RSA SOLUTION OVERVIEW

Size: px
Start display at page:

Download "RSA SOLUTION OVERVIEW"

Transcription

1 RSA Advanced Threat Detectin and Respnse with RSA NetWitness Lgs and Packets SPOTTING ADVANCED THREATS WITH BEHAVIOR ANALYTICS AND DATA SCIENCE MODELING Using Behavir Analytics and Data Science t Identify Cvert Channels and C2 Threats The use f detective analytics is nw a central piece f security architectures, as security prfessinals are increasingly encuntering a needle-in-the-haystack prblem. Security tls especially rule based nes as well as systems, applicatins, and infrastructure, create s much data that it's tugh t uncver the signal f a real attack. Behavir analytics tls help make sense f the vast amunt f data that these systems generate. While many vendrs claim t use behaviral techniques, they fail t integrate them with ther data science mdels t deal with tday s natin state r hacktivist-type attacker. There are sme real use cases where using behaviral techniques fr data analysis can identify sme f the mst real and pressing detectin issues security teams face, and that cnventinal analytic tls alne fail t spt. One amng many f these use cases is trying t spt cmprmised hsts, bth internal and external. Real threats dn t penly advertise themselves. They hide their activity amng all the ther things that are happening in tday s typically cmplex IT envirnments. These threats rely n the assumptin that tday s security teams have neither the tls nr the time t investigate deeply enugh t distinguish between their activity and thse f emplyees, custmers r partners. Tday s sphisticated attackers use ways t get infrmatin in and ut f the rganizatin that evade detectin, leveraging what are knwn as cvert channels that enable cmmand and cntrl (C2) f resurces. Many successful recent public attacks have cvert channels cmmunicating with C2 servers that can fully cmprmise systems. Fr example: Phishing scams typically use cvert channels t deliver malware t victims, making it difficult t spt that initial click n the ffending link. After cmprmise, tday s threats ften use cvert channels t effect cmmand and cntrl f victim endpints, hiding cmmunicatin traffic amngst nrmal web traffic. In additin t behavir analytics t detect C2 activity, using data science techniques t spt the use f cvert channels means that security teams can spt these sphisticated threats quicker, and reduce the likelihd that an attack harms the rganizatin.

2 Beacning Hsts Cmmunicating with Cmmand and Cntrl Sites When an internal hst gets cmprmised, attackers typically pen a backdr t allw cmmunicatin between a cmmand and cntrl (C2) site and the cmprmised system. Since mst rganizatins have a restrictive plicy arund the inbund cnnectins they will accept, the attackers get arund this by equipping the cmprmised hst t regularly phne hme t pick up instructins fr launching the next stage f the attack. Internal hsts beacning t a C2 hst at a high level lks very much like any ther http traffic, say fr example regularly plling news site, but there are ften clues t distinguish it frm cmmunicatins activity with nrmal hsts if ne lks mre carefully. Amng thers, these indicatrs include: Frequency f cmmunicatins. Typical beacning happens at a regular but relatively infrequent cadence, fr shrt perids f time this is in cntrast t standard web traffic, which is usually either ne-time r mre frequent. Bytes upladed vs dwnladed. Typical web sessins initiated by humans dwnlad far mre than they uplad web servers serve up pictures and ther cntent as a result f a URL request. Hwever, malicius sessins ften uplad far mre than just a shrt request fr a URL. Use f ckies. Typical web sessins place multiple ckies within the user s brwser t track user activity acrss that website and thers. Malicius sessins seldm use ckies. Use f referrer strings. The vast majrity f web sessins cme frm the user clicking n a hyperlink, resulting in a referrer string in the URL request. Malicius sessins generated frm lcal malware generally dn t. URL lengths. Because peple are suppsed t remember high-level URLs (such ggle.cm, cnn.cm etc.), they are usually shrt in length. Hwever malicius services ften embed themselves deep dwn in web servers, resulting in unusually lng destinatin URL generated frm within the rganizatin. Hard and fast alert threshlds fr any f these individual metrics is highly errr prne, s applying data science analytics are essential t identify utliers frm nrmal traffic, taking int cnsideratin many f these factrs at the same time.

3 Why Sptting the Use f Cvert Channels is a Challenge Sptting cvert channel activity falls int tw areas lking at bth inbund and utbund cnnectins, detecting internal hsts with anmalus utbund cmmunicatin patterns, and sptting thse external hsts that are mst likely t be cmprmised. Tw cmmn symptms f cvert channel activity are: Beacning where an internal hst peridically phnes hme t a cmmand and cntrl (C2) hst cntrlled by the attacker, but this phning hme is designed t lk like nrmal web brwsing traffic. Suspicius dmains where an attacker bfuscates the surce f attacks by hiding itself amng the millins f dmains and users in the rganizatin talk t. Prblem is, neither f these symptms are easy t spt using signatures r any hard and fast detective rules. Hwever, mst cvert channel activity leave behind clues that, if detected, can help t distinguish malicius frm nrmal traffic. Making a determinatin as t whether an internal r external hst is suspicius invlves cllecting and examining multiple pieces f data ver extended time perids, detecting deviatins fr regular behavirs and creating a prbability weighted risk scre based upn the results. Suspicius Internet Dmains Hide Amng Nrmal Traffic Perpetratrs f scams ften cmprmise existing hsts n the Internet, and redirect victims tward these sites t either cllect private infrmatin, r deliver malware. Many cnventinal security defenses maintain watch lists f knwn IP addresses and dmain names that hst these attacker services. Hwever, t thwart these static defenses, attackers ften use fast flux techniques, cmprmising many hsts, registering many dmains and redirecting different victims t different dmain thrugh different servers, making effective static watch lists almst impssible t cmpile and maintain. Suspicius dmains can be tricky t spt, and identificatin generally relies upn inspecting raw traffic ging t and frm thse dmains. Fr example: Number f IP addresses assciated with a dmain. Mst cnventinal dmains nly have a few IP addresses assciated with them. Malicius dmains ften have dzens f IP addresses assciated with them t evade static IP watch lists. Number f dmain name wners assciated with a DNS address. Mst cnventinal IP addresses are nly assciated with a few dmain wners. Malicius servers and dmains ften a have cmplex many-t-many system f IP addresses, t dmain hsts, and t dmain wners, s a high number f dmain wners assciated with a system is suspicius. Number f users hitting thse dmains relative t its cmplexity. A ppular dmain like Ggle r Yah, r a ppular hsting service (Amazn EC) will have lts f dmain names and IP addresses assciated with it. But then again, since it is ppular, many users will likely be accessing it. On the ther hand, a dmain that few peple are accessing, but with dzens f IP addresses and wners is mre likely t be malicius. Traffic cntent types. Mst cnventinal servers have ne r tw rles; they are either web servers, mail servers, DNS servers, etc. Suspicius dmains ften hst many services n the same server. GETS vs PUT/POSTs. Mst web servers serve up far mre cntent than peple uplad t it. Dmains where the rati f POSTs t GETs is high are mre likely malicius.

4 Similar t the beacning hst example abve relating static and fixed ratis fr these values can be highly errr prne, requiring mre advanced data science techniques t essentially identify thse utliers frm nrmal, taking int cnsideratin many indicative factrs at nce. RSA Integrates Behavir Analytics t Rapidly Identify Cmmand and Cntrl Activity Internal hsts beacning t a C2 hst at a high level lks very much like any ther http traffic, fr example, regularly plling a news site, but there are ften clues t distinguish it frm cmmunicatins activity with nrmal hsts if ne lks mre carefully. Amng thers, these indicatrs include: frequency f cmmunicatins, hw lng ag the dmain was registered, strange user agents, lack f referrer r dmains nt cnnected t very ften. By gathering and analyzing this data ver lng time hrizns and in real time defenders can identify a beacning hst s tell. RSA NetWitness Lgs and Packets Behavir Analytics C2 mdule evaluates web traffic and alerts analysts if a dmain exhibits behavirs cnsistent with a malware cmmand and cntrl server. The alerts cntain visibility int the indicatrs and cntextual data useful when respnding t an alert. RSA NetWitness Lgs and Packets Cutting Edge Techniques Keep Security Teams Ahead f Advanced Threats Nne f the analysis described abve can alne identify with certainty a cvert channel in an rganizatin. What makes this analysis tugh is the statistical analysis required acrss ALL sessins and acrss all f these measures t identify these suspicius sessins. Few systems have the underlying data, speed, r smarts t d this. Past appraches have been highly errr prne and inefficient as systems have depended n: Rules and threshld-based alerts that may wrk in ne envirnment but nt anther, r need cnstant mdificatin as web behavir evlves Highly manual appraches that rely n creating reprts f search-based results and manually sptting patterns within the results OR Vanilla Big Data systems and cuntless hurs f custmizatin getting them t cllect the right data and spt the types f behavirs described abve RSA NetWitness Lgs and Packets emplys advanced statistical methds t spt these types f attacks, plus prvides an infrastructure upn which t build ther detectin and reprting use cases. RSA NetWitness Lgs and Packets aims t: Prvide cmplete visibility t identify and investigate attacks Eliminate blind spts with visibility acrss lgs, netwrks, and endpints Inspect every netwrk, packet sessin and lg event fr threat indicatrs at time f cllectin with capture time data enrichment Augment visibility with additinal cmpliance and business cntext Detect and analyze even the mst advanced f attacks befre they can impact the business Discver attacks missed by traditinal SIEM and signature-based tls by crrelating netwrk packets, NetFlw, endpints and lgs Identify endpint malware missed by cnventinal AV in real-time

5 Start finding incidents immediately with ut f-the-bx reprting, intelligence, and rules Identify high risk indicatrs f cmprmise by harnessing the pwer f big data and data science techniques Take targeted actin n the mst imprtant incidents Instantly pivt frm incidents int deep endpint and netwrk packet detail t perfrm netwrk frensics and understand the true nature and scpe f the issue Priritize investigatins and streamline multiple analyst wrkflws in ne tl Maximize yur team s ptential by implementing RSA s best practicebased security peratins management tls and training Cnclusins T detect advanced attacks, multiple data types such as netwrk packet, lg, endpint, and clud data need t be cmbined. These data surces prvide the ability fr RSA NetWitness Lgs and Packets t discver attacks missed by lg-centric SIEM and signature-based tls with the nly slutin that can crrelate all f the needed data surces and apply advanced behaviral techniques and data science mdels. Using these advanced techniques in cmbinatin can prvide security teams with speedier detectin and all the visibility required t respnd t advanced, but cmmn attack tls that emply cvert channels with C2 threats.

Operational Security. Speaking Frankly The Internet is not a very safe place. A sense of false security... Firewalls*

Operational Security. Speaking Frankly The Internet is not a very safe place. A sense of false security... Firewalls* Operatinal Security Firewalls and Intrusin Detectin CS242 Cmputer Netwrks Speaking Frankly The Internet is nt a very safe place Frm ur netwrk administratr s pint f view, the wrld divides int tw camps:

More information

SIEM Use Cases 45 use cases for Security Monitoring

SIEM Use Cases 45 use cases for Security Monitoring www.paladin.net SIEM Use Cases 45 use cases fr Security Mnitring Paladin - SIEM Use Cases Use Case 02 Descriptin DMZ Jumping This rule will fire when cnnectins seemed t be bridged acrss the netwrk's DMZ.

More information

BMC Remedyforce Integration with Remote Support

BMC Remedyforce Integration with Remote Support BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective

More information

Welcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network. General

Welcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network. General Welcme t Remte Access Services (RAS) Our gal is t prvide yu with seamless access t the TD netwrk, including the TD intranet site, yur applicatins and files, and ther imprtant wrk resurces -- whether yu

More information

COMPLETE ENDPOINT DEFENSE INTEGRATING PROTECTION, DETECTION, RESPONSE AND REMEDIATION IN A SINGLE SOLUTION

COMPLETE ENDPOINT DEFENSE INTEGRATING PROTECTION, DETECTION, RESPONSE AND REMEDIATION IN A SINGLE SOLUTION Cerrand las grietas en la detección del malware Adaptive Defense 360 Find the answers, slve the prblem COMPLETE ENDPOINT DEFENSE INTEGRATING PROTECTION, DETECTION, RESPONSE AND REMEDIATION IN A SINGLE

More information

UML : MODELS, VIEWS, AND DIAGRAMS

UML : MODELS, VIEWS, AND DIAGRAMS UML : MODELS, VIEWS, AND DIAGRAMS Purpse and Target Grup f a Mdel In real life we ften bserve that the results f cumbersme, tedius, and expensive mdeling simply disappear in a stack f paper n smene's desk.

More information

Intelligence Driven Malware Analysis (IDMA) Malicious Profiling

Intelligence Driven Malware Analysis (IDMA) Malicious Profiling Intelligence Driven Malware Analysis (IDMA) Malicius Prfiling 14 January 2015 Hmeland Natinal Cybersecurity and Cmmunicatins Integratin Center whami Cyber Threat Analyst at Nrthrp Grumman Perfrmed wide

More information

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools. Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are

More information

Cisco Tetration Analytics, Release , Release Notes

Cisco Tetration Analytics, Release , Release Notes Cisc Tetratin Analytics, Release 1.102.21, Release Ntes This dcument describes the features, caveats, and limitatins fr the Cisc Tetratin Analytics sftware. Additinal prduct Release ntes are smetimes updated

More information

BMC Remedyforce Integration with Bomgar Remote Support

BMC Remedyforce Integration with Bomgar Remote Support BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their

More information

Adobe Connect 8 Event Organizer Guide

Adobe Connect 8 Event Organizer Guide Adbe Cnnect 8 Event Organizer Guide Questins fr Meeting HOST t ask at rganizatin meeting: Date (r dates) f event including time. Presenting t where Lcal ffice cubicles, reginal r glbal ffices, external

More information

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services

Privacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in

More information

FIREWALL RULE SET OPTIMIZATION

FIREWALL RULE SET OPTIMIZATION Authr Name: Mungle Mukupa Supervisr : Mr Barry Irwin Date : 25 th Octber 2010 Security and Netwrks Research Grup Department f Cmputer Science Rhdes University Intrductin Firewalls have been and cntinue

More information

App Orchestration 2.6

App Orchestration 2.6 App Orchestratin 2.6 Terminlgy in App Orchestratin 2.6 Last Updated: July 8, 2015 Page 1 Terminlgy Cntents Elements f App Orchestratin... 3 Dmains... 3 Multi-Datacenter Deplyments... 4 Delivery Sites...

More information

Getting Started with the Web Designer Suite

Getting Started with the Web Designer Suite Getting Started with the Web Designer Suite The Web Designer Suite prvides yu with a slew f Dreamweaver extensins that will assist yu in the design phase f creating a website. The tls prvided in this suite

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? CCNA 4 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput

More information

PAGE NAMING STRATEGIES

PAGE NAMING STRATEGIES PAGE NAMING STRATEGIES Naming Yur Pages in SiteCatalyst May 14, 2007 Versin 1.1 CHAPTER 1 1 Page Naming The pagename variable is used t identify each page that will be tracked n the web site. If the pagename

More information

Linking network nodes

Linking network nodes Linking netwrk ndes The data link layer CS242 Cmputer Netwrks The link layer The transprt layer prvides cmmunicatin between tw prcesses. The netwrk layer prvides cmmunicatin between tw hsts. The link layer

More information

Dolby Conference Phone Support Frequently Asked Questions

Dolby Conference Phone Support Frequently Asked Questions Dlby Cnference Phne Supprt Frequently Asked Questins Versin 1.0, 1 Intrductin This dcument prvides sme answers t frequently asked questins abut the Dlby Cnference Phne. Fr mre detailed infrmatin n any

More information

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks On the rad again The netwrk layer data plane CS242 Cmputer Netwrks The netwrk layer The transprt layer is respnsible fr applicatin t applicatin transprt. The netwrk layer is respnsible fr hst t hst transprt.

More information

Instructions for Accessing Online Testing Resources

Instructions for Accessing Online Testing Resources Instructins fr Accessing Online Testing Resurces 2018-2019 Hw t get help fr Testing Applicatin Functinality / System Errrs (nt lgin issues): IMPORTANT: The rle f the District s IT staff and Help Desk in

More information

EcoStruxure for Data Centers FAQ

EcoStruxure for Data Centers FAQ EcStruxure fr Data Centers FAQ Revisin 1 by Patrick Dnvan Executive summary EcStruxure TM fr Data Centers is Schneider Electric s IT-enabled, pen, interperable system architecture fr data centers. This

More information

Vulnerability Protection A Buffer for Patching

Vulnerability Protection A Buffer for Patching Vulnerability Prtectin A Buffer fr Patching A Lucid Security Technical White Paper February 2004 By Vikram Phatak, Chief Technlgy Officer Santsh Pawar, Vulnerability Analyst Lucid Security Crpratin 124

More information

AudienceView How-To Guide: How to Run the Profiler? Part 1 (Website or Website Portfolio)

AudienceView How-To Guide: How to Run the Profiler? Part 1 (Website or Website Portfolio) AudienceView Hw-T Guide: Hw t Run the Prfiler? Part 1 (Website r Website Prtfli) The Prfiler The Prfiler cntains key metrics and trends t help users uncver imprtant insights frm the AudienceView platfrm.

More information

Arius 3.0. Release Notes and Installation Instructions. Milliman, Inc Peachtree Road, NE Suite 1900 Atlanta, GA USA

Arius 3.0. Release Notes and Installation Instructions. Milliman, Inc Peachtree Road, NE Suite 1900 Atlanta, GA USA Release Ntes and Installatin Instructins Milliman, Inc. 3424 Peachtree Rad, NE Suite 1900 Atlanta, GA 30326 USA Tel +1 800 404 2276 Fax +1 404 237 6984 actuarialsftware.cm 1. Release ntes Release 3.0 adds

More information

Live Analytics for Kaltura Live Streaming Information Guide. Version: Jupiter

Live Analytics for Kaltura Live Streaming Information Guide. Version: Jupiter Live Analytics fr Kaltura Live Streaming Infrmatin Guide Versin: Jupiter Kaltura Business Headquarters 250 Park Avenue Suth, 10th Flr, New Yrk, NY 10003 Tel.: +1 800 871 5224 Cpyright 2015 Kaltura Inc.

More information

HP OpenView Performance Insight Report Pack for Quality Assurance

HP OpenView Performance Insight Report Pack for Quality Assurance Data sheet HP OpenView Perfrmance Insight Reprt Pack fr Quality Assurance Meet service level cmmitments Meeting clients service level expectatins is a cmplex challenge fr IT rganizatins everywhere ging

More information

HP MPS Service. HP MPS Printer Identification Stickers

HP MPS Service. HP MPS Printer Identification Stickers HP MPS Service We welcme yu t HP Managed Print Services (MPS). Fllwing yu will find infrmatin regarding: HP MPS printer identificatin stickers Requesting service and supplies fr devices n cntract Tner

More information

Assignment #5: Rootkit. ECE 650 Fall 2018

Assignment #5: Rootkit. ECE 650 Fall 2018 General Instructins Assignment #5: Rtkit ECE 650 Fall 2018 See curse site fr due date Updated 4/10/2018, changes nted in green 1. Yu will wrk individually n this assignment. 2. The cde fr this assignment

More information

Procurement Contract Portal. User Guide

Procurement Contract Portal. User Guide Prcurement Cntract Prtal User Guide Cntents Intrductin...2 Access the Prtal...2 Hme Page...2 End User My Cntracts...2 Buttns, Icns, and the Actin Bar...3 Create a New Cntract Request...5 Requester Infrmatin...5

More information

Building a Strategic Plan for Your Security Awareness Program

Building a Strategic Plan for Your Security Awareness Program SESSION ID: HUM-T09 Building a Strategic Plan fr Yur Security Awareness Prgram Lance Spitzner Directr SANS Securing The Human @lspitzner WindwsOS EMET Micrsft Security Essentials Security Cntrls Data Executin

More information

Users, groups, collections and submissions in DSpace. Contents

Users, groups, collections and submissions in DSpace. Contents Users, grups, cllectins and submissins in DSpace Cntents Key cncepts... 2 User accunts and authenticatin... 2 Authrisatin and privileges... 2 Resurce plicies... 2 User rles and grups... 3 Submissin wrkflws...

More information

Cisco EPN Manager Operations

Cisco EPN Manager Operations Training Data Sheet Cisc EPN Manager Operatins Cisc EPN Manager Operatins is an instructr-led and lab-based curse in which yu learn t perfrm basic EPN Manager netwrk peratins functins. The Cisc Evlved

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 9 2016 v5.1 Answers 100% 1. Which tw characteristics are assciated with UDP sessins? (Chse tw.) Destinatin devices receive traffic with minimal delay. Transmitted data segments are tracked.

More information

INVENTION DISCLOSURE

INVENTION DISCLOSURE 1. Inventin Title. Light Transprt and Data Serializatin fr TR-069 Prtcl 2. Inventin Summary. This inventin defines a light prtcl stack fr TR-069. Even thugh TR-069 is widely deplyed, its prtcl infrastructure

More information

IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016 1. A user ntices that the data transfer rate fr the gigabit NIC in the user cmputer is much slwer than expected. What is a pssible cause fr the

More information

Launching Xacta 360 Marketplace AMI Guide June 2017

Launching Xacta 360 Marketplace AMI Guide June 2017 Launching Xacta 360 Marketplace AMI Guide June 2017 Tels Crpratin 2017. All rights reserved. U.S. patents Ns. 6,901,346; 6,980,927; 6,983,221; 6,993,448; and 7,380,270. Xacta is a registered trademark

More information

Kaltura Video Extension for SharePoint 2013 Deployment Guide for Microsoft Office 365. Version: 1.0

Kaltura Video Extension for SharePoint 2013 Deployment Guide for Microsoft Office 365. Version: 1.0 Kaltura Vide Extensin fr SharePint 2013 Deplyment Guide fr Micrsft Office 365 Versin: 1.0 Kaltura Business Headquarters 250 Park Avenue Suth, 10th Flr, New Yrk, NY 10003 Tel.: +1 800 871 5224 Cpyright

More information

CounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation.

CounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation. CunterSnipe Sftware Installatin Guide Sftware Versin 10.x.x CunterSnipe sftware installs n any system cmpatible with Ubuntu 14.04 LTS server which is supprted until 2019 Initial Set-up- Nte: An internet

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This

More information

TEST METHODOLOGY. Advanced Endpoint Protection: Enterprise Self-Test Methodology

TEST METHODOLOGY. Advanced Endpoint Protection: Enterprise Self-Test Methodology TEST METHODOLOGY v0.9 DRAFT Table f Cntents 1 Intrductin... 3 1.1 Abut This Test Methdlgy... 3 1.1.1 Security Effectiveness... 3 1.1.2 Perfrmance... 4 1.2 Deplyment... 4 1.3 Test Metrics... 4 2 Security

More information

Dynamic Storage (ECS)

Dynamic Storage (ECS) User Guide Dynamic Strage (ECS) Swisscm (Schweiz) AG 1 / 10 Cntent 1 Abut Dynamic Strage... 3 2 Virtual drive, the EMC CIFS-ECS Tl... 4 3 Amazn S3 Brwer... 6 4 Strage Gateway Appliance... 9 5 Amazn S3

More information

Configuring Database & SQL Query Monitoring With Sentry-go Quick & Plus! monitors

Configuring Database & SQL Query Monitoring With Sentry-go Quick & Plus! monitors Cnfiguring Database & SQL Query Mnitring With Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, Nvember, 2013 http://www.sentry-g.cm Be Practive, Nt Reactive! One f the best ways f ensuring a database is

More information

Practical Exercises in Computer Networks and Distributed Systems

Practical Exercises in Computer Networks and Distributed Systems (V..6, Nv 2) Practical Exercises in Cmputer Netwrks and Distributed Systems Stream Sckets and the Client/Server mdel (C language, W) 2-, Jsé María F Mrán This practical illustrates basic cncepts prtcl

More information

How to use DCI Contract Alerts

How to use DCI Contract Alerts Hw t use DCI Cntract Alerts Welcme t the MyDCI Help Guide series Hw t use DCI Cntract Alerts In here, yu will find a lt f useful infrmatin abut hw t make the mst f yur DCI Alerts which will help yu t fully

More information

Connect+/SendPro P Series Networking Technical Specification

Connect+/SendPro P Series Networking Technical Specification Shipping & Mailing Pstage Meters Cnnect+/SendPr P Series Netwrking Technical Specificatin Intrductin 2 Netwrk Requirements 2 Prt/Cmmunicatin Requirements 2 URL Infrmatin 3 FAQs 10 Service Cllateral SV62440

More information

Model WM100. Product Manual

Model WM100. Product Manual Mdel WM100 Prduct Manual Table f Cntents Sectin Page 1. Hardware... 3 2. Sftware... 4 3. Features... 5 4. Installatin... 6 5. App Devices... 9 6. App Rms... 12 7. App Scenes... 14 8. App Setup... 18 Cntents

More information

High Security SaaS Concept Software as a Service (SaaS) for Life Science

High Security SaaS Concept Software as a Service (SaaS) for Life Science Sftware as a Service (SaaS) fr Life Science Cpyright Cunesft GmbH Cntents Intrductin... 3 Data Security and Islatin in the Clud... 3 Strage System Security and Islatin... 3 Database Security and Islatin...

More information

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu BANNER BASICS What is Banner? Definitin Prduct Mdules Self-Service-Fish R Net Lg int Banner Banner Envirnment The Main Windw My Banner Pages What is it? What frm d yu use? Steps t create a persnal menu

More information

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL

More information

Adverse Action Letters

Adverse Action Letters Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin

More information

Kaltura MediaSpace User Manual. Version: 3.0

Kaltura MediaSpace User Manual. Version: 3.0 Kaltura MediaSpace User Manual Versin: 3.0 Kaltura Business Headquarters 200 Park Avenue Suth, New Yrk, NY. 10003, USA Tel.: +1 800 871 5224 Cpyright 2012 Kaltura Inc. All Rights Reserved. Designated trademarks

More information

AWS Privileged Access Management

AWS Privileged Access Management AWS Privileged Access Management Easy, but is it Secure? It s easy t spin up wrklads, get cde deplyed and stand-up a wrking envirnment. It s EASIER t create an insecure envirnment and lse cntrl with higher

More information

USER MANUAL. RoomWizard Administrative Console

USER MANUAL. RoomWizard Administrative Console USER MANUAL RmWizard Administrative Cnsle Cntents Welcme... 3 Administer yur RmWizards frm ne lcatin... 3 Abut This Manual... 4 Setup f the Administrative Cnsle... 4 Installatin... 4 The Cnsle Windw...

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in this

More information

CLIC ADMIN USER S GUIDE

CLIC ADMIN USER S GUIDE With CLiC (Classrm In Cntext), teaching and classrm instructin becmes interactive, persnalized, and fcused. This digital-based curriculum, designed by Gale, is flexible allwing teachers t make their classrm

More information

HPE AppPulse Mobile. Software Version: 2.1. IT Operations Management Integration Guide

HPE AppPulse Mobile. Software Version: 2.1. IT Operations Management Integration Guide HPE AppPulse Mbile Sftware Versin: 2.1 IT Operatins Management Integratin Guide Dcument Release Date: Nvember 2015 Cntents Overview: The IT Operatins Management Integratin 3 System Requirements 3 Hw t

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 5 2016 v5.1 Answers 100% 1. What happens t runt frames received by a Cisc Ethernet switch? The frame is drpped. The frame is returned t the riginating netwrk device. The frame is bradcast

More information

Stock Affiliate API workflow

Stock Affiliate API workflow Adbe Stck Stck Affiliate API wrkflw The purpse f this dcument is t illustrate the verall prcess and technical wrkflw fr Adbe Stck partners wh want t integrate the Adbe Stck Search API int their applicatins.

More information

Getting started. Roles of the Wireless Palette and the Access Point Setup Utilities

Getting started. Roles of the Wireless Palette and the Access Point Setup Utilities Getting started The Wireless Palette is a sftware applicatin fr mnitring the cmmunicatin status between the Wireless LAN PC Card and the Wireless LAN Access Pint (hereinafter referred t as the Access Pint).

More information

The transport layer. Transport-layer services. Transport layer runs on top of network layer. In other words,

The transport layer. Transport-layer services. Transport layer runs on top of network layer. In other words, The transprt layer An intrductin t prcess t prcess cmmunicatin CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege Transprt-layer services Prvides fr lgical cmmunicatin* between applicatin

More information

These tasks can now be performed by a special program called FTP clients.

These tasks can now be performed by a special program called FTP clients. FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad

More information

APPLY PAGE: LOGON PAGE:

APPLY PAGE: LOGON PAGE: APPLY PAGE: Upn accessing the system fr the first time, yu will land n the Apply Page. This page will shw yu any currently pen pprtunities that yu can apply fr, as well as any relevant deadlines r ther

More information

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

EView/400i Management Pack for Systems Center Operations Manager (SCOM) EView/400i Management Pack fr Systems Center Operatins Manager (SCOM) Cncepts Guide Versin 7.0 July 2015 1 Legal Ntices Warranty EView Technlgy makes n warranty f any kind with regard t this manual, including,

More information

Cisco EPN Manager Network Administration

Cisco EPN Manager Network Administration Training Data Sheet Cisc EPN Manager Netwrk Administratin Cisc EPN Manager Netwrk Administratin is an instructr-led and lab-based curse in which yu learn t mnitr, cnfigure, and prvisin netwrk devices by

More information

Customer Upgrade Checklist

Customer Upgrade Checklist Custmer Upgrade Checklist Getting Ready fr Yur Sabre Prfiles Upgrade Kicking Off the Prject Create a prfiles prject team within yur agency. Cnsider including peple wh can represent bth the business and

More information

SafeDispatch SDR Gateway for MOTOROLA TETRA

SafeDispatch SDR Gateway for MOTOROLA TETRA SafeDispatch SDR Gateway fr MOTOROLA TETRA SafeMbile ffers a wrld f wireless applicatins that help rganizatins better manage their mbile assets, fleet and persnnel. Fr mre infrmatin, see www.safembile.cm.

More information

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 Prepared by: March Haber, march@il.ibm.cm Last Updated: January, 2012 IBM MetaData Wrkbench Enablement Series Table f Cntents: Table f

More information

Imagine for MSDNAA Student SetUp Instructions

Imagine for MSDNAA Student SetUp Instructions Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS

More information

ROCK-POND REPORTING 2.1

ROCK-POND REPORTING 2.1 ROCK-POND REPORTING 2.1 AUTO-SCHEDULER USER GUIDE Revised n 08/19/2014 OVERVIEW The purpse f this dcument is t describe the prcess in which t fllw t setup the Rck-Pnd Reprting prduct s that users can schedule

More information

Data Requirements. File Types. Timeclock

Data Requirements. File Types. Timeclock A daunting challenge when implementing a cmmercial IT initiative can be understanding vendr requirements clearly, t assess the gap between yur data and the required frmat. With EasyMetrics, if yu are using

More information

Andrid prgramming curse Sessin bjectives Intrductin URL & HttpCnnectin Netwrking APIs Using URL t read data Using HttpCnnectin pst data Reading netwrk state Web Service SOAP REST By Võ Văn Hải Faculty

More information

Transmission Control Protocol Introduction

Transmission Control Protocol Introduction Transmissin Cntrl Prtcl Intrductin TCP is ne f the mst imprtant prtcls f Internet Prtcls suite. It is mst widely used prtcl fr data transmissin in cmmunicatin netwrk such as Internet. Features TCP is reliable

More information

Common Language Runtime

Common Language Runtime Intrductin t.net framewrk.net is a general-purpse sftware develpment platfrm, similar t Java. Micrsft intrduced.net with purpse f bridging gap between different applicatins..net framewrk aims at cmbining

More information

Admin Report Kit for Exchange Server

Admin Report Kit for Exchange Server Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses

More information

HP Server Virtualization Solution Planning & Design

HP Server Virtualization Solution Planning & Design Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP

More information

Understand how Google works, how Google thinks

Understand how Google works, how Google thinks Understand hw Ggle wrks, hw Ggle thinks Understanding hw Ggle wrks, hw Ggle thinks Search Engine Optimizatin can seem hrribly cmplicated. It s nt. It des, hwever, incrprate lts f apparently unrelated tasks.

More information

ITD Information Security October 19, 2015

ITD Information Security October 19, 2015 ITD Infrmatin Security Octber 19, 2015 Cntents Intrductin... 3 Synpsis... 3 ITD Security Team... 3 Cunty Emplyees... 3 Malware Prtectin... 4 Physical Security... 4 Data... 4 Internet... 4 Micrsft Office

More information

HW4 Software version 3. Device Manager and Data Logging LOG-RC Series Data Loggers

HW4 Software version 3. Device Manager and Data Logging LOG-RC Series Data Loggers Page 1 f 18 HW4 Sftware versin 3 Device Manager and Data Lgging LOG-RC Series Data Lggers 2011; Page 2 f 18 Table f cntents 1 ORGANIZATION OF THE HW4 MANUALS... 3 2 OVERVIEW... 4 3 INITIAL SETUP... 4 3.1

More information

Kindle Fire Guide. Requires OverDrive Account/Adobe ID authorization.

Kindle Fire Guide. Requires OverDrive Account/Adobe ID authorization. Getting started Depending n yur preference OverDrive App Supprts EPUB ebks and MP3 Audibks. Direct dwnlad thrugh mbile app. N publisher restrictins. Yu ll need the fllwing: A Kindle Fire registered with

More information

UPGRADING TO DISCOVERY 2005

UPGRADING TO DISCOVERY 2005 Centennial Discvery 2005 Why Shuld I Upgrade? Discvery 2005 is the culminatin f ver 18 mnths wrth f research and develpment and represents a substantial leap frward in audit and decisin-supprt technlgy.

More information

PAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal

PAY EQUITY HEARINGS TRIBUNAL. Filing Guide. A Guide to Preparing and Filing Forms and Submissions with the Pay Equity Hearings Tribunal PAY EQUITY HEARINGS TRIBUNAL Filing Guide A Guide t Preparing and Filing Frms and Submissins with the Pay Equity Hearings Tribunal This Filing Guide prvides general infrmatin nly and shuld nt be taken

More information

IT Essentials (ITE v6.0) Chapter 7 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 7 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 7 Exam Answers 100% 2016 1. Hw many devices can a Bluetth device cnnect t simultaneusly? 127 7 10 24 5 2. A device has an IPv6 address f 2001:0DB8:75a3:0214:0607:1234:aa10:ba01

More information

Reviewer Information Sheet for Committee Members

Reviewer Information Sheet for Committee Members Reviewer Infrmatin Sheet fr Cmmittee Members OSIRIS is a web-based applicatin that was created t imprve human subject prtectins and t enable the IRB t better serve the research cmmunity. The applicatin

More information

Privacy Protection for Preventing Mobile Data Over-Collection Meikang Qiu

Privacy Protection for Preventing Mobile Data Over-Collection Meikang Qiu Privacy Prtectin fr Preventing Mbile Data Over-Cllectin Meikang Qiu Dept. f Cmputer Science Pace University Outlines Intrductin Related Wrk Backgrund Study System Mdels Mbile-Clud Framewrk Design Experiments

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questins Versin 10-21-2016 Cpyright 2014-2016 Aviatrix Systems, Inc. All rights reserved. Aviatrix Clