OBSERVEIT TECHNICAL SOLUTION OVERVIEW

Size: px
Start display at page:

Download "OBSERVEIT TECHNICAL SOLUTION OVERVIEW"

Transcription

1 OBSERVEIT TECHNICAL SOLUTION OVERVIEW This document outlines the key features, system architecture, deployment scenarios, system requirements, product installation, security and privacy infrastructure, data management, and integration capabilities of ObserveIT Enterprise. This document was written for ObserveIT Enterprise version TABLE OF CONTENTS 1 Complete Insider Threat Solution... 3 Key Components Key Solution Features Insider Threat Intelligence File Activity Monitoring Visual Forensics Advanced Key Logging User Activity Alerts Website Categorization Session and User Activity Metadata Search Reporting and Auditing DBA Activity Audit Privileged Identity Management Identity Theft Detection User Session Locking Policy Messaging and Recording Notification System Architecture Overall Architecture Windows Agent Unix/Linux Agent Mac Agent Application Server Web Console Database Server Deployment Scenarios Standard Agent-based Deployment (Servers and Desktops) Jump Server Gateway Outbound Jump Server Gateway Citrix Server for Published Applications Hybrid Deployment: Agent-Based + Gateway Sizing and System Requirements OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 1

2 5.1 Small Deployments Medium Deployments Large Deployments with High-Availability Installation Overview One-Click Installation Custom Installation Windows Agent Installation Unix/Linux or Mac Agent Installation Key Configuration Settings Rules Configuration Console Users (ObserveIT Administrator Users) Recording Policies SMTP, LDAP, Active Directory Security and Privacy Infrastructure Windows Agent Unix/Linux Agent Data Security in Transit Data Security at Rest Installation Security System Health Monitoring Configuration Change Auditing User Privacy Protection Data Management Database Structure Database Storage File System Storage Metadata Storage Archiving Integrating ObserveIT Data into Third-Party SIEM Systems SIEM System Integration Using Native SIEM Apps SIEM System Integration Using Database API SIEM System Integration Using Monitor Log Data Integrating ObserveIT Data into Network Management (Alerting) Systems Integrating ObserveIT with a Service Desk System Agent API for Process-Oriented Integration OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 2

3 1 Complete Insider Threat Solution ObserveIT provides a comprehensive solution to Identify and Eliminate Insider Threat. ObserveIT enables organizations to precisely identify and proactively protect against malicious and negligent behavior of everyday users, privileged users, and remote vendors, and high-risk employees. ObserveIT enables security and risk analysts to track and monitor file activities in order to identify and alert on instances of data exfiltration. ObserveIT significantly reduces security incidents by changing user behavior through real-time education and deterrence coupled with full-screen video capture of security policy violations; investigation time is thus reduced from days of sifting through logs to minutes of playing back video. User activity profiling of risky users enables the investigation of aggregated information about user activities in order to identify and resolve insider threats more easily. ObserveIT monitoring of both User Activity and File Activity are critical for detecting Insider Threat and data exfiltration. File Activity Monitoring enables organizations to track and alert when files are downloaded or exported using browsers or web-based applications, and when files are copied or moved to default local sync folders of cloud storage services. ObserveIT's Insider Threat Intelligence platform increases security awareness by educating employees about out-of-policy behavior whether malicious or negligent. Through policy notification and enforcement, users can be educated to change their behavior. The ObserveIT User Risk Dashboard provides Security Analysts and Investigators with an easy way to track users that have experienced any type of policy notification or enforcement as a result of violating company policy or security rules. Every user notification message triggers an alert that notifies security specialists about the incident and updates the user s risk score. Preventive actions enable security and compliance officers to stop users from breaching security or violating company policies by forcibly logging off users from unauthorized machines and closing harmful applications. The ObserveIT monitoring software acts like a security camera on your endpoints, monitoring and recording all user activity on Windows and Unix/Linux servers and desktops. The system generates video recordings, user activity logs, behavioral analytics and real-time alerts. The result is a complete solution for identifying and managing user-based risk. Regardless of protocol or application, ObserveIT records any window session via a terminal or console, in a compressed and searchable format. The ObserveIT software captures all activity and generates textual audit logs, even for applications that do not produce their own internal logs. Every action that is performed by remote vendors, developers, system administrators, and business users, connected via RDP, SSH, Telnet, Citrix, direct console login, or any other protocol on physical and virtual machines, such as Citrix and VMWare, is recorded by video. Video replay provides bullet-proof forensic evidence, and video content analysis can identify all actions that were performed. ObserveIT can help satisfy compliance requirements for PCI, SOX, HIPAA, and NISPOM. Key Components Insider Threat Library: ObserveIT's extensive library of out-of-the-box alert rules cover the most common scenarios of risky user activities, with built-in policy notifications designed to increase the security awareness of users, and reduce overall company risk. File Activity Monitoring: Track and alert on files that were downloaded or exported using a browser or webbased application, from the internet or intranet. Alert if a tracked file is copied or moved to the default local sync folder of cloud storage services. Policy notification and enforcement: Define company policies and security regulations and enforce them by posting specific, detailed notification and blocking messages in real-time to any user violating these rules. Policy enforcement: Prevent malicious or unauthorized Linux commands from being executed based on flexible Prevention rules defined by customers. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 3

4 Preventive actions: Stop users from breaching security or violating company policies by forcibly logging off from unauthorized machines and closing harmful applications. Track changes in user behavior: Security Analysts and investigators can track users that have experienced policy notifications or enforcement as a result of violating company policy or security rules, and pinpoint users with the highest number of policy violations and users whose behavior is not improving with time. User Behavior Analytics and Risk Scoring: Assess the risk of every user, analyze and score user activity to identify any actions that are out of role, suspicious, or in violation of security policies. User Activity Profile: Access a risky user's profile in order to investigate and view aggregated information about the user's activities, such as, which applications they are using, where they spend most of their time, and so on. Protect employee privacy: Anonymization of users in the Dashboard and Web Console protects the privacy of recorded users. User Activity Monitoring and Alerting: Capture all user activity, generates textual audit logs, screen recordings and alerts for risky behavior on desktops and servers. Efficient alert rule management: Alert rules are grouped by Categories and assigned to User Lists. Website Categorization: Automatically detect categories of Websites that end users are browsing, enabling alerts to be generated on browsing categories such as Gaming, Adults, Infected or Malicious Websites, Phishing Websites, and more. Field-Level Application Logging and Auditing: Track what is happening within on-premise and cloud apps, including those with no internal logging facilities of their own. Live-Session Response and Visual Forensics: Provide video replay and analysis of real-time and historic user actions, and the ability to actually stop user activity. Department level risk management via Active Directory Group-based permissions: Large organizations can manage the risk of their employees in departments or groups, each owned by a dedicated security team member or manager. Detection of potential data leaks and exfiltration when copying files, connecting USB Devices, or printing sensitive documents: Enriched metadata recording to enable the tracking of user actions such as copying/dragging files and folders, the insertion of USB-based external storage devices into a computer, or printing large documents. Import and export of detection rules: Enable customers to share real-time information about risky user activity and out-of-policy behavior with other departments/users and organizations. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 4

5 2 Key Solution Features 2.1 Insider Threat Intelligence ObserveIT's Insider Threat Intelligence provides a platform to assess the risk of every user, analyze and score user activity, with the goal of identifying user actions that are out-of-role, suspicious, or in violation of security policies. File Activity Monitoring helps to detect data theft, provides a user and data activity summary of exactly what happened, and helps counteract some of the most common ways that users attempt to export and transfer sensitive data out of the organization. The Insider Threat Intelligence platform also provides access to the profiles of users to help investigate risky users by viewing their regular activity. Insider threat is prevented by educating employees about out-of-policy behavior, whether malicious or negligent. Through policy notification and enforcement, users can be educated to change their behavior. ObserveIT has the capability to categorize billions of websites and alert when users browse sites with malicious, phishing, unacceptable or counter-productive content, thus providing high visibility into employees' web browsing habits and the detection of security risk from Insider Threat Insider Threat Library ObserveIT provides an extensive library of out-of-the-box detection scenarios that can be used by Business users and Administrators to detect insider threat on Windows, Mac, and Unix/Linux systems. The ObserveIT Analytics Library Package contains 230 rules that cover the most common scenarios of risky user activities that might generate alerts. Rules have built-in policy notifications that are designed to increase the security awareness of users, and reduce overall company risk. Grouped according to security Categories to help navigation and facilitate their operation and maintenance, rules can also be mapped to types of user groups, such as Privileged Users, Everyday Users, Remote Vendors, and so on, each with a specific risk level. The Insider Threat Library is maintained by an ObserveIT Content Manager and released as a ZIP file to customers, providing them with the most up-to-date insider threat scenarios Viewing User Behavior and Risk Score The ObserveIT User Risk Dashboard provides Security Analysts and Investigators with an easy way to track users that have experienced any type of policy notification or enforcement resulting from a violation of company policy or security rules. Every user notification message triggers an alert that notifies security specialists about the incident and updates the user s risk score. In the ObserveIT User Risk Dashboard, you can view overall organizational risk from insider threats and view a prioritized list of users and applications that present the greatest risk to your company. The Dashboard provides an overall view of user risk and behavior trends over a period of time. Graphs illustrate the number of alerts that were triggered each day, the number of out-of-policy notifications displayed to users each day, and the number of users involved in those alerts and notifications. Security analysts (including security and compliance staff, and those who review insider threats, compliance, or out-of-policy risks) can quickly locate and identify where user risk is coming from and investigate users. At a glance, you can see a user risk summary, breakdown of risky users by risk levels, number of new users at risk, top risky applications and alerts. The dashboard highlights new users who become risky, denoted by recent changes in their user risk score. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 5

6 ObserveIT allows large organizations to manage the risk of their employees in separate departments or groups, each owned by a dedicated security team member or manager. The monitored users of each department are configured based on Active Directory Groups/Users ensuring full segregated permissions across the product including all risky user data, risk summary statistics, session recordings, alerts and reports. The following information for each user at risk helps you prioritize which users to first investigate: General information about the user such as title, department and personal photo. Risk score color-coded by risk level, and score change since the previous day. Out-of-policy notifications and behavior trends. Which applications and alerts contributed most to the user s total risk score, so you can understand where the risk is coming from and take corrective action. A timeline of when the risky activity occurred. Figure 1 ObserveIT User Risk Dashboard ObserveIT User Analytics calculates a user-centric risk score that is displayed in the dashboard to identify and prioritize users who present the most risk to an organization. The score is an intelligent aggregation of a user s activity alerts during the last month. The daily risk score tracks a user s risk day by day, allowing you to easily identify score changes and act first on users whose risk level have recently changed. You can customize score thresholds per risk level for both alert rules and users to control what is considered critical, high, medium, or low risk in your organization User Activity Profile ObserveIT enables Security Analysts to access risky users profiles to investigate employee or remote vendor activity, such as: Where do users spend most of their time? Which applications do they use? How much time do users spend in applications? How much time during working hours is the user idle? OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 6

7 Which computers are used to work on or to connect from? Which shared accounts are being used? Is anything abnormal about the user's behavior? By viewing the normal behavior of a user or comparing it with the user s peers, investigators can quickly determine if the activity that is being investigated is indeed risky. Dynamic filtering capabilities enable you to focus your investigation on specific applications, endpoints, login accounts, and/or remote client machines. An overall view of user activity during the specified profile period is displayed in a User Activity Over Time graph. Figure 2 ObserveIT User Activity Profile Policy Notification and Enforcement ObserveIT enables you to easily define your company policies and security regulations and enforce them by posting a specific, detailed notification message in real-time to any user violating these rules. The notification message can be triggered each time the rule is violated, or alternatively only once per user session. Warning notification messages automatically disappear after a few seconds so there is no impact on end-user productivity. Customers can choose to have the notification branded with their company logo, or leave it generic. Once the notification is displayed, the user can click to view the policy/security requirements directly from the message itself and have the option to provide a comment explaining their misbehavior or to acknowledge the message. Blocking messages prevent users from continuing whatever they are doing. Users are forced to review the message, acknowledge it, and provide their comment (optionally, depending on configuration) before they can continue with their work. The policy/security requirements are available directly from the message. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 7

8 Figure 3 Windows End-User Blocking Message On Unix/Linux systems, a policy notification is applied by writing the real-time notification message text directly to the terminal output. Users become aware of the security/policy violation message and can keep on with their work. The text is not added as input to the currently running command hence there is no impact on any interactive or back processes. A simple clear command (^L) will clear the text message. Figure 4 Unix/Linux End-User Warning Notification ObserveIT can prevent unauthorized Linux commands from being executed based on flexible Prevent rules that you can define. For example, if a user runs an SFTP command from a remote server with intent to bypass security controls, the command will be blocked from execution preventing remote user access to the sensitive file(s). When a Policy Enforcement rule is triggered, the end user receives the standard operating system Permission denied message together with an optional message configured by security administrators. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 8

9 In addition, ObserveIT preventive actions enable security and compliance officers to stop users from breaching security or violating company policies. Users can be forcibly logged off from machines that they are not authorized to access or to prevent them from continuing with activities that are risky or malicious. Applications or websites that users should not be running can be forcibly closed, including "triggering" applications (for example, when users browse forbidden websites or website categories, or execute potentially harmful SQL commands). Figure 5 Logging Off and Closing Application End-User Messages Tracking User Behavior Change via Policy Violations and Notifications ObserveIT enables you to track users that have experienced policy notifications or enforcement, pinpointing users with the highest number of policy violations and whose behavior is not improving with time. In the ObserveIT User Risk Dashboard, an indication is displayed next to a risky user s photo showing the number of out-of-policy notifications. A trend arrow indicates if the user behavior has improved with time. For more details, a tooltip shows extra information about the types of violations involved so analysts can drill down to view full details of any incident including playing the video recording. Figure 6 Out-of-Policy Behavior Tooltip 2.2 File Activity Monitoring ObserveIT s File Activity Monitoring enables security analysts to detect data exfiltration before it happens, with full file audit. Many organizations store sensitive data in content management systems such as Microsoft SharePoint, Box for Business, Google for Work, and other storage systems accessed via a web interface. Sensitive data is accessed daily from web/cloud applications (CRM, ERP, trading systems, health applications, OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 9

10 and other business applications) presenting a massive security challenge. ObserveIT s File Activity Monitoring provides visibility on users that download specific files from websites or web applications, whether on the internet or in the local intranet. ObserveIT tracks accessed files and alerts administrators when a tagged file is moved to a local cloud sync & share folder, such as Dropbox. Figure 7 Alert Details on Exfiltrating a Tracked File The alert details show the original name of the exfiltrated file and the website from which the file was downloaded. The details of all tracked file activities are reported in the ObserveIT File Diary which also shows the lifecycle of each file's history. File activities metadata can be exported to Excel and printed. Sessions of file activity events can be replayed in the Session Player. You can search related file activity for users that are suspicious, and view the full history of the file on any activity. Figure 8 Viewing and Filtering Tracked Files in the File Diary OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 10

11 The File History tab provides a full history of all operations that occurred on the alerted file and allows you to jump directly to the Video playback at any point. Figure 9 Viewing the Tracked File s History OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 11

12 2.3 Visual Forensics Playing back a user session shows exactly what occurred on-screen. Playback speed is adjustable. On the right side of the player window is an activity summary panel which lists, in chronological order, every action performed during the session. Clicking an action jumps directly to that portion of the video just like navigating chapters on a DVD. Alerts triggered from the session are indicated on the timeline, and during playback alert details are automatically displayed at the exact time they occurred. Figure 10 Windows Session Playback ObserveIT goes far beyond simply recording on-screen activity. All on-screen activity is transcribed into an easyto-read user activity log so that you don t need to watch the video to know what the user did. User activity logs can be selected by endpoint (Endpoint Diary page), by user (User Diary page), or by keyword search (Search page). Clicking on any specific event in the log launches the video playback from that exact moment. You can see at a glance exactly what a user did during a session, and if any suspicious activities were performed. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 12

13 Figure 11 User Activity Log 2.4 Advanced Key Logging Key loggers track and record an employee s or vendor s computer activities for the purposes of monitoring, root-cause analysis, forensic investigation and regulatory auditing. ObserveIT key logging offers unique capabilities not available in any other key logging solution. ObserveIT Key Logging enables security analysts to detect and generate alerts on: Sensitive keywords and commands that users typed in desktop applications, websites, and shell command tools. Data exfiltration attempts by users typing protected keywords in s or chat applications, social media sites, etc. Commands executed in CLI tools such as Windows CMD, PowerShell, PuTTY or Mac Terminal. ObserveIT administrators and compliance auditors can search for text entered by a user, as well as certain application/system selections, and then jump directly to the session video recording at that exact location. To prevent users who are authorized to access the database from viewing passwords or other sensitive data, data captured by the ObserveIT key logger is hashed (using the SHA256 salted hash algorithm). There is no way to reverse (un-hash) the hashed data. ObserveIT Administrators cannot disable Key logger hashing from the ObserveIT Web Console. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 13

14 2.5 User Activity Alerts The Alerts feature provides ObserveIT with a proactive, real-time detection, deterrence and prevention mechanism. Alerts are user-defined notifications which are generated when suspicious login events or user activity occurs during a session. When alerts are triggered, textual notifications can be displayed warning users about potential security violations so that they can take remedial action. In some cases, users can be "denied access" and hence prevented from continuing with their current activity. Alerts are integrated throughout the ObserveIT Web Console (in the User Risk Dashboard, User Diary, Endpoint Diary, Search pages, and video Session Player) and can be easily integrated into an organization s existing SIEM system. The ObserveIT installation package includes an extensive library of out-of-the-box alert rules that Business users and Administrators can use to detect risky user activity and trigger alerts on Windows, Mac, or Unix/Linux machines. Following are some examples of risky user activities that might trigger alerts: Logging-in locally or remotely to unauthorized endpoints by unauthorized users or from unauthorized clients Sending sensitive documents to a local/network printer during irregular hours Copying files or folders that are either sensitive or located in a sensitive location during irregular hours Connecting a USB storage device (or mobile phone) in order to copy sensitive information Using Cloud storage backup or large file-sending sites that are not allowed by company policy Storing passwords in files that can be easily detected by password harvesting tools Clicking links within s that open Phishing websites Browsing contaminating websites with high potential security risk Browsing websites with unauthorized content (gambling, adults, etc.) Being non-productive by wasting time on Social Networks, Chat, Gaming, Shopping sites, and so on Searching the Internet for information on malicious software, such as steganography tools (for hiding textbased information within images) Accessing the Darknet using TOR browsers Performing unauthorized activities on endpoints, such as, running webmail or Instant Messaging services Running malicious tools such as, password cracking, port scanning, hacking tools, or non-standard SETUID programs on Linux/Unix Hiding information and covering tracks by running secured/encrypted clients, clearing browsing history, zipping files with passwords, or tampering with audit log files Attempting to gain higher user privileges (for example, via the su or sudo commands, running an application as Administrator) Performing copyright infringement by browsing copyright-violating websites or by running P2P tools Changing the root password by regular user or searching for directories with WRITE/EXECUTE permissions in preparation for an attack (on Linux/Unix) Performing IT sabotage by deleting local users or files in sensitive directories (on Linux/Unix) Creating backdoors by adding users/groups to be used later un-innocently Installing questionable or unauthorized software such as hacking/spoofing tools on either desktops or sensitive endpoints Accessing sensitive administration tools or configurations, such as Registry Editor, Microsoft Management Console, PowerShell, Firewall settings, etc. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 14

15 2.5.1 Alerts Review and Response ObserveIT s enhanced alert review workflow enables Incident Response teams to drive incident investigation. A workflow status can be set for each alert indicating whether it is being reviewed, has been identified as an issue, or ended up being a non-issue. Adding comments to alerts enables you to provide feedback on findings and decisions regarding the triggered alerts. The Alerts display can be filtered according to specific comment text, or to show all alerts with comments. In the alert s details, you can view existing comments (or hide them). Comments are also displayed while browsing alerts in Gallery mode. The capability to export metadata about alerts to PDF reports enables the sharing of real-time information for collaboration during investigation on risky user activity and specific incidents with other departments/users (such as, HR, Legal, managers) who do not have access to ObserveIT. Figure 12 Exporting Alerts to a PDF Report Alerts can also be exported to your SIEM for further collaboration Alerts Display Modes You can view alerts in various display modes. For example, Gallery mode provides a view of the user environment, enabling you to see the context of exactly what the user was doing when an alert was triggered. You can browse through the screenshots of each alert while viewing the full alert details next to each screen, and easily replay sessions in which alerts occurred. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 15

16 Figure 13 Viewing Slideshow of Alerts with Alert Details Emphasized By clicking the Video playback icon, you can open the Session Player at the screen location where an alert was generated. The following shows an example of the video replay of a session during which several alerts occurred. Figure 14 Replaying Sessions with Alerts OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 16

17 2.6 Website Categorization ObserveIT provides high visibility into employees' web browsing habits. Using URL Filtering technology, ObserveIT can automatically detect categories of Websites that end users are browsing, enabling alerts to be generated on browsing categories such as Gaming, Adults, Infected or Malicious Websites, Phishing Websites, and more. ObserveIT has over 28 billion indexed URLs that are updated daily with new websites and new security risks. Website Categorization supports flexible deployment modes whether your endpoint can access the internet directly or via a protected proxy. Note: To trigger alerts on Internet browsing, the Website Categorization module must be installed. 2.7 Session and User Activity Metadata Search ObserveIT captures all sessions and user activity, recording important information about what is seen on the screen, which applications are used, what actions are performed, the date and time of actions, and other specific metadata attributes. This "metadata" is stored in the ObserveIT database, which is located on a central SQL Server. Because metadata is centrally stored and indexed, it can be used to easily search throughout recorded sessions and provide a textual breakdown of each user session. As part of any investigation process, it is crucial to be able to quickly locate forensic data. ObserveIT s advanced search boosts performance by allowing you to focus a search on specific metadata. You can search for users who logged in, application sensitive elements that were clicked or viewed, metadata that was captured on risky user activity concerning file copying and data exfiltration through USB storage devices or printing sensitive data, keystrokes typed, applications that were run, specific window titles or URLs viewed, browsing forbidden Website categories, SQL commands containing keywords (such as, a table name), and more. On Unix/Linux systems, you can search for users who logged in, executed specific commands (based on command name, full path, arguments, command switches) or acted under a different user's permissions. You can also filter searches based on specific login users, specific machines, and specific time periods. Matched keywords are highlighted. For accelerated search performance, it is highly recommended that you install the Microsoft SQL Server Full Text Search (FTS) utility prior to ObserveIT installation. Figure 15 Searching for Sessions and User Activities The displayed search results provide the context of the activity, showing the exact location of searched keywords (for example, in a URL, Window title, SQL statement, and so on). Where relevant, the resulting search hit is linked directly to the portion of the video where the action occurred, making it easy to find the exact OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 17

18 moment that an action was performed. Within each session, you can watch the full video replay of the user session and see exactly what took place Capture Metadata on Potential Data Leaks ObserveIT enriches the recording of metadata by enabling the capture of user activity related to potential data leaks. Any user attempt to move files (or folders) by copying them to the clipboard or dragging them with the mouse is immediately captured by ObserveIT, together with the names of the files as well as their source location and size. Thresholds can be defined to indicate a LARGE file copy based on the number of files being copied and/or their total size. In addition, if a user connects any USB storage device (including a mobile phone), ObserveIT immediately captures the device description (i.e., model and manufacturer) and the mapped drive letter. Furthermore, copying to the clipboard text from sensitive applications can now be tracked and alerted on, providing administrators with additional detection visibility on potential data leaks. The ObserveIT detection mechanism also captures metadata relating to user attempts to print sensitive or confidential data. Upon a user attempt to print files or documents, ObserveIT immediately captures the titles of the files, the printer, and the number of pages being printed, while differentiating between the printing of large and standard size documents. This enriched metadata is fully integrated across the product, allowing customers to detect and deter any out-of-policy behavior or risky activity of their employees with regard to file copying and data exfiltration through USB storage devices or printing sensitive data. Users can define alerts when sensitive files are being copied or printed, pop up a notification or blocking message when a USB storage device is connected, generate reports, search for specific files being copied or printed, and export the new metadata to their favorite SIEM system. 2.8 Reporting and Auditing ObserveIT reporting can be used by novice administrators to generate reports based on preconfigured built-in reports, or by experienced administrators and security auditors who require flexible application usage reports and trend analysis reviews. Experienced administrators and security auditors can also create comprehensive customized reports based on their own requirements. Reports can provide aggregated or summary information about all monitored user activity on Windows, Mac, or Unix-based endpoints. ObserveIT reporting capabilities significantly enhance security operations and regulatory compliance by providing reports on alerts, websites visited, documents printed, USB storage device connections, file/folder copying, large file/folder copying, typed key logger data, SQL queries executed against production databases, installing and uninstalling applications, system events, user logins, and more. Captured metadata can be used to expose potential data leaks by generating reports that show for example, when corporate or sensitive files were copied or printed, when a user connected a USB storage device, when notification or blocking messages were displayed to users, when large files were copied or printed, and so on. The ObserveIT Web Console provides several ways to run reports and export user activity log data: The report generator includes built-in reports and customizable report rules for filtering by user/user group, endpoint/endpoint group, date, application, resources accessed, and more. Reports can be run ad-hoc or delivered on a schedule by . Full-text Google-like searching allows pinpoint identification of user sessions. User activity log drill-down allows each session to be viewed item-by-item, to see which applications were run and which actions were performed during that session. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 18

19 Video replay can be launched directly from any audit view or report. Specific audit video can be exported for delivery as a simple HTML file for forensic evidence delivery. 2.9 DBA Activity Audit DBA Activity Auditing provides monitoring of SQL queries executed by DBAs against production databases. SQL query activity is captured by ObserveIT when the DBA is using a DB management tool on an ObserveITmonitored computer. A recommended configuration is to ensure that all DBAs for whom recording is required must connect through a Windows gateway, on which the ObserveIT Agent and the DB management tool application are installed. Figure 16 Capturing SQL Queries Using ObserveIT, administrators and auditors can review all SQL queries performed on a given date or filter results by database, DB User, endpoint, login ID, or any text contained within the queries. SQL queries are also included in the session activity details displayed in the Endpoint Diary and User Diary pages. When using the Search page in Metadata (user activity log) mode, text matches within SQL queries will also return the relevant sessions in the search results. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 19

20 2.10 Privileged Identity Management When admin users log in using a shared account (for example, administrator, root), ObserveIT can be configured to present specific users with a secondary challenge-response, forcing them to specify their named-user account ID. Secondary IDs can be tied to an Active Directory repository, or can be managed locally in the ObserveIT Web Console. ObserveIT s Secondary Identity mechanism allows you to manage and secure shared-user access without requiring the overhead, complexity, or expense of password rotation or password vaults. Figure 17 Shared-User Login Triggers Secondary User Authentication 2.11 Identity Theft Detection ObserveIT s Identity Theft Detection module brings a new approach to preventing and discovering incidents of stolen privileges. Today, security officers provide users with tools and education on how to protect their identity (such as, Two-Factor Authentication, Password complexity, reset rules, and so on). But once an identity is stolen, no tool can clearly identify or track the incident, and the responsibility for detection lies entirely on the security officer. ObserveIT enables you to include users in the detection process, and thus make users responsible for their identities. IT identity theft incidents can be detected and neutralized much quicker when users have a means to flag unauthorized logins. For each monitored endpoint, ObserveIT keeps track of authorized/confirmed pairings of User IDs and client machines. If a user logs in to an endpoint from a client that is not paired to the user, an is sent to the user. For example: A hacker steals a password and logs in from a remote machine. An is sent to the user saying The user johnsmith just logged in to server WEBSRV-PROD from unauthorized IP address Please confirm that it was you who performed this action. An internal user steals an administrator s password and logs in to a server from her own desktop, generating an saying, The user johnsmith logged in to server DBPROD-4 from unauthorized desktop KATHY- DSKTP. Please confirm that it was you who performed this action. The user can either confirm or deny the action. In parallel, an event is logged for the administrator to track and monitor unauthorized pairings. Granular security rules can be applied to specify how to manage each user confirmation. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 20

21 2.12 User Session Locking With ObserveIT, you can view live user sessions in real time. If required, you can interact with the user of each session by sending messages (for example, You should not be running SQL queries on the production database. ) and can also stop the user session entirely by locking the session Policy Messaging and Recording Notification Policy information can be delivered to users as they log into a server or desktop. This policy info can include notification of auditing activity (for example, Please note that all activity on this machine is recorded. ). Policy information can also relate to company or regulatory policies ( Please note that PCI requirements mandate that no database traces be implemented on this server. ). Policy messages can also be set to require the user s response. This can be used to record the user s acknowledgment that he/she is being recorded (a legal requirement in some jurisdictions). Users can optionally be prevented from completing their logon to the computer until they provide a confirmation and/or response. Figure 18 Policy Messaging Delivered to the User on Windows and on Unix/Linux OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 21

22 3 System Architecture 3.1 Overall Architecture ObserveIT is a software-based User Activity Monitoring and internal risk identification platform. Software agents running on Windows and/or Unix/Linux gateways, and servers and/or desktops capture user activity data and send it to an ObserveIT Application Server. The Application Server sends the relevant user activity log and screen video data to a Database Server for storage. Administrators manage the system and access user activity logs, screen video, reports and other features using the ObserveIT Web Console, which is served by the Application Server. Figure 19 ObserveIT Architecture OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 22

23 3.2 Windows Agent The ObserveIT Windows Agent is a software component that is installed on any Windows-based operating system (server or desktop) that you want to record. You can deploy as many ObserveIT Agents as required up to the licensing limit. For a small number of monitored endpoints, it is recommended that you manually install the Agent on each system. The Windows Agent is a user-mode executable that binds to every user session. As soon as a user logs into a monitored endpoint, the Agent begins recording based on the configured recording policy. From the moment a user logs on, the Windows Agent starts capturing user activity data logs and, if configured, screen video. All captured user activity data can be searched for, reported on, configured for alerts, and integrated with SIEM systems. The Agent sends all screen capture video and textual activity logs to the ObserveIT Application Server for processing and storage. Figure 20 Windows Agent Architecture By default, the Agent records the screen only when actual user activity is detected at the keyboard or mouse; during idle time (when there is no user activity on the machine), the Agent does not generate logs of screen capture data. However, optional time-based recording allows the recording of everything that appears on the screen even when the user is idle or not present which can be useful, for example, to record the output of lengthy scripts run by IT users. When network connectivity between the Agent and the Application Server is unavailable, the Windows Agent maintains an offline buffer to temporarily collect data. The buffer size is customizable. Once connectivity is restored, the buffered data is delivered to the Application Server. Supported Platforms for Windows Agents Microsoft Windows Server 2008/2008 R2/2012/2012 R2/2016, Windows 7, 8, 8.1, and 10. For an up-to-date list of supported Windows platforms, refer to: OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 23

24 3.3 Unix/Linux Agent The ObserveIT Unix/Linux Agent is a software component that can be installed on any supported UNIX or Linux system that you want to monitor. The Unix/Linux Agent runs in user mode and is triggered when an interactive session is created on a monitored machine (connected via SSH, Telnet, Rlogin, and so on). It records user activity inside the sessions, including interactive user activity and system functions such as OPEN, EXEC, CHMOD and others. The recorded data is sent to the ObserveIT Application Server and can be replayed or searched for input commands, system functions and output data. All recorded data can be searched, reported, configured for alerts, and integrated with SIEM systems. SFTP sessions to Unix/Linux machines can also be recorded, logged, searched, configured for alerts and integrated with SIEM systems, in the same manner as SSH sessions. Figure 21 Unix/Linux Agent Architecture When a user logs-in on a Unix/Linux machine, the Agent is started and begins recording the shell actions based on a predefined data recording policy. The ObserveIT Unix/Linux Agent captures all the internal actions and the names of files and resources that are effected by command line operations. All output, commands and important system functions inside commands are captured and forwarded to the Agent, which sends it to the ObserveIT Application Server for processing and storage. In offline mode, the ObserveIT Agent allows local storage of the recorded data in the event of network malfunction or disconnection. When network connectivity is re-established, the ObserveIT Service transmits the locally cached data back to the Application Server. To prevent the local disk from reaching its full capacity, the volume of local data cache is limited per offline session. Attempting to stop the recording process will terminate the user session, preventing any further user activity from not being recorded. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 24

25 Supported Platforms for Unix/Linux Agents Solaris 10 (updates 7-11) and Solaris 11 (updates 1-3) RHEL/CentOS , RHEL/CentOS , RHEL/CentOS , and RHEL/CentOS Ubuntu 12.04, 14.04, and Oracle Linux , Oracle Linux , Oracle Linux and Oracle Linux SLES SuSE 11 SP2-SP3, and SLES SuSE 12 AIX 6.1, AIX 7.1, and AIX 7.2 HP-UX Debian 6, 7 and 8 Amazon Linux AMI For a full list of supported platforms for Unix/Linux Agents, refer to: Mac Agent The ObserveIT Mac Agent software can be installed on any Mac platform (mainly desktop) which requires monitoring. Mac Agents appear in the ObserveIT license as Windows Workstations. The OS version is MAC; the OS Type is Windows. The Mac Agent has full recording capabilities and supports the following features: Key logging Alerts Video and metadata recording Configurable recording policies (include/exclude users, applications, or URLs) Record when Agent is offline Recording notification message Out-of-policy notifications (warning and blocking messages) Log Off and Close Application actions Health monitoring detect if the Agent is offline or has been tampered with All the metadata that is collected from the Mac Agent is searchable, reportable, can be alerted on, and can be exported to SIEM systems. Risky activity that is performed on the Mac Agent is consolidated with other risky activities from the same user, providing a unified risk score for the user and a user-centric view in the User Risk Dashboard. Supported Platforms & System Requirements for Mac Agents Mac desktop, laptop, server software versions: OSX Yosemite OSX El Capitan MacOS Sierra VNC support for remote connections Fast user switch for recording multiple users Minimum hardware requirements for deploying ObserveIT Agents on Mac operating systems are: 1.6 GHz or faster Intel Core processor 4 GB RAM or more 1 GB free hard disk space 100 Mb/1Gb Ethernet adapter (1 Gigabit link speed recommended) OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 25

26 3.5 Application Server The ObserveIT Application Server is an ASP.NET application that runs on a Windows Server-based computer (physical server or VM), in the context of Microsoft Internet Information Server (IIS). Recorded data is sent by the Agents to the Application Server, which stores the data in SQL Server databases and file system shared folders. Windows-based operating system recorded data is divided into 2 sections: the metadata (approx. 30% of the total storage size) and the graphical images (approx. 70% of the total storage size). UNIX/Linux-based operating system recordings are 100% metadata. The Application Server also maintains recording policies and other configuration data, actively communicates with Agents to deliver configuration updates and to monitor system health, handles data maintenance/archiving, and generates reports. 3.6 Web Console The ObserveIT Web Console is also an ASP.NET application that runs in the context of Microsoft Internet Information Server (IIS). It is the primary interface for audit review, video replay, and reporting, as well as for configuring and administering ObserveIT. All configuration information is stored in the ObserveIT Database Server. The Web Console includes granular policy rules for limiting access to sensitive data. In most cases, the ObserveIT Web Console component is installed on the same computer as the ObserveIT Application Server (one of them if there are multiple Application Servers). 3.7 Database Server By default, ObserveIT uses Microsoft SQL Server for data storage. This storage includes user activity configuration data, user analytics data, textual audit metadata and possibly the screenshots captured by the ObserveIT Agents for video replay. ObserveIT can also be configured to store the video replay screenshots in file system storage instead of in the SQL database, either on the local hard drive of the ObserveIT Application Server, or on a file share in the network. In these cases, the MS SQL Server database is still used for storing user activity log and configuration data. ObserveIT can work with SQL Server Express, but it is not recommended due to its size limitations. Connectivity with the database is on standard TCP port OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 26

27 4 Deployment Scenarios ObserveIT can be deployed in several different ways, as shown below. The different methods are not mutuallyexclusive, allowing for a hybrid deployment when required. 4.1 Standard Agent-based Deployment (Servers and Desktops) The standard method of deployment involves deploying the ObserveIT Agent on each machine to be monitored. An Agent is installed on each machine that is being monitored, which captures activity on the machine and feeds the video/log data to the Application Server. Figure 22 Agent-Based Deployment OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 27

28 4.2 Jump Server Gateway The Jump Server (Terminal Server) Gateway deployment is the ideal solution for logging all user configuration changes on remote network devices, servers, desktops and DB servers. In this topology, the ObserveIT Agent is deployed only on a gateway machine; only one Agent is required for recording all sessions. Users are routed via the gateway, and ObserveIT records all user sessions in which the user connects to another target machine via RDP, SSH or other protocol. Client applications (such as, Microsoft SQL Server Management Studio, browsers, and others) are recorded with full user activity log analysis on the gateway. In this deployment, ObserveIT does not record any user session in which a user logs on directly to a target machine (via local console login, or via a direct RDP/SSH/etc. window) that is not routed via a gateway. The volume of user activity log data captured is less than for the full Agent deployment because the ObserveIT Agent on the gateway does not have access to OS-specific information on the target machine. For example, it cannot detect the name of a file opened within an RDP window. Figure 23 Terminal Server Gateway (Jump Server) Deployment OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 28

29 Figure 24 Linux Gateway (Jump Server) Deployment 4.3 Outbound Jump Server Gateway The Jump Server Gateway topology described above can also be used for environments in which remote users need to access multiple external resources. For example, a Managed Services Provider that needs to support multiple customers and wants to record and audit all the actions performed by the support employees. The topology is essentially the same as for the Jump Server Gateway; the only difference is the location of each resource that is, the Terminal Server is not on the same network as the target machines. Figure 25 Outbound Jump Server OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 29

30 4.4 Citrix Server for Published Applications The ObserveIT Agent can be deployed on a Citrix Server in order to record all activities that take place within Published Applications served by the Citrix machine. Figure 26 Citrix Server Deployment OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 30

31 4.5 Hybrid Deployment: Agent-Based + Gateway The Hybrid topology is the most commonly-used ObserveIT deployment because it allows you to simultaneously deploy any combination of the above topologies. Any remote or local user can be routed via a gateway. This enables ObserveIT to capture and record every outbound session which can be replayed at any time. Agents can also be deployed on specific sensitive endpoints that require a more detailed audit, including any logins performed by privileged users with direct access to the endpoints. ObserveIT provides full user activity log data analysis and recorded video of all user actions that take place on sensitive endpoints upon which Agents are installed for which privileged users have direct access (and can therefore bypass the gateway). Figure 27 Hybrid Deployment: Gateway + Agent OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 31

32 5 Sizing and System Requirements 5.1 Small Deployments For installations with low user activity (less than 1,000 monitored users in average user cases), an All in One installation can be utilized, which means that the Application Server, Web Console and Database Server are all installed on the same platform. This platform can be a physical server, or it can be a virtual machine running in a typical virtualization solution. Web Console Access ObserveIT Agents All in One Database Server App Server Web Console Figure 28 Small Implementation System Requirements and Data Sizing for Small Deployments Physical Server with 4-8 Core CPU 2.4 GHZ or higher (processor configuration as needed) 16 GB of RAM Operating System hard disk: 80 GB (15K or SSD) 2 NICs - 1 GB Ethernet (10 GB Ethernet is recommended) OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 32

33 5.2 Medium Deployments For medium-sized implementations of ObserveIT comprising 1,000-6,000 monitored endpoints in average user cases, it is preferable for the MS SQL Server to be installed separately from the Application Server/Web Console. If required, an existing SQL Server can be used, or a new instance can be created. Depending on the company s data storage strategies, a file system storage method for screen-capture data might be considered for this size deployment. Web Console Access ObserveIT Agents App Server & Web Console Database Server Figure 29 -Medium Implementation System Requirements and Data Sizing for Medium Deployments For each Application Server*, the recommended requirements are: 8 Core CPU 2.4 GHZ 16 GB RAM 100 GB free hard disk space * It is recommended to add another Application Server for every 2,000 concurrent users. For more specific sizing information, or for configurations exceeding 1,000 Agents, contact an ObserveIT representative. For the SQL Server, the recommended requirements are: Physical Server with 12 Core CPU 2.4 GHZ 32 GB of RAM 24 TB for 1 month s data retention For specific recommendations, contact an ObserveIT representative. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 33

34 5.3 Large Deployments with High-Availability ObserveIT supports large enterprise implementations comprising more than 6,000-10,000 concurrent users per site. Optimized database storage configuration and Application Server performance provide support for an increasingly large number of ObserveIT business users. If you have more than 10,000 users relying on your expected user activity and ObserveIT configurations, you may still be able to actively monitor all your users with no difficulties using the specifications listed in System Requirements and Data Sizing for Large Deployments. However, it is recommended to consult an ObserveIT representative. For best practices for common scenarios and benchmark data for assessing a customer s hardware configuration requirements (Application Servers, Database Servers, and Storage) in large scale deployments, contact an ObserveIT representative. Large enterprise implementations of ObserveIT will typically be accompanied by load balancing (LB), highavailability (HA) and redundancy requirements. Key factors for deploying HA include: Two or more endpoints running the ObserveIT Application Server and Web Console Cluster-based implementation of Microsoft SQL Server SQL Server using a dedicated storage device or, alternatively, using ObserveIT s file system storage mechanism for visual screenshot data storage Load Balancer Implementation When full LB and HA are required, you can use a software-based load balancer (such as Microsoft NLB) or hardware-based load balancer (such as F5). Optionally, this can be further augmented by a failover cluster for the Application Server with an active/passive cluster that has only one node operational at any given time. Also, more nodes can be added, as needed, to the failover cluster. ObserveIT Agents App Server App Server 2 MS SQL Server Failover Cluster DNS Records: oitsrv A Figure 30 Load Balancing Implementation OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 34

35 File System Storage To improve performance of the MS SQL Server, it is sometimes recommended to use ObserveIT s file system storage capabilities. In this deployment, the SQL Server is still used for user activity log and configuration data, but the actual screenshot images are stored in a file system directory structure, which is fully managed by ObserveIT. ObserveIT Agents Database Server File System Storage App Server & Web Console Figure 31 File System Storage System Requirements and Data Sizing for Large Deployments For each Application Server*, the recommended requirements are: 8 Core CPU 2.4 GHZ 16 GB RAM 100 GB free hard disk space * It is recommended to add another Application Server for every 2,000 concurrent users. For more specific sizing information, or for configurations exceeding 1,000 Agents, contact an ObserveIT representative. For the SQL Server, the recommended requirements are: Physical Server with 24 Core CPU 2.4 GHZ 64 GB or higher RAM (OS 2012) 15 TB for SQL server, 35 TB for file system (1 month s data retention) For specific recommendations, contact an ObserveIT representative. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 35

36 6 Installation Overview 6.1 One-Click Installation One-Click installation is the easiest way to deploy ObserveIT in the most common environments. The main installation screen provides settings for configuring the SQL Server, Web Console and License. One-Click installation will also install an Agent locally on the Application Server machine. The installation automatically configures the Web Console to work with the secure HTTPS protocol using a self-signed certificate. Figure 32 One-Click Installation 6.2 Custom Installation Each of the ObserveIT components can be installed separately as part of a custom installation, whereby you can distribute the components and use advanced configuration options as needed. Active Directory Domain membership is not mandatory, although ideally all components should be placed on domain members. This enables usage of AD groups for Console Users; filtering of AD groups for Privileged Identity Management; DNS integration for Agent auto-configuration; and GPO-based installation. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 36

37 6.3 Windows Agent Installation Windows Agent installation is performed over a standard Windows installer package (.MSI) that is well supported by software distribution applications and Group Policy (GPO). The Windows Agent can be installed by using the default installation (using a simple batch file) or by using a custom installation which allows you to configure advanced settings, including the Agent registration mode and user recording policy. For improved security, you may also be required to provide a security password when installing or uninstalling the Agent. Requiring a password to install Agents prevents the unauthorized recording of computers and the unauthorized consumption of ObserveIT licenses. By also requesting a password on uninstallation of an Agent, unauthorized removal of a computer from ObserveIT's list of recorded machines is prevented. No reboot is required after installation. Optionally, a system tray icon can be configured to be displayed on the machine when the Agent is running. 6.4 Unix/Linux or Mac Agent Installation The Unix/Linux or Mac Agent installer is a self-extracting file which includes the package and the installation program. All Unix/Linux or Mac Agent installation files are centrally located. The Agent installation procedure is the same for all platforms; a single installation script can be used for every supported platform. For example:./observeit-agent-ubuntu precise run -- -i -s For improved security, you may also be required to provide a security password when installing or uninstalling the Agent. The installation script can also be run in interactive or silent mode: Interactive mode: The installation program prompts you to enter the installation parameters that are required to configure the Agent. Prompts are triggered if the user does not specify the name of the Application Server or if registration to the Application Server fails. Silent mode: The installation program does not prompt for any configuration options during the installation process. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 37

38 The following example shows an ObserveIT interactive installation on a Linux Agent, and the Linux directory structure: Figure 33 Interactive Unix/Linux Installation OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 38

39 7 Key Configuration Settings 7.1 Rules Configuration Alert and prevent rules define the conditions under which an alert will be triggered. Administrators can configure flexible, fully-customizable alert and prevent rules which can help to detect malicious user activities, prevent unauthorized and malicious activity via policy enforcement, increase security awareness through user education and policy notifications, detect known patterns of risky behavior using the built-in library of alert rules, and so on. Figure 34 Alert Rule Configuration For each rule, a detection policy defines the conditions that will trigger an alert (based on robust combinations of Who, Did What, On Which Computer, When, and From Which Client), and additional actions to be taken when the alert is triggered. User warning notifications and blocking messages notify users in real-time about any out-of-policy behavior. Users can acknowledge a message, add a comment explaining their actions, and follow a link to view the company policy. If required, the security administrator can also select to start recording a user when a security violation is detected. Preventive actions, such as forced log off and forcibly closing applications/websites, enable security officers to stop users from breaching or violating company policies. On Linux systems, ObserveIT prevent rules can be configured to block unauthorized Linux commands, including SFTP commands, from being executed. For example, if a user attempts to run commands that manipulate sensitive protection policy files, the user will be denied access to the protection policy files. Video recording of user commands and terminal output can be activated on Linux prevent rules. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 39

40 The Rule Engine Service component on the Application Server processes the activity data and generates alerts based on rules which are active. The administrator can configure a notification policy which defines whom should be notified when an alert is generated, and how they will be notified. For enhanced management and operation, alert rules can be assigned to one or more user groups (a.k.a User Lists ) such as Privileged Users, Everyday Users, Remote Vendors, Terminated Employees, Users in a Watch-List, Executives, Developers & DevOps. Privileged Users and Everyday Users lists are prepopulated based on common Active Directory groups. These lists can be modified, and other lists can be easily created or populated by assigning them individual users or Active Directory groups. In addition, alert rules can be assigned to security Categories (such as, Data Exfiltration, Hiding Information and Covering Tracks, Running Malicious Software, Performing Unauthorized Admin Tasks, and more) in order to help navigation and facilitate rules operation and maintenance. Categories can be applied on Windows, Mac, or Unix/Linux operating systems. Some categories are relevant for all systems. Alert rules in the Insider Threat Library are already grouped into Categories and assigned to relevant User Lists with appropriate risk levels Importing and Exporting Rules ObserveIT allows the importing and exporting of rules. Importing is managed by a straightforward wizard that notifies you in advance about any potential conflict or missing data on the target environment. Exporting rules is simply done by selecting the rules you wish to export and providing the location for the export file. The ability to export and import rules extends ObserveIT's Insider Threat Solution, by enabling the sharing of real-time information about risky user activity and out-of-policy behavior with other departments/users in an organization and with other organizations. Rules can be integrated with external HR systems; ObserveIT User Lists can be exported and imported as a comma-delimited format file (CSV), so for example, you can simply export your current "Employee watch-list" from your HR system and import it into your list in ObserveIT. Alert, policy, and prevent rules can be easily migrated between staging or other environments (such as, from POC to UAT to Production). ObserveIT customers and business partners can use the exported/imported ObserveIT rules to detect risky user activity and out-of-policy behavior on their own Windows or Unix/Linux machines. After the export/import process is completed, the rules can be edited as required to suit the needs of the organization. Note: System rules in the ObserveIT Insider Threat Library are automatically and regularly updated without the need to upgrade to the latest version. The export of System Rules from the ObserveIT Insider Threat Library (ITL) is managed by ObserveIT. System rules are exported with their User List assignments; any changes that were made in List Items are included in the file to be imported. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 40

41 7.2 Console Users (ObserveIT Administrator Users) The following permission levels can be defined for user accounts with access to the Web Console: Admin: This role grants the highest permissions and allows administrators to make configuration changes, view user activity logs and play back all recorded session videos. View-Only Admin: This role allows administrators to view session recordings but not access any ObserveIT configuration options. Config Admin: This role maintains user privacy by allowing administrative access to most configurations options in the Web Console but prevents the viewing of any user activity logs or screen recordings. Different levels of access can be defined for specific users or user groups. Console users can be granted permissions to view recorded sessions on one or more endpoints (on which the ObserveIT Agent is installed), endpoint groups, individual users (domain\user), or Active Directory groups. These permissions are given to users based on their defined role. Permissions can also be assigned to Active Directory groups to view and access session data on specific endpoints or endpoint groups. When configured, only session data that applies to the Active Directory group will be available. Figure 35 Console User Configuration OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 41

42 7.3 Recording Policies Recording Policies are sets of configuration options that control aspects of how the monitored endpoint is configured. By using Recording Policies, the administrator can configure one set of recording settings and apply these settings on many monitored endpoints simultaneously. Policy settings include: Enabling Agent Recording Enabling Identity Theft Detection Enabling Agent API Restricting Recording to RDP Sessions Enabling Hotkeys Enabling Key Logging Enabling In-App Elements Detection Enabling File Activity Monitoring Enabling Entire Screen Capture Optimizing Screen Capture Data Size Enabling Recording Notification Recording in Color or Grayscale Setting Session Timeout Setting Keyboard Stroke Recording Frequency Setting Continuous Recording Data Recording Policy Offline Recording Policy Stealth and Privacy Policy Data Loss Detection Policy Identification Policy (Secondary User Identification/PIM) User Recording Policy Application Recording Policy Non-Interactive Programs Recording Policy Agent Logging and Debugging Memory Management Figure 36 Recording Policy Templates OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 42

43 7.4 SMTP, LDAP, Active Directory SMTP configuration enables ObserveIT to send messages and scheduled reports to Console Users. Figure 37 SMTP Settings Configuration LDAP integration is commonly used for secondary user authentication. Figure 38 LDAP Settings Configuration If during installation, the endpoint which hosts the ObserveIT Application Server component is a member of an Active Directory domain, this connector is created automatically. If the endpoint is not a member of a domain during installation, but is made a member later, the connector can still be created. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 43

44 8 Security and Privacy Infrastructure ObserveIT is a highly-secure, enterprise-class platform designed for full reliability and non-repudiation. 8.1 Windows Agent The Windows Agent is protected by a multi-layered watchdog mechanism that continuously monitors the recording Agent. If the Agent process is unexpectedly stopped, the watchdog immediately restarts it and reports the incident to the Application Server. If so configured, the event will also be reported to a SIEM system and/or an address. ObserveIT detects any Agent files or offline data that has been tampered with or has incurred data loss, and generates events which can be viewed in the Web Console and Administrator Dashboard. These events can also be sent to an address and/or to an integrated SIEM system. 8.2 Unix/Linux Agent The ObserveIT watchdog mechanism also continuously monitors the Unix/Linux Agent. The Unix/Linux Agent hooks to the terminal device and to the user shell. Thus, if there is any attempt to stop/kill the Agent logger process, the watchdog will immediately report the incident and terminate the shell process. Tampering with Unix/Linux Agent files or offline data also generates events which can be viewed in the Web Console and Administrator Dashboard. 8.3 Data Security in Transit Communication between the ObserveIT components is handled over the HTTP protocol. SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encryption protocols are fully supported for securing all HTTPS traffic between the client machine and the server running the ObserveIT Web Console. If required, an IPSec tunnel can also be used to protect the Agent-to-Server traffic. Figure 39 HTTPS and IPSec Security OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 44

45 8.4 Data Security at Rest Data that is stored in MS SQL Server automatically inherits all the data protection mechanisms already in place for corporate databases. Additionally, ObserveIT will encrypt all screen recordings when the Image Security option is enabled. In this situation, the ObserveIT Agents and Application Server will use a token exchange mechanism to encrypt all session data. The recordings are digitally signed by the Application Server when stored in the database. When ObserveIT detects any tampering with a session s data (for example, if a DBA deleted an incriminating screenshot from within the session recording), a warning indicator Console: appears for that session in the Web Figure 40 Data Integrity Warning Indicator For privacy, all screen capture data (whether stored in an SQL database or in the file system) can be encrypted by a synchronous Rijndael 256-bit key. To further protect this key, the key itself can be encrypted by an asynchronous 1024-bit X509 certificate (with RSA encryption key). This encryption is also inherited by any sessions exported for offline viewing. ObserveIT Agents are FIPS (Federal Information Processing Standards) compliant. Both Windows and Unix/Linux Agents comply with the FIPS security standard and can be deployed on any supported FIPS-enabled machine. The TLS encryption protocol is used to secure traffic between the ObserveIT Agents and the ObserveIT Application Server. 8.5 Installation Security The ObserveIT administrator can protect against improper or unauthorized Agent installation by requiring the person installing or uninstalling any Agent to provide a security password, which is registered on the Application Server. Requiring a password to install Agents prevents the unauthorized recording of computers and the unauthorized consumption of ObserveIT licenses. By enforcing a password also on uninstallation of an Agent, the unauthorized removal of a computer from ObserveIT's list of recorded machines is prevented. The main ObserveIT Administrator Dashboard and mini Administrator Dashboard display the number of Agents that were recently installed and uninstalled. In addition, if configured, notifications via can report successful or failed installation/uninstallation events due to security password enforcement. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 45

46 8.6 System Health Monitoring ObserveIT provides comprehensive monitoring of all system components, providing administrators with a highlevel system health overview, along with drill-down capabilities to quickly investigate any issues. An Administrative Dashboard presents administrators with graphical summaries of the operational statuses of installed ObserveIT Agents and Infrastructure, enabling you to see at-a-glance any issues requiring attention, such as communication faults, data loss, dwindling disk space or Agent tampering. Most Dashboard elements can be clicked to drill down into the details of that element. Figure 41 Administrator Dashboard You can easily drill down from the Dashboard to the affected entity, and then directly to the individual events that led to a specific incident. Additionally, the status of the most important elements is highlighted in a mini Admin Dashboard that appears at the top of every ObserveIT page, providing immediate drill-down to more details: Figure 42 Mini Admin Dashboard alerts can be configured to inform administrators of critical issues in real time. Links in the lead directly to the ObserveIT Web Console for further information or investigation. The following types of system events are covered by the Dashboard; they can be included in alerts and they can be integrated within a third-party SIEM system via simple integration: Agent or Service killed or stopped Agent went offline, lost data or experienced communication problems Agent tampered with Agents installed and uninstalled Application Server went offline OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 46

47 8.7 Configuration Change Auditing ObserveIT provides detailed auditing reports that show critical configuration changes that were made while working in the Web Console. For example, when anonymization is enabled/disabled, when an endpoint is unregistered, or when an Agent's recording was turned off or changes were made in a Recording Policy configuration, you can track exactly who did this and when it happened. These reports are valuable for security auditing and change management. Figure 43 Auditing Web Console Changes 8.8 User Privacy Protection ObserveIT provides the following options for protecting user privacy: Anonymization of user details: ObserveIT can be configured to work in Anonymized mode. In this mode, all personal user information in the Dashboard and the Web Console is encoded so there is no way to identify the name of the user, the role or department, or see the user's personal photo. Computers that are accessed and login accounts being used can also be anonymized. A Security Analyst or an Investigator using the system can still get detailed visibility to the risky users including their alerts and activity, but without their personal identity being exposed. Figure 44 Anonymized Users in the ObserveIT Dashboard OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 47

48 If there is a need to expose user details during the investigation process, an Exposure Request can be submitted, and the request will be reviewed and approved (or rejected) by an authorized administrator acting as the Privacy Officer. In addition, certain users or groups (e.g., Remote Vendors) can be excluded from being anonymized, and high ranking individuals (e.g., the CISO) can be allowed to view data in the clear (i.e., not anonymized). Granular access rights: ObserveIT users access can be restricted so that they can be assigned permissions to view sessions of specific endpoints, endpoint groups, individual users, or Active Directory groups. Permissions are reflected in session recordings throughout the Web Console. For example, the Database group manager can view sessions by DBAs on any computer, plus any user session that took place on the database server. This ensures relevant access by authorized users while blocking inappropriate access by users without a valid reason. These rules extend to all user activity logs, reports and video replay. Granular access rights also apply in the User Risk Dashboard where security analysts are permitted to view and monitor only the risky users and their data to which they have been assigned permissions. Start video recording upon alert: The Start video recording action in the Alert/Policy Rule protects user privacy by allowing the recording of metadata only and adding video as further evidence of user actions only when a specific alert has been triggered. This feature provides ObserveIT with activity data required for analyzing user behavior without disclosing any sensitive data that might appear on the user screen. Dual Password Protection for Playback (4-Eyes Protection): ObserveIT allows you to specify a second password (not managed by the ObserveIT administrator) that is required for replaying the video of a user session. This ensures both audit completeness and employee privacy. In typical situations, IT management (via an ObserveIT administrator) holds the main ObserveIT password, and legal counsel or a union rep holds the second password. This satisfies stringent privacy protection regulations, including BDSG (Germany), CNIL (France), DPD 95/46/EC (EU), and Human Rights Act (UK). Granular deployment allows textual audit logs to be accessed by compliance officers (without the second password), whereas video replay requires legal counsel authorization (both passwords). ObserveIT self-auditing: ObserveIT audits itself, capturing logs and videos of every ObserveIT user who views recorded sessions. Recording Policy options: ObserveIT lets you decide which users/user groups to record, which applications not to record (for example, facebook) and the recording level (for example, metadata only with no video). OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 48

49 9 Data Management 9.1 Database Structure By default, ObserveIT utilizes the following databases, which are created during installation: ObserveIT: Stores all the user activity configuration data and textual audit metadata captured by the ObserveIT Agents. ObserveIT_Analytics: Stores the data that is displayed in the Insider Threat Intelligence Dashboard. This includes alerts statistics and users' score data over time, aggregated by users, applications and alert types. It also stores user profile information, such as job title, photo, department, region, address and more. ObserveIT Data: By default, stores all the ObserveIT screenshot images captured by ObserveIT Agents. Screenshot images can also be stored in the file-system. ObserveIT_Archive_1: The archive storage database stores both the archived user-activity metadata and screenshot images (unless file-system storage is configured). ObserveIT_Archive_template: Used for backup and restore when creating a new archive database. 9.2 Database Storage All data stored in SQL databases can utilize existing backup solutions that are built in to MS SQL Server or thirdparty database backup solutions. The SQL Server database is used to store user activity configuration data, user analytics data, textual audit metadata and possibly (unless the file-system is used) the screenshots captured by the ObserveIT Agents for video replay. To prevent data loss as the database becomes full, ObserveIT allows you to configure additional storage space. You can configure a threshold specifying the maximum disk space that is allocated for the database. A system event is generated when the database storage threshold (%) reaches its configured limit, alerting you to configure additional storage space by updating the specified threshold or by running the archive process. 9.3 File System Storage Visual screenshots represent the largest portion of ObserveIT s data storage needs. For large scale deployments and to prevent SQL Server database performance issues, you can configure the video replay screenshots for filesystem storage instead of in the SQL database, either on the local hard drive of the ObserveIT Application Server or on a file share in the network. When using file-system storage, there is still a need to maintain the SQL Server database in order to store the textual metadata and ObserveIT configuration data. ObserveIT automatically manages the directory where you specify that screenshot data should be stored, including an auto-generated and archived subdirectory tree per date and per session. 9.4 Metadata Storage ObserveIT also records important information about what is seen on the screen, which applications are currently used, what actions the user has performed, the date and time of the action and more. This "metadata" stored in ObserveIT's database is located on a central SQL Server. Because metadata is centrally stored and indexed, it can be used to easily search throughout all recorded sessions and provide a textual breakdown of each user session. Recorded metadata is a very important aspect of the auditing experience and capabilities. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 49

50 9.5 Archiving ObserveIT has built-in database archiving capabilities to move data from the main ObserveIT database to a secondary database. Storing obsolete and irrelevant data online reduces the overall performance of a database server. By archiving data, you can decrease disk space usage and reduce the maintenance required, for example, in defragmentation, backup and restore procedures. From a performance point of view, if a production database or file system storage has obsolete data that is never or rarely used, query execution can be timeconsuming because queries also scan obsolete data. To improve query performance, you should move obsolete data from the production database to another archive database. Archiving of data can also be performed on file systems that are used for storing screen capture data. Archiving jobs can be launched manually or can be scheduled for automatic periodic archive rotation. Figure 45 Archiving Data The archive process moves the image (screen capture) data, but maintains the user activity log data for search purposes. This ensures that the data that consumes the most storage is moved, while maintaining the searchability of user activity log information. Video replay can be launched directly from an archived session. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 50

51 10 Integrating ObserveIT Data into Third-Party SIEM Systems ObserveIT s user activity data can be integrated with third-party SIEM monitoring systems (such as Microsoft System Center Operation Manager, IBM QRadar, HP ArcSight, Splunk, and McAfee SIEM/ELM) in order to enhance real-time alerting and reporting capabilities. The ObserveIT log data can be integrated with SIEM systems also by providing the data in database API format, or by exporting ObserveIT monitor log files which can be imported to an organization s existing SIEM system. The following types of ObserveIT log data can be exported to SIEM systems: User Activity DBA Activity Session Activity Alerts System Events In-App Elements Audit Sessions Audit Logins Audit Configuration 10.1 SIEM System Integration Using Native SIEM Apps ObserveIT s user activity data can be integrated with Native SIEM Apps: IBM QRadar and Splunk. The ObserveIT App for IBM Qradar/Splunk provides security analysts and investigation teams with powerful user activity metadata, smart user behavior alerts, and powerful user context to help identify and investigate Insider Threats and other user-based threats directly from within the App. Security teams can correlate ObserveIT metadata with other data sources to create smarter alerts and stop threats before they happen. A one-click link from the App to the ObserveIT Web Console provides full Video Playback and deeper analysis of user behavior. All ObserveIT metadata and alerts can be integrated into the Observer App for IBM Qradar/Splunk allowing you to: Search for all recorded user sessions and activity Search for all user behavior alerts View graphical summaries of the above data Search for specific user sessions and alerts by user, computer, application, time range, and so on View detailed summaries of user session activity applications that were run, visited websites, files copied, printing, and so on Drill down to see alerts details Link from alerts to view full user sessions Link to full video playback OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 51

52 The following screenshots provide examples. Figure 46 ObserveIT SIEM Integration with IBM QRadar Native App Figure 47 ObserveIT SIEM Integration with Splunk Native App OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 52

53 10.2 SIEM System Integration Using Database API Providing log data via ObserveIT s database API enables SIEM systems and other third-party monitoring software to programmatically integrate with ObserveIT in order to receive session data and recordings. When using the API, access is provided to log data stored in ObserveIT s database tables. Thus, third-party systems can retrieve the exposed data directly from ObserveIT s database. ObserveIT s API provides log data using views. Users with role_api read permissions can access the API_OIT views. The ObserveIT database API provides the following views for each of the log file data types: API_OIT_User_Activity: Contains data about user activities on monitored endpoints, including captured screenshots and user activity log data (details about applications, registry settings, and files that the user accessed). API_OIT_Session_Activity: Contains data about sessions that occurred on monitored endpoints. API_ OIT_DBA_Activity: Contains data about SQL database queries that were performed during sessions. API_OIT_Alert_Activity: Contains data about activity alerts which were generated when suspicious login events or user activity occurred during a session. Alert rules define the conditions under which an alert is triggered. API_OIT_System_Events: Contains data about events that were triggered by the system (for example, when a user logs in, or during the health check monitoring of the Agent, Notification Service, Application Server or Web Console). Events are defined by their severity, source for example, Notification Service and category (Login, Health Check). API_ OIT_InApp_Elements Contains data about specific elements (In-App Elements) within desktop and web-based applications that were marked for tracking risky user behavior. API_OIT_Audit_Session Contains data about all the sessions which were replayed by the user. API_OIT_Audit_Logins Contains data about all successful and failed logins to the Web Console. API_OIT_Audit_Configuration Contains data about configuration changes that were made while working in the Web Console (like when a server is unregistered or when changes were made in a recording policy configuration) SIEM System Integration Using Monitor Log Data ObserveIT Monitor Log data can be easily integrated into an organization s existing SIEM system. ObserveIT is currently certified to provide integration support with the HP ArcSight SIEM monitoring software. Integration with HP ArcSight SIEM enables the export of ObserveIT log data to ArcSight Common Event Format (CEF). All log files from ObserveIT user activities, DBA activity, activity alerts, system events, In-App Element data, user logins, and audit sessions, logins, and configurations can be exported and integrated into the SIEM monitoring software at timed intervals. The SIEM integration parses the ObserveIT log files, and create events, triggers, and alerts based on text strings of information that appear inside the log file. Integrated log data can be viewed and videos of recorded sessions can be replayed directly from within the external SIEM dashboard or report environment. This screenshot shows how ObserveIT user activity and alert data is incorporated within the HP ArcSight SIEM monitoring software. OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 53

54 Figure 48 ObserveIT User Activity and Alerts SIEM Integration OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 54

55 User Activity Log Integration Most SIEM platforms utilize data collector mechanism for importing log data. ObserveIT s user activity logs fit this model well. Any SIEM can access ObserveIT user activity logs via real-time log file polling. This method uses direct access to the data source without the need to go via a Web service or API-call layer. Your SIEM / Log Mgmt Application Poller Log file polling (Direct access, no AppServer interaction) Poll every x seconds OIT AppServer Real-time Metadata Log File Field Mapper Log file polling results Latest deltas Your Database Figure 49 Real-Time Log File Polling Data Collector Schematic ObserveIT user activity logs can be added to a real-time log file by enabling this within the Integrated SIEM configuration settings. The log file can then be integrated into any SIEM system, including native integration such as HP ArcSight CEF file format. Figure 50 Real-Time Logging OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 55

56 Video Replay Integration Unlike the user activity log data, the video replay data is typically maintained within the ObserveIT environment, enabling enhanced custom playback functionality and reducing the amount of data that would otherwise be continuously added to the SIEM. OIT Web Console Your Custom App HTTP Port 4884 Video Player HTML Wrapper Video Database Single sign-on: Custom app uses uid/pwd of OIT web console Passwords are not transferred: Token-based authentication with TTL limits Figure 51 Video Replay Integration Schematic The video replay is available as a single HTTP target even if the ObserveIT database is federated across multiple local installations. The custom application does not need to be aware of the actual video storage location. Your Custom App OIT Centralized Web Console Config data for centralized console HTTP Port 4884 Single URL for on-the-fly video replay Video Player HTML Wrapper Config data for each local OIT deployment Single sign-on: Custom app uses uid/pwd of centralized OIT console Passwords are not transferred: Token-based authentication with TTL limits Same SSO / pwd / token / TTL process for communication with each local install OIT Local Install 1 OIT Local Install 2 OIT Local Install 3 Video Database Video Database Video Database Figure 52 Video Replay Integration with Federated Databases OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 56

57 11 Integrating ObserveIT Data into Network Management (Alerting) Systems The same data integration highlighted above for SIEM integration can be used to implement a custom alerting method within any common Network Management Platform. 12 Integrating ObserveIT with a Service Desk System The integration of ObserveIT s user activity monitoring solution with an IT Service Desk system provides additional layers of security and monitoring to your organization. The main benefits of service desk system integration are: 1. You can require specific administrators and/or remote vendors to enter a valid ticket number from the service desk system before being able to log into specific endpoints. By linking every login to a specific ticket, unnecessary and unauthorized logins are reduced and there is greater enforcement of segregation of duties. 2. Once a ticket number is provided as part of the server login process, ObserveIT automatically augments the ticket data with key details about the login session which are only available to ObserveIT. For example, the ticket will include the actual user name used to access the server (based on a secondary identification login which goes beyond generic system admin login accounts), the specific server which was accessed, and the exact date/time that the session occurred. 3. The ticket record will include a direct link to the video recording of the specific session in which the administrator or remote vendor addressed the ticket. This provides the unique ability to visually review exactly how the user addressed the ticket. Linking a video recording of their actions addressing a ticket from within the ticket itself allows faster and easier auditing of the exact actions performed by administrators and remote vendors. When an administrator or remote vendor attempts to log in to a monitored endpoint, a message is displayed requesting the user to enter a valid ticket number from a service desk system before they can log on to the endpoint. Figure 53 Ticket Window OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 57

58 The ticket number entered is validated against the service desk system database before the user is granted access to the system. The ticket associated with the session is linked to a video recording of the session. In addition, specific information about the login session is automatically saved by ObserveIT and included in the service desk system. Within the service desk system itself, a direct link to the video recording of the specific session in which the administrator or remote vendor addressed the ticket provides faster and easier auditing of the exact actions performed by administrators and remote vendors. ObserveIT offers built-in integration with ServiceNow that works out of the box. Integration with most other ticketing systems (such as ServiceDesk, Remedy, Track-It!, HEAT, and Kayako) may be implemented by customers according to their own requirements. ObserveIT provides API guidance to help customers build a Web Service that will enable them to integrate ObserveIT with their own ticketing system. For details, see the ObserveIT Service Desk Integration Guide. For further details about integrating ObserveIT's session recording system with an IT service desk system, refer to OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 58

59 13 Agent API for Process-Oriented Integration ObserveIT s Agent API enables external applications to build custom logic for what and when to record. The Agent API exposes a set of classes that enable: Start, Stop, Pause, Resume, and End a recorded session Custom logic for when to start recording (based on process ID, process name, computer name, user, URL, and more) System health check Viewing recorded sessions Recording additional processes can be tied to existing sessions or to a new session, thus creating a separate session for each recorded process. The API is built in to the Agent but not enabled by default. It can be enabled from the ObserveIT Web Console. Controller Machine Monitored Machine Your Custom Code JavaScript.NET VBScript OIT DLL (API) TCP Port 5050 Listener Service Agent Process Agent Process Agent Process Custom code & OIT DLL are tightly coupled One instance of agent process per login session Listener & Agents are tightly coupled Controller Machine & Monitored Machine are loosely coupled. Can be (but does not need to be) same machine. Figure 54 Agent API Schematic OBSERVEIT TECHNICAL SOLUTION OVERVIEW 2017 ObserveIT. All rights reserved. 59

OBSERVEIT TECHNICAL SOLUTION OVERVIEW

OBSERVEIT TECHNICAL SOLUTION OVERVIEW OBSERVEIT TECHNICAL SOLUTION OVERVIEW This document outlines the key features, system architecture, deployment scenarios, system requirements, product installation, security infrastructure, data management,

More information

WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5

WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5 WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5 ObserveIT s award-winning insider threat management software combines user monitoring, behavioral analytics, and now policy enforcement

More information

ObserveIT 7.1 Release Notes

ObserveIT 7.1 Release Notes ObserveIT 7.1 Release Notes In This Document About This Release... 2 New Features and Enhancements... 2 Backward Compatibility... 3 New Supported Platforms... 3 Resolved Issues... 4 Known Issues... 4 Limitations...

More information

ObserveIT Technology Overview

ObserveIT Technology Overview PRODUCT FACT SHEET ObserveIT Technology Overview At a Glance This document outlines the deployment scenarios, component architecture, technical feature descriptions and integration capabilities of ObserveIT

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation

More information

Performing an ObserveIT Upgrade Using the Interactive Installer

Performing an ObserveIT Upgrade Using the Interactive Installer Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One

More information

Upgrading an ObserveIT One-Click Installation

Upgrading an ObserveIT One-Click Installation Upgrading an ObserveIT One-Click Installation This document was written for ObserveIT Enterprise version 7.6.1. This document uses screenshots and procedures written for Windows Server 2012 R2 and SQL

More information

WHAT S NEW IN OBSERVEIT 5.8 ObserveIT 5.8 delivers a range of enhancements aimed at more efficiently supporting the monitoring of business users.

WHAT S NEW IN OBSERVEIT 5.8 ObserveIT 5.8 delivers a range of enhancements aimed at more efficiently supporting the monitoring of business users. WHAT S NEW IN OBSERVEIT 5.8 ObserveIT 5.8 delivers a range of enhancements aimed at more efficiently supporting the monitoring of business users. Risky user behavior is behind the majority of breaches

More information

ObserveIT Release Notes

ObserveIT Release Notes ObserveIT 7.5.2 Release Notes This document lists new and deprecated supported platforms, issues that were discovered and fixed since the release of the previous release of ObserveIT, and known issues

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 5.1 Program Overview Contents About the Program Ekran Server & Management Tool Database Management Licensing Client Installation Monitoring Parameters Client Protection Advanced User Authentication

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Privileged Account Security: A Balanced Approach to Securing Unix Environments Privileged Account Security: A Balanced Approach to Securing Unix Environments Table of Contents Introduction 3 Every User is a Privileged User 3 Privileged Account Security: A Balanced Approach 3 Privileged

More information

PROTECT AND AUDIT SENSITIVE DATA

PROTECT AND AUDIT SENSITIVE DATA PROTECT AND AUDIT SENSITIVE DATA Teleran Data and Compliance KEY FEATURES Monitors user, application, query and data usage activity Enforces data access policies in real-time Alerts staff in real-time

More information

MEETING ISO STANDARDS

MEETING ISO STANDARDS WHITE PAPER MEETING ISO 27002 STANDARDS September 2018 SECURITY GUIDELINE COMPLIANCE Organizations have seen a rapid increase in malicious insider threats, sensitive data exfiltration, and other advanced

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 6.5 9/26/2014 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

CRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations

CRYPTTECH. Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations Cost-effective log management for security and forensic analysis, ensuring compliance with mandates and storage regulations Integration with Numerous Type of Devices Flexible Architectural Configuration

More information

Security from the Inside

Security from the Inside Security from the Inside Detect, Record, and Eliminate Malicious User Behavior 24/7 live screen recording & playback Automatically allow or block any activity Real-time user activity tracking Rule-based

More information

NetIQ Privileged Account Manager 3.5 includes new features, improves usability and resolves several previous issues.

NetIQ Privileged Account Manager 3.5 includes new features, improves usability and resolves several previous issues. Privileged Account Manager 3.5 Release Notes July 2018 NetIQ Privileged Account Manager 3.5 includes new features, improves usability and resolves several previous issues. Many of these improvements were

More information

Security in the Privileged Remote Access Appliance

Security in the Privileged Remote Access Appliance Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking

More information

ObserveIT v Introduction and Installation Guide

ObserveIT v Introduction and Installation Guide ObserveIT v.7.0.0 Introduction and Installation Guide Contents Introduction... 3 Product Version... 3 Trial Limitations... 4 System Requirements... 4 ObserveIT All-in-One Management Server... 5 ObserveIT

More information

Mapping BeyondTrust Solutions to

Mapping BeyondTrust Solutions to TECH BRIEF Taking a Preventive Care Approach to Healthcare IT Security Table of Contents Table of Contents... 2 Taking a Preventive Care Approach to Healthcare IT Security... 3 Improvements to be Made

More information

Netwrix Auditor. Administration Guide. Version: /31/2017

Netwrix Auditor. Administration Guide. Version: /31/2017 Netwrix Auditor Administration Guide Version: 9.5 10/31/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation

More information

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Copyright 2014, Oracle and/or its affiliates. All rights reserved. 1 Enterprise Manager 12c Compliance Management Part 1 Overview 2 3 Agenda Compliance Overview Understanding Compliance Results Understanding Compliance Score Calculation Compliance Related Roles and Privileges

More information

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks Key Advantages Stay ahead of zero-day threats, ransomware, and greyware with machine learning and dynamic

More information

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust

More information

McAfee Skyhigh Security Cloud for Amazon Web Services

McAfee Skyhigh Security Cloud for Amazon Web Services McAfee Skyhigh Security Cloud for Amazon Web Services McAfee Skyhigh Security Cloud for Amazon Web Services (AWS) is a comprehensive monitoring, auditing, and remediation solution for your AWS environment

More information

the SWIFT Customer Security

the SWIFT Customer Security TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

ISO/IEC Controls

ISO/IEC Controls ISO/IEC 27001 Controls and Netwrix Auditor Mapping www.netwrix.com Toll-free: 888-638-9749 About ISO/IEC 27001 ISO/IEC 27001 is an international standard that provides requirements for establishing, implementing,

More information

Netwrix Auditor Competitive Checklist

Netwrix Auditor Competitive Checklist Netwrix Auditor Competitive Checklist DATA COLLECTION AND STORAGE Non-intrusive architecture Operates without agents so it never degrades system performance or causes downtime. Certified collection of

More information

Securing Office 365 with SecureCloud

Securing Office 365 with SecureCloud Securing Office 365 with SecureCloud 1 Introduction Microsoft Office 365 has become incredibly popular because of the mobility and collaboration it enables. With Office 365, companies always have the latest

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

The SANS Institute Top 20 Critical Security Controls. Compliance Guide The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise

More information

Goliath Application Availability Monitor. Technology Overview

Goliath Application Availability Monitor. Technology Overview Goliath Application Availability Monitor Technology Overview Page 1 8/14/2018 Contents Introduction... 3 Step-by-Step Screenshot Analysis... 4 Scheduling and Automation... 5 Alert Notifications... 6 Deployment...

More information

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that

More information

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) A Guide to Leveraging Privileged Account Security to Assist with SWIFT CSCF Compliance Table of Contents Executive Summary...

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information

Proactive Performance Monitoring for Citrix XenApp & XenDesktop

Proactive Performance Monitoring for Citrix XenApp & XenDesktop Proactive Performance Monitoring for Citrix XenApp & XenDesktop TECHNOLOGY OVERVIEW In approximately one week, support tickets dropped by 25% Our customers were complaining about persistent slowness with

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

SecureVue. SecureVue

SecureVue. SecureVue SecureVue SecureVue Detects Cyber-Attacks Before They Impact Your Business Provides Situational Awareness to Proactively Address Enterprise Threats Ensures Quick and Easy Compliance Reporting and Documentation

More information

Table of Contents HOL-SDC-1415

Table of Contents HOL-SDC-1415 Table of Contents Lab Overview - - IT Outcomes Security Controls Native to Infrastructure. 2 Lab Guidance... 3 Module 1 - Policy-Based Compliance... 5 Introduction... 6 Manage vcenter Server Virtual Machines...

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

McAfee Endpoint Threat Defense and Response Family

McAfee Endpoint Threat Defense and Response Family Defense and Family Detect zero-day malware, secure patient-zero, and combat advanced attacks The escalating sophistication of cyberthreats requires a new generation of protection for endpoints. Advancing

More information

McAfee Skyhigh Security Cloud for Citrix ShareFile

McAfee Skyhigh Security Cloud for Citrix ShareFile McAfee Skyhigh Security Cloud for Citrix ShareFile McAfee Skyhigh Security Cloud for Citrix ShareFile helps organizations securely accelerate their business by providing industry-best Data Loss Prevention

More information

IBM services and technology solutions for supporting GDPR program

IBM services and technology solutions for supporting GDPR program IBM services and technology solutions for supporting GDPR program 1 IBM technology solutions as key enablers - Privacy GDPR Program Work-stream IBM software 2.1 Privacy Risk Assessment and Risk Treatment

More information

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office

More information

Printer and Driver Management

Printer and Driver Management 2017 PrinterLogic, All Rights reserved. Business Problem From an end user s perspective, printing is easy click Print and pick up the document at a nearby printer. What they don t know is all that s involved

More information

Imperva CounterBreach

Imperva CounterBreach Imperva CounterBreach DATASHEET Protect Your Data from Insider Threats The greatest threat to enterprise security is the people already on the payroll. To do their jobs, employees, contractors, consultants

More information

IBM Internet Security Systems Proventia Management SiteProtector

IBM Internet Security Systems Proventia Management SiteProtector Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

Netwrix Auditor. Event Log Export Add-on Quick-Start Guide. Version: 8.0 6/3/2016

Netwrix Auditor. Event Log Export Add-on Quick-Start Guide. Version: 8.0 6/3/2016 Netwrix Auditor Event Log Export Add-on Quick-Start Guide Version: 8.0 6/3/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

68 Insider Threat Red Flags

68 Insider Threat Red Flags 68 Insider Threat Red Flags Are you prepared to stop the insider threat? Enterprises of all shapes and sizes are taking a fresh look at their insider threat programs. As a company that s been in the insider

More information

McAfee MVISION Cloud. Data Security for the Cloud Era

McAfee MVISION Cloud. Data Security for the Cloud Era McAfee MVISION Cloud Data Security for the Cloud Era McAfee MVISION Cloud protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It s cloud-native data

More information

2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,

2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, 2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered

More information

Anchor User Guide. Presented by: Last Revised: August 07, 2017

Anchor User Guide. Presented by: Last Revised: August 07, 2017 Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...

More information

Goliath Technology Overview with MEDITECH Module

Goliath Technology Overview with MEDITECH Module Customers # 324 Fortune 500 Goliath Technology Overview with MEDITECH Module In approximately one week, support tickets dropped by 25% z Our Customers were complaining about persistent slowness with Citrix.

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Symantec Endpoint Protection Family Feature Comparison

Symantec Endpoint Protection Family Feature Comparison Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per

More information

Risk Intelligence. Quick Start Guide - Data Breach Risk

Risk Intelligence. Quick Start Guide - Data Breach Risk Risk Intelligence Quick Start Guide - Data Breach Risk Last Updated: 19 September 2018 --------------------------- 2018 CONTENTS Introduction 1 Data Breach Prevention Lifecycle 2 Choosing a Scan Deployment

More information

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer Netwrix Auditor Visibility platform for user behavior analysis and risk mitigation Mason Takacs Systems Engineer Agenda Product Overview Product Demonstration Q&A About Netwrix Auditor Netwrix Auditor

More information

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches

More information

Built-in functionality of CYBERQUEST

Built-in functionality of CYBERQUEST CYBERQUEST Knows everything Built-in functionality of CYBERQUEST Summary Demonstration of CyberQuest functionality E-mail: office@nextgensoftware.solutions Content Intro... 3 Built-in functionality of CYBERQUEST...

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Sync User Guide. Powered by Axient Anchor

Sync User Guide. Powered by Axient Anchor Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7

More information

SQL Server Solutions GETTING STARTED WITH. SQL Secure

SQL Server Solutions GETTING STARTED WITH. SQL Secure SQL Server Solutions GETTING STARTED WITH SQL Secure Purpose of this document This document is intended to be a helpful guide to installing, using, and getting the most value from the Idera SQL Secure

More information

GDPR Controls and Netwrix Auditor Mapping

GDPR Controls and Netwrix Auditor Mapping GDPR Controls and Netwrix Auditor Mapping www.netwrix.com Toll-free: 888-638-9749 About GDPR The General Data Protection Regulation (GDPR) is a legal act of the European Parliament and the Council (Regulation

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...

More information

SOX/COBIT Framework. and Netwrix Auditor Mapping. Toll-free:

SOX/COBIT Framework. and Netwrix Auditor Mapping.  Toll-free: SOX/COBIT Framework and Netwrix Auditor Mapping www.netwrix.com Toll-free: 888-638-9749 About SOX All public companies in the U.S. are subject to Sarbanes Oxley (SOX) compliance without exceptions. SOX

More information

Proactive Performance Monitoring for Citrix XenApp & XenDesktop. Technology Overview

Proactive Performance Monitoring for Citrix XenApp & XenDesktop. Technology Overview Proactive Performance Monitoring for Citrix XenApp & XenDesktop Technology Overview 4/10/2018 Contents Summary... 3 Purpose Built for Citrix Environments... 3 Co-existence with Enterprise Monitoring Tools...

More information

Overcoming Remote Desktop Challenges with

Overcoming Remote Desktop Challenges with Overcoming Remote Desktop Challenges with SPONSORED BY A BWW Media Group Brand By Michael Otey Michael Otey is president of TECA, Inc., which focuses on Windows and SQL Server product development and consulting.

More information

Data Breach Risk Scanning and Reporting

Data Breach Risk Scanning and Reporting Data Breach Risk Scanning and Reporting 2017. SolarWinds. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document

More information

Detector Service Delivery System (SDS) Version 3.0

Detector Service Delivery System (SDS) Version 3.0 Detector Service Delivery System (SDS) Version 3.0 Detecting and Responding to IT Security Policy Violations Quick Start Guide 2018 RapidFire Tools, Inc. All rights reserved. V20180112 Contents Overview

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

Data Leak Prevention

Data Leak Prevention Data Leak Prevention Safetica ESET Technology Alliance Data Leak Prevention by Safetica Safetica security software offers a full DLP (Data Leak Prevention) solution which covers a wide range of security

More information

Understand & Prepare for EU GDPR Requirements

Understand & Prepare for EU GDPR Requirements Understand & Prepare for EU GDPR Requirements The information landscape has changed significantly since the European Union (EU) introduced its Data Protection Directive in 1995 1 aimed at protecting the

More information

EXABEAM HELPS PROTECT INFORMATION SYSTEMS

EXABEAM HELPS PROTECT INFORMATION SYSTEMS WHITE PAPER EXABEAM HELPS PROTECT INFORMATION SYSTEMS Meeting the Latest NIST SP 800-53 Revision 4 Guidelines SECURITY GUIDELINE COMPLIANCE There has been a rapid increase in malicious insider threats,

More information

McAfee epolicy Orchestrator

McAfee epolicy Orchestrator McAfee epolicy Orchestrator Centrally get, visualize, share, and act on security insights Security management requires cumbersome juggling between tools and data. This puts the adversary at an advantage

More information

Top. Reasons Legal Teams Select kiteworks by Accellion

Top. Reasons Legal Teams Select kiteworks by Accellion Top 10 Reasons Legal Teams Select kiteworks by Accellion Accellion Legal Customers Include: Top 10 Reasons Legal Teams Select kiteworks kiteworks by Accellion enables legal teams to manage their increasing

More information

CimTrak Product Brief. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Product Brief. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Netwrix Auditor Add-on for Privileged User Monitoring

Netwrix Auditor Add-on for Privileged User Monitoring Netwrix Auditor Add-on for Privileged User Monitoring Quick-Start Guide Version: 9.6 5/8/2018 Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

Get to know SysKit Monitor

Get to know SysKit Monitor Get to know SysKit Monitor Ser ver Administration & Monitoring Solution SysKit is a software development company based in Zagreb, Croatia, Europe founded in 2009. We create innovative software solutions

More information

Database Centric Information Security. Speaker Name / Title

Database Centric Information Security. Speaker Name / Title Database Centric Information Security Speaker Name / Title The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

HIPAA Compliance Assessment Module

HIPAA Compliance Assessment Module Quick Start Guide HIPAA Compliance Assessment Module Instructions to Perform a HIPAA Compliance Assessment Performing a HIPAA Compliance Assessment 2 HIPAA Compliance Assessment Overview 2 What You Will

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM

More information

The Cognito automated threat detection and response platform

The Cognito automated threat detection and response platform Overview The Cognito automated threat detection and response platform HIGHLIGHTS Finds active cyberattackers inside cloud, data center and enterprise environments Automates security investigations with

More information

NETWRIX GROUP POLICY CHANGE REPORTER

NETWRIX GROUP POLICY CHANGE REPORTER NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Data Leak Prevention

Data Leak Prevention Data Leak Prevention Key advantages Full suite DLP solution Short time-to-benefit High level of tamperresistance All speciality functions covered against leakage Agnostic approach Clearly defined data

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting

More information