per megabyte are in effect.
5 USB event support on Windows 08 platforms Tracking USB device connection/disconnection is difficult using only the Windows event log. Depending on the device in question, the events generated when activate varies widely in their number and amount of detail. A second mechanism has been implemented to complement the event logs. This registers the agent directly with the operating system so to be notified on the arrival and detach events for all USB devices. As some of these events are outside the Event Log system, they are flagged as Snare Generated in the resulting event message string. Apply Agent Settings through Group Policy In a large network environment, having large number of Snare agents with no Snare Agent Management Console(AMC) can sometimes be a difficult task to maintain and apply new settings on all agents. Snare for Windows makes the task of applying new settings much easier through group policy. Now network domain administrators can update the settings of Snare for Windows through Microsoft Group Policy Editor. The updated settings will be applied to Snare for Windows based upon Group Policy update preferences. Moreover, Snare for Windows supports two levels of group policies, i.e. Super Group Policy and Snare Agent Group Policy. Super group policy is useful when different types of Snare agents (Snare Epilog, Snare for Windows and Snare for MSSQL) are running on a network. Using super group policy, network domain administrators can update the settings of all types of Snare agents running on a network using Microsoft Group Policy Editor. For example, network domain administrators can use Microsoft Group Policy Editor to update all types of Snare agents on network to send the log to Snare Server running at on TCP port Once this super group policy is applied, all Snare agents will now send logs to Snare Server running at on TCP port Snare for Windows comes with Super Group Policy Administrative Template (ADM) (available upon request) that network domain administrators can use to update all major settings of all types of Snare agents running on the network. Figure 1 shows the updating of destination log servers using super group policy administrative template. Snare for Windows group policy is useful when there is a need to update the settings of all Snare for Windows running in a network. Unlike, super group policy, Snare for Windows group policy only updates the settings of all Snare for Windows. For example, network domain administrators can use Microsoft Group Policy Editor to update all Snare for Windows agents on network to send the log to Snare Server running at on TCP port Once this Snare for Windows group policy is applied, all Snare for Windows agents will now send logs to the Snare Server running at on TCP port Snare for Windows also comes with Snare for Windows Group Policy Administrative Template (ADM) (available upon request) that network domain administrators can use to update all settings of all Snare for Windows agents running on the network. Figure 1 also shows the updating of destination log servers using Snare for Windows group policy administrative template.
6 Figure 1: Update Snare Agents Network Settings through Agent Group Policy and Super Group Policy
7 Enhanced Event Throttling Snare for Windows v4.2 also comes with enhanced event throttling capabilities. It includes three useful settings in this regard, as shown in Figure 2. Figure 2: EPS Event Throttling Setting The EPS Rate Limit is a hard limit on the number of events sent by the agent per second to any destination server. For example, if EPS rate limit is set to 50 (as it is in Figure 2) then Snare for Windows will only send maximum 50 log messages in a second to any destination server. This EPS rate limit applies only to sending the events not capturing the events. The EPS rate limit settings are to help to reduce the load on slow network links or to reduce the impact on the destination servers during unexpected high event rates. For example, if a destination server goes down for system maintenance or due to an unexpected reason then all Snare for Windows agents running on the network build the cache of log messages (assuming that TCP has been configured) and as soon as destination server becomes available, all Snare for Windows agents will send log messages from their caches at a rate no faster than the EPS rate limit. If Notify on EPS Rate Limit option is selected then a message will be sent to the destination server(s) whenever Snare for Windows reaches the EPS rate limit. The message also include the EPS rate limit value. The frequency of EPS rate limit notifications can be controlled through 'EPS Notification Rate Limit' setting. For example, if EPS notification rate limit is set to 10 minutes then only one EPS notification message will be sent every 10 minutes to the destination server(s) regardless of how many times Snare for Windows reaches the EPS rate limit. Bug Fixes Resolved the issue with 'server status' on current events page that prevented server status information being displayed in some cases. Note: All Snare Servers communicating with this agent release should be updated to the patch version so the Agent Management Console (AMC) can take advantage of the new features described here.
