GUIDE TO SYBASE SECURITY
|
|
|
- Dennis Jackson
- 10 years ago
- Views:
Transcription
1 GUIDE TO SYBASE SECURITY Company: Network Intelligence India Pvt. Ltd. Date: 31 st January 2003
2 Guide to Sybase Security Introduction: This article provides a detailed explanation of security for a Sybase database. The article has been written from the perspective of both security auditing and implementation. The queries and details given have been tested on Sybase Adaptive Server Enterprise 12.5 but will be valid for other versions as well. Sybase Server provides good security mechanisms, if configured properly. The security Architecture implemented by Sybase can be divided into five parts: 1. Dictionary Access Controls (DAC): This helps database administrators to give access to users at the object level. 2. Identification and Authentication controls: Ensures only authorized users have access to objects. 3. Division or Roles: The divisions are based on system and user level tasks. There is a special role, sa_role for Database and System Administration, and sso_role for Security Officer who is responsible for managing security of database. 4. Network based Security: Sybase provides protected Remote Authentication, encrypted transmission of data over networks, and message integrity. 5. Auditing: Sybase has very good auditing mechanisms. If configured to its potential it provides for excellent accountability. While carrying out the following tasks, you should have both sso_role and sa_role roles. Also, for all stored procedures use the master database by issuing the use master query. You may bunch all the queries into a single file called QueryFile.txt and issue the commands at one go. To save the output of the queries into an output file you may issue the following from the command line isql S ServerName U UserName i QueryFile.txt o Output.txt We cover the following topics within Sybase Security: General Server Security Database Configuration User Security Data Security Auditing Network Security
3 1. General Server Security 1.1 Operating System Check Check for permissions on the directory where Sybase is installed. Ensure only System Administrator has access to Sybase directory. Using regedt32 Check for permissions on Sybase Registry Keys on HKLM\Software\Sybase 1.2 Server Information To list Remote servers, Backup servers and other Servers on which this Adaptive Server can execute RPC, along with the server options: exec sp_helpserver In the above output check for the following parameters: Network password encryption: If "net password encryption" is true, the client-server authentication is done by encrypting passwords using the key supplied by server. If "net password encryption" is false, the client-server authentication takes place in plain text. Security mechanism: By default, "rpc security model A" is used, which does not provide security mechanisms such as encryption For securing network communication, the RPC security mechanism must be set to rpc security model B which provides various security services such as Mutual Authentication, Message Confidentiality via Encryption, and Message Integrity. To get information about the databases present on a particular server: exec sp_helpdb 1.3 Login Configuration Authentication Modes: Check which authentication mode is enabled: exec sp_loginconfig "login mode" If the value is: 0 Standard 1 Integrated 2 Mixed mode
4 Standard Authentication Mode: This is the default Authentication mode. Sybase uses its own database (the table syslogins in the master database) to authenticate users. Even a Windows NT/2000 Administrator cannot log into the Sybase Server if he has no valid login account in the Sybase server. Integrated Authentication Mode: In Integrated Authentication Mode, Sybase relies solely on Windows to authenticate users. Windows users or groups are then granted access to Sybase. Mixed Mode Authentication: In Mixed Mode, users are first authenticated by Windows Authentication and if the valid Windows account is not present, Sybase uses its own database i.e. the Standard Security mode to authenticate users who are authenticated by Sybase username-password pairs maintained within the Sybase Server. Default Login: exec sp_loginconfig "default account" Ensure that the value of the parameter DefaultLogin is not "sa". This parameter is used when Sybase is configured for Integrated Security mode. When the authorized user does not have any entry in syslogins table, Sybase allows him to enter with DefaultLogin's credentials. Therefore any authorized Windows Users will be became "sa", if DefaultLogin value is set to "sa". It should ideally be set to NULL or a low-privileged account. 1.4 Patch Levels The server must be kept updated with the latest patches. To get the detail of current version and patches applied: The latest patches can be downloaded from Some of the terminologies used for Sybase patches: EBF (Expedited Bug Fix or Emergency Bug Fix): this is similar to hotfixes for Windows. Sybase Team releases EBFs for the Bugs found in the software. Previously these were called SWR (Software Release). ESD (Electronic Software Delivery): these are similar to Service Packs. These are Roll Ups of EBF's that were made available for downloads. IR (Interim Release): These are Super Roll Ups of ESD's which also contain some of the Extra Features added to the Sybase Server. Note: You must apply the previous IR before applying latest ESD. Read the instructions carefully before applying patches
5 2. Database Configuration 2.1 General Database Parameters To get current configuration for the Sybase ASE Server: exec sp_configure Check for 'allow updates to system tables'. DBAs can write stored procedures to modify system tables if 'allow updates to system tables' is 'on'. Therefore it is the duty of System Security Officer to ensure this key is set to 'off'. exec sp_configure "allow updates to system tables" If the stored procedure has already been created to modify system tables, it is possible to execute this stored procedure even if the current value of 'allow updates to system tables' is set to 'off'. Therefore, it is very important to audit the list of stored procedures on the database. Check for the key 'allow resource limit', and ensure it is set to '1' exec sp_configure "allow resource limit" Sybase allows limiting of resources (number of rows to output, query processing time, and bulk inserts) used by a particular User or Application. This information is stored in the table sysresourcelimit. Malicious users can cause DoS attacks by executing a query, which takes long time to execute. Setting this key to '1' and making proper configurations for users and applications, it is possible to prevent such attacks. Ensure that system table 'syscomments' is protected exec sp_configure "select on syscomments.text" The system table syscomments contains the text of views, triggers, default table constraints, and procedures. This data is very critical and should be protected, by denying select permission on this table. By default, the value is set to '1', which allows select permission on this table. Ensure that this value is set to '0'. 2.2 Error Log Configuration Check if failed login attempts are logged to error logs exec sp_configure "log audit logon failure" Ensure this value is '1', which would log all failed login attempts to error logs in addition to the audit tables, which help in recording such critical intrusion attempts at two different places. If this value is '0', failed login attempts are not logged to error logs. Check if successful login attempts are logged to error logs exec sp_configure "log audit logon success" Ensure this value is '1'.
6 3. User Level Security 3.1 Group Details To get all groups present in the Particular Database use DBName exec sp_helpgroup To get a group-wise listing of users present in each Database (DBName) use DBName exec sp_helpgroup GroupName (Repeat this for each of the group names obtained from the previous query) 3.2 Role Details Check for Server Roles and User-defined roles present on server select name, password, pwdate, status from syssrvroles To obtain detailed information of each role: exec sp_displayroles "RoleName", expand_up (Note: Use expand_up and expand_down to get roles hierarchy) To get details about roles of a particular user exec sp_displayroles UserName, expand_down Check all roles without a password Sybase provides a mechanism where roles can be set to have passwords. This is a strong security mechanism, which prevents user from using these roles even if they are granted these roles. This facility can also be used to audit who had logged in with this role. So it is recommended to set passwords to these roles: select name from syssrvroles where password = NULL 3.3 User Details To get all users in particular database: exec sp_helpuser To get the hashed user passwords select name, password from syslogins To get detailed information about a particular user sp_displaylogin UserName
7 This will produce a lot of information about that user. We must check for the following parameters: Default login name The login name might be different from the user name. Default database Ensure that no user is assigned default database as master, since database master stores all system tables, no user should be given access to this database except to users who has sa_role and sso_role. Auto login script If Auto login script is set for any user, check this script in details and ensure it does not contain any malicious code. This script gets executed as soon as user logs into the server. Roles assigned In Sybase, privileges are assigned to roles and users are assigned these roles. Therefore, you must determine what privilege levels each user has. Whether this account locked If the account is locked, make a note and ask DBA for reason behind it. Last date of password change If the date for last password change is quite old, recommend changing of password for that user. Password expiration interval This is the maximum validity period for the user s password. Should be between 4 weeks to 6 weeks depending upon user s privileges and the criticality of the database. Whether password got expired? Whether the current password of the user is expired. This might mean that this is a user who has not logged in for quite some time. Minimum password length This must be set according to the organization s security policy. Anywhere from 6 upwards is a good value. Maximum failed logins Ensure that the maximum allowed failed login attempts is not more than 3. After 3 wrong attempts his account will be locked out. Current failed login attempts This is critical if the Maximum Failed Logins parameter has not been set. It will help you to determine if any accounts are being attacked.
8 To get information about the permissions assigned to users use DBName exec sp_helprotect Execute this query for each database. Note down those users who have important permissions. The WITH GRANT is a very critical permission, and you must ensure that only legitimate users have this permission. This permission allows the user to grant his permissions to other users, and it can create a loss of accountability. DELETE and UPDATE permissions should also be reviewed for users owning these. Any user can use permissions given to public. Hence ensure that the public account does not have DELETE and UPDATE permissions. 3.4 Additional User Security Checks The 'sa' login has super-user privileges on a Sybase server. Since this account is the primary target of all attackers, it should be protected with a strong password. There is a better way of securing the 'sa' account however. Remove all the important roles 'sa_role' and 'sso_role' from this account, so that even if this account gets compromised Sybase database is safe from malicious attacks. Instead grant these roles to only those logins who are responsible for database administration. Grant the 'sso_role' to user who has the responsibility of System Security Officer and the 'sa_role' to the DBA. Make sure to set passwords for these roles. Remove the user Guest from all databases except master and tempdb Set permissions to objects at the group level. 3.5 Password Parameters Check for System-wide password expiration interval This value will expire the password of the logins when the expiration interval is over. Ensure this value is between 2-3 weeks. '0' - Password does not expired 'n' - Password expires after specified 'n' number days. exec sp_configure "password expiration interval" Check if password contains at least one digit By setting this value to '1', Sybase enforces users to have at least one number in their password. This helps in preventing dictionary attacks to crack passwords. exec sp_configure "check password for digit" Check for the server wide minimum password length Minimum password length should be at least 8, which would make it difficult for users to choose easily guessable passwords. exec sp_configure "minimum password length"
9 Review the passwords of the following system accounts: User name Default Password Comments mon_user mon_user Default Monitor Server Account sybmail User defined Created when the Sybase Mail Service is installed dba SQL Created with Enterprise Portal Express Edition entldbdbo dbopswd Created with Database Access Control entldbreader rdrpswd Created with Database Access Control jagadmin NULL Password Created with Enterprise Portal Application Server PIAdmin PIAdmin Created with Enterprise Portal Application Server pkiuser pkipasswd Enterprise Portal PortalAdmin sybase Enterprise Portal pso 123qwe Enterprise Portal Delete system accounts, which are not required.
10 4. Data Level Security 4.1 Permissions Check for permissions on critical Tables, Procedures, Triggers use DBName exec sp_helprotect ObjectName This will output: 1. Who has what permissions 2. Type of permission depending on object 3. Whether the WITH GRANT Permission is set or not Review if any objects have permissions granted to group 'public'. 4.2 Stored Procedures List all extended stored procedures, which are stored in sybsysdatabase use sybsystemprocs select name from sysobjects where type='xp' Ensure that the extended stored procedure xp_cmdshell is removed. xp_cmdshell, is a very critical procedure which allows execution of Operating System commands. Default value for the security context of xp_cmdshell is 1, which requires user to have Windows NT account to execute OS commands, But once Sybase ASE gets compromised, the intruder can set security context of xp_cmdsell to 0, which allows Sybase to execute OS commands under the security context of Sybase windows NT account, thus your whole OS is at stake. So it is strongly recommended to remove this procedure. To drop this extended procedure: exec sp_dropextendedproc xp_cmdshell Note: Make sure to delete the sybsyesp.dll. If this.dll is not deleted, the DBA on the server can restore xp_cmdshell. However, if you need to keep this procedure then check who has permissions on xp_cmdshell: use sybsystemprocs exec sp_helprotect xp_cmdshell Check for other extended stored procedures like sendmail, fre , readmail, delet , startmail, stopmail. If you are not using the mailing facility provided by Sybase, it s recommended to remove these procedures and the mail account 'sybmail.
11 5. Auditing Sybase does not install the auditing facility by default. This must be installed in addition to the default installation. Sybase auditing tables and procedures are located in the sybsecurity database, which is created when Auditing is installed on the Server. Check if the Sybase inbuilt Auditing facility is installed or not by ensuring that the sybsecurity database exists. Sybase comes with full-featured inbuilt auditing mechanism. When installed Sybase stores the auditing configuration details and audit trail tables sysaudits_01-sysaudits_08 in sybsecurity. Check if Auditing is enabled/disabled use master exec sp_configure "auditing The following sections apply only if auditing has been installed and enabled. Check for number of auditing tables in sybsecurity database Sybase recommends using at least 2-3 tables for Auditing. So that if one gets filled up, others can be use instantaneously without loss of data. select count(*) from sysobjects where name like "sysaudits%" Check if thresholds are added for any audit table and what threshold procedures are associated with each of them. use sybsecurity exec sp_helpthreshold aud_seg1 Repeat this query for each audit table. The segment name for "sysaudits_01" is "aud_seg1", for "sysaudits_02" its "aud_seg2", and so on. Check if audit tables are archived or not It is recommended to archive the audit tables for investigating malicious activities. Determine the stored procedure associated with the particular audit table in the above query. This stored procedure gets executed when the table reaches its threshold limited. It is recommended that the SP should archive the audit table. Check for current audit table parameter use master exec sp_configure "current audit table" The output will be either an integer 'n' or '0'. Recommended value is '0', which indicates if the current audit table is full, Sybase will use the next audit table. Check for the parameter Suspend Audit when audit table is full. exec sp_configure "suspend audit when device full"
12 Ensure the value is "1", which will suspend auditing when all audit tables are full. This condition will arise only if the threshold procedures did not run successfully. However setting this value to "0" will truncate the current audit table and continue using it as the current audit table. Therefore if audit tables are to be archived and thresholds are used, keep this value to "1" Check for the key "audit queue size" and ensure it is set to large value (keep it roughly to '50') use master exec sp_configure "audit queue size" A trade-off has to be maintained between security and performance, while setting this key value. A lower value will increase frequency of writing from queue to audit tables at the cost of performance and a higher value will cost security problem if the system crashes for it will result in the loss of data from queue. Check for the current auditing options for the following important global settings: Logins - All login attempts Logouts - All logout attempts bcp - bulk copy event create - All create events like create table, procedure, view, trigger, etc. delete - Deleting of rows from tables and views. disk - execution of disk init, disk reinit, etc. drop - Drop events for database, tables, procedure, triggers, views, etc. dump - Dumping of database, transactions, etc. use sybsecurity exec sp_displayaudit Ensure that all these setting are turned "on". Check for failed logins attempts use sybsecurity select * from AuditTable where event =45 and eventmod =2 For event details in audit table refer to:
13 6. Network Level Security 6.1 Remote Server Information Check if Remote Server Access is allowed use master exec sp_configure "allow remote access" '1' - Remote access is allowed '0' - Remote access is not allowed If Remote access is allowed, check for the Remote User credentials and Network Security. This allows stored procedures on the local server to be run from a remote server through RPC. Check for the presence of trusted user exec sp_helpremoteserver Sybase allows trusted connection to be set up for remote logins such that they do not need to provide a password for connecting to the server. If such trusted connections are present investigate the credentials of those users. 6.2 Remote Access Mechanism Check for Security mechanism and Security Services provided by them select * from syssecmechs The table syssecmechs is not present by default, and gets created when queried for it. It contains the following columns: sec_mech_name Name of Security mechanism provided by the server available_service Security services provided by that mechanism. For instance, for Windows LAN Manager, the entries would be: sec_mech_name = NT LAN MANAGER available_service = unified login Review the libctl.cfg file, which contains information about Network driver, Security, Directory drivers and any required initialization information. Check the following parameters: 1. If LDAP passwords are encrypted 2. Security mechanisms: "dce" For the DCE security mechanism. "csfkrb5" "LIBSMSSP" Note: Location of libtcl.cfg: UNIX platforms: $SYBASE/config/ Desktop platforms: SYBASE_home\ini\ For the CyberSAFE Kerberos security mechanism. For Windows LAN Manager on Windows NT or Windows 95(clients only).
14 Check for parameter Unified login required exec sp_configure "unified login required" Ensure it is set to '1', if Network security is enabled. Setting it to '0', will allow traditional user-password logins to ASE as well as trusted connections, which would nullify our efforts of putting network security.
Adaptive Server Enterprise
Security Administration Guide Adaptive Server Enterprise 15.7 ESD #2 DOCUMENT ID: DC01672-01-1572-02 LAST REVISED: August 2012 Copyright 2012 by Sybase, Inc. All rights reserved. This publication pertains
NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a
NNT CIS Microsoft SQL Server 2008R2 Database Engine Level 1 Benchmark Report 0514a: WIN- 2LR8M18J6A1 On WIN-2LR8M18J6A1 - By admin for time period 6/10/2014 8:59:44 AM to 6/10/2014 8:59:44 AM NNT CIS Microsoft
Adaptive Server Enterprise
System Administration Guide: Volume 1 Adaptive Server Enterprise 15.7 DOCUMENT ID: DC31654-01-1570-01 LAST REVISED: September 2011 Copyright 2011 by Sybase, Inc. All rights reserved. This publication pertains
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
General DBA Best Practices
General DBA Best Practices An Accelerated Technology Laboratories, Inc. White Paper 496 Holly Grove School Road West End, NC 27376 1 (800) 565-LIMS (5467) / 1 (910) 673-8165 1 (910) 673-8166 (FAX) E-mail:
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Adaptive Server Enterprise
Configuration Guide Adaptive Server Enterprise 15.7 [ Windows ] DOCUMENT ID: DC38421-01-1570-01 LAST REVISED: September 2011 Copyright 2011 by Sybase, Inc. All rights reserved. This publication pertains
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Microsoft SQL Server Security & Auditing. March 23, 2011 ISACA Chapter Meeting
Microsoft SQL Server Security & Auditing March 23, 2011 ISACA Chapter Meeting Agenda Introduction SQL Server Product Description SQL Security Basics Security System Views Evolution of Tool Set for Auditing
SQL Server Hardening
Considerations, page 1 SQL Server 2008 R2 Security Considerations, page 4 Considerations Top SQL Hardening Considerations Top SQL Hardening considerations: 1 Do not install SQL Server on an Active Directory
SQL Server 2008 Administration
SQL Server 2008 Administration Real World Skills for ITP Certification and Beyond Tom Carpenter WILEY Wiley Publishing, Inc. Contents Introduction xxi Part i Introducing SQL Server 2008 1 Chapter 1 Understanding
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Use of Commercial Backup Software with Juris (Juris 2.x w/msde)
Use of Commercial Backup Software with Juris (Juris 2.x w/msde) Juris databases hosted on a Microsoft SQL Server 2000 Desktop Engine (MSDE) instance can be backed up manually through the Juris Management
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
PUBLIC Installation: SAP Mobile Platform Server for Linux
SAP Mobile Platform 3.0 SP11 Document Version: 1.0 2016-06-09 PUBLIC Content 1.... 4 2 Planning the Landscape....5 2.1 Installation Worksheets....6 3 Installing SAP Mobile Platform Server....9 3.1 Acquiring
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Division of IT Security Best Practices for Database Management Systems
Division of IT Security Best Practices for Database Management Systems 1. Protect Sensitive Data 1.1. Label objects containing or having dedicated access to sensitive data. 1.1.1. All new SCHEMA/DATABASES
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
Getting to Know the SQL Server Management Studio
HOUR 3 Getting to Know the SQL Server Management Studio The Microsoft SQL Server Management Studio Express is the new interface that Microsoft has provided for management of your SQL Server database. It
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
Introduction to IT Security
Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 30 November 2015 Marek Rychly ES, 30 November
Adaptive Server Enterprise
Using Sybase Failover in a High Availability System Adaptive Server Enterprise 15.7 DOCUMENT ID: DC00356-01-1570-02 LAST REVISED: Feburary 2012 Copyright 2012 by Sybase, Inc. All rights reserved. This
SQL Backup and Restore using CDP
CDP SQL Backup and Restore using CDP Table of Contents Table of Contents... 1 Introduction... 2 Supported Platforms... 2 SQL Server Connection... 2 Figure 1: CDP Interface with the SQL Server... 3 SQL
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Database Auditing - 1 - Report submitted by: D. Murali Krishna - 200505017 S.M Siva Rama Krishna - 200505015
- 1 - Database Auditing Report submitted by: D. Murali Krishna - 200505017 S.M Siva Rama Krishna - 200505015 Course : Information Security Audit and Assurance Faculty : Prof. Bruhadeshwar - 2 - Contents:
Microsoft SQL Server Security Best Practices
Microsoft SQL Server Security Best Practices This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL Server.
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
Sybase ASE Linux Installation Guide Installation and getting started guide for SAP Sybase ASE on Linux
Sybase ASE Linux Installation Guide Installation and getting started guide for SAP Sybase ASE on Linux www.sap.com TABLE OF CONTENTS INSTALLING ADAPTIVE SERVER... 3 Installing Adaptive Server with the
84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff
84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff This article is designed to provide security administrators with a security checklist for going live with Windows NT.
MS SQL Server Backup - User Guide
MS SQL Server Backup - User Guide TABLE OF CONTENTS Introduction... 1 Features... 1 System Requirements... 1 MS SQL Server Backup... 2 Accessing SQL Server Backup... 2 MS SQL Server Restore... 6 Accessing
Admin Report Kit for Active Directory
Admin Report Kit for Active Directory Reporting tool for Microsoft Active Directory Enterprise Product Overview Admin Report Kit for Active Directory (ARKAD) is a powerful reporting solution for the Microsoft
System Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
Manage Your Shop with Policy Based Management & Central Management Server
Manage Your Shop with Policy Based Management & Central Management Server Ryan Adams Blog - http://ryanjadams.com Twitter - @ryanjadams Email [email protected] Objectives CMS Configuration CMS Import
PRECISION v16.0 MSSQL Database. Installation Guide. Page 1 of 45
Installation Guide PRECISION v16.0 MSSQL Database Page 1 of 45 2015 Precision Software, a division of QAD Inc. Precision Software products are copyrighted and all rights are reserved by Precision Software,
SQL Server Hardening
Considerations, page 1 SQL Server 2008 R2 Security Considerations, page 3 Considerations Top SQL Hardening Considerations Top SQL Hardening considerations: 1 Do not install SQL Server on an Active Directory
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
SEER Enterprise Shared Database Administrator s Guide
SEER Enterprise Shared Database Administrator s Guide SEER for Software Release 8.2 SEER for IT Release 2.2 SEER for Hardware Release 7.3 March 2016 Galorath Incorporated Proprietary 1. INTRODUCTION...
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
D50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
TROUBLESHOOTING GUIDE
Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,
How To Restore An Org Server With Anor Backup For Windows 7.5.2 (Oracle)
Oracle Server Backup User Guide TABLE OF CONTENTS Introduction... 2 Oracle Server Backup... 3 Features... 3 Requirements for Oracle server backup... 3 How to enable ARCHIVELOG Mode... 3 System Requirements...
imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000
English imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000 Version 1.0.1 731-01873A-EN Contents Overview... 1 Network... 2 Network Environments...2
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
CA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Sybase Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Mitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
Oracle Database 11g: Security. What you will learn:
Oracle Database 11g: Security What you will learn: In Oracle Database 11g: Security course students learn how they can use Oracle database features to meet the security, privacy and compliance requirements
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
ADO and SQL Server Security
ADO and SQL Server Security Security is a growing concern in the Internet/intranet development community. It is a constant trade off between access to services and data, and protection of those services
$99.95 per user. SQL Server 2005 Database Administration CourseId: 152 Skill level: 200-500 Run Time: 30+ hours (158 videos)
Course Description This popular LearnItFirst.com course is a soup-to-nuts course that will teach you how to choose your edition, install, configure and manage any edition of. You ll learn the details of
Web. Security Options Comparison
Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.
9. Database Management Utility
Overview 9.1 Overview 9. Database Management Utility The Compass2.0 database contains information about configuration details for the intrusion control panel. It is essential that a backup of the information
Microsoft SQL Server Staging
Unified ICM requires that you install Microsoft SQL Server on each server that hosts a Logger or Administration & Data Server (Real Time Distributor and HDS only) component. Microsoft SQL Server efficiently
How To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
C p o y p r y i r g i h g t D t e a t i a lie l d
of EISOO AnyBackup Appliance Copyright 2003-2012 EISOO Software Co.,Ltd. No company or individual are allowed to copy, distribute and extract all or parts of this document without the permission of EISOO
ClockWork Enterprise 5
ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork
s@lm@n Microsoft Exam MB2-702 Microsoft Dynamics CRM 2013 Deployment Version: 6.1 [ Total Questions: 90 ]
s@lm@n Microsoft Exam MB2-702 Microsoft Dynamics CRM 2013 Deployment Version: 6.1 [ Total Questions: 90 ] Question No : 1 You install Microsoft Dynamics CRM on-premises. The Microsoft Dynamics CRM environment
Windows Server 2008/2012 Server Hardening
Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible
Database Fundamentals
Database Fundamentals A article about database maintenance in Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org October 2006 Table of Contents Introduction... 3 Microsoft
Database Maintenance Guide
Database Maintenance Guide Medtech Evolution - Document Version 5 Last Modified on: February 26th 2015 (February 2015) This documentation contains important information for all Medtech Evolution users
LockoutGuard v1.2 Documentation
LockoutGuard v1.2 Documentation (The following graphics are screen shots from Microsoft ISA Server and Threat Management Gateway which are the property of Microsoft Corp. and are included here for instructive
Oracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
Features of AnyShare
of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...
Chancery SMS 7.5.0 Database Split
TECHNICAL BULLETIN Microsoft SQL Server replication... 1 Transactional replication... 2 Preparing to set up replication... 3 Setting up replication... 4 Quick Reference...11, 2009 Pearson Education, Inc.
Defense In-Depth to Achieve Unbreakable Database Security
Defense In-Depth to Achieve Unbreakable Database Security Qiang Lin, Ph.D Abstract Enterprises realize that sole reliance on generic security mechanisms does not provide the protection they need for their
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
STIDistrict Server Replacement
STIDistrict Server Replacement Major Steps Defined This document addresses how to migrate data and applications from an existing STIDistrict (SQL) Server to a new machine. There will be 8 major steps:
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
CERN, Information Technology Department [email protected]
Identity Management Alberto Pace CERN, Information Technology Department [email protected] Computer Security The present of computer security Bugs, Vulnerabilities, Known exploits, Patches Desktop Management
Objectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.
Frequently Asked Questions Secure Log Manager Last Update: 6/25/01 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed
CA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Sybase Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
VeriCentre 3.0 Upgrade Pre-Installation and Post Installation Guidelines
VeriCentre 3.0 Upgrade Pre-Installation and Post Installation Guidelines * For actual installation steps, please refer to the VeriCentre 3.0 Installation guide that came with the VeriCentre 3.0 software.
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft SQL Server Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event Source: SQL Server Versions:
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
Published. Technical Bulletin: Use and Configuration of Quanterix Database Backup Scripts 1. PURPOSE 2. REFERENCES 3.
Technical Bulletin: Use and Configuration of Quanterix Database Document No: Page 1 of 11 1. PURPOSE Quanterix can provide a set of scripts that can be used to perform full database backups, partial database
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
VMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
BSDI Advanced Fitness & Wellness Software
BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
70-444 PRO: Optimizing and Maintaining a Database Administration Solution by Using Microsoft SQL Server 2005. Practice Test. Version 2.
Microsoft 70-444 70-444 PRO: Optimizing and Maintaining a Database Administration Solution by Using Microsoft SQL Server 2005 Practice Test Version 2.7 QUESTION NO: 1 Microsoft 70-444: Practice Exam You
Hunting flaws in Microsoft SQL Server
Hunting flaws in Microsoft SQL Server Cesar Cerrudo Independant Security Researcher Aaron Newman CTO/Founder, Application Security, Inc. www.appsecinc.com 1 Outline Collecting passwords Elevating privileges
SQL Server Hardening
Considerations, page 1 SQL Server 2008 R2 Security Considerations, page 4 Considerations Top SQL Hardening Considerations Top SQL Hardening considerations: 1 Do not install SQL Server on an Active Directory
