How to Find What You Want Using simple regex in HPE ArcSight Logger
|
|
- Daisy Rice
- 5 years ago
- Views:
Transcription
1 Introduction HPE ArcSight SmartConnectors and FlexConnectors do a great job parsing, normalizing, and categorizing events. Sometimes there is some additional parsing that you might want to do, to get your hands on part of a value to chart it, or sum it up, or count it up. The piece that you want is either within a field already, or is not in a field in the Logger schema. When you find yourself in this situation, Regular Expressions (or RegEx) can be used to isolate the part that you want from the parts that you do not want. The technique described here can be used for just about any piece of an event. The Use Case we will use here is to see what versions of Connectors are sending events in to ArcSight, so we know what versions are out there, and we can determine if, and where, we might need to upgrade Connectors. In the Common Event Format schema, the agentversion field has a short name of av. It is well known that a chart of Top Names or Top Source Address can be produced using the ArcSight Logger Search/Analyze feature. Here are those searches: top name top sourceaddress In the 2 examples above, both the name and the sourceaddress field are part of the ArcSight Logger schema and are both indexed fields by default. This can be seen in Logger s Default Fields display and seeing both name and sourceaddress listed, and indexed. With Logger 6.2, type default into the Take me to navigation. By default the agentversion field is not included in the indexed fields. If you try to run a search and summarize using the agent version field av, the result is the following: The field agentversion could be added to the indexes, but before any field is added to the indexes, consider how often might you search on agentversion? The decision to add this field to the indexing adds some small amount of indexing work to Logger. Since we do not expect to always be searching on agentversion, we will use some RegEx to do our work instead and not add this work to the Logger indexer. As a result, the search may not be as fast as an indexed search, but the tradeoff is that nearly anything can be specified as part of the search.
2 Back to the Use Case: What are the varying agentversion values? If we can isolate the version numbers, we can use the top command to do the work for us. The next stage is to isolate the version numbers from the agentversion fields, and we use Logger Regular Expressions to do the work for us. Zeroing in on What We Want The Logger rex command specifies a pattern to look for values, against the event in Logger. Let s look at a real example. Here is a CEF event, and the agentversion field and value are highlighted. CEF:0 ArcSight ArcSight agent:050 Connector Raw Event Statistics Low eventid= mrt= catdt=security Mangement art= cat=/agent/rawevent/statistics deviceseverity=warning rt= filetype=agent cs1= cs2= cs3=0.14 cs4=6447 cs5=21.49 cs6=3uegky1ababdqg3pb+fslhg== cn1= cn2= cn3=42 devicecustomdate1= c6a4=fe80:0:0:0:20c:29ff:fe41:91b4 cs1label=event throughput cs2label=raw event character throughput cs3label=event throughput (SLC) cs4label=raw event length (SLC) cs5label=raw event character throughput (SLC) cs6label=destination ID cn1label=total event count cn2label=total raw event length cn3label=event count (SLC) devicecustomdate1label=last time c6a4label=agent IPv6 Address ahost=romeo.foobar.com agt= agentzoneuri=/all Zones/ArcSight System/Private Address Space Zones/RFC1918: av= atz=us/eastern aid=3uegky1ababdqg3pb+fslhg== at=syslog dvchost=romeo.kramerapps.com dvc= devicezoneuri=/all Zones/ArcSight System/Private Address Space Zones/Local Network Zones/RFC5735: IANA - Loopback ( ) dtz=us/eastern _cefver=0.1 The rex command lets us specify a pattern to look for the agentversion in the CEF event. In the event, the agentversion field and value is specified by av= The name of the field is av and the value is The rex command also allows us to isolate and capture whatever follows that equals sign =, i.e. the numbers and decimals. The capture value is whatever is contained within parenthesis specified in the search. Let s start crafting our search. Any event coming in from Connectors will have an agentversion value. Connector events are from ArcSight Products, so we start with this as our initial search. deviceproduct=arcsight Next, we add our regular expression pattern search, using the rex command. Remember, we are looking for that special string of av=some.numbers.and.digits.we.want.to.capture deviceproduct=arcsight rex "av=(?<av>[^\s]+)\s" Let s dissect the search command above, piece by piece.
3 Following the initial search is a character, also called the pipe character. This means take all the events from the left hand side of the, now known as the output of the first part of the search, and direct them at the command on the right hand side of the command, now known as the input to the next part of the search. Next is the rex command itself. This is the word rex followed by a set of quotes. deviceproduct=arcsight rex "" Next is the pattern that we are looking for. We want to pull out whatever is after the av= equals sign. In this next step of building our command, we tell rex to look for the pattern av= and to extract what follows the equals sign. deviceproduct=arcsight rex "av=()" Let s keep building. Since we want to refer to the agentversion value later on, we can give these new values a name. The name we choose goes inside the angle brackets like this <av> 1. deviceproduct=arcsight rex "av=(?<av>)\s" This new variable name could be nearly anything you wish and does not need to match the av we are searching on. This would also work: deviceproduct=arcsight rex "av=(?<myav>)\s" A? is included to capture the match into a backreference now called av. We re almost done. deviceproduct=arcsight rex "av=(?<av>[^\s]+)\s" We complete the rex command by adding a few symbols that mean anything except a space, one or more times 2. This is all followed by one last space, shown as \s. Since CEF key=values are separated by a space, this last space in our regular expression means the end of the agentversion key=value, separating it from the next key=value in the CEF event. Putting it all together in the Logger search will extract out the values, assign them to a search-time field called av and display that column of values in Logger like this: 1 The syntax here is sometimes called a named backreference. 2 Specifying anything except a something is also known as a negating character class in RegEx parlance.
4 And now we can ask Logger to tally up this new field we created with the rex command, and show us the distribution of values.
5 Summary Using a live example the use of HPE ArcSight Logger rex command was used to build a regular expression search to pick out a part of an event and summarize events using the isolated pieces of events. The pieces do not have to be added to Logger schema, and do not have to be added to the Logger indexing in order to summarize the event activity. For further information: - ArcSight Logger Administrator s Guide, Logger 6.2, page
[win@18372.4 EVENT_CATEGORY="Logon" EVENT_FACILITY="16" EVENT_ID="4624" EVENT_LEVEL="0" EVENT_NAME="Security" EVENT_REC_NUM="278198" EVENT_SID="N/A" EVENT_SOURCE="Microsoft Windows security auditing."
More informationIntroduction to Scratch
Introduction to Scratch Familiarising yourself with Scratch The Stage Sprites Scripts Area Sequence of Instructions Instructions and Controls If a computer is a box think of a program as a man inside the
More informationHPE Security ArcSight Connectors
HPE Security ArcSight Connectors SmartConnector for HPE H3C Syslog Configuration Guide October 17, 2017 Configuration Guide SmartConnector for HPE H3C Syslog October 17, 2017 Copyright 2012 2017 Hewlett
More information#MicroFocusCyberSummit
#MicroFocusCyberSummit Data Simplicity: ArcSight Data Platform enhances enterprise data via the Common Event Format Peter Titov Micro Focus #MicroFocusCyberSummit Agenda Usage Ingestion Management Solutions
More informationHPE Security ArcSight Connectors
HPE Security ArcSight Connectors SmartConnector for HPE c7000 Virtual Connect Module Syslog Configuration Guide October 17, 2017 SmartConnector for HPE c7000 Virtual Connect Module Syslog October 17, 2017
More informationHPE Security ArcSight Connectors. FlexConnector Developer's Guide
HPE Security ArcSight Connectors FlexConnector Developer's Guide August 30, 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set forth in the express
More informationEnriching and Automating Fraud Response with HP ArcSight ESM
Enriching and Automating Fraud Response with HP ArcSight ESM TB3022 Ron Stamper, Regions Financial, Cybersecurity Engineer Josh Larkins, Malcovery Security, Sr Threat Intel Analyst Table of Contents Introduction
More informationThere are 2 options when connecting to Multiple Companies:
Connecting to Multiple Companies There are 2 options when connecting to Multiple Companies: 1. Creating a PICKLIST 2. Creating a Consolidation Connection Creating a Picklist You would use Picklists when
More informationUsing Excel This is only a brief overview that highlights some of the useful points in a spreadsheet program.
Using Excel 2007 This is only a brief overview that highlights some of the useful points in a spreadsheet program. 1. Input of data - Generally you should attempt to put the independent variable on the
More informationCommon Event Format. Imperva SecureSphere January 3, 2018
Common Event Format Imperva SecureSphere January 3, 2018 CEF Connector Configuration Guide Imperva SecureSphere January 3, 2018 Revision History Version Date Description 1.0 04/26/2009 First edition of
More informationIntro to Programming. Unit 7. What is Programming? What is Programming? Intro to Programming
Intro to Programming Unit 7 Intro to Programming 1 What is Programming? 1. Programming Languages 2. Markup vs. Programming 1. Introduction 2. Print Statement 3. Strings 4. Types and Values 5. Math Externals
More informationLecture 05 I/O statements Printf, Scanf Simple statements, Compound statements
Programming, Data Structures and Algorithms Prof. Shankar Balachandran Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 05 I/O statements Printf, Scanf Simple
More informationSaving Internet Searches and Resources
Saving Internet Searches and Resources You and your students will find many resources on the Internet. Sometimes there is a graphic that is perfect for a presentation or project. Or, there may be some
More informationAsset and network modeling in HP ArcSight ESM and Express
Asset and network modeling in HP ArcSight ESM and Express Till Jäger, CISSP, CEH EMEA ArcSight Architect, HP ESP Agenda Overview Walkthrough of asset modeling in ArcSight ESM More inside info about the
More informationHPE Security ArcSight User Behavior Analytics
HPE Security ArcSight Analytics Software Version: 5.0 Integration and Content Guide July 21, 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set
More informationSection 3.1 Fractions to Decimals
Section 3.1 Fractions to Decimals A fraction is a part of a whole. For example, it means 1 out of 5 possible pieces. is a fraction; Fractions also illustrate division. For example, also means 1 5 which
More informationCommon Event Format Configuration Guide. NIKSUN NetDetector-NetVCR Date: Wednesday, May 30, 2012
Common Event Format Configuration Guide NIKSUN NetDetector-NetVCR Date: Wednesday, May 30, 2012 1 CEF Connector Configuration Guide This document is provided for informational purposes only, and the information
More informationXML flex lessons from the trenches
XML flex lessons from the trenches HP ESP Global Services Eugenio Marrero, SA Tammy Torbert, SE Agenda Why XML flex connector? What documentation/tools are available? Basic XML concepts XML parser Installing
More informationHPE Security ArcSight Connectors
HPE Security ArcSight Connectors SmartConnector Release Notes 7.6.0.8009.0 May 15, 2017 HPE Security ArcSight SmartConnector Release Notes 7.6.0.8009.0 May 15, 2017 Copyright 2010 2017 Hewlett Packard
More informationCentrify for ArcSight Integration Guide
Centrify for ArcSight Integration Guide November 2017 Centrify Corporation Abstract This integration guide is to help our Centrify Infrastructure Services customers easily integrate Centrify events into
More informationJava Programming Fundamentals - Day Instructor: Jason Yoon Website:
Java Programming Fundamentals - Day 1 07.09.2016 Instructor: Jason Yoon Website: http://mryoon.weebly.com Quick Advice Before We Get Started Java is not the same as javascript! Don t get them confused
More information= 3 + (5*4) + (1/2)*(4/2)^2.
Physics 100 Lab 1: Use of a Spreadsheet to Analyze Data by Kenneth Hahn and Michael Goggin In this lab you will learn how to enter data into a spreadsheet and to manipulate the data in meaningful ways.
More informationHPE Security ArcSight Connectors
HPE Security ArcSight Connectors SmartConnector for Barracuda Firewall NG F- Series Syslog Configuration Guide October 17, 2017 Configuration Guide SmartConnector for Barracuda Firewall NG F-Series Syslog
More informationTopic 3: Fractions. Topic 1 Integers. Topic 2 Decimals. Topic 3 Fractions. Topic 4 Ratios. Topic 5 Percentages. Topic 6 Algebra
Topic : Fractions Topic Integers Topic Decimals Topic Fractions Topic Ratios Topic Percentages Duration / weeks Content Outline PART (/ week) Introduction Converting Fractions to Decimals Converting Decimals
More informationProtect Session B10039 ArcSight Activate Threat Intelligence Packages
Protect2016 - Session B10039 ArcSight Activate Threat Intelligence Packages Time to stop reinventing the wheel Prepared by SEMplicity & HPE George A. Boitano 617-524-0171 gboitano@semplicityinc.com Yun
More informationLearn Linux in a Month of Lunches by Steven Ovadia
Learn Linux in a Month of Lunches by Steven Ovadia Sample Chapter 17 Copyright 2017 Manning Publications brief contents PART 1 GETTING LINUX UP AND RUNNING... 1 1 Before you begin 3 2 Getting to know Linux
More informationHPE Security ArcSight SmartConnectors. Format Preserving Encryption Environment Setup Guide
HPE Security ArcSight SmartConnectors Format Preserving Encryption Environment Setup Guide October 19, 2017 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services
More informationWELCOME UVAHS REMEDY INCIDENT MANAGEMENT
WELCOME UVAHS REMEDY INCIDENT MANAGEMENT 1 Course Material Index Updating and Resolving Incidents Assigning, Re-Assigning, Updating and Resolving Incidents Additional Modules: Introduction Logging In and
More informationCommon Event Format Configuration Guide. ABAP-Experts.com // NCMI GmbH SecurityBridge Date: Thursday, January 12, 2017
Common Event Format Configuration Guide ABAP-Experts.com // NCMI GmbH SecurityBridge Date: Thursday, January 12, 2017 1 Table of Contents Common Event Format Configuration Guide... 1 Table of Contents...
More informationReference Guide. Adding a Generic File Store - Importing From a Local or Network ShipWorks Page 1 of 21
Reference Guide Adding a Generic File Store - Importing From a Local or Network Folder Page 1 of 21 Adding a Generic File Store TABLE OF CONTENTS Background First Things First The Process Creating the
More informationWhere Did My Files Go? How to find your files using Windows 10
Where Did My Files Go? How to find your files using Windows 10 Have you just upgraded to Windows 10? Are you finding it difficult to find your files? Are you asking yourself Where did My Computer or My
More informationSAFE Home Inventory. Getting Started Guide
SAFE Home Inventory Getting Started Guide Table of Contents What can I do with SAFE?... 1 Getting started using SAFE... 1 Overview of SAFE screens... 1 Use the collectibles and household items screens...
More informationSmartConnector Configuration Guide for
SmartConnector Configuration Guide for Mazu Profiler V3 Schema DB August 15, 2007 SmartConnector Configuration Guide for Mazu Profiler V3 Schema DB August 15, 2007 Copyright 2007 ArcSight, Inc. All rights
More informationExcel Basics Fall 2016
If you have never worked with Excel, it can be a little confusing at first. When you open Excel, you are faced with various toolbars and menus and a big, empty grid. So what do you do with it? The great
More informationData. Selecting Data. Sorting Data
1 of 1 Data Selecting Data To select a large range of cells: Click on the first cell in the area you want to select Scroll down to the last cell and hold down the Shift key while you click on it. This
More informationSendouts Release Notes Version 8.8
Sendouts Release Notes Version 8.8 Contents Ease of Use New Lookups Featuring Type Ahead Technology 2 New Match and Advance Process 3 Editable Snapshot 5 Updated Resume Split Screen & More Resume Views
More informationCreating a data file and entering data
4 Creating a data file and entering data There are a number of stages in the process of setting up a data file and analysing the data. The flow chart shown on the next page outlines the main steps that
More informationTable of Contents Data Validation... 2 Data Validation Dialog Box... 3 INDIRECT function... 3 Cumulative List of Keyboards Throughout Class:...
Highline Excel 2016 Class 10: Data Validation Table of Contents Data Validation... 2 Data Validation Dialog Box... 3 INDIRECT function... 3 Cumulative List of Keyboards Throughout Class:... 4 Page 1 of
More informationDOWNLOAD PDF MICROSOFT EXCEL ALL FORMULAS LIST WITH EXAMPLES
Chapter 1 : Examples of commonly used formulas - Office Support A collection of useful Excel formulas for sums and counts, dates and times, text manipularion, conditional formatting, percentages, Excel
More informationLecture Transcript While and Do While Statements in C++
Lecture Transcript While and Do While Statements in C++ Hello and welcome back. In this lecture we are going to look at the while and do...while iteration statements in C++. Here is a quick recap of some
More informationCommon Event Format Configuration Guide. Barracuda Networks Barracuda Web Application Firewall Date: Wednesday, February 01, 2017
Common Event Format Configuration Guide Barracuda Networks Barracuda Web Application Firewall Date: Wednesday, February 01, 2017 1 CEF Connector Configuration Guide This document is provided for informational
More informationage = 23 age = age + 1 data types Integers Floating-point numbers Strings Booleans loosely typed age = In my 20s
Intro to Python Python Getting increasingly more common Designed to have intuitive and lightweight syntax In this class, we will be using Python 3.x Python 2.x is still very popular, and the differences
More informationMicro Focus Security ArcSight Connectors. SmartConnector for Snort Syslog. Configuration Guide
Micro Focus Security ArcSight Connectors SmartConnector for Snort Syslog Configuration Guide June, 2018 SmartConnector for Snort Syslog June, 2018 Copyright 2011 2017; 2018 Micro Focus and its affiliates
More informationWant the *GUIDED* tour?
Want the *GUIDED* tour? 12 x12 layouts are great, and 8.5 x11 layouts are great too - BUT what if you want to great something that you can print (or have printed) right to standard photo paper? Shouldn
More informationHPE Security ArcSight Connectors
HPE Security ArcSight Connectors SmartConnector for Windows Event Log Unified: Microsoft Network Policy Server Supplemental Configuration Guide March 29, 2013 Supplemental Configuration Guide SmartConnector
More informationHow & Why We Subnet Lab Workbook
i How & Why We Subnet Lab Workbook ii CertificationKits.com How & Why We Subnet Workbook Copyright 2013 CertificationKits LLC All rights reserved. No part of this book maybe be reproduced or transmitted
More informationMicrosoft Access 2010
www.jwalkonline.org/main michael@jwalkonline.org @MichaelJWalk Microsoft Access 2010 Part 3 Michael J. Walk It's about control: use advanced features of Access to control data entry, automate processes,
More informationFormulas and Functions
Conventions used in this document: Keyboard keys that must be pressed will be shown as Enter or Ctrl. Controls to be activated with the mouse will be shown as Start button > Settings > System > About.
More informationExcel Tips to help you with the PS477/577 Final Paper Project
Excel Tips to help you with the PS477/577 Final Paper Project Please try working through this sheet BEFORE the training session -- it will allow you to learn much more at the training session. Best of
More informationCreating Simple Links
Creating Simple Links Linking to another place is one of the most used features on web pages. Some links are internal within a page. Some links are to pages within the same web site, and yet other links
More informationEECS 183. Week 3 - Diana Gage. www-personal.umich.edu/ ~drgage
EECS 183 Week 3 - Diana Gage www-personal.umich.edu/ ~drgage Upcoming Deadlines Lab 3 and Assignment 3 due October 2 nd (this Friday) Project 2 will be due October 6 th (a week from Friday) Get started
More informationHow do I use BatchProcess
home news tutorial what can bp do purchase contact us TUTORIAL Written by Luke Malpass Sunday, 04 April 2010 20:20 How do I use BatchProcess Begin by downloading the required version (either 32bit or 64bit)
More informationStudent Success Center Arithmetic Study Guide for the ACCUPLACER (CPT)
Fractions Terms Numerator: which tells how many parts you have (the number on top) Denominator: which tells how many parts in the whole (the number on the bottom) is parts have a dot out of Proper fraction:
More informationIntro. Scheme Basics. scm> 5 5. scm>
Intro Let s take some time to talk about LISP. It stands for LISt Processing a way of coding using only lists! It sounds pretty radical, and it is. There are lots of cool things to know about LISP; if
More informationMicrosoft Excel. Charts
Microsoft Excel Charts Chart Wizard To create a chart in Microsoft Excel, select the data you wish to graph or place yourself with in the conjoining data set and choose Chart from the Insert menu, or click
More informationUnity 1.0 Troubleshooting Guide
Unity 1.0 Troubleshooting Guide Troubleshooting Utilities MediaNet Analyzer Version 1.0 runs only on the Macintosh and does not ship with Unity 1.0. It is available on the Knowledge Center Website. It
More informationCentrify for ArcSight Integration Guide
July 2018 Centrify Corporation Abstract This guide is written for Centrify Infrastructure Services customers who want to integrate Centrify events with ArcSight. Legal Notice This document and the software
More informationGenerating Wrappers with Fetch Agent Platform 3.2. Matthew Michelson and Craig A. Knoblock CSCI 548: Lecture 2
Generating Wrappers with Fetch Agent Platform 3.2 Matthew Michelson and Craig A. Knoblock CSCI 548: Lecture 2 Starting our example Extract list of cars from Craig s List: Post text Link to details page
More informationUnderstanding And Using Custom Queries
Purpose This document describes how to use the full flexibility of Nagios to get the most out of your network flow data. Target Audience Network admins performing forensic analysis on a network's flow
More informationReversing. Time to get with the program
Reversing Time to get with the program This guide is a brief introduction to C, Assembly Language, and Python that will be helpful for solving Reversing challenges. Writing a C Program C is one of the
More informationRelationship Estimator
This is a small program that is intended to make the DNA Prediction Chart Spreadsheet a bit easier to use. It is based entirely on the data in this spreadsheet plus some interpolation of missing values.
More informationMicro Focus Security ArcSight Connectors. SmartConnector for Microsoft IIS Multiple Site File. Configuration Guide
Micro Focus Security ArcSight Connectors SmartConnector for Microsoft IIS Multiple Site File Configuration Guide June, 2018 Configuration Guide SmartConnector for Microsoft IIS Multiple Site File June,
More informationMicro Focus Security ArcSight Connectors. SmartConnector for McAfee Network Security Manager Syslog. Configuration Guide
Micro Focus Security ArcSight Connectors SmartConnector for McAfee Network Security Manager Syslog Configuration Guide June, 2018 Configuration Guide SmartConnector for McAfee Network Security Manager
More informationI. Create the basic Analysis:
I. Create the basic Analysis: 1) Create a new analysis from the Finance General Ledger subject area. 2) Add the following fields: Fund, Object Group, Actuals, Actuals, Actuals, Actuals 3) Add the 3 standard
More informationRegular Expressions. Upsorn Praphamontripong. CS 1111 Introduction to Programming Spring [Ref: https://docs.python.org/3/library/re.
Regular Expressions Upsorn Praphamontripong CS 1111 Introduction to Programming Spring 2018 [Ref: https://docs.python.org/3/library/re.html] Overview: Regular Expressions What are regular expressions?
More informationHomework 1 Excel Basics
Homework 1 Excel Basics Excel is a software program that is used to organize information, perform calculations, and create visual displays of the information. When you start up Excel, you will see the
More informationSPSS 11.5 for Windows Assignment 2
1 SPSS 11.5 for Windows Assignment 2 Material covered: Generating frequency distributions and descriptive statistics, converting raw scores to standard scores, creating variables using the Compute option,
More information6.001 Notes: Section 15.1
6.001 Notes: Section 15.1 Slide 15.1.1 Our goal over the next few lectures is to build an interpreter, which in a very basic sense is the ultimate in programming, since doing so will allow us to define
More informationChapter 1 -- Getting Started, Getting Help
Chapter 1 -- Getting Started, Getting Help Logging In Click on the Evergreen staff client icon located on your desktop or select the Evergreen Staff Client from your Start menu: The login screen opens:
More informationOpening a Data File in SPSS. Defining Variables in SPSS
Opening a Data File in SPSS To open an existing SPSS file: 1. Click File Open Data. Go to the appropriate directory and find the name of the appropriate file. SPSS defaults to opening SPSS data files with
More informationImporting source database objects from a database
Importing source database objects from a database We are now at the point where we can finally import our source database objects, source database objects. We ll walk through the process of importing from
More information6.1 Evaluate Roots and Rational Exponents
VOCABULARY:. Evaluate Roots and Rational Exponents Radical: We know radicals as square roots. But really, radicals can be used to express any root: 0 8, 8, Index: The index tells us exactly what type of
More informationLecture 3 - Template and Vectors
Lecture - Template and Vectors Homework Format and Template: We ll each develop a simple template to use to start any new homework. The idea of a template is to layout the basic structure of what goes
More informationCITRIX NAVIGATION & ACCESSING myhr
INTRODUCTION This guide details how to log into Citrix and navigate to the myhr Home page. If you have any difficulty throughout this process please contact ICT (extension 43000). After 20 minutes of inactivity,
More informationHPE Security ArcSight Connectors
HPE Security ArcSight Connectors SmartConnector for Microsoft Windows Event Log Unified Configuration Guide May 16, 2016 SmartConnector for Microsoft Windows Event Log Unified Configuration Guide SmartConnector
More informationAssignment Definition And General Feedback By Michael Panitz at Cascadia Community College (
For Loops: Will Tanna Assignment Definition And General Feedback By Michael Panitz at Cascadia Community College (http://www.cascadia.edu) Table of contents: Summary When To Use and Avoid This Example
More informationExcel 2007 Fundamentals
Excel 2007 Fundamentals Introduction The aim of this document is to introduce some basic techniques for using Excel to enter data, perform calculations and produce simple charts based on that information.
More informationMicro Focus Security ArcSight Connectors. SmartConnector for McAfee Gateway Syslog. Configuration Guide
Micro Focus Security ArcSight Connectors SmartConnector for McAfee Email Gateway Syslog Configuration Guide June, 2018 Configuration Guide SmartConnector for McAfee Email Gateway Syslog June, 2018 Copyright
More informationM150 -B / Unit 12. By Wawi. A good user interface design enables the user to effectively interact with the system and perform his tasks.
A good user interface design enables the user to effectively interact with the system and perform his tasks. (True) HCI: (Human-Computer Interaction) is the study of how humans interact with computers
More informationGold Standard Award for Optimal Aging Nomination Instructions
Gold Standard Award for Optimal Aging Nomination Instructions Thank you for your interest in submitting a nomination for the Gold Standard Award for Optimal Aging! Please review the following information
More information6 Tips to Help You Improve Configuration Management. by Stuart Rance
6 Tips to Help You Improve Configuration Management by Stuart Rance Introduction Configuration management provides information about what assets you own, how they are configured, and how they are connected
More informationR Basics / Course Business
R Basics / Course Business We ll be using a sample dataset in class today: CourseWeb: Course Documents " Sample Data " Week 2 Can download to your computer before class CourseWeb survey on research/stats
More informationInteractive MATLAB use. Often, many steps are needed. Automated data processing is common in Earth science! only good if problem is simple
Chapter 2 Interactive MATLAB use only good if problem is simple Often, many steps are needed We also want to be able to automate repeated tasks Automated data processing is common in Earth science! Automated
More informationComputer Programming & Problem Solving ( CPPS ) Turbo C Programming For The PC (Revised Edition ) By Robert Lafore
Sir Syed University of Engineering and Technology. Computer ming & Problem Solving ( CPPS ) Functions Chapter No 1 Compiled By: Sir Syed University of Engineering & Technology Computer Engineering Department
More information************ THIS PROGRAM IS NOT ELIGIBLE FOR LATE SUBMISSION. ALL SUBMISSIONS MUST BE RECEIVED BY THE DUE DATE/TIME INDICATED ABOVE HERE
Program 10: 40 points: Due Tuesday, May 12, 2015 : 11:59 p.m. ************ THIS PROGRAM IS NOT ELIGIBLE FOR LATE SUBMISSION. ALL SUBMISSIONS MUST BE RECEIVED BY THE DUE DATE/TIME INDICATED ABOVE HERE *************
More information1) Log on to the computer using your PU net ID and password.
CS 150 Lab Logging on: 1) Log on to the computer using your PU net ID and password. Connecting to Winter: Winter is the computer science server where all your work will be stored. Remember, after you log
More informationUsing Parameter Queries
[Revised and Updated 21 August 2018] A useful feature of the query is that it can be saved and used again and again, whenever we want to ask the same question. The result we see (the recordset) always
More informationCivil Engineering Computation
Civil Engineering Computation First Steps in VBA Homework Evaluation 2 1 Homework Evaluation 3 Based on this rubric, you may resubmit Homework 1 and Homework 2 (along with today s homework) by next Monday
More informationHPE Security ArcSight Connectors
HPE Security ArcSight Connectors SmartConnector for Microsoft Office 365 Configuration Guide October 17, 2017 SmartConnector for Microsoft Office 365 October 17, 2017 Copyright 2016 2017 Hewlett Packard
More informationMarkMagic 6 Bar Code Labels, RFID Tags, and Electronic Forms Software for IBM System i
MarkMagic 6 Bar Code Labels, RFID Tags, and Electronic Forms Software for IBM System i Tutorial 3: Version 6 Graphic Concepts Tutorial 3: Graphics Concepts Pg. 1 Welcome Welcome to Part 3 of the MarkMagic
More informationThe same method can be used for variables that are character strings or other data types.
Contents SIMPLE INPUT & OUTPUT... 1 Printing to the Screen (Command Window) Using the disp() Command... 1 Getting Input From the User Using the input() Command... 3 SIMPLE INPUT & OUTPUT So far we have
More informationCommon Tasks on Sharpschool
Common Tasks on Sharpschool You will need to log in to the website to be able to make changes to your page. To do so, navigate to our main district webpage and on the top gray bar, click on. Use your computer
More informationMaking Tables and Graphs with Excel. The Basics
Making Tables and Graphs with Excel The Basics Where do my IV and DV go? Just like you would create a data table on paper, your IV goes in the leftmost column and your DV goes to the right of the IV Enter
More informationCreating Dragon Templates and Commands
Creating Dragon Templates and Commands Users are encouraged to create their own custom templates by following the instructions below. Viewing Existing Templates in Dragon To view existing templates/dragon
More informationCS125 : Introduction to Computer Science. Lecture Notes #4 Type Checking, Input/Output, and Programming Style
CS125 : Introduction to Computer Science Lecture Notes #4 Type Checking, Input/Output, and Programming Style c 2005, 2004, 2002, 2001, 2000 Jason Zych 1 Lecture 4 : Type Checking, Input/Output, and Programming
More informationMicro Focus Security ArcSight Connectors. SmartConnector for Cisco Secure ACS Syslog. Configuration Guide
Micro Focus Security ArcSight Connectors SmartConnector for Cisco Secure ACS Syslog Configuration Guide June, 2018 SmartConnector for Cisco Secure ACS Syslog June, 2018 Copyright 2003 2017; 2018 Micro
More informationLesson 3 Transcript: Part 1 of 2 - Tools & Scripting
Lesson 3 Transcript: Part 1 of 2 - Tools & Scripting Slide 1: Cover Welcome to lesson 3 of the db2 on Campus lecture series. Today we're going to talk about tools and scripting, and this is part 1 of 2
More information6.S189 Homework 1. What to turn in. Exercise 1.1 Installing Python. Exercise 1.2 Hello, world!
6.S189 Homework 1 http://web.mit.edu/6.189/www/materials.html What to turn in Do the warm-up problems for Days 1 & 2 on the online tutor. Complete the problems below on your computer and get a checkoff
More informationStudent Records. SLCM_AD_310 Practice Guide
Student Records SLCM_AD_310 Practice Guide Table of contents Exercise 2.1 Create & Inactivate Holds... 2 Exercise 2.2 Create a Note on a Student s File... 4 Exercise 3.1 Change Student Address... 5 Exercise
More informationAccess - Introduction to Queries
Access - Introduction to Queries Part of managing a database involves asking questions about the data. A query is an Access object that you can use to ask the question(s). The answer is contained in the
More information