PortQRY Native Windows command line Nmap like port scanner - Check status of remote host ports on Windows

Size: px
Start display at page:

Download "PortQRY Native Windows command line Nmap like port scanner - Check status of remote host ports on Windows"

Transcription

1 PortQRY Native Windows command line Nmap like port scanner - Check status of remote host ports on Windows Author : admin Linux users know pretty well Nmap (network mapper) tool which is precious in making a quick server host security evaluation. Nmap binary port is available for Windows too, however as nmap is port for its normal operation you have to install WinPcap (Packet Capture Library). And more importantly it is good to mention if you need to do some remote port scanning from Windows host, there is Microsoft produced native tool called PortQry (Port Query). PortQRY is a must have tool for the Windows Admin as it can help you troubleshoot multiple network issues. 1 / 11

2 As of time of writting this post PortQRY is at version 2, PortQRY tool has also a GUI (UI) Version for those lazy to type in command line. Port Query UI tool (portqueryui.exe) is a tool to query open ports on a machine. This tool makes use of command line version port query tool (portqry.exe). The UI provides the following functionalities: 1. Following "Enter destination IP or FQDN to query:, an edit box needs the user to specify the IP address or FDQN name of the destination to query port status. 2. The end user is able to choose Query type: - Predefined services type. It groups ports into service, so that you can query multiple ports 2 / 11

3 for a service by a single click. Service includes "Domains and Trusts", "DNS Queries", "NetBIOS communication", "IPSEC", "Networking", "SQL Service", "WEB Service", "Exchange Server", "Netmeeting", and other services. You can check detail port and protocol info for each service category by opening Help -> Predefined Services... PORTQRY is part of Windows Server 2003 Support Tools and can be added to any NT based Windows (XP, 2003, Vista, 7, 8) You can download portqry command line tool here or my mirrored portqry version command line port scanner here and PortQRY UI here. PortQRY comes in PortQryV2.exe package which when run extracts 3 files: PortQry.exe program, EULA and readme file. Quickest way to make portqry globally accessible from win command prompt is to copy it to %SystemRoot% (The environment variable holding default location for Windows Installation directory). It is good idea to add PortQRY to default PATH folder to make it accessible from command line globally. PorQry has 3 modes of operation: Command Line Mode, Interactive Mode and Local Mode 3 / 11

4 Command Line Mode - is when it is invoked with parameters. Interactive Mode is when it runs in interactive CLI console 4 / 11

5 5 / 11

6 and Local Mode is used whether information on local system ports is required. 6 / 11

7 Here are some examples on basic usage of portqry: 1. Check if remote server is running webserver is listening on (HTTPS protocol) TCP port 80 portqry -n servername -e 80 7 / 11

8 Querying target system called: pc-freak.net Attempting to resolve name to IP address... Name resolved to querying... TCP port 80 (http service): FILTERED 2. Check whether some common Samba sharing and DNS UDP ports are listening portqry -n servername -p UDP -o 37,53,88,135 Querying target system called: servername Attempting to resolve name to IP address... Name resolved to querying... UDP port 37 (time service): NOT LISTENING UDP port 53 (domain service): NOT LISTENING UDP port 88 (kerberos service): NOT LISTENING UDP port 135 (epmap service): NOT LISTENING 8 / 11

9 3. Scan open ports in a port range - Check common services port range (port ) portqry -n r 1:1024 find ": LISTENING" 4. Logging network scan output to file Portqry n localhost e 135 -l port135.txt Querying target system called: localhost Attempting to resolve name to IP address... Name resolved to querying... TCP port 135 (epmap service): LISTENING Using ephemeral source port Querying Endpoint Mapper Database... Server's response: UUID: d95afe70-a6d e-2c84da1ddb0d ncacn_ip_tcp:localhost[49152] UUID: 2f5f6521-cb b446-00df0bce31db Unimodem LRPC Endpoint ncacn_np:localhost[pipewkssvc]... Total endpoints found: Scanning UDP and TCP protocols port PortQry -n -e 25 -p both 9 / 11

10 Querying target system called: Attempting to resolve name to IP address... Name resolved to querying... TCP port 53 (domain service): LISTENING UDP port 53 (domain service): LISTENING or FILTERED Sending DNS query to UDP port Checking remote server whether LDAP ports are listening Portqry -remotehost.com -p tcp -e 389 Portqry -n remotehost.com -p tcp -e 636 Portqry -n remotehost.com -p both -e 3268 Portqry -n remotehost.com -p tcp -e Making SNMP community name requests portqry -n host2 -cn!my community name! -e 161 -p udp 8. Initiating scan from pre-selected source port A network socket request initiation is useful from certain port because, some remote services expect connection from certain ports, lets say you're connecting to mail server, you might want to set as a source port - port 25, to make remote server another SMTP is connecting. portqry -n -e 25 -sp Scanning whether server ports required by Active Directories are opened Common ports used in Windows hosts to communicate between each other to sustain Active Directory are: 10 / 11

11 Powered by TCPDF ( Walking in Light with Christ - Faith, Computing, Diary 88 (Kerberos) 135 (RPC) 389 (LDAP) 445 (CIFS) 3268 (Global Catalog) portqry -n remote-host.com -o 88,135,389,445,3268 -p both portqry has also a silent mode with the "-q" switch if you want to get only whether a port is LISTENING (opened). On port scan it returns three major return codes (very useful for scripting purposes); returncode 0 - if port / service is listening returncode 1 - if service is not listening returncode 2 - if service is listening or filtered PortQry is very simple port scanner for win sysadms and is precious tool for basic network debugging (services) on Windows farms, however it doesn't have the powerful cracker functionality, application / OS versioning etc. like Nmap. 11 / 11

Starting Nmap 6.40 ( ) at :54 Pacific Daylight Time Nmap scan report for mass_dns: warning: Unable to

Starting Nmap 6.40 (   ) at :54 Pacific Daylight Time Nmap scan report for mass_dns: warning: Unable to Starting Nmap 6.40 ( http://nmap.org ) at 2016-06-12 12:54 Pacific Daylight Time Nmap scan report for 172.30.0.7 mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using

More information

Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions

Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions Review Questions 1. Which part of a MAC address is unique to each manufacturer? A. The network identifier B. The OUI C. The device identifier

More information

Sun Storage Common Array Manager

Sun Storage Common Array Manager Sun Storage Common Array Manager Quick Start Guide This guide can help you with the basic steps of installing Oracle s Sun Storage Common Array Manager software. If you are upgrading from a previous version

More information

Manually Ftp Windows Xp Command Line Port Scan

Manually Ftp Windows Xp Command Line Port Scan Manually Ftp Windows Xp Command Line Port Scan But you can also use this same technology from the command line to bring about a change Configure a manual static ip address: Stroke is the command line back-end

More information

ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist

ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1T6-323 Title : Microsoft Windows 2000 Network Analysis and Troubleshooting

More information

Cisco PCP-PNR Port Usage Information

Cisco PCP-PNR Port Usage Information Cisco PCP-PNR Port Usage Information Page 1 of 18 20-Sep-2013 Table of Contents 1 Introduction... 3 2 Prerequisites... 3 3 Glossary... 3 3.1 CISCO PCP Local Machine... 3 3.1.1 CISCO PCP Component... 4

More information

Start Plink SSH tunnel on Windows start - Windows Resource Kit and AlwaysUp start Windows services when computer boots up

Start Plink SSH tunnel on Windows start - Windows Resource Kit and AlwaysUp start Windows services when computer boots up Start Plink SSH tunnel on Windows start - Windows Resource Kit and AlwaysUp start Windows services when computer boots up Author : admin Recently I blogged How to create dynamic and static SSH tunnels

More information

Pre-Installation Checklist v5.0

Pre-Installation Checklist v5.0 Pre-Installation Checklist v5.0 November 2010 Table of Contents Introduction 3 Network infrastructure 4 ShareScan Manager PC 5 Devices 7 ecopy Connectors 8 Network Communication 13 Document Management

More information

3.1. Administrator s Guide TNT SOFTWARE. ELM Log Manager. Version

3.1. Administrator s Guide TNT SOFTWARE. ELM Log Manager. Version Version 3.1 TNT SOFTWARE ELM Log Manager Administrator s Guide TNT SOFTWARE ELM Log Manager 3.1 Administrator s Guide Copyright 1997-2003 TNT Software All Rights Reserved 2001 Main Street Vancouver, WA

More information

Getting started with System Center Essentials 2007

Getting started with System Center Essentials 2007 At a glance: Installing and upgrading Configuring Essentials 2007 Troubleshooting steps Getting started with System Center Essentials 2007 David Mills System Center Essentials 2007 is a new IT management

More information

2 Hardening the appliance

2 Hardening the appliance 2 Hardening the appliance 2.1 Objective For security reasons McAfee always recommends putting the McAfee Web Gateway appliance behind a firewall. For added security McAfee also recommends that the appliance

More information

VMware Content Gateway to Unified Access Gateway Migration Guide

VMware Content Gateway to Unified Access Gateway Migration Guide VMware Content Gateway to Unified Access Gateway Migration Guide Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Installation & Configuration Guide Version 1.6

Installation & Configuration Guide Version 1.6 TekConSer Installation & Configuration Guide Version 1.6 Document Revision 2.0 http://www.kaplansoft.com/ TekConSer is built by Yasin KAPLAN Read Readme.txt for last minute changes and updates which can

More information

How to install and configure Jabber Server (Ejabberd) on Debian Lenny GNU / Linux

How to install and configure Jabber Server (Ejabberd) on Debian Lenny GNU / Linux How to install and configure Jabber Server (Ejabberd) on Debian Lenny GNU / Linux Author : admin I've recently installed a jabber server on one Debian Lenny server and hence decided to describe my installations

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

Port Usage Information for the IM and Presence Service

Port Usage Information for the IM and Presence Service Port Usage Information for the Service Port usage overview, page 1 Information collated in table, page 1 service port list, page 2 Port usage overview This document provides a list of the and ports that

More information

Quick Installation Guide

Quick Installation Guide Nortel IP Flow Manager Release: 2.0 Version: 02.01 Copyright 2009 Nortel Networks Nortel IP Flow Manager 2.0 Page 1 of 9 Nortel IP Flow Manager Release: 2.0 Publication: NN48015-300 Document status: Standard

More information

Port Usage Information for the IM and Presence Service

Port Usage Information for the IM and Presence Service Port Usage Information for the Service Service Port Usage Overview, on page 1 Information Collated in Table, on page 1 Service Port List, on page 2 Service Port Usage Overview This document provides a

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

Security in the Privileged Remote Access Appliance

Security in the Privileged Remote Access Appliance Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Authorized Send Installation and Configuration Guide Version 3.5

Authorized Send Installation and Configuration Guide Version 3.5 Canon Authorized Send Installation and Configuration Guide Version 3.5 08011-35-UD2-004 This page is intentionally left blank. 2 Authorized Send Installation and Configuration Guide Contents Preface...5

More information

Guide to TCP/IP, Third Edition. Chapter 12: TCP/IP, NetBIOS, and WINS

Guide to TCP/IP, Third Edition. Chapter 12: TCP/IP, NetBIOS, and WINS Guide to TCP/IP, Third Edition Chapter 12: TCP/IP, NetBIOS, and WINS Objectives Discuss the history of NetBIOS Understand what NetBIOS is and its limitations Understand the role of NetBIOS in Windows 2000

More information

Configuring Firewalls for SiteProtector Traffic

Configuring Firewalls for SiteProtector Traffic IBM Proventia Management SiteProtector System Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 7, July 29, 2008 Overview SiteProtector cannot function properly if firewalls prevent

More information

Cisco Process Orchestrator 3.4 Hardening Guide

Cisco Process Orchestrator 3.4 Hardening Guide Cisco Systems Cisco Process Orchestrator 3.4 Hardening Guide Tuan Tran Contents INTRODUCTION... 2 WINDOWS SECURITY HARDENING POLICY... 2 MICROSOFT SQL SERVER HARDENING BEST PRACTICE... 2 HARDENING AN ORACLE

More information

ForeScout CounterACT. Configuration Guide. Version 10.8

ForeScout CounterACT. Configuration Guide. Version 10.8 ForeScout CounterACT Endpoint Module: HPS Inspection Engine Version 10.8 Table of Contents About the HPS Inspection Engine... 5 Requirements... 5 Supported Windows Operating Systems... 5 Accessing and

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Question 1 of 50. Traffic going to a public IP address is being translated by your Palo Alto Networks firewall to your

More information

LDAP Directory Integration

LDAP Directory Integration LDAP Server Name, Address, and Profile Configuration, on page 1 with Cisco Unified Communications Manager Task List, on page 1 for Contact Searches on XMPP Clients, on page 6 LDAP Server Name, Address,

More information

Technical Brief. Network Port & Routing Requirements Active Circle 4.5 May Page 1 sur 15

Technical Brief. Network Port & Routing Requirements Active Circle 4.5 May Page 1 sur 15 Technical Brief Network Port & Routing Requirements Active Circle 4.5 May 2017 Page 1 sur 15 INDEX 1. INTRODUCTION... 3 1.1. SCOPE OF THE DOCUMENT... 3 1.2. AUDIENCE... 3 1.3. ORGANIZATION OF THE INFORMATION...

More information

Using CSC SSM with Trend Micro Damage Cleanup Services

Using CSC SSM with Trend Micro Damage Cleanup Services APPENDIXD Using CSC SSM with Trend Micro Damage Cleanup Services Trend Micro InterScan for CSC SSM works with Trend Micro Damage Cleanup Services (DCS) as part of an enterprise protection strategy. The

More information

Xerox Device Data Collector 1.1 Security and Evaluation Guide

Xerox Device Data Collector 1.1 Security and Evaluation Guide Xerox Device Data Collector 1.1 Security and Evaluation Guide 2009 Xerox Corporation. All rights reserved. Xerox, WorkCentre, Phaser and the sphere of connectivity design are trademarks of Xerox Corporation

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Configure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch

Configure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch Configure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch Objective Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are transportation

More information

3.1. Administrator s Guide TNT SOFTWARE. ELM Enterprise Manager. Version

3.1. Administrator s Guide TNT SOFTWARE. ELM Enterprise Manager. Version Version 3.1 TNT SOFTWARE ELM Enterprise Manager Administrator s Guide TNT SOFTWARE ELM Enterprise Manager 3.1 Administrator s Guide Copyright 1997-2003 TNT Software All Rights Reserved 2001 Main Street

More information

Manual Ftp Windows Server 2008 Firewall Settings Greyed Out

Manual Ftp Windows Server 2008 Firewall Settings Greyed Out Manual Ftp Windows Server 2008 Firewall Settings Greyed Out Server limits and settings. 80. Connection. 82 Case File: Custom FTP command response. 101 We recommend the use of Microsoft Windows Server 2008

More information

Ftp Connect Command Prompt To Sql Server 2008 Using Windows Authentication

Ftp Connect Command Prompt To Sql Server 2008 Using Windows Authentication Ftp Connect Command Prompt To Sql Server 2008 Using Windows Authentication I'm having issues connecting to my newly created FTP Site on my Windows 2008R2 server. I've created the site. It is running. Using

More information

Window Server Firewall Configuration

Window Server Firewall Configuration Windows Server Firewall, on page 1 Cisco Firewall Configuration Utility Prerequisites, on page 2 Run Cisco Firewall Configuration Utility, on page 2 Verify New Windows Firewall Settings, on page 3 Windows

More information

BCPro Installation Instructions Code No. LIT Software Release 3.0 Issued September 2017

BCPro Installation Instructions Code No. LIT Software Release 3.0 Issued September 2017 Code No. LIT-12011910 Software Release 3.0 Issued September 2017 Welcome...2 Summary of Changes...2 Related Documentation...2 Installation Overview...2 Prerequisite Software Checklist for Installation

More information

VMware Enterprise Systems Connector Installation and Configuration. JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9.

VMware Enterprise Systems Connector Installation and Configuration. JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9. VMware Enterprise Systems Connector Installation and Configuration JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9.3 You can find the most up-to-date technical documentation

More information

SQL 2012 Installation

SQL 2012 Installation This document will go through a basic SQL Server 2012 installation. For installation requirements, support and download information please visit the following Microsoft websites. Before you start, you

More information

Remote Process Explorer

Remote Process Explorer Remote Process Explorer Frequently Asked Questions LizardSystems Table of Contents Introduction 3 What is Remote Process Explorer? 3 Before Installing 3 How can I download Remote Process Explorer? 3 Will

More information

Forescout. Configuration Guide. Version 11.0

Forescout. Configuration Guide. Version 11.0 Forescout Version 11.0 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Link Gateway Initial Configuration Manual

Link Gateway Initial Configuration Manual Link Gateway Initial Configuration Manual Copyright 2016 NetLinkz. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated

More information

Wireshark Tutorial. Chris Neasbitt UGA Dept. of Computer Science

Wireshark Tutorial. Chris Neasbitt UGA Dept. of Computer Science Wireshark Tutorial Chris Neasbitt UGA Dept. of Computer Science Contents Introduction What is a network trace? What is Wireshark? Basic UI Some of the most useful parts of the UI. Packet Capture How do

More information

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as

More information

App Orchestration 2.0

App Orchestration 2.0 App Orchestration 2.0 Getting Started with Citrix App Orchestration 2.0 Prepared by: Jenny Berger Commissioning Editor: Erin Smith Version: 1.0 Last Updated: April 4, 2014 Page 1 Contents Welcome to App

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...

More information

Process Description. XP Home Default. XP Pro Default Standard Power User Gamer. Display Name

Process Description. XP Home Default. XP Pro Default Standard Power User Gamer. Display Name Alerter Notifies selected users and computers of administrative alerts. If the service is stopped, programs that use administrative alerts will not receive them. If this service is disabled, any services

More information

VMware Enterprise Systems Connector Installation and Configuration

VMware Enterprise Systems Connector Installation and Configuration VMware Enterprise Systems Connector Installation and Configuration Modified APR 2018 VMware Identity Manager 3.1 VMware Identity Manager VMware AirWatch 9.2 You can find the most up-to-date technical documentation

More information

Deploy the ExtraHop Discover Appliance in Azure

Deploy the ExtraHop Discover Appliance in Azure Deploy the ExtraHop Discover Appliance in Azure Published: 2018-04-20 The following procedures explain how to deploy an ExtraHop Discover virtual appliance in a Microsoft Azure environment. You must have

More information

Océ VarioLink 2222c VarioLink 2822c VarioLink 3622c. Explore your options. User manual Network Administration

Océ VarioLink 2222c VarioLink 2822c VarioLink 3622c. Explore your options. User manual Network Administration Océ VarioLink 2222c VarioLink 2822c VarioLink 3622c Explore your options o User manual Network Administration . Océ-Technologies B.V. Copyright 2009,Océ-Technologies B.V. Venlo, The Netherlands. All rights

More information

TCP, UDP Ports, and ICMP Message Types1

TCP, UDP Ports, and ICMP Message Types1 Appendix A APPENDIX A TCP, UDP Ports, and ICMP Message Types1 I list useful TCP, UDP ports, and ICMP message types in this appendix. A comprehensive list of registered TCP and UDP services may be found

More information

Manual Ftp Windows 7 Command Line Port Scan

Manual Ftp Windows 7 Command Line Port Scan Manual Ftp Windows 7 Command Line Port Scan This window allows for network logon Name and Password information for a the path to a 7- Mode NetApp filer for either real-time or scanning scenarios. Choose

More information

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year! EXAMGOOD QUESTION & ANSWER Exam Good provides update free of charge in one year! Accurate study guides High passing rate! http://www.examgood.com Exam : 70-647 Title : Windows Server 2008,Enterprise Administrator

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...

More information

How to find and Delete Duplicate files in directory on Linux server with find and fdupes command

How to find and Delete Duplicate files in directory on Linux server with find and fdupes command How to find and Delete Duplicate files in directory on Linux server with find and fdupes command Author : admin Linux / UNIX find command is very helpful to do a lot of tasks to us admins such as Deleting

More information

Forescout. Configuration Guide. Version 8.1

Forescout. Configuration Guide. Version 8.1 Forescout Version 8.1 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Hands-On Ethical Hacking and Network Defense 3rd Edition

Hands-On Ethical Hacking and Network Defense 3rd Edition Hands-On Ethical Hacking and Network Defense 3rd Edition Chapter 8 Desktop and Server OS Vulnerabilities Last updated 3-17-18 Objectives After reading this chapter and completing the exercises, you will

More information

Manual Ftp Windows Server 2008 Firewall Port Forward

Manual Ftp Windows Server 2008 Firewall Port Forward Manual Ftp Windows Server 2008 Firewall Port Forward SMB/CIFS, FTP and WebDAV access is available allowing the use of existing client software to access the Alfresco data store. This allows you to browse

More information

VMware Enterprise Systems Connector Installation and Configuration. Modified 29 SEP 2017 VMware AirWatch VMware Identity Manager 2.9.

VMware Enterprise Systems Connector Installation and Configuration. Modified 29 SEP 2017 VMware AirWatch VMware Identity Manager 2.9. VMware Enterprise Systems Connector Installation and Configuration Modified 29 SEP 2017 VMware AirWatch 9.1.1 VMware Identity Manager 2.9.1 You can find the most up-to-date technical documentation on the

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Domain Restructuring Windows Server 2008

Domain Restructuring Windows Server 2008 Domain Restructuring Windows Server 2008 Introduction: This document will describe design decision to add Additional Domain Controller in the existing Active Directory Forest. The infrastructure is assumed

More information

How to add support for DJVU file format on M$ Windows, Mac, GNU / Linux and FreeBSD

How to add support for DJVU file format on M$ Windows, Mac, GNU / Linux and FreeBSD How to add support for DJVU file format on M$ Windows, Mac, GNU / Linux and FreeBSD Author : admin By default there is no way to see what is inside a DJVU formatted document on both Windows and Linux OS

More information

Centrix WorkSpace IQ Installation Guide. Version 4.5

Centrix WorkSpace IQ Installation Guide. Version 4.5 Centrix WorkSpace IQ Installation Guide Version 4.5 If you have any feedback about the product or documentation, please submit to: enquiries@centrixsoftware.com 2010 Centrix Software Ltd. All rights reserved.

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

Netcat Scanning to Backdoors

Netcat Scanning to Backdoors Netcat Scanning to Backdoors Security & Privacy on the Internet (03-60-467) Fall 2009 Submitted to Dr. A.K. Aggarwal Submitted By Jeffrey Kurcz School of Computer Science University of Windsor CONTENTS

More information

Install and Run Multiple Tomcat and JAVA server instances on single Windows server Howto

Install and Run Multiple Tomcat and JAVA server instances on single Windows server Howto Install and Run Multiple Tomcat and JAVA server instances on single Windows server Howto Author : admin I've had a task at my work place to install Multiple Tomcat servers on Windows 2012 Server R2 the

More information

SignArchive 2.5. User Manual SOFTPRO GmbH, All rights reserved. Version 0.4

SignArchive 2.5. User Manual SOFTPRO GmbH, All rights reserved. Version 0.4 SignArchive 2.5 User Manual. 2008 SOFTPRO GmbH, All rights reserved Version 0.4 Date: August 5, 2008 Date: August 5, 2008 Content 1 OVERVIEW...4 2 INSTALLATION...5 2.1 SIGNARCHIVE SERVER...5 2.1.1 Upgrade

More information

Lab - Using Wireshark to Examine a UDP DNS Capture

Lab - Using Wireshark to Examine a UDP DNS Capture Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

IBM Exam C IBM Tivoli Endpoint Manager V8.1 Implementation Version: 6.0 [ Total Questions: 180 ]

IBM Exam C IBM Tivoli Endpoint Manager V8.1 Implementation Version: 6.0 [ Total Questions: 180 ] s@lm@n IBM Exam C2090-560 IBM Tivoli Endpoint Manager V8.1 Implementation Version: 6.0 [ Total Questions: 180 ] IBM C2090-560 : Practice Test Topic break down Topic No. of Questions Topic 1: Volume A 60

More information

How To Open Udp Port In Your Firewall Windows 7

How To Open Udp Port In Your Firewall Windows 7 How To Open Udp Port 16000 In Your Firewall Windows 7 This will show you how to allow port 16000udp through the firewall for operating (vista ultimate and premium) If yours does, follow the below set up

More information

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.

More information

Port Utilization in Unified CVP

Port Utilization in Unified CVP Utilization in Unified CVP Utilization Table Columns, page 1 Unified CVP Utilization, page 2 Utilization Table Columns The columns in the port utilization tables in this document describe the following:

More information

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic IBM Security IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic Version 2.9 Note Before using this information and the product it supports, read the information in Notices

More information

Install Cacti on Debian, CentOS, SuSE and Gentoo Linux - Tracking graphically server performance

Install Cacti on Debian, CentOS, SuSE and Gentoo Linux - Tracking graphically server performance Install Cacti on Debian, CentOS, SuSE and Gentoo Linux - Tracking graphically server performance Author : admin There are plenty of ways to track graphically server performance in Web (Nagios, Munin, Zabbix,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Evaluating Website Security with Penetration Testing Methodology

Evaluating Website Security with Penetration Testing Methodology Evaluating Website Security with Penetration Testing Methodology D. Menoski, P. Mitrevski and T. Dimovski St. Clement of Ohrid University in Bitola/Faculty of Technical Sciences, Bitola, Republic of Macedonia

More information

Scanner Central Admin 4.6 User's Guide

Scanner Central Admin 4.6 User's Guide P2WW-2816-03ENZ0 Scanner 4.6 User's Guide This chapter describes the features, main functions, and system configuration of Scanner. This chapter describes the installation of Scanner. This chapter describes

More information

Barracuda Networks NG Firewall 7.0.0

Barracuda Networks NG Firewall 7.0.0 RSA SECURID ACCESS Standard Agent Implementation Guide Barracuda Networks.0 fal, RSA Partner Engineering Last Modified: 10/13/16 Solution Summary The Barracuda NG Firewall

More information

CELLTRAQ Battery Monitoring Software

CELLTRAQ Battery Monitoring Software CELLTRAQ Battery Monitoring Software Instructions April 2009 167-000128A INNOVATION TECHNOLOGY QUALITY WORLDWIDE Page 2 CELLTRAQ Overview CELLTRAQ CELLTRAQ is a web application that is used to monitor

More information

Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions

Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions Network+ Guide to Networks, Seventh Edition Chapter 2, Solutions [C HD] Applying Concepts: Configure Address Translation Using NAT At the end of this chapter, you ll create your own NAT translation table

More information

Metasploit. Installation Guide Release 4.4

Metasploit. Installation Guide Release 4.4 Metasploit Installation Guide Release 4.4 TABLE OF CONTENTS About this Guide Target Audience...1 Organization...1 Document Conventions...1 Support...2 Support for Metasploit Pro and Metasploit Express...2

More information

BlackBerry UEM Configuration Guide

BlackBerry UEM Configuration Guide BlackBerry UEM Configuration Guide 12.9 2018-11-05Z 2 Contents Getting started... 7 Configuring BlackBerry UEM for the first time... 7 Configuration tasks for managing BlackBerry OS devices... 9 Administrator

More information

AVG 9.0 Anti-Virus Business Edition

AVG 9.0 Anti-Virus Business Edition AVG 9.0 Anti-Virus Business Edition User Manual Document revision 90.6 (30. 4. 2010) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

vcenter Server Installation and Setup Update 1 Modified on 30 OCT 2018 VMware vsphere 6.7 vcenter Server 6.7

vcenter Server Installation and Setup Update 1 Modified on 30 OCT 2018 VMware vsphere 6.7 vcenter Server 6.7 vcenter Server Installation and Setup Update 1 Modified on 30 OCT 2018 VMware vsphere 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Oracle Linux 7: Advanced Administration Ed 1

Oracle Linux 7: Advanced Administration Ed 1 Oracle University Contact Us: +33 15 7602 081 Oracle Linux 7: Advanced Administration Ed 1 Duration: 5 Days What you will learn This Oracle Linux 7: Advanced Administration training is ideal for experienced

More information

Configuration Guide. BlackBerry UEM. Version 12.9

Configuration Guide. BlackBerry UEM. Version 12.9 Configuration Guide BlackBerry UEM Version 12.9 Published: 2018-07-16 SWD-20180713083904821 Contents About this guide... 8 Getting started... 9 Configuring BlackBerry UEM for the first time...9 Configuration

More information

AVG 8.5 Internet Security Network Edition

AVG 8.5 Internet Security Network Edition AVG 8.5 Internet Security Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Network Glossary. Version 0 ENG

Network Glossary. Version 0 ENG Network Glossary In this Network Glossary, you will find basic information about advanced network features of Brother machines along general networking and common terms. The supported protocols and the

More information

ForeScout CounterACT. Single CounterACT Appliance. Quick Installation Guide. Version 8.0

ForeScout CounterACT. Single CounterACT Appliance. Quick Installation Guide. Version 8.0 ForeScout CounterACT Single CounterACT Appliance Version 8.0 Table of Contents Welcome to CounterACT Version 8.0... 4 CounterACT Package Contents... 4 Overview... 5 1. Create a Deployment Plan... 6 Decide

More information

Wireless and Dorm Printing Overview

Wireless and Dorm Printing Overview Wireless and Dorm Printing Overview Updated: 2/1/2009 IMPORTANT: IPP printing is not supported In order for wireless and dorm users to successfully print to print queues installed on a GoPrint system,

More information

Dell Wyse Device Manager Installation Guide

Dell Wyse Device Manager Installation Guide Dell Wyse Device Manager 5.7.2 Installation Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates

More information

Required Ports for Cisco Prime Collaboration

Required Ports for Cisco Prime Collaboration The following tables lists the required ports for the Cisco Prime Collaboration Assurance and Cisco Prime Collaboration Provisioning servers to communicate with the devices. Ports Used by Prime Collaboration

More information

Set-up Server Features and Roles Once the users are created we will move on to setting up the Internet Information Services (IIS) role on the server.

Set-up Server Features and Roles Once the users are created we will move on to setting up the Internet Information Services (IIS) role on the server. HOW TO: Install and Setup System Center Configuration Manager (SCCM) 2012 SP1 on a Windows Server 2012 Part 1 - Prerequisites In the following three part guide we will be going over how to install and

More information