Discovery. Discovery

Size: px
Start display at page:

Download "Discovery. Discovery"

Transcription

1 Discovery Discovery

2 Building a Baseline Inventory - Overview Manual Certificate Import Manual Certificate Records CA Exports CA Import & Bulk Certificate Import LoB Operations Finance External CA Export Internal MS CA Export Network Discovery Agent Discovery Leverage Vulnerability Assessment Results (Targeted Queries) vtpp Agent Discovery Queries

3 Network Discovery - Overview Locates certificates used in SSL/TLS connection on accessible network ports Uses a protocol compliant approach to scanning Attempts TCP 3-way handshake and SSL Handshake Doesn t use protocol tricks like other vulnerability scanners Non-responding hosts / ports must wait for timeouts Each engine is able to scan about 800k Ports / hr 12 IP addresses x ports = 786,432 total ports

4 Network Discovery - Targeting Leverage Vulnerability Assessments (scans) to provide targeted Network Discovery information Review of hosts & ports where certificates may be found Manual translation into TPP there isn t an import function

5 Network Discovery Targeting Strategies Targeting IPs and Ports Use information gleaned from vulnerability assessments. Pros: Fast, scan only known ports Cons: Will never find new server stood up, requires constant tweaking / resetting from vulnerability assessments

6 Network Discovery Targeting Strategies Targeted ports / full subnets Use port information from vulnerability assessments, but scan whole IP subnets. Pros: Targeted to find common ports that may have certificates. Less administrative maintenance. Will find new servers being stood up in environment. Cons: Slower than more focused scans. Still requires occasional review of targeted IP subnets and ports.

7 Network Discovery Targeting Strategies Full Discovery All IPs & All Ports Pros: Ensure a complete discovery of the whole environment. Cons: Slow. May not be practical for every environment. Slow. Could require a lot of extra scanning engine resources and/or firewall rules. Very slow. Leveraging the Venafi Server agent may be the only practical way to achieve full discovery on a reasonable timeframe.

8 Network Discovery Planning & Architecture Network topology and access control rules define the number of dedicated TPP scanning engine(s) needed to conduct network Discovery in all zones. Network zones should map to Devices & Apps folder in TPP. Best Practice: Create a separate Network Discovery job for each zone to be scanned. Allows the proper assignment of Certificate & Device Placement rules

9 Network Discovery Planning & Architecture

10 Network Discovery Planning & Architecture

11 Network Discovery Planning & Architecture

12 Discovery Placement Rules Placement Rules correspond directly to the policy folder structure created under the _Discovered folder. Create the folder structure before building placement rules. Default Vendor Issuer Certificates PS maintains a list of typically encountered Vendor Certificates. Known Issuers (e.g. Symantec and Internal CA) Define additional rules to refine the sort using certificate properties Place into dedicated ownership folders within \VED\Policy\Certificates folder structure! Note: Placement rules are used for both Network and Agent certificate discovery work Self-Signed Certificates Unknown / Other

13 Discovery Placement Rules Duplicate placement rules for each network separate zone that will be scanned Device placement is tied to certificate placement rules. Devices must be placed appropriately within the policy tree to ensure that validation functions. Validation & Provisioning use engine-based partitioning in the Policy Tree vs. Discovery Zones assignment on the engine itself

14 Discovery Placement Rules To match common vendor default certificates that are encountered and place them in the Default Vendor Issued folder, PS has crafted a regular expression that can be used to match the vast majority of discovered vendor certificates.

15 Discovery Placement Rules It s also necessary to create a catch-all rule for each network zone. This rule is configured to match any certificate found, and controls the placement of the device object. The if no rules apply setting on the Discovery job does not allow placement of devices to be specified!

16 Discovery Placement Rules

17 Network Discovery Assigning Placement Rules

18 Agent Discovery - Overview Agents can discover certificates not accessible over the network. Client authentication certificates Truststore certificates and bundles Discovery can be performed on a more frequent (daily) basis. Discovered certificates are pushed to the TPP server using a single port (443), dramatically reducing: Firewall requirements; and The number of additional engines required for discovery

19 Agent Discovery Agent Groups should be configured to follow the same zoning to ensure proper placement of devices as well! -Use Membership Criteria and IP in x.x.x.x to align with network zones.

20 Agent Discovery Agents use the same Certificate Placement Rules as Network Discovery!

21 Discovery - Scheduling Security best practice would call for Discovery every night, though that may not be practical based on the size and scope of the network. In this case an Agent deployment is the best option! Evaluate the results of those scans as quickly as possible. Use judgment based upon empirical evidence observed during the initial scans: If it s reasonable that all scans could be performed in that environment every two weeks, that should be the recommendation. If only critical server zones can be completed in that reasonable time, schedule those for more frequent runs.

22 Discovery - Scheduling Regardless of the schedule, best-practice would dictate that Network Discovery Jobs are scheduled. A recurring schedule is decided upon Standing change control tickets are established The scans are performed using the scheduler, not manually started

23 Discovery Analyze Results Certificates that expire very soon (within days) Weak keys length, especially in production or internet facing systems Deprecated algorithms Certificates from Known Issuers without ownership assigned

24 Discovery Analyze Results ISSUERS! (Especially ones that are not normal) Certificates that don t expire in a secure fashion (20 year plus) Self-signed certificates Same certificate installed on multiple systems (1 certificate across hundreds of systems)

25 Lab Complete Lab VTIS Discovery Placement Rules Time: 20 minutes View labs, slides, and other resources:

Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541

Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541 Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541 Compliance and Settings Management Device Management

More information

Streamline Certificate Request Processes. Certificate Enrollment

Streamline Certificate Request Processes. Certificate Enrollment Streamline Certificate Request Processes Certificate Enrollment Contents At the end of this section, you will be able to: Configure TPP to allow users to request new certificates through Aperture Policy

More information

SSH Product Overview

SSH Product Overview SSH Product Overview SSH Product Overview Understanding SSH SSH Discovery and Remediation Agentless SSH Agent Based SSH 2018 Venafi. All Rights Reserved. 2 Where is SSH used? File Transfer & Remote Script

More information

VSP18 Venafi Security Professional

VSP18 Venafi Security Professional VSP18 Venafi Security Professional 13 April 2018 2018 Venafi. All Rights Reserved. 1 VSP18 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for:

More information

Venafi Server Agent Agent Overview

Venafi Server Agent Agent Overview Venafi Server Agent Agent Overview Venafi Server Agent Agent Intro Agent Architecture Agent Grouping Agent Prerequisites Agent Registration Process What is Venafi Agent? The Venafi Agent is a client/server

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

VSP16. Venafi Security Professional 16 Course 04 April 2016

VSP16. Venafi Security Professional 16 Course 04 April 2016 VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER Course 10747D; Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN This course describes how to configure

More information

Reinvent Your 2013 Security Management Strategy

Reinvent Your 2013 Security Management Strategy Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses... 5 Check your licenses...6

More information

Comodo Certificate Manager

Comodo Certificate Manager Comodo Certificate Manager Simple, Automated & Robust SSL Management from the #1 Provider of Digital Certificates 1 Datasheet Table of Contents Introduction 3 CCM Overview 4 Certificate Discovery Certificate

More information

BMC Remedyforce Discovery and Client Management. Frequently asked questions

BMC Remedyforce Discovery and Client Management. Frequently asked questions BMC Remedyforce Discovery and Client Management Frequently asked questions 1 Table of Contents BMC Remedyforce Discovery and Client Management 4 Overview 4 Remedyforce Agentless Discovery 4 Remedyforce

More information

A: Administering System Center Configuration Manager

A: Administering System Center Configuration Manager 20703-1A: Administering System Center Configuration Manager Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This five-day course describes how to use Configuration Manager and its associated site

More information

User Guide. Version R95. English

User Guide. Version R95. English Software Management User Guide Version R95 English September 22, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

How to configure Sophos for all other clients

How to configure Sophos  for all other clients How to configure Sophos Email for all other clients 1. Add Your Domain & Verify Ownership 2. Add Mailboxes to Sophos Email 3. Restrict Delivery to Sophos IP Addresses 4. Modify MX records to point to Sophos

More information

Administration of Altiris Client Management Suite 7.0 Study Guide

Administration of Altiris Client Management Suite 7.0 Study Guide Administration of Altiris Client Management Suite 7.0 Study Guide The following tables list the Symantec Certification exam objectives for the Administration of Altiris Client Management Suite 7.0 exam

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Course Outline Module 1: Managing computers and mobile devices in the enterprise This module describes the features of Configuration Manager

More information

Service Mesh and Microservices Networking

Service Mesh and Microservices Networking Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Course 20703-1A 5 Days Instructor-led, Hands on Course Information This five-day course describes how to use Configuration Manager and its associated site

More information

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER Course Code: 20703-1a Duration 5 days Introduction This five-day course describes how to use Configuration and its associated site systems to efficiently

More information

Atrium Webinar- What's new in ADDM Version 10

Atrium Webinar- What's new in ADDM Version 10 Atrium Webinar- What's new in ADDM Version 10 This document provides question and answers discussed during following webinar session: Atrium Webinar- What's new in ADDM Version 10 on May 8th, 2014 Q: Hi,

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager 20703-1; 5 Days; Instructor-led Course Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

ELIMINATE SECURITY BLIND SPOTS WITH THE VENAFI AGENT

ELIMINATE SECURITY BLIND SPOTS WITH THE VENAFI AGENT ELIMINATE SECURITY BLIND SPOTS WITH THE VENAFI AGENT less discovery can t find all keys and certificates Key and certificate management is no longer just an IT function. So it cannot be treated the same

More information

ZENworks 2017 Audit Management Reference. December 2016

ZENworks 2017 Audit Management Reference. December 2016 ZENworks 2017 Audit Management Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

ZENworks 11 Support Pack 4 Management Zone Settings Reference. October 2016

ZENworks 11 Support Pack 4 Management Zone Settings Reference. October 2016 ZENworks 11 Support Pack 4 Management Zone Settings Reference October 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S.

More information

Sophos Mobile SaaS startup guide. Product version: 7.1

Sophos Mobile SaaS startup guide. Product version: 7.1 Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8

More information

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018 How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

Qualys Cloud Platform

Qualys Cloud Platform Qualys Cloud Platform Quick Tour The Qualys Cloud Platform is a platform of integrated solutions that provides businesses with asset discovery, network security, web application security, threat protection

More information

Cyber Essentials Questionnaire Guidance

Cyber Essentials Questionnaire Guidance Cyber Essentials Questionnaire Guidance Introduction This document has been produced to help companies write a response to each of the questions and therefore provide a good commentary for the controls

More information

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS Number: 1Y0-200 Passing Score: 800 Time Limit: 120 min File Version: 38.7 http://www.gratisexam.com/ CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS Exam Name: Managing

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Configuring Vulnerability Assessment Devices

Configuring Vulnerability Assessment Devices CHAPTER 10 Revised: November 10, 2007 Vulnerability assessment (VA) devices provide MARS with valuable information about many of the possible targets of attacks and threats. They provide information useful

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

HOW TO BUILD A SUCCESSFUL VULNERABILITY MANAGEMENT PROGRAM FOR MEDICAL DEVICES. Sarah Kennedy Robert Sloan

HOW TO BUILD A SUCCESSFUL VULNERABILITY MANAGEMENT PROGRAM FOR MEDICAL DEVICES. Sarah Kennedy Robert Sloan HOW TO BUILD A SUCCESSFUL VULNERABILITY MANAGEMENT PROGRAM FOR MEDICAL DEVICES Sarah Kennedy Robert Sloan WHO WE ARE Sarah B.S. in Telecommunications Systems Management M.S. in Information Security CISSP

More information

CounterACT Check Point Threat Prevention Module

CounterACT Check Point Threat Prevention Module CounterACT Check Point Threat Prevention Module Version 1.0.0 Table of Contents About the Check Point Threat Prevention Integration... 4 Use Cases... 4 Additional Check Point Threat Prevention Documentation...

More information

Getting started with System Center Essentials 2007

Getting started with System Center Essentials 2007 At a glance: Installing and upgrading Configuring Essentials 2007 Troubleshooting steps Getting started with System Center Essentials 2007 David Mills System Center Essentials 2007 is a new IT management

More information

Novell ZENworks 10 Patch Management SP3

Novell ZENworks 10 Patch Management SP3 Reference AUTHORIZED DOCUMENTATION Novell ZENworks 10 Patch Management SP3 10.3 August 26, 2010 www.novell.com ZENworks 10 Patch Management Reference Legal Notices Novell, Inc. makes no representations

More information

Client Certificates Are Going Away

Client Certificates Are Going Away Client Certificates Are Going Away What now? Garrett Wollman, TIG May 2, 2016 1 Overview of this talk 1. Review of the current situation and how we got here 2. Our response to the deprecation of client

More information

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. Network IPS Overview Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats. By using protocol recognition, identification, and traffic analysis

More information

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary MOC 20703-1A: Administering System Center Configuration Manager Course Summary Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Changing the Administrator Password in Web

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure IT

More information

ForeScout Extended Module for Qualys VM

ForeScout Extended Module for Qualys VM ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical

More information

Course A: Administering System Center Configuration Manager

Course A: Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Overview: This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network

More information

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)

More information

ForeScout CounterACT. Configuration Guide. Version 5.0

ForeScout CounterACT. Configuration Guide. Version 5.0 ForeScout CounterACT Core Extensions Module: Reports Plugin Version 5.0 Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Verify That the Plugin Is Running... 5

More information

Altiris CMDB Solution from Symantec Help. Version 7.0

Altiris CMDB Solution from Symantec Help. Version 7.0 Altiris CMDB Solution from Symantec Help Version 7.0 CMDB Solution Help topics This document includes the following topics: About CMDB Solution CMDB Global Settings page Default values page Default values

More information

Forescout. eyeextend for VMware AirWatch. Configuration Guide. Version 1.9

Forescout. eyeextend for VMware AirWatch. Configuration Guide. Version 1.9 Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Forescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0

Forescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0 Forescout Version 2.0 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

High Availability Synchronization PAN-OS 5.0.3

High Availability Synchronization PAN-OS 5.0.3 High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...

More information

Administering System Center 2012 Configuration Manager

Administering System Center 2012 Configuration Manager Course 10747: Administering System Center 2012 Configuration Manager Page 1 of 8 Administering System Center 2012 Configuration Manager Course 10747: 4 days; Instructor-Led Introduction This four-day instructor-led

More information

Administering System Center Configuration Manager ( A)

Administering System Center Configuration Manager ( A) Administering System Center Configuration Manager (20703-1A) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Describing the features Configuration Manager and

More information

Advanced Security Tester Course Outline

Advanced Security Tester Course Outline Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,

More information

Venafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved.

Venafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved. Venafi Platform Architecture 1 Architecture Basic Professional Services 2018 Venafi. All Rights Reserved. Goals 1 2 3 4 5 Architecture Basics: An overview of Venafi Platform. Required Infrastructure: Services

More information

Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician

Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician Vendor: Microsoft Exam Code: 70-682 Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician Version: DEMO QUESTION 1 Scenario 1 For your convenience, the scenario is repeated

More information

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018 How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

IPV6 SIMPLE SECURITY CAPABILITIES.

IPV6 SIMPLE SECURITY CAPABILITIES. IPV6 SIMPLE SECURITY CAPABILITIES. 50 issues from RFC 6092 edited by J. Woodyatt, Apple Presentation by Olle E. Johansson, Edvina AB. ABSTRACT The RFC which this presentation is based upon is focused on

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Qualys Cloud Suite 2.x

Qualys Cloud Suite 2.x Qualys Cloud Suite 2.x Version 2.34 August 29, 2018 Here s what s new in Qualys Cloud Suite 2.34! Continuous Monitoring License Counts are enforced for Continuous Monitoring Security Assessment Questionnaire

More information

Administering System Center 2012 Configuration Manager

Administering System Center 2012 Configuration Manager Administering System Center 2012 Configuration Manager Duration: 5 Days Course Code:10747D About this Course This course describes how to configure and manage a System Center 2012 R Configuration Manager

More information

SHA-1 to SHA-2. Migration Guide

SHA-1 to SHA-2. Migration Guide SHA-1 to SHA-2 Migration Guide Web-application attacks represented 40 percent of breaches in 2015. Cryptographic and server-side vulnerabilities provide opportunities for cyber criminals to carry out ransomware

More information

Microsoft Administering System Center Configuration Manager

Microsoft Administering System Center Configuration Manager 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20703-1 Administering System Center Configuration Manager Length 5 days Price $4290.00 (inc GST) Version A Overview This five-day course describes how to

More information

Build

Build Web Dashboard User Manual Build 2.2.0.1 2017-04-05 This is the official user manual on using SAMLite web dashboard to perform reporting and administrative tasks. This manual describes each section of reporting

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

FIREWALL BEST PRACTICES TO BLOCK

FIREWALL BEST PRACTICES TO BLOCK Brought to you by Enterprie Control Systems FIREWALL BEST PRACTICES TO BLOCK Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting

More information

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and

More information

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9 Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Belarc Product Description

Belarc Product Description Belarc Product Description BelManage Base Belarc's architecture is based on a single enterprise-wide server and database. There is no requirement to maintain local servers or scanners. Belarc's discovery

More information

Forescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9

Forescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9 Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Manage Your Device Inventory

Manage Your Device Inventory About Device Inventory, page 1 Device Inventory and Cisco ISE Authentication, page 7 Device Inventory Tasks, page 7 Add a Device Manually, page 8 Filter Devices, page 12 Change Devices Layout View, page

More information

WhatsConfigured v3.1 User Guide

WhatsConfigured v3.1 User Guide WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the

More information

ForeScout Extended Module for Symantec Endpoint Protection

ForeScout Extended Module for Symantec Endpoint Protection ForeScout Extended Module for Symantec Endpoint Protection Version 1.0.0 Table of Contents About the Symantec Endpoint Protection Integration... 4 Use Cases... 4 Additional Symantec Endpoint Protection

More information

Tenable.io User Guide. Last Revised: November 03, 2017

Tenable.io User Guide. Last Revised: November 03, 2017 Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link

More information

10747D: Administering System Center 2012 Configuration Manager

10747D: Administering System Center 2012 Configuration Manager 10747D: Administering System Center 2012 Course Details Course Code: 10747D Elements of this syllabus are subject to change. About this course Duration: Notes: 5 days This course syllabus should be used

More information

EXAM Recertification for MCSE: Private Cloud. Buy Full Product.

EXAM Recertification for MCSE: Private Cloud. Buy Full Product. Microsoft EXAM - 70-981 Recertification for MCSE: Private Cloud Buy Full Product http://www.examskey.com/70-981.html Examskey Microsoft 70-981 exam demo product is here for you to test the quality of the

More information

ZENworks 2017 Patch Management Reference. December 2016

ZENworks 2017 Patch Management Reference. December 2016 ZENworks 2017 Patch Management Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Release Notes McAfee Vulnerability Manager 7.5.8

Release Notes McAfee Vulnerability Manager 7.5.8 Release Notes McAfee Vulnerability Manager 7.5.8 About this release Resolved issues Installation instructions Known issues Find product documentation About this release This document contains important

More information

Implementing and Supporting Windows Intune

Implementing and Supporting Windows Intune Implementing and Supporting Windows Intune Module 3: Computer Administration by Using Windows Intune Module Overview Understanding Groups Creating and Populating Groups The Windows Intune Update Process

More information

Host Identity Sources

Host Identity Sources The following topics provide information on host identity sources: Overview: Host Data Collection, on page 1 Determining Which Host Operating Systems the System Can Detect, on page 2 Identifying Host Operating

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Changing the Administrator Password in Web

More information

MOC ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

MOC ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER ONE STEP AHEAD. MOC 10747 ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER Length: 5 Days Level: 300 Technology: Microsoft System Center 2012 Configuration Manager Delivery Method: Instructor-led

More information

Banner Gets a Facelift Coming this October

Banner Gets a Facelift Coming this October Banner Gets a Facelift Coming this October 1 Benefits: No more Banner-specific password. Just log in with your regular credentials (NetID and password same that you use to log onto your computer, into

More information

ForeScout Extended Module for ArcSight

ForeScout Extended Module for ArcSight Version 2.8 Table of Contents About the ArcSight Integration... 4 Use Cases... 4 Send Endpoint Status, Compliance, or Property Changes from CounterACT to ArcSight... 5 SmartConnector Health and Compliance

More information

The following topics describe how to configure correlation policies and rules.

The following topics describe how to configure correlation policies and rules. The following topics describe how to configure correlation policies and rules. Introduction to and Rules, page 1 Configuring, page 2 Configuring Correlation Rules, page 5 Configuring Correlation Response

More information

Administering System Center Configuration Manager ( )

Administering System Center Configuration Manager ( ) Administering System Center Configuration Manager (20703-1) Formato do curso: Presencial Localidade: Lisboa Data: 30 Set. 2019 a 04 Out. 2019 Preço: 1670 Horário: Laboral - das 09h30 às 17h30 Nível: Avançado

More information

VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN

VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN VMware vcenter AppSpeed User s Guide AppSpeed 1.0 EN-000213-01 VMware vcenter AppSpeed User s Guide You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/

More information

Altiris Client Management Suite 7.1 from Symantec User Guide

Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Industrial Defender ASM. for Automation Systems Management

Industrial Defender ASM. for Automation Systems Management Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping

More information

Foundstone 7.0 Patch 6 Release Notes

Foundstone 7.0 Patch 6 Release Notes Foundstone 7.0 Patch 6 Release Notes These release notes describe the changes and updates for Foundstone 7.0, patch 6. This application installs only the patch needed to update the Foundstone system. Foundstone

More information

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2 Forescout Version 2.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

: Administration of Symantec Endpoint Protection 14 Exam

: Administration of Symantec Endpoint Protection 14 Exam 250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks

More information

Channel FAQ: Smartcrypt Appliances

Channel FAQ: Smartcrypt Appliances Channel FAQ: Smartcrypt Appliances Q: When were Smartcrypt appliances announced? A: announced the release of our Smartcrypt virtual and physical appliances on September 19, 2017. Smartcrypt Enterprise

More information

F5 BIG-IQ Centralized Management: Local Traffic & Network Implementations. Version 5.4

F5 BIG-IQ Centralized Management: Local Traffic & Network Implementations. Version 5.4 F5 BIG-IQ Centralized Management: Local Traffic & Network Implementations Version 5.4 Table of Contents Table of Contents Managing Local Traffic Profiles...7 How do I manage LTM profiles in BIG-IQ?...7

More information

Recommendations for Device Provisioning Security

Recommendations for Device Provisioning Security Internet Telephony Services Providers Association Recommendations for Device Provisioning Security Version 2 May 2017 Contact: team@itspa.org.uk Contents Summary... 3 Introduction... 3 Risks... 4 Automatic

More information

IT Service Delivery And Support Week Four - OS. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao

IT Service Delivery And Support Week Four - OS. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao IT Service Delivery And Support Week Four - OS IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 What is an Operating System (OS)? OS is a software that designed to run on specific hardware

More information

Understanding the Dynamic Update Mechanism Tech Note

Understanding the Dynamic Update Mechanism Tech Note Understanding the Dynamic Update Mechanism Tech Note Revision 0.A 2016, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Introduction... 3 Types of Updates... 3 Upgrade Architectures... 3 Download

More information