8 Bug Fixes in Version There was an issue (specifically noted when agents GUI is running in Internet Explorer 10) that the GUI takes longer than usual to load, and may sometimes become non-responsive. Bug Fixes Version Fix truncate list delimiter being exported to server as a CRLF instead of a tab. Fix truncate list and rate limit parameters write to registry. Fix truncate list import from.inf file bug. Update MSI build procedure to be compatible with Windows 2012 R2, 32 and 64 bit architectures Fix install problem when existing binary is locked by operating system and unable to be overwritten with new version. Bug Fixes - Version Network resource leak An issue has been identified where the Snare Windows agents may grow in its usage of UDP ports on the host. The issue appears to be a timing one and related to the destination server not being reliable in some fashion. A network error had to be triggered along with an internal recheck of the agents configuration within a short time period to manifest in this way. The issue would only appear in some circumstances of load and network connectivity issues. The symptom would manifest as in growing number of sockets while it retried the destination connection and would result in the UDP sockets in most cases (and much lower chance of TCP port due to the TCP handshake) to grow. The issue could be caused by high latency/over a VPN, a bad link, a firewall packet issue, traffic shaping devices or the server having physical issues. Any of these options could trigger this behaviour. This issue seems to have mostly affected busy Domain Controllers and other high activity systems and has been seen on Windows 2003, 2008 and Windows 7 systems for the Snare for Windows agent. Any network based operation on the host may be affected along with the servers operation. If any of these symptoms are present then it is important that customers upgrade to prevent a possible outage or downtime of the system. This issue has only affected the Windows Agent versions 4.1.3, 4.1.4, 4.2.0, and 4.2.2; version resolves this issue. Open SSL library Update The OpenSSL library version used by the agents has been updated to 1.0.1g due to the recent Heartbleed vulnerability discovery. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. Client implementations using vulnerable versions (such as the agents) are exposed to minimal risk and have shown no signs of being vulnerable with testing. The SSL communications the agent uses to the server can not be hijacked to inject the Heartbleed payload and our Micro web server interface is not vulnerable. However IA believes keeping our software up to the recommended patch levels is very important so we have patched the software. This issue has only affected the Windows Agent versions 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.2.0, and where the SSL capabilities were added; version resolves this issue
SNARE Agent for Windows v 4.2.8 - Release Notes
SNARE Agent for Windows v 4.2.8 - Release Notes Snare is a program that facilitates the central collection and processing of the Windows Event Log information. All three primary event logs (Application,
Release Notes for Snare Windows Agent Release Notes for Snare Enterprise Agent Windows v4.2/4.3
Release Notes for Snare Enterprise Agent Windows v4.2/4.3 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for the Snare Enterprise Agent for
Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8
Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release
SNARE Agent for Windows v 4.0.2.2 - Release Notes
SNARE Agent for Windows v 4.0.2.2 - Release Notes Copyright (c) 2012 InterSect Alliance International Pty Ltd. Snare is a program that facilitates the central collection and processing of Windows NT/2000/XP/2003
Guide to Snare for Windows v4.2
Guide to Snare for Windows v4.2 Intersect Alliance Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct, or indirect damages
Guide to Snare for Windows for v4.2/4.3
Guide to Snare for Windows for v4.2/4.3 Intersect Alliance Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct, or indirect
Guide to Snare for Windows for version 4.1
Guide to Snare for Windows for version 4.1 Intersect Alliance Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct, or indirect
The Snare Agents Commercial or Open Source? - White Paper -
The Snare Agents Commercial or Open Source? - White Paper - A Prophecy International Company Introduction to Agents The SNARE agent is the industry standard for logging security events and is used with
Guide to SNARE for MSSQL v1.2
Guide to SNARE for MSSQL v1.2 1999-2013 Intersect Alliance Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct, or indirect
ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs
ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
Fifty Critical Alerts for Monitoring Windows Servers Best practices
Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite
User Guide to Snare Enterprise Agent for MSSQL v1.2
User Guide to Snare Enterprise Agent for v1.2 1999-2013 Intersect Alliance Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct,
User Guide to the Snare Agent Management Console in Snare Server v7.0
User Guide to the Snare Agent Management Console in Snare Server v7.0 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors
Packet Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Administration Guide ActivClient for Windows 6.2
Administration Guide ActivClient for Windows 6.2 ActivClient for Windows Administration Guide P 2 Table of Contents Chapter 1: Introduction....................................................................12
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Snare Agent Management Console User Guide to the Snare Agent Management Console in Snare Server v6
User Guide to the Snare Agent Management Console in Snare Server v6 InterSect Alliance International Pty Ltd Page 1 of 14 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
MAPI Connector Overview
The CommuniGate Pro Server can be used as a "service provider" for Microsoft Windows applications supporting the MAPI (Microsoft Messaging API). To use this service, a special Connector library (CommuniGate
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
NETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015
TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015 2201 Thurston Circle Bellevue, NE 68005 www.tigerpawsoftware.com Contents Tigerpaw Exchange Integrator Setup Guide v3.6.0... 1 Contents...
Agency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
Chapter 8 Monitoring and Logging
Chapter 8 Monitoring and Logging This chapter describes the SSL VPN Concentrator status information, logging, alerting and reporting features. It describes: SSL VPN Concentrator Status Active Users Event
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
IBM Security QRadar Version 7.2.2. WinCollect User Guide V7.2.2
IBM Security QRadar Version 7.2.2 WinCollect User Guide V7.2.2 Note Before using this information and the product that it supports, read the information in Notices on page 47. Product information This
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
DIGIPASS Authentication for Windows Logon Product Guide 1.1
DIGIPASS Authentication for Windows Logon Product Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions,
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
WhatsUp Event Alarm v10.x Listener Console User Guide
WhatsUp Event Alarm v10.x Listener Console User Guide Contents WhatsUp Event Alarm Listener Console Overview Firewall Considerations... 6 Using the WhatsUp Event Alarm Listener Console... 7 Event Alarm
How To Fix A Snare Server On A Linux Server On An Ubuntu 4.5.2 (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking
Snare System Version 6.3.5 Release Notes is pleased to announce the release of Snare Server Version 6.3.5. Snare Server Version 6.3.5 Bug Fixes: The Agent configuration retrieval functionality within the
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
Delegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Load Balancing & High Availability
Load Balancing & High Availability 0 Optimizing System Resources through Effective Load Balancing An IceWarp White Paper October 2008 www.icewarp.com 1 Background Every server is finite. Regardless of
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
K7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
Implementing and Managing Security for Network Communications
3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Using WhatsUp IP Address Manager 1.0
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies,
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
Adaptive Log Exporter Users Guide
IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States
Evaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000
800-782-3762 www.edgewave.com Welcome to EdgeWave Web Security! This short guide is intended to help administrators set up and test the iprism Web Filtering appliance for evaluation purposes. A more detailed
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Agent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
SyncLockStatus Evaluator s Guide
SyncLockStatus Evaluator s Guide 2011 Table of Contents Introduction... 2 System Requirements... 2 Required Microsoft Components... 2 Contact Information... 3 SyncLockStatus Architecture... 3 SyncLockStatus
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Docufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
Contents CHAPTER 1 IMail Utilities
Contents CHAPTER 1 IMail Utilities CHAPTER 2 Collaboration Duplicate Entry Remover... 2 CHAPTER 3 Disk Space Usage Reporter... 3 CHAPTER 4 Forward Finder... 4 CHAPTER 5 IMAP Copy Utility... 5 About IMAP
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
Chapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
Snare System Version 6.3.4 Release Notes
Snare System Version 6.3.4 Release Notes is pleased to announce the release of Snare Server Version 6.3.4. Snare Server Version 6.3.4 New Features The behaviour of the Snare Server reflector has been modified
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
Guide to Snare Epilog for Windows from v1.7
Guide to Snare Epilog for Windows from v1.7 Intersect Alliance Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct, or indirect
User's Guide. ControlPoint. Change Manager (Advanced Copy) SharePoint Migration. v. 4.0
User's Guide ControlPoint Change Manager (Advanced Copy) SharePoint Migration v. 4.0 Last Updated 7 August 2013 i Contents Preface 3 What's New in Version 4.0... 3 Components... 3 The ControlPoint Central
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
ANIXIS Password Reset
ANIXIS Password Reset Administrator s Guide V3.10 Copyright 2003-2015 ANIXIS. All rights reserved. ANIXIS, ANIXIS Password Reset, Password Policy Enforcer, PPE/Web, Password Policy Client, Password Policy
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
Connection and Printer Setup Guide
Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
Backup and Restore FAQ
Backup and Restore FAQ Topic 50210 Backup and Restore Web, Data, and Email Security Solutions 11-Mar-2014 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
SECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
StorageCraft ShadowStream User Guide StorageCraft Copyright Declaration
StorageCraft Copyright Declaration StorageCraft ImageManager, StorageCraft ShadowProtect, StorageCraft Cloud, and StorageCraft Cloud Services, together with any associated logos, are trademarks of StorageCraft
Vector HelpDesk - Administrator s Guide
Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Configuring and Maintaining Vector HelpDesk version 5.6 Vector HelpDesk - Administrator s Guide Copyright Vector Networks
Biznet GIO Cloud Connecting VM via Windows Remote Desktop
Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make
SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.
Frequently Asked Questions Secure Log Manager Last Update: 6/25/01 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
JapanCert 専 門 IT 認 証 試 験 問 題 集 提 供 者
JapanCert 専 門 IT 認 証 試 験 問 題 集 提 供 者 http://www.japancert.com 1 年 で 無 料 進 級 することに 提 供 する Exam : 70-643 Title : Windows Server 2008 Applications Infrastructure, Configuring Vendors : Microsoft Version :
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting
