Empower Software and Security Software Interactions

Size: px
Start display at page:

Download "Empower Software and Security Software Interactions"

Transcription

1 TECN Rev. 00 Page 1 of 7 Empower Software and Security Software Interactions This Technical Note discusses how Empower software functions and examines potential interactions with anti-virus software as well as other PC-based security software. It also provides recommended actions. It does not discuss the use of appliance-type network security solutions. Except where noted, Empower refers to Empower (Build 1154), Empower 2 (Build 2154), and Empower 3 (Build 3471) software. This Technical Notes does not document interactions between other Waters products such as MassLynx or UNIFI and security software. Empower background Empower is a distributed data acquisition, processing, and control application. It is a scalable solution. This discussion focuses on the Enterprise configuration where application components are distributed among separate physical machines in a network environment. The Empower system consists of the following components: Database server An Oracle database (Versions 9, 10, and 11) generally running on a Windows Server platform. Other solutions include the Solaris UNIX and Linux operating systems. File server A Windows platform designed to host raw data files and serve them to other components of the application. Client A Windows platform designed to allow a user to interact with the Empower application. Acquisition node A Windows platform designed to control and collect data from analytical laboratory instrumentation. A Windows database server generally includes database, file server, and client components as part of a standard installation. UNIX database deployments require the use of a separate Windows file server. In the Personal configuration, all components are present in a single physical machine. Security software background Companies such as Symantec, McAfee, and Sophos provide solutions designed to protect computing resources from network threats. These threats include viruses and denial-of-service attacks. The typical components of a security solution include: File system protection Usually a low-level program designed to intercept disk access before user-mode programs in order to prevent virus infections. Network protection Usually a low-level program designed to intercept network access before user-mode programs in order to prevent virus infections. In most cases these solutions support a set-and-forget approach that operates in the background in addition to a more aggressive interactive approach. The interactive approach is generally a full scan in that processes in memory and examines every file on the computer.

2 TECN Rev. 00 Page 2 of 7 Basic Empower activities Data acquisition Empower data is acquired using one or more of the following communications technologies: Serial o Onboard serial port o Equinox serial card or Avocent Serial hub connected through Ethernet o A card supplied by Waters o USB-to-serial converters Ethernet using additional network card(s) configured into a bridged network, generally referred to as the instrument LAN USB control of instruments not manufactured by Waters IEEE-488 o Control of instruments manufactured by Waters and controlled through a buslac/e card o An Ethernet to IEEE-488 converter Independent of the communications protocol, Empower issues commands to and collects data from instruments in a near real-time fashion. The initial activity is generally performed remotely via the use of COM and DCOM communications protocols. For example, a user sitting at a client PC may instruct a system connected to a remote computer to begin collecting data. Instruments have sufficient memory to buffer data for very short periods of time (1 to 15 seconds) and have similar timeout values. However, if the underlying operating system closes or is instructed to close a connection to an instrument, failure is likely and a message is recorded in the Empower Message Center. Closing a communications connection may occur, for example, during an update of the security software. This activity on the part of the security software is used to prevent an attack from succeeding during an unguarded moment. While this type of vulnerability is mainly Ethernet-based, it may also occur on other communications protocols. Empower has the ability to detect and respond to disconnections between the acquisition level and the database/file server level. Similarly, writing data to the local disk is a significant activity. If a security solution interferes with this process, then one or more of the following conditions may occur: Instrument failure or hanging Loss of data

3 TECN Rev. 00 Page 3 of 7 The typical programs involved in data acquisition include: watersservice.exe instrumentserver.exe wdhcpserversvc.exe quickset.exe quickstart.exe For the Waters ACQUITY product line, there are control applications that run and access the instruments through the Instrument LAN. These include: acquityconsole.exe yyyserver.exe, where yyy designates the type of instrument (such as BSM and QSM for pumps, and FTN and SM for injectors) When the Instrument Control Driver is supplied by a 3rd party, the application file names may vary. The most likely interruptions to data acquisition are: Access to local hard disk to cache collected data Access to remote hard disk during transfer of data Communications with instruments connected to the acquisition node The actual interruption may go unnoticed by the end user because Empower was designed to collect data in the background, often on a remote node where no one is actively logged in. In most cases this prevents immediate and obvious notification that an issue has occurred. An administrator can review logs such as the alert.log, sqlnet.log, recover.log, various OS event logs and others to determine the nature of the issue. Data processing The Empower application processes data via the client component which reads raw data from the file server component. Processed areas, amounts, and other data are then returned to the Empower database on the server. The most likely interruption to data processing is in the area of supplying data. In some cases, when security software has been configured to do so, there may be an interactive alert. In a Citrix environment, the alert message may appear on the console of the server and will not be visible to the user. An administrator can review logs such as the alert.log, sqlnet.log, recover.log, various OS event logs and others to determine the nature of the issue. Another possible behavior related to use of security software and Empower is the inability to launch some Empower applications, particularly when using the Pro Interface. For example, opening a project from Configuration Manager uses the DCOM protocol. If the security software interferes with the transfer of information, the user may receive a failed to launch message. While there are other reasons for this message, the effects of a too aggressive security system need to be eliminated.

4 TECN Rev. 00 Page 4 of 7 Recommendations General Install the Empower application, Waters-supplied instrument drivers, and 3rd party software as an Administrator and with the security software temporarily disabled. For systems using Microsoft products, this would include the Windows Firewall and Defender programs. It is important to remember that some security systems may contain multiple components such as antivirus and intrusion prevention/detection. When changing the configuration during installation or on a routine basis, remember to address all of these security components. If your system is running on Windows 7, you should disable Microsoft User Access Control. Excluding folders and files from scanning If possible, exclude the \Empower folder and all sub directories from real time scanning. If not, then you should exclude the following files from scanning and other activities: Folder \empower\bin Files to exclude *.exe *.ocx *.dll Comments There are language-specific folders for English (en), Japanese (ja), Chinese (zh) and Korean (ka). You should exclude the all.dll files in these directories as well. \empower\html All files Used to display certain user interface elements. \empower\instruments\bin *.exe \empower\instruments\html All files Used to display certain user interface elements. \empower\instruments\settings All files Used to store some instrument settings. \empower\instruments\temp All files Empower may create temporary files here. \empower\instruments\3rd party vendor folder(s) 3rd party drivers may also install into \empower\instruments. Consult the 3rd party vendor for information regarding any files that should be excluded. \empower\logs All files Log files are created during certain activities such as batch backup or batch restore. \empower\oracle \empower\projects and \empower\restore \empower\scripts *,dat *.inf *.cks *.exp *.log *.txt *.sql *.txt *.log *.bat Refer to the section on Oracle files. Accessed when performing specific functions such as upgrading projects and databases.

5 TECN Rev. 00 Page 5 of 7 NOTE: During development and testing, Waters configures Empower nodes by excluding the \empower folder and all subfolders. Waters strongly recommends that customers exclude the folders rather than specific file types for this reason. In addition, you should also exclude directories for Waters-supplied and 3rd party instrument drivers if they installed into directories other than those under the Empower folder. If you are unable to exclude directories, contact the instrument driver vendor for assistance in determining the specific file types to exclude. Excluding Oracle-related files In document ID # , Oracle recommends at a minimum the following files be excluded: Oracle datafiles Control files Redo-log files Archived redo-log files if database is in archive log mode *.ora files Password file *.log files in the ORACLE_HOME folder The Oracle document indicates that these files need to be open all of the time in order for the database to be accessible. Security software may place a temporary lock on the file which would prevent access by Oracle. The effect of this lock may be a database hang, crash, or other unexpected behavior. Program exceptions to the firewall Where possible, configure firewall software to allow, or to allow and log communications access. If firewall software is configured to deny a connection, ensure that the denial is logged to aid in troubleshooting. If possible, eliminate firewall protections on the instrument LAN. Connect only supported instruments on the Instrument LAN. Do not attach printers, computers, or other devices to the instrument LAN. The Empower 3 Installation and Configuration Guide lists the Waters-supplied applications that should be added as exceptions to the firewall. Refer to the Release Notes for Waters supplied software issued after the release of Empower 3. Additional exceptions may be needed if 3rd party drivers are in use. Document the security software and limit changes Security software suites often use a mechanism similar to Active Directory group policies where PCs are grouped into collections. Waters recommends that you configure Empower database servers, file servers, clients. and LAC/E 32 modules into their own collection. Define and document the configuration and whether and how often changes to the configuration are allowed.

6 TECN Rev. 00 Page 6 of 7 Monitor on a frequent basis Encourage users to document their experiences in order to establish a baseline. System administrators should review logs generated by security software on a periodic basis searching for the terms empower" and "waters," as well as other key topics such as the name(s) of a 3rd party instrument vendor whose driver is in use. Troubleshooting and diagnosis When an issue occurs, obtain the following information: Description of the issue 1st occurrence of the issue Last occurrence of typical behavior Any recent changes Logs and other information which may be of a transient nature Operating system event logs Empower message center Empower recover log Service Profile (if system is an ACQUITY) Agilent ICF logs (if system is an Agilent) 3rd party security software logs (if not logged into the OS event logs) which may include: o Ports or programs blocked o Files quarantined o Program updates If behavior occurs with sufficient frequency, consider disabling the security software for a short period of time. If this eliminates the behavior, then you can assume that the security software is contributing to the behavior. Change one component at a time whenever possible. Determine whether the interruption was temporary in nature such as during buffering. Use the instrumentserver recover command while logged in as a domain administrator to upload raw data files to the file server. If manual data recovery works, then the interruption is generally security related. Consider running the watersservice.exe service as a domain user rather than as SYSTEM. In order to do this, the domain user will need full control of the Empower project share directories. Review the collected logs to determine whether an event such as a program update, security scan, or quarantine of one or more files or processes occurred at the time of the behavior. Consider configuring additional exceptions to the security software as indicated by the logs. These could include: Delay of program updates to an idle time Allowing rather than blocking of programs and/or processes

7 TECN Rev. 00 Page 7 of 7 Contact Waters Support through your local subsidiary for assistance as required. Be prepared to supply the logs collected above, any investigation performed, and the results of such investigations. NOTE: When making any changes to a system, you should consider the applicable Standard Operating Procedures (SOPs) and complete the appropriate documentation and validation.

Empower 3 Feature Release 3 Hotfix 1 Release Notes

Empower 3 Feature Release 3 Hotfix 1 Release Notes *716004786* *Rev.A* Empower 3 Feature Release 3 Hotfix 1 Release Notes 716004786 Revision A Copyright Waters Corporation 2016 All rights reserved General information Copyright notice 2016 WATERS CORPORATION.

More information

Benefits. Centrally managed protection of corporate networks

Benefits. Centrally managed protection of corporate networks Defend what you create Centrally managed protection of corporate networks Benefits Centrally managed protection of Windows workstations, Windows file servers and Unix mail servers High scalability Grouping

More information

Empower 3 FR3 System Administrator's Guide / Revision A Copyright Waters Corporation All rights reserved

Empower 3 FR3 System Administrator's Guide / Revision A Copyright Waters Corporation All rights reserved Empower 3 FR3 System Administrator's Guide 715005082 / Revision A Copyright Waters Corporation 2002-2016 All rights reserved Page ii Empower 3 FR3 System Administrator's Guide Copyright notice 2002-2016

More information

Agilent 7890 GC Instrument Control Software Version 2.5

Agilent 7890 GC Instrument Control Software Version 2.5 R E L E A S E N O T E S Agilent 7890 GC Instrument Control Software Version 2.5 The Agilent 7890 GC Instrument Control Software version 2.5 enables dual-tower injection capability and provides support

More information

Waters Driver Pack 2016 Release 1

Waters Driver Pack 2016 Release 1 Waters Driver Pack 2016 Release 1 Installation and Configuration Guide 715005197 Revision A Copyright Waters Corporation 2016 All rights reserved General information Copyright notice 2016 WATERS CORPORATION.

More information

Agilent 7890 GC Instrument Control Software Version 2.01

Agilent 7890 GC Instrument Control Software Version 2.01 R E L E A S E N O T E S Agilent 7890 GC Instrument Control Software Version 2.01 These release notes explain how to install Waters Instrument Control Software (ICS), version 2.01, for the Agilent 7890

More information

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

Selecting an Empower 2 Database Server

Selecting an Empower 2 Database Server TECN1852724 Rev. 01 Page 1 of 7 The Empower 2 application uses memory on the server to store information read from and inserted into the database. This document describes important information regarding

More information

Configuring Symantec. device

Configuring Symantec. device Configuring Symantec AntiVirus for Hitachi File OS device Configuring Symantec AntiVirus for Hitachi File OS device The software described in this book is furnished under a license agreement and may be

More information

Chapter 12: Advanced Operating Systems

Chapter 12: Advanced Operating Systems : Advanced Operating Systems IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents,

More information

Antivirus Solution Guide. NetApp Clustered Data ONTAP 8.2.1

Antivirus Solution Guide. NetApp Clustered Data ONTAP 8.2.1 Antivirus Solution Guide NetApp Clustered Data ONTAP 8.2.1 Contents Abstract... 4 Audience... 4 Purpose and Scope... 4 Introduction... 4 Antivirus Solution Architecture... 5 Components of the Vscan/AV

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Avira Free Mac Security Version HowTo

Avira Free Mac Security Version HowTo Avira Free Mac Security Version 2.0.4 HowTo Table of contents 1. Introduction... 3 1.1 Features... 3 1.2 System Requirements...4 2. Installation...4 2.1 Installation with the install wizard...4 2.2 Installation

More information

Empower 2 Feature Release 5 Upgrade Guide

Empower 2 Feature Release 5 Upgrade Guide Empower 2 Feature Release 5 Upgrade Guide 715001799/Revision A Copyright Waters Corporation 2008 All rights reserved Copyright notice 2008 WATERS CORPORATION. PRINTED IN THE UNITED STATES OF AMERICA AND

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Relius Administration Version 19.1 Upgrade Installation and Configuration. October 28, 2014

Relius Administration Version 19.1 Upgrade Installation and Configuration. October 28, 2014 Relius Administration Version 19.1 Upgrade Installation and Configuration October 28, 2014 Table Of Contents Section Subject 1 Overview 2 Installation and Environment Considerations 3 Performing the Relius

More information

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps 2018 By: RemoveVirus.net Remove A Virus From Your PC In 5 Simple Steps PCs, like Macs and Mobile Devices are susceptible to different types of malware. Avoid panicking when you realize that your PC has

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

McAfee Endpoint Security

McAfee Endpoint Security Release Notes 10.5.3 Contents About this release What's new Resolved issues Installation information Known issues Getting product information by email Where to find product documentation About this release

More information

Antivirus Solution Guide for Clustered Data ONTAP: Symantec

Antivirus Solution Guide for Clustered Data ONTAP: Symantec Technical Report Antivirus Solution Guide for Clustered Data ONTAP: Symantec Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp July 2016 TR-4304 Abstract An antivirus solution is key for enterprises

More information

Recommended release notes

Recommended release notes Sophos Anti-Virus for Mac OS X Recommended release notes About these release notes These are the release notes for Sophos Anti-Virus for Mac OS X. Note: You may find that you cannot yet download and use

More information

Agilent 7890 GC Instrument Control Software Version 2.6

Agilent 7890 GC Instrument Control Software Version 2.6 R E L E A S E N O T E S Agilent 7890 GC Instrument Control Software Version 2.6 Version 2.6 of the instrument control software (ICS) for the Agilent 7890 GC addresses several issues, provides support for

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Empower 2 System Administrator s Guide

Empower 2 System Administrator s Guide Empower 2 System Administrator s Guide 71500109808/Revision B Copyright Waters Corporation 2008 All rights reserved Copyright notice 2008 WATERS CORPORATION. PRINTED IN THE UNITED STATES OF AMERICA AND

More information

SIMATIC. Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software. Preface. Using virus scanners 2

SIMATIC. Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software. Preface. Using virus scanners 2 SIMATIC Process Control System PCS 7 V7.0 SP1 SIMATIC Process Control System PCS 7 V7.0 SP1 Security Information Note: Setting up antivirus software Security Information Note Preface 1 Using virus scanners

More information

Module 15. Troubleshooting Software

Module 15. Troubleshooting Software Module 15 Troubleshooting Software Objectives 1. 4.6 Troubleshooting Software 2. 4.7 Troubleshooting Security 2 TROUBLESHOOTING SOFTWARE 3 Troubleshooting Legacy Software Installation 1. Check Microsoft

More information

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.

Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1. Symantec Endpoint Protection, Symantec Endpoint Protection Small Business Edition, and Symantec Network Access Control 12.1.3 Release Notes Symantec Endpoint Protection, Symantec Endpoint Protection Small

More information

Empower 3 Installation, Configuration, and Upgrade Guide /Revision A Copyright Waters Corporation All rights reserved

Empower 3 Installation, Configuration, and Upgrade Guide /Revision A Copyright Waters Corporation All rights reserved Empower 3 Installation, Configuration, and Upgrade Guide 715005081/Revision A Copyright Waters Corporation 2002-2016 All rights reserved Page ii General Information Copyright notice 2002-2016 WATERS CORPORATION.

More information

AlienVault USM Appliance for Security Engineers 5 day course outline. Module 2: USM Appliance Basic Configuration and Verifying Operations

AlienVault USM Appliance for Security Engineers 5 day course outline. Module 2: USM Appliance Basic Configuration and Verifying Operations AlienVault USM Appliance for Security Engineers 5 day course outline Course Introduction Module 1: Overview The Course Introduction provides students with the course objectives and prerequisite learner

More information

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business.

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business. Endpoint Protection Antivirus and Antispyware Eliminates all types of threats, including viruses, rootkits, worms and spyware. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers

More information

Module 2: AlienVault USM Basic Configuration and Verifying Operations

Module 2: AlienVault USM Basic Configuration and Verifying Operations AlienVault USM for Security Engineers 5 day course outline Course Introduction Module 1: Overview The Course Introduction provides students with the course objectives and prerequisite learner skills and

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

Zillya Internet Security User Guide

Zillya Internet Security User Guide Zillya Internet Security User Guide Content Download Zillya Internet Security... 4 Installation Zillya Internet Security... 4 System Status... 7 System Scanning... 9 When Zillya Internet Security finds

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45 User Guide i Contents Introduction 5 McAfee SecurityCenter 7 Features... 8 Using SecurityCenter... 9 Header... 9 Left column... 9 Main pane... 10 Understanding SecurityCenter icons... 11 Understanding

More information

Kaspersky Administration Kit 8.0 REFERENCE GUIDE

Kaspersky Administration Kit 8.0 REFERENCE GUIDE Kaspersky Administration Kit 8.0 REFERENCE GUIDE P R O G R A M V E R S I O N : 8. 0 C R I T I C A L F I X 1 Dear User! Thank you for choosing our product. We hope that this documentation will help you

More information

ForeScout Extended Module for Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection ForeScout Extended Module for Symantec Endpoint Protection Version 1.0.0 Table of Contents About the Symantec Endpoint Protection Integration... 4 Use Cases... 4 Additional Symantec Endpoint Protection

More information

: Administration of Symantec Endpoint Protection 14 Exam

: Administration of Symantec Endpoint Protection 14 Exam 250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE

More information

PTS Customer Protection Agreement

PTS Customer Protection Agreement PTS Customer Protection Agreement Revised: July 26, 2017 Thank you for choosing as your IT provider. Customer s Network environments with the most success have an in-house Network Administrator or someone

More information

SonicWALL Security Software

SonicWALL  Security Software Email Security SonicWALL Email Security 7.2.4 Software System Compatibility SonicWALL Email Security 7.2.4 Software is supported on systems with the following: Operating Systems Windows 2003, SP2 Windows

More information

The Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008

The Convergence of Management and Security. Stephen Brown, Sr. Product Manager December 2008 The Convergence of Management and Security Stephen Brown, Sr. Product Manager December 2008 Agenda 1 A Robust Management Foundation 2 The Value of Security and Management Convergence 3 Symantec Endpoint

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Version 10.1 Update Installation and Configuration. October 5, 2005

Version 10.1 Update Installation and Configuration. October 5, 2005 Version 10.1 Update Installation and Configuration October 5, 2005 Table Of Contents Section Subject 1 Overview 2 Installation and Environment Considerations 3 Performing the Relius Administration 10.1

More information

Sophos Enterprise Console

Sophos Enterprise Console secure network quick startup guide Product Version: 5.5 Contents About this guide... 1 Limitations on the secure network...2 What do I install?...3 What are the key steps?... 4 Download the installers...5

More information

Network Security Platform Overview

Network Security Platform Overview Quick Tour Revision B McAfee Network Security Platform 8.1 Network Security Platform Overview McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Content for Sophos- Theory and lab session

Content for Sophos- Theory and lab session Content for Sophos- Theory and lab session Module 1 : Enduser Protection deployment scenarios Review of Enduser Protection features and components Factors to consider when designing solutions Single site

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

The following documents are included with your Sony VAIO computer.

The following documents are included with your Sony VAIO computer. Documentation The following documents are included with your Sony VAIO computer. Printed Documentation Quick Start Guide Describes the process from unpacking to starting up your VAIO. Troubleshooting and

More information

This document provides instructions for the following products.

This document provides instructions for the following products. 1.1 Introduction 1.1.1 Purpose 1.1.2 Scope To install anti-virus software on the Brevera Breast Biopsy system with CorLumina imaging technology system. This document applies to all CorLumina systems with

More information

Ellipse Support. Contents

Ellipse Support. Contents Ellipse Support Ellipse Support Contents Ellipse Support 2 Commercial In Confidence 3 Preface 4 Mission 5 Scope 5 Introduction 6 What do you need to know about tuning and configuration? 6 How does a customer

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

New in this Release...3 New in Pointsec Media Encryption New in this Release of Pointsec Media Encryption - MI Client...4

New in this Release...3 New in Pointsec Media Encryption New in this Release of Pointsec Media Encryption - MI Client...4 Release Notes Pointsec Media Encryption - MI Client 2.6 Version B Copyright Pointsec Mobile Technologies AB, 2007, a Check Point Software Techonologies Ltd. company. For full documentation, please see

More information

For additional information, see these documents on the Breeze 2 software DVD:

For additional information, see these documents on the Breeze 2 software DVD: R E L E A S E N O T E S Waters Breeze 2 Read these release notes before you install and operate Breeze 2. They contain information necessary to ensure successful liquid chromatography results, including:

More information

Relius Documents PC SQL Express Installation and Configuration. April 15, 2008

Relius Documents PC SQL Express Installation and Configuration. April 15, 2008 Relius Documents PC SQL Express Installation and Configuration April 15, 2008 Table Of Contents Section Subject 1 Overview 2 Installation and Environment Considerations 3 Performing the Database Installation

More information

Sophos Enterprise Console

Sophos Enterprise Console quick startup guide Product Version: 5.5 Contents About this guide... 1 What do I install?...2 What are the key steps?... 3 Download the Enterprise Console installer...4 If you have a Sophos license...

More information

Windows 7 Professional 64 bit Installation and Configuration for MassLynx or Empower Controlled Ethernet Instrument Communication

Windows 7 Professional 64 bit Installation and Configuration for MassLynx or Empower Controlled Ethernet Instrument Communication Windows 7 Professional 64 bit Installation and Configuration for MassLynx or Empower Controlled Ethernet Instrument Communication May 2014 Version 4 PLEASE READ BEFORE CONTINUING: This document applies

More information

SonicWALL Network Anti-Virus

SonicWALL Network Anti-Virus SonicWALL Network Anti-Virus Contents Copyright Notice...2 Limited Warranty...2 Introduction...4 Managing Network Anti-Virus...5 Activating the Network Anti-Virus Subscription...6 Configuring Network Anti-Virus...7

More information

IBM Proventia Management SiteProtector Installation Guide

IBM Proventia Management SiteProtector Installation Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Installation Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports, read the information in

More information

Waters Headspace Control Option, Version 3.0

Waters Headspace Control Option, Version 3.0 R E L E A S E N O T E S Waters Headspace Control Option, Version 3.0 Version 3.0 of the Headspace Control Option (HCO) contains instrument drivers for Agilent Headspace Samplers and a toolkit program that

More information

Version 19.1 Web/VRU/CSR Upgrade Installation and Configuration. October 28, 2014

Version 19.1 Web/VRU/CSR Upgrade Installation and Configuration. October 28, 2014 Version 19.1 Web/VRU/CSR Upgrade Installation and Configuration October 28, 2014 Table Of Contents Section Subject 1 Overview 2 Installation and Environment Considerations 3 Performing the Relius Administration

More information

MassLynx 4.1 SCN 804. Release Notes. SQ Detector 2

MassLynx 4.1 SCN 804. Release Notes. SQ Detector 2 R E L E A S E N O T E S MassLynx 4.1 SCN 804 Release Notes SQ Detector 2 43464 Rev 01 Copyright Waters Corporation 2011. All rights reserved. Copyright 2011 Waters Corporation 43464_1. Waters is a registered

More information

Relius Administration Version For Public Consumption Last Updated: May 16, 2017 Relius Technology Support

Relius Administration Version For Public Consumption Last Updated: May 16, 2017 Relius Technology Support Relius Administration Version 2017 For Public Consumption Last Updated: May 16, 2017 Relius Technology Support Attention Technology Consultants! If you are unfamiliar with the end-user specific Relius

More information

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Getting Started Guide This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software. Contents 2 Contents Introduction... 3 System Requirements... 4

More information

F-Secure Mobile Security

F-Secure Mobile Security F-Secure Mobile Security for Windows Mobile User s Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

Deploy. Your step-by-step guide to successfully deploy an app with FileMaker Platform

Deploy. Your step-by-step guide to successfully deploy an app with FileMaker Platform Deploy Your step-by-step guide to successfully deploy an app with FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements, and

More information

Parallels Virtuozzo Containers 4.5 for Windows Release Candidate Readme

Parallels Virtuozzo Containers 4.5 for Windows Release Candidate Readme Parallels Virtuozzo Containers 4.5 for Windows Release Candidate Readme May 29, 2009 This document provides first-priority information on the Parallels Virtuozzo Containers 4.5 for Windows Release Candidate

More information

USB Server User Manual. USB Server Manual (DN-13010)

USB Server User Manual. USB Server Manual (DN-13010) USB Server Manual (DN-13010) Copyright Notice Copyright 2010. Al rights reserved. Disclaimer Incorporated shall not be liable for technical or editorial errors or omissions contained herein; nor for incidental

More information

ManageEngine EventLog Analyzer Quick Start Guide

ManageEngine EventLog Analyzer Quick Start Guide ManageEngine EventLog Analyzer Quick Start Guide Contents Installing and starting EventLog Analyzer Connecting to the EventLog Analyzer server Adding devices for monitoring Adding Windows devices Adding

More information

Waters ACQUITY QDa Instrument Component Software version 1.54

Waters ACQUITY QDa Instrument Component Software version 1.54 R E L E A S E N O T E S Waters ACQUITY QDa Instrument Component Software version 1.54 The ACQUITY QDa Detector is a single-quadrupole mass detector. The instrument component software (ICS) adds the capability

More information

VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE. Version: 4.5

VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE. Version: 4.5 VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE This manual provides a quick introduction to Virtual Iron software, and explains how to use Virtual Iron VI-Center to configure and manage virtual

More information

Annexure E Technical Bid Format

Annexure E Technical Bid Format Annexure E Technical Bid Format ANTIVIRUS SOLUTION FOR MAIL SERVER SECURITY AND SERVER SECURITY FOR DESKTOP,LAPTOP Sr. No Description Compliance (Y/N) Remark 01 Must offer comprehensive client/server security

More information

Veriato Recon / 360. Version 9.0.3

Veriato Recon / 360. Version 9.0.3 Veriato Recon / 360 Version 9.0.3 1/3/2018 Upgrade Guide January 3, 2018 Table of Contents Before You Begin... 1 What's New... 1 How the System Works... 1 Upgrade Support... 6 Update Antivirus Exclusions...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

MBS Microsoft Oracle Plug-In 6.82 User Guide

MBS Microsoft Oracle Plug-In 6.82 User Guide MBS Microsoft Oracle Plug-In 6.82 User Guide 10 Oracle Plug-In This version of the Oracle Plug-In supports Windows Agents. It is an add-on that allows you to perform database backups on Oracle databases.

More information

Waters Empower 2 Service Pack G

Waters Empower 2 Service Pack G R E L E A S E N O T E S Waters Empower 2 Service Pack G Empower 2 Service Pack G enhances LDAP capabilities. These release notes also address the following information and instructions: System and software

More information

Appendix A: Version 4.0 Networking Guidelines

Appendix A: Version 4.0 Networking Guidelines Appendix A: Version 4.0 Networking Guidelines Notice Users are responsible for network setup and maintenance, including installation and configuration of all necessary hardware and software. Carl Zeiss

More information

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual GFI MailSecurity 2011 for Exchange/SMTP Administration & Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and

More information

Version 16.1 Upgrade Installation and Configuration. July 5, 2011

Version 16.1 Upgrade Installation and Configuration. July 5, 2011 Version 16.1 Upgrade Installation and Configuration July 5, 2011 Table Of Contents Section Subject 1 Overview 2 Installation and Environment Considerations 3 Performing the Relius Administration 16.1 Upgrade

More information

Remove Manually Norton Internet Security 2012 Will Not Start

Remove Manually Norton Internet Security 2012 Will Not Start Remove Manually Norton Internet Security 2012 Will Not Start Restart your computer to check if you can start your Norton product. I cannot connect to the Internet My Norton product does not work or displays

More information

SUBSTANTIAL TECHNOLOGY PARTNERSHIPS FOR YOUR SOLID SECURITY

SUBSTANTIAL TECHNOLOGY PARTNERSHIPS FOR YOUR SOLID SECURITY SUBSTANTIAL TECHNOLOGY PARTNERSHIPS FOR YOUR SOLID SECURITY Connect reliable macmon Network Access Control (NAC) with leading security solutions and profit from real benefits! Our in-house developed NAC

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

Installation Manual. and User Guide

Installation Manual. and User Guide Installation Manual and User Guide ESET Mobile Antivirus For Windows Mobile Copyright 2009 by ESET, spol. s r. o. ESET Mobile Antivirus For Windows Mobile was developed by ESET, spol. s r.o. For more information

More information

ForeScout CounterACT Resiliency Solutions

ForeScout CounterACT Resiliency Solutions ForeScout CounterACT Resiliency Solutions User Guide CounterACT Version 7.0.0 About CounterACT Resiliency Solutions Table of Contents About CounterACT Resiliency Solutions... 5 Comparison of Resiliency

More information

Managing Oracle Real Application Clusters. An Oracle White Paper January 2002

Managing Oracle Real Application Clusters. An Oracle White Paper January 2002 Managing Oracle Real Application Clusters An Oracle White Paper January 2002 Managing Oracle Real Application Clusters Overview...3 Installation and Configuration...3 Oracle Software Installation on a

More information

Nortel Media Application Server 5.1. Installation NN

Nortel Media Application Server 5.1. Installation NN NN44450-300 Document status: Standard Document issue: 01.03 Document date: 15 October 2008 Product release: Release 5.1 Job function: and Commissioning Type: Technical document Language type: English All

More information

Infrastructure: Local/Client Hosted

Infrastructure: Local/Client Hosted Infrastructure: Local/Client Hosted This section describes the infrastructure required to optimally run Profile in your organisation. It is advised that you check with your hardware vendor or IT consultant

More information

BD FACSMelody Cell Sorter Installation and Security Guide

BD FACSMelody Cell Sorter Installation and Security Guide BD FACSMelody Cell Sorter Installation and Security Guide For Research Use Only 23-20312-00 6/2018 Becton, Dickinson and Company BD Biosciences 2350 Qume Drive San Jose, CA 95131 USA BD Biosciences European

More information

MySQL Cluster Ed 2. Duration: 4 Days

MySQL Cluster Ed 2. Duration: 4 Days Oracle University Contact Us: +65 6501 2328 MySQL Cluster Ed 2 Duration: 4 Days What you will learn This MySQL Cluster training teaches you how to install and configure a real-time database cluster at

More information

McAfee Internet Security Suite Quick-Start Guide

McAfee Internet Security Suite Quick-Start Guide Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet

More information

Version 18.1 Web/VRU/CSR Upgrade Installation and Configuration. August 15, 2013

Version 18.1 Web/VRU/CSR Upgrade Installation and Configuration. August 15, 2013 Version 18.1 Web/VRU/CSR Upgrade Installation and Configuration August 15, 2013 Table Of Contents Section Subject 1 Overview 2 Installation and Environment Considerations 3 Performing the Relius Administration

More information

Waters Fraction Collector III with Empower Instrument Control Software Version 1.00

Waters Fraction Collector III with Empower Instrument Control Software Version 1.00 R E L E A S E N O T E S Waters Fraction Collector III with Empower Instrument Control Software Version 1.00 These release notes explain how to install Waters Instrument Control Software (ICS), version

More information

Release Notes McAfee Application Control 6.1.0

Release Notes McAfee Application Control 6.1.0 Release Notes McAfee Application Control 6.1.0 About this document New features Known issues Resolved issues Installation instructions Find product documentation About this document Thank you for choosing

More information