administrator are Console Users that can log on to the Web Management console and



Similar documents
Outlook Web Access Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:

Active Directory Management. Agent Deployment Guide

Edit system files. Delete file. ObserveIT Highlights. Change OS settings. Change password. See exactly what users are doing!

Backup and Restore with 3 rd Party Applications

Setting Up SSL on IIS6 for MEGA Advisor

Owner of the content within this article is Written by Marc Grote

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

MultiSite Manager. Using HTTPS and SSL Certificates

Installing and Configuring vcenter Multi-Hypervisor Manager

NSi Mobile Installation Guide. Version 6.2


Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide

Record and Replay All Windows and Unix User Sessions Like a security camera on your servers

TANDBERG MANAGEMENT SUITE 10.0

Netwrix Auditor. Administrator's Guide. Version: /30/2015

GFI Product Manual. Deployment Guide

Generate Reports About User Actions on Windows Servers

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

NETWRIX EVENT LOG MANAGER

Security Correlation Server Quick Installation Guide

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Ignify ecommerce. Item Requirements Notes

E- SPIN's IPSwitch WhatsUp Gold Network Management System System Administration Advanced Training (5 Day)

Microsoft Dynamics CRM Server 2011 software requirements

Internet Script Editor (ISE)

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Netwrix Auditor for Windows Server

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012

etoken Enterprise For: SSL SSL with etoken


Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Active Directory Sync (AD) How it Works in WhosOnLocation

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N REV A01 January 14, 2011

User Guide. Version 3.2. Copyright Snow Software AB. All rights reserved.

WhatsUp Event Analyst v10.x Quick Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

RSA envision Windows Eventing Collector Service Deployment Overview Guide

1. Installation Overview

Netwrix Auditor for Exchange

Cloud Services ADM. Agent Deployment Guide

Getting Started with. Ascent Capture Internet Server Revision A

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

ObserveIT User Activity Monitoring software meets the complex compliance and security challenges related to user activity auditing.

Interwise Connect. Working with Reverse Proxy Version 7.x

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

HTTP Server Setup for McAfee Endpoint Encryption (Formerly SafeBoot) Table of Contents

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Configuring Security Features of Session Recording

Mobile Device Management Version 8. Last updated:

Sage 100 ERP. ebusiness Manager Installation Guide

Web based training for field technicians can be arranged by calling These Documents are required for a successful install:

etrust Audit Using the Recorder for Check Point FireWall-1 1.5

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

IDENTIKEY Server Administrator Reference 3.1

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

Installation Overview

Kaseya Server Instal ation User Guide June 6, 2008

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review

How to Enable LDAP Directory Services Authentication to Microsoft Active Directory in the HP cclass Onboard Administrator

Docufide Client Installation Guide for Windows

Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008

Management Center. Installation and Upgrade Guide. Version 8 FR4

Lepide Exchange Recovery Manager

WhatsUp Gold v11 Features Overview

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Netwrix Auditor for SQL Server

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

RoomWizard Synchronization Software Manual Installation Instructions

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Remote Administration

Installing Management Applications on VNX for File

Outgoing VDI Gateways:

Installation and Configuration Guide for Windows and Linux

1. Management Application (or Console), including Deferred Processor & Encryption Key 2. Database 3. Website

+27O.557+! RM Auditor Additions - Web Monitor. Contents

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

intertrax Suite resource MGR Web

8/26/2007. Network Monitor Analysis Preformed for Home National Bank. Paul F Bergetz

Component Details Notes Tested. The virtualization host is a windows 2008 R2 Hyper-V server. Yes

Identikey Server Administrator Reference 3.1

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

XIA Configuration Server

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Configuring WMI Performance Monitors

Netwrix Auditor for Active Directory

Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet

5nine Virtual Firewall 2.1 for Microsoft Hyper-V

GFI Product Manual. Administrator Guide

GFI Product Manual. Administrator Guide

LoadMaster SSL Certificate Quickstart Guide

Active Directory Management. Agent Deployment Guide

Transcription:

Q and A Can I control what ObserveIT records? Yes, within the Web Console it is possible to define what the Agent records. By using inclusion or exclusion, you can control many aspects of the recording policy, such as the users being recorded, the list of applications being recorded, and so on. Can I export videos? Yes, an entire session or part of a session can be exported to a standalone executable of the video sequence. This can be used for offline viewing or as evidence for user actions in case such information is required by an auditor. What type of Metadata is captured with ObserveIT? A. In addition to capturing the screen image for each user action, ObserveIT extracts information about the state of the operating system and the application being used, which allows ObserveIT to precisely identify what the user is doing in any given moment. This metadata is analyzed and encoded in a standardized format that is stored in the Database Server. Because this information is stored along with the metadata describing what is seen on the screen, you can perform very powerful searches across your entire enterprise. Can I control what ObserveIT records? A. Yes. The Agent recording settings are configured through policies, either at the server level, or on a group of servers. From within the ObserveIT Web Management console it is possible to define what the Agent is to capture. By using inclusion or exclusion, you can control many aspects of the recording policy: the users, applications, specific files, URLs and specific keystroke events. What is the difference between an Administrator and a View Only Administrator options? Administrators are Console Users that can log on to the Web Management console and view recordings, and also make changes to the ObserveIT configuration. View Only administrator are Console Users that can log on to the Web Management console and view recordings, but cannot make any changes to the ObserveIT configuration or permissions. What is unique about the ObserveIT capturing mechanism? A. ObserveIT's patented technology has the ability to identify each type of user interaction (dialog boxes, configuration tabs, confirmation prompts) including the result of that action, and index it as metadata for search and retrieval. In addition to the screen information, the captured metadata provides the context for each user action performed on the server What types of reports are available in the ObserveIT Web Console? A. Within ObserveIT's Web Console you can view many types of reports. These reports are created by querying from three main components server, user, and a resource which can

be any screen element that the user interacts with: menus, application dialog, files and so on. The following are examples of some of the ObserveIT reports: List users that have accessed selected servers by date and time List users that have accessed selected resources such as files, applications, configuration property pages, etc. List resources (registry entries, applications, screens, files, etc.) that were accessed on selected servers by date and time List installed/uninstalled applications on selected servers List installed/uninstalled application by selected users ObserveIT has recorded activities performed by consultants and external vendors. How can I use these videos for training and knowledge management? A. When you identify that a portion of the captured user session correctly represents a best practices method, or otherwise demonstrates the correct process for repeated tasks, you can tag that recording and save it for training purposes. These recordings can be later accessed by using the ObserveIT Web Console without having to go through the search process again. What types of alerting mechanism are available in ObserveIT? A. ObserveIT provides a mechanism for 3rd Party monitoring and management software to interact with the metadata that is stored within ObserveIT's database, and through this interaction you can configure your existing monitoring tools to generate an alert whenever a specified resource is accessed. This includes access to files, registry entries, application property pages or any other screen element. These alerts can be sent by email, pager, SNMP event, SMS, based upon the capabilities of your existing monitoring software. What server side operating systems are supported by ObserveIT? A. All versions of Windows NT/2000/2003/2008 Server are currently supported, including 32 bit and 64 bit versions. What client side operating systems are supported by ObserveIT? A. The ObserveIT Agent can be installed on the following platforms: Windows: NT/2000/2003/2008 and Windows XP/Vista/7, including 32 bit and 64 bit versions. Unix: Linux RedHat/CentOS versions 5.4 to 5.6, including 32 bit and 64 bit versions. Solaris 10 updates U4 to U9 (SPARC and x86 processors) What versions on SQL are supported by ObserveIT?

A. All SQL versions are currently supported, meaning SQL 2005/2008 and MSDE/SQL Server 2005 Express Edition. What versions on IIS are supported by ObserveIT? A. All IIS versions that are part of Windows 2000/2003/2008 Server are currently supported, meaning IIS 5.0/6.0/7.0/7.5. and with the newest update, 8.0. Can I integrate my software with ObserveIT? A. Yes, there is a published set of APIs and an SDK that developers and administrators can use to integrate functionality with 3rd party applications. Can I integrate ObserveIT with other application servers? Each of the server components can coexist with other applications using the same physical hardware platform. ObserveIT has specific configuration settings to allow integration with Active Directory, CA e Trust, Microsoft MOM, SCOM and other application software. What additional information does ObserveIT capture? A. In addition to the screen and underlying metadata, the date, time, IP address, and user is stored in the database. Does ObserveIT provide a mechanism for alerting in case the Agent has stopped communicating with the Application server? A. Yes, in case this happens during an active session. For example, if someone has managed to stop the agent, or in case the server went offline. You will need to configure SMTP and add an e mail address to the Web Console administrator and enable the "Alert" option. In addition, custom scripts can be created by experienced administrators to remotely poll a server's running processes and alert them in case the ObserveIT Agent has stopped. Where are the ObserveIT videos stored? A. Unlike other screen recording software, ObserveIT does not store the recordings in individual files. All the data captured by ObserveIT is stored within a Microsoft SQL Server database, on the Database Server. Because this information is stored along with the metadata describing what is seen on the screen, you can perform very powerful searches across your entire enterprise. Note: Starting from 5.3.0 release, videos can also be stored on a file system. Is my recorded data secure? A. The data is digitally signed and encrypted when it is stored in the database. Access to the data is limited by permissions defined within the Web Console, and any access to this

data is audited by ObserveIT. Is the ObserveIT for Servers communication secure? A. The ObserveIT Agent to ObserveIT Application Server secure conversation implements OASIS standards for WS Secure conversation, which allows security contexts to be created and key material to be exchanged more efficiently. Binary data is serialized and is stamped with a token key and digitally signed. In order to prevent session hijacking, ObserveIT uses a 2 minutes transaction Time To Live parameter. In addition to the built in security mechanism, you can further secure the Agent to Server communication by configuring IIS on the Application server to require SSL, and the Agent to use HTTPS instead of HTTP. When using SSL, packet payloads are encrypted and protected from packet analyzers and other sniffing tools. By using SSL you can protect the communication with means of a industry strength security protocol which is widely accepted and can easily traverse firewalls and other security devices. How do I know that the ObserveIT Agent is working properly? A. There is a health check process that polls the Agents, Application Server(s) and Database Server to verify communication and functionality. Is ObserveIT able to audit the use of a file share? A. You can audit and search for any action performed by any user that is logged on to a user session on the monitored server. This means that if a user accesses the server via RDP/Citrix/VNC and so on, and the server is monitored, you'll be able to record all the user's actions. However, if the user accesses the server via UNC (Uniform Naming Convention, a PC format for specifying the location of resources on a local area network (LAN). ) over the network, you will not be able to record this access unless you also monitor the user's workstation. Does ObserveIT record action in Active Directory Users and Computers such as creating/modifying users, creating/modifying groups, etc? A. The answer is "it depends on how you did it". For example, if the administrator used RDP to connect to the DC and open ADUC and perform the actions, then yes, he or she would be recorded (given that there's an Agent installed on the DC). However, if they used the local ADUC (Active Directory Users and Computers) MMC ( MMCMicrosoft Management Console ) snap in on their workstation, then no, they would not be recorded as no user session was created on the monitored DC. To solve this scenario, one would look into installing the Agent on each management workstation, and configuring the Server Policy to only record administrator based applications such as MMC, Regedit, Notepad, CMD, PowerShell and so on.