Patch Management Integration
|
|
|
- Emerald Warner
- 10 years ago
- Views:
Transcription
1 Patch Management Integration January 10, 2012 (Revision 5) Copyright Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered trademarks of Tenable Network Security, Inc. Tenable, the Tenable logo, the Nessus logo, and/or other Tenable products referenced herein are trademarks of Tenable Network Security, Inc., and may be registered in certain jurisdictions. All other product names, company names, marks, logos, and symbols may be the trademarks of their respective owners. Tenable Network Security, Inc Columbia Gateway Drive, Suite 100, Columbia, MD
2 Table of Contents Overview... 3 Scanning With Multiple Patch Managers... 3 WSUS Creating the Policies... 3 General... 4 Credentials... 4 Plugins... 4 Preferences... 5 SCCM Creating the Policies... 8 General... 8 Credentials... 9 Plugins... 9 Preferences...10 VMware Go Creating the Policies...11 General...11 Credentials...12 Plugins...12 Preferences...13 Red Hat Network Satellite...15 Creating the Policies...15 General...15 Credentials...16 Plugins...16 Preferences...17 About Tenable Network Security...20 Copyright Tenable Network Security, Inc. 2
3 OVERVIEW Tenable s Unified Security Monitoring (USM) product suite provides great flexibility in scanning methods to better serve our customers varying scanning requirements and restrictions. Customers can perform passive scanning, active network scans, or scan with credentials for more accurate results with less network bandwidth utilization. Nessus and SecurityCenter now leverage credentials for the WSUS, SCCM, and VMware Go (formerly Shavlik) patch management systems to perform patch auditing on systems for which credentials may not be available to the Nessus scanner. IT administrators are expected to manage the patch monitoring software themselves and install any agents required by the patch management system on their systems. SCANNING WITH MULTIPLE PATCH MANAGERS If multiple sets of credentials are supplied to Nessus for patch management tools, Nessus will not use all of them. Based on the credentials supplied, Nessus will use the first one available in the following order: 1. Credentials supplied to directly authenticate to the target 2. VMware Go (formerly Shavlik) 3. WSUS 4. SCCM WSUS Windows Server Update Services (WSUS) is available from Microsoft to manage the distribution of updates and hotfixes for Microsoft products. Nessus and SecurityCenter have the ability to query WSUS to verify whether or not patches are installed on systems managed by WSUS and display the patch information through the Nessus or SecurityCenter GUI. > If the credential check sees a system but it is unable to authenticate against the system, it will use the data obtained from the patch management system to perform the check. If Nessus is able to connect to the target system, it will perform checks on that system and ignore WSUS output. > The data returned to Nessus by WSUS is only as current as the most recent data that the WSUS server has obtained from its managed hosts. WSUS scanning is performed using two Nessus plugins: > wsus_init_info.nbin (Plugin ID 57031) > wsus_get_missing_updates.nbin (Plugin ID 57032) CREATING THE POLICIES From the Nessus or SecurityCenter web interface, click the Policies tab and then Add. Directions for each tab under the Add Policy menu are described in this section. Copyright Tenable Network Security, Inc. 3
4 General If WSUS patch management scans are run as part of a normal scan or SMB scan, all port scanning settings can be configured as they would in a typical scan policy. Credentials Because Nessus does not rely on the system being managed by WSUS to report patch management issues, credentials for the target systems do not need to be used in the scan policy. Plugins At least three specific plugins must be enabled for the WSUS patch management scans to run. These plugins can easily be found by searching for WSUS or Patch Management on the plugin filtering configuration page: Copyright Tenable Network Security, Inc. 4
5 Patch Management: WSUS Server Settings Patch Management: Missing updates from WSUS Windows : Microsoft Bulletins Preferences Credentials for the WSUS server must be provided for WSUS scanning to work properly. Credential Description WSUS Server WSUS IP address or system name WSUS Port Port WSUS is running on (Typically TCP 80 or 443) WSUS Username WSUS admin username WSUS Password WSUS admin password In the Preferences pane, select Patch Management: WSUS Server Settings from the Plugin drop-down menu: Copyright Tenable Network Security, Inc. 5
6 Copyright Tenable Network Security, Inc. 6
7 Copyright Tenable Network Security, Inc. 7
8 SCCM System Center Configuration Manager (SCCM) is available from Microsoft to manage large groups of Windows-based systems. Nessus has the ability to query SCCM to verify whether or not patches are installed on systems managed by SCCM and display the patch information through the Nessus or SecurityCenter GUI. > If the credentialed check sees a system but it is unable to authenticate against the system, it will use the data obtained from the patch management system to perform the check. If Nessus is able to connect to the target system, it will perform checks on that system and ignore SCCM output. > The data returned by SCCM is only as current as the most recent data that the SCCM server has obtained from its managed hosts. SCCM scanning is performed using two Nessus plugins: > sccm_init_info.nbin (Plugin ID 57029) > sccm_get_missing_updates.nbin (Plugin ID 57030) CREATING THE POLICIES From the Nessus or SecurityCenter web interface, click the Policies tab and then Add. Directions for each tab under the Add Policy menu are described in this section. General If SCCM patch management scans are run as part of a normal scan or SMB scan, all port scanning settings can be configured as they would in a typical scan policy. Copyright Tenable Network Security, Inc. 8
9 Credentials Because Nessus scans do not rely on the system being managed by SCCM to report patch management issues, credentials for the target systems do not need to be used in the scan policy. Plugins At least three specific plugins must be enabled for the SCCM patch management scans to run. These plugins can easily be found by searching for SCCM or Patch Management on the plugin filtering configuration page: Patch Management: SCCM Server Settings Patch Management: Missing updates from SCCM Copyright Tenable Network Security, Inc. 9
10 Windows : Microsoft Bulletins Preferences Credentials for the SCCM server must be provided for SCCM scanning to work properly. Credential Description SCCM Server SCCM IP address or system name SCCM Domain The domain the SCCM server is a part of SCCM Username SCCM admin username SCCM Password SCCM admin password In the Preferences pane, select Patch Management: SCCM Server Settings from the Plugin drop-down menu: Copyright Tenable Network Security, Inc. 10
11 VMWARE GO VMware Go (formerly known as Shavlik) is a cloud-based service that checks the patch compliance status of an organization s systems. Nessus and SecurityCenter have the ability to query VMware Go to verify whether or not patches are installed on systems managed by VMware Go and display the patch information through the Nessus or SecurityCenter GUI. > The VMware Go plugin never makes a direct connection to the target system; it instead connects to the VMware Go server specified to query the host about patch status. > Outbound access to the VMware Go management server is required. > SMB credentials are given priority; VMware Go is not used on a host when a valid SMB account is given. > The organization using VMware Go is responsible for installing the VMware Go agents on their hosts. > The data returned to Nessus by VMware Go is only as current as the most recent data that the VMware Go. VMware Go scanning is performed using three Nessus plugins: > shavlik_settings.nbin (Plugin ID: 57026) > shavlik_host_info.nbin (Plugin ID 57027) > shavlik_missing_patches.nbin (Plugin ID 57028) CREATING THE POLICIES From the Nessus or SecurityCenter web interface, click the Policies tab and then Add. Directions for each tab under the Add Policy menu are described in this section. General If VMware Go patch management scans are run as part of a normal scan or SMB scan, all port scanning settings can be configured as they would in a typical scan policy. Copyright Tenable Network Security, Inc. 11
12 Credentials Because VMware Go scans do not rely on the system being managed to report patch management issues, credentials for the systems do not need to be used in the scan policy. Plugins Make sure the plugin Patch Management: VMware Go Server Settings is selected under Plugins -> Families -> Settings : Patch Management: VMware Go Server Settings Copyright Tenable Network Security, Inc. 12
13 Patch Management: Missing updates from VMware Go Preferences Credentials for the VMware Go server must be provided for scanning to work properly. Credential Description VMware Go Server VMware Go Domain VMware Go Username VMware Go IP address or system name The VMware cloud-specified domain the VMware Go server is a part of VMware Go admin username VMware Go Password VMware Go admin password In the Preferences pane, select Patch Management: VMware Go Server Settings from the Plugin drop-down menu: Copyright Tenable Network Security, Inc. 13
14 The following settings pane will be displayed: Once valid VMware Go credentials have been provided, any of the standard Windows checks will produce output similar to the following: Copyright Tenable Network Security, Inc. 14
15 RED HAT NETWORK SATELLITE Red Hat Satellite is a systems management platform for Linux-based systems. Nessus and SecurityCenter have the ability to query Satellite to verify whether or not patches are installed on systems managed by Satellite and display the patch information through the Nessus or SecurityCenter GUI. Although not supported by Tenable, the RHN Satellite plugin will also work with Spacewalk Server, the Open Source Upstream Version of Red Hat Satellite. Spacewalk has the capability of managing distributions based on Red Hat (RHEL, CentOS, Fedora) and SuSE. Tenable supports the Satellite server for Red Hat Enterprise Linux. > If the credential check sees a system but it is unable to authenticate against the system, it will use the data obtained from the patch management system to perform the check. If Nessus is able to connect to the target system, it will perform checks on that system and ignore RHN Satellite output. > The data returned to Nessus by RHN Satellite is only as current as the most recent data that the Satellite server has obtained from its managed hosts. Satellite scanning is performed using two Nessus plugins: > satellite_settings.nbin (Plugin ID 57063) > satellite_get_managed_hosts.nbin (Plugin ID 57064) > satellite_get_packages.nbin (Plugin ID 57065) > satellite_get_schedule.nbin (Plugin ID 57066) > satellite_get_system_info.nbin (Plugin ID 57067) CREATING THE POLICIES From the Nessus or SecurityCenter web interface, click the Policies tab and then Add. Directions for each tab under the Add Policy menu are described in this section. General If RHN Satellite patch management scans are run as part of a normal scan, all port scanning settings can be configured as they would in a typical scan policy. Copyright Tenable Network Security, Inc. 15
16 Credentials Because RHN Satellite scans do not rely on the system being managed to report patch management issues, credentials for the systems do not need to be used in the scan policy. Plugins Make sure the following plugins are enabled under Plugins -> Families -> Settings : > Patch Management: Red Hat Satellite Server Get Installed Packages > Patch Management: Red Hat Satellite Server Get System > Patch Management: Red Hat Satellite Server Settings Copyright Tenable Network Security, Inc. 16
17 In addition, enable the local operating system security check plugins of your choice. Nessus currently supports Red Hat Enterprise Server, Fedora, OpenSuSE, and CentOS in conjunction with the Red Hat Satellite Server plugins: Preferences Credentials for the RHN Satellite server must be provided for scanning to work properly. Credential Description Copyright Tenable Network Security, Inc. 17
18 Red Hat Satellite server(s) Red Hat Satellite port(s) Red Hat Satellite username(s) Red Hat Satellite password(s) RHN Satellite IP address or system name Port Satellite is running on (Typically TCP 80 or 443) Satellite username Satellite password In the Preferences pane, select Patch Management: Red Hat Satellite Server Settings from the Plugin drop-down menu: Enter the host, port, user, and password for your Satellite server: Run the scan. The results of the scan will show which local checks fired: Copyright Tenable Network Security, Inc. 18
19 Copyright Tenable Network Security, Inc. 19
20 ABOUT TENABLE NETWORK SECURITY Tenable Network Security, the leader in Unified Security Monitoring, is the source of the Nessus vulnerability scanner and the creator of enterprise-class, agentless solutions for the continuous monitoring of vulnerabilities, configuration weaknesses, data leakage, log management and compromise detection to help ensure network security and FDCC, FISMA, SANS CAG and PCI compliance. Tenable s award-winning products are utilized by many Global 2000 organizations and Government agencies to proactively minimize network risk. For more information, please visit Tenable Network Security, Inc Columbia Gateway Drive Suite 100 Columbia, MD Copyright Tenable Network Security, Inc. 20
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
3D Tool 2.0 Quick Start Guide
www.tenable.com [email protected] 3D Tool 2.0 Quick Start Guide ABOUT THE 3D TOOL Tenable s 3D Tool is a Windows application that is used to query data from a SecurityCenter 4 server and present it in
Log Correlation Engine Backup Strategy
Log Correlation Engine Backup Strategy August 10, 2012 (Revision 1) Copyright 2002-2012 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered trademarks of
May 11, 2011. (Revision 10)
Blended Security Assessments Combining Active, Passive and Host Assessment Techniques May 11, 2011 (Revision 10) Renaud Deraison Director of Research Ron Gula Chief Technology Officer Copyright 2011. Tenable
April 11, 2011. (Revision 2)
Passive Vulnerability Scanning Overview April 11, 2011 (Revision 2) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of
Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12)
Nessus and Mobile Device Scanning November 7, 2014 (Revision 12) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 Scanning for Mobile Devices with Nessus... 4 Creating a
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments
Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments Introduction Server virtualization and private cloud services offer compelling benefits, including hardware consolidation,
Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)
Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning
Nessus Enterprise for Amazon Web Services (AWS) Installation and Configuration Guide. July 16, 2014 (Revision 2)
Nessus Enterprise for Amazon Web Services (AWS) Installation and Configuration Guide July 16, 2014 (Revision 2) Table of Contents Introduction... 3 Requirements... 3 Standards and Conventions... 3 Nessus
Tenable for CyberArk
HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system
Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)
Configuring Virtual Switches for Use with PVS February 7, 2014 (Revision 1) Table of Contents Introduction... 3 Basic PVS VM Configuration... 3 Platforms... 3 VMware ESXi 5.5... 3 Configure the ESX Management
Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)
Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Perimeter Service... 3 Subscription and Activation... 3 Multi Scanner Support...
Nessus Agents. October 2015
Nessus Agents October 2015 Table of Contents Introduction... 3 What Are Nessus Agents?... 3 Scanning... 4 Results... 6 Conclusion... 6 About Tenable Network Security... 6 2 Introduction Today s changing
How to Add, Deactivate, or Edit a Contact
How to Add, Deactivate, or Edit a Contact Add Contact (Add account option only available to the Primary Contact for the account) 1. Log in to the Tenable Support Portal with authorized credentials: https://support.tenable.com/
SYSTEM DEPLOYMENT & SECURITY AUDITING WITH RHN SATELLITE & NESSUS
SYSTEM DEPLOYMENT & SECURITY AUDITING WITH RHN SATELLITE & NESSUS Akash Chandrashekar Senior Solution Architect, Red Hat Lee Kinser Solution Architect, Red Hat Jack Daniel Technical Product Manager, Tenable
Nessus Credential Checks for Unix and Windows
Nessus Credential Checks for Unix and Windows June 15, 2011 (Revision 25) Copyright 2002-2011 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered trademarks
Nessus Cloud User Registration
Nessus Cloud User Registration Create Your Tenable Nessus Cloud Account 1. Click on the provided URL to create your account. If the link does not work, please cut and paste the entire URL into your browser.
IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
SecurityCenter 4.4 Administration Guide
SecurityCenter 4.4 Administration Guide September 18, 2012 (Revision 3) The newest version of this document is available at the following URL: http://static.tenable.com/prod_docs/securitycenter_4.4_admin_guide.pdf
June 8, 2011. (Revision 1)
Unified Security Monitoring Best Practices June 8, 2011 (Revision 1) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of
Real-Time Auditing for SANS Consensus Audit Guidelines
Real-Time Auditing for SANS Consensus Audit Guidelines Leveraging Asset-Based Configuration and Vulnerability Analysis with Real-Time Event Management July 31, 2012 (Revision 6) Ron Gula Chief Executive
CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY
CONQUERING COMPLIANCE ISSUES WITH RHN SATELLITE AND TENABLE NESSUS SECURITY Akash Chandrashekar - Solution Architect, Red Hat Renaud Deraison - Tenable Network Security, Inc. / Nessus.org Compliance Issues
4. Getting started: Performing an audit
4. Getting started: Performing an audit Introduction Security scans enable systems administrators to identify and assess possible risks within a network. Through GFI LANguard N.S.S. this is performed automatically,
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM
IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
SecurityCenter 4.2 Administration Guide
SecurityCenter 4.2 Administration Guide January 24, 2012 (Revision 5) The newest version of this document is available at the following URL: http://static.tenable.com/prod_docs/securitycenter_4.2_admin_guide.pdf
Qualys PC/SCAP Auditor
Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS
SecurityCenter 5.1 with Nessus Agent Support. October 22, 2015
SecurityCenter 5.1 with Nessus Agent Support October 22, 2015 Table of Contents Introduction... 3 Adding an Agent Repository... 6 Add Agent Scans and Import Agent Scan Results... 7 Tips and Tricks... 8
Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1)
Network Infrastructure Is Not Immune Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1) Table of Contents Executive Summary... 3 Network
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Tenable Network Security Support Portal. January 12, 2015 (Revision 14)
Tenable Network Security Support Portal January 12, 2015 (Revision 14) Table of Contents Introduction... 3 Activate Tenable Support Portal... 3 Locate Your Customer ID... 6 Manage Your Activation Codes...
VULNERABILITY MANAGEMENT
Vulnerability Management (VM) software differ in the richness of reporting, and the capabilities for application and security configuration assessment. Companies must consider how a VM technology will
Shavlik Patch for Microsoft System Center
Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This
Managing Vulnerability Assessment
Security Threat Response Manager Release 2012.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-12 Copyright Notice Copyright 2013
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
Nessus 5.0 Flash User Guide. April 22, 2013 (Revision 23)
Nessus 5.0 Flash User Guide April 22, 2013 (Revision 23) Table of Contents Introduction... 3 Standards and Conventions... 3 Nessus UI Overview... 3 Description... 3 Supported Platforms... 4 Installation...
How To Run The Nessus 6 Vulnerability Scanner On A Pc Or Mac Or Linux (For A Non-Procedure) On A Microsoft Mac Or Pc Or Linux On A Mac Or Mac (For An Unprocedured Pc Or
Nessus v6 Command Line Reference November 26, 2014 (Revision 2) Table of Contents Introduction... 3 Standards and Conventions... 3 Nessus Command Line... 3 Overview and Basic Usage... 3 Nessus Command
SSL: A False Sense of Security? How the Tenable Solution Restores SSL Effectiveness and Mitigates Related Threats
SSL: A False Sense of Security? How the Tenable Solution Restores SSL Effectiveness and Mitigates Related Threats White Paper Copyright 2002-2012 Tenable Network Security, Inc. Tenable Network Security,
Setting Up Sharp MX-Color Imagers To Scan To Email
Setting Up Sharp MX-Color Imagers To Scan To Email MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, MX-M850, MX-M950, MX-M1100 Step 1. Click Start > Run
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide RSA Authentication Manager and User Credential Manager Last Modified: Friday, March 13, 2015 Event Source Product Information: Vendor: RSA, The
QuickStart Guide for Managing Computers. Version 9.2
QuickStart Guide for Managing Computers Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
Blended Security Assessments
Blended Security Assessments Combining Active, Passive and Host Assessment Techniques October 12, 2009 (Revision 9) Renaud Deraison Director of Research Ron Gula Chief Technology Officer Table of Contents
Log Correlation Engine 4.6 Quick Start Guide. January 25, 2016 (Revision 2)
Log Correlation Engine 4.6 Quick Start Guide January 25, 2016 (Revision 2) Table of Contents Introduction... 4 Standards and Conventions... 4 Product Overview... 4 Prerequisites... 4 LCE Quick Start...
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
SecureAnywhereTM Web Security Service
SecureAnywhereTM Web Security Service This document provides a general overview of the Webroot SecureAnywhere Web Security Service Partner Management Portal. Webroot Partners such as Managed Service Providers
Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016
Version 2.0 April 2016 Folder Proxy + OWA + ECP/EAC Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
SecurityCenter 4.4 Architecture
SecurityCenter 4.4 Architecture September 21, 2012 (Revision 2) The newest version of this document is available at the following URL: http://static.tenable.com/prod_docs/securitycenter_4.4_architecture.pdf
PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE
PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are
Setting up an icap Server for ISG- 1000/2000 AV Support
Application Note Setting up an icap Server for ISG- 1000/2000 AV Support Version 1.1 Ronald Ng AJTAC Engineer AV/DI/UF Specialist Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA
VMware vcenter Update Manager Administration Guide
VMware vcenter Update Manager Administration Guide vcenter Update Manager 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
User Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
Best Practices. Understanding BeyondTrust Patch Management
Best Practices Understanding BeyondTrust Patch Management February 2014 Contents Overview... 3 1 - Configure Retina CS... 4 2 - Enable Patch Management for Smart Groups... 6 3 Identify and Approve Patches...
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Nipper Studio Beginner s Guide
Nipper Studio Beginner s Guide Multiple Award Winning Security Software Version 2.1 Published March 2015 Titania Limited 2014. All Rights Reserved This document is intended to provide advice and assistance
ACE Management Server Deployment Guide VMware ACE 2.0
Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Web Application Scanning with Nessus
Web Application Scanning with Nessus Detecting Web Application Vulnerabilities and Environmental Weaknesses September 6, 2013 (Revision 5) Brian Martin Nessus SME Carole Fennelly Director, Content & Documentation
JAMF Software Server Installation Guide for Linux. Version 8.6
JAMF Software Server Installation Guide for Linux Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.
3rd Party VoIP Phone Setup Guide (Panasonic 500-550b)
3rd Party VoIP Phone Setup Guide (Panasonic 500-550b) We are changing how we add 3rd party VoIP phones to accounts. Going forward, you can simply add a 3rd Party Softphone and use those credentials to
Nessus Credentialed Checks. November 24, 2014 (Revision 38)
Nessus Credentialed Checks November 24, 2014 (Revision 38) Table of Contents Introduction... 4 Standards and Conventions... 4 Overview of Nessus Credentialed Checks... 4 Purpose... 4 Access Level... 5
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Tenable Enterprise Product Training
Tenable Enterprise Product Training Tenable Unified Security Monitoring for Analysts (5MD) This hands-on instructor led course provides security analysts with the skills and knowledge necessary to discover
AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard
AlienVault Unified Security Management (USM) 5.1 Running the Getting Started Wizard USM v5.1 Running the Getting Started Wizard, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault
How To Handle A Threat From A Corporate Computer System
Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns
QuickStart Guide for Managing Mobile Devices. Version 9.2
QuickStart Guide for Managing Mobile Devices Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide
Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and
Disaster Recovery. Websense Web Security Web Security Gateway. v7.6
Disaster Recovery Websense Web Security Web Security Gateway v7.6 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2011 The products and/or methods
TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE
TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks
Dynamic DNS How-To Guide
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
Rebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
uh6 efolder BDR Guide for Veeam Page 1 of 36
efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder
Global Knowledge MEA Remote Labs. Remote Lab Access Procedure
Global Knowledge MEA Remote Labs Remote Lab Access Procedure Contents 1. Overview... 3 2. Student Workstation Requirements... 3 2.1. Windows Platforms... 3 2.2. Apple Platforms... 3 2.3. Linux Platforms...
Unified Security Management (USM) 5.2 Vulnerability Assessment Guide
AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
rating of 5 out 5 stars
SPM User Guide Contents Aegify comprehensive benefits... 2 Security Posture Assessment workflow... 3 Scanner Management... 3 Upload external scan output... 6 Reports - Views... 6 View Individual Security
Cisco UCS Director Payment Gateway Integration Guide, Release 4.1
First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
Configuring PPP And SIP
Copyright Copyright 2005. All rights reserved. The content of this manual is subject to change without notice. The information and messages contained herein are proprietary to. No part of this manual may
Management, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
Phone Inventory 1.0 (1000) Installation and Administration Guide
Phone Inventory 1.0 (1000) Installation and Administration Guide 2010 VoIP Integration June 23, 2010 Table of Contents Product Overview... 3 Requirements... 3 Application Requirements... 3 Call Manager...
Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder
Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,
Setting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
Setting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Summary. How-To: Active Directory Integration. April, 2006
How-To How-To Integrate CanIt-PRO with Active Directory: April, 2006 Summary Several organizations use Active Directory to manage their user accounts. This paper describes how to integrate CanIt-PRO with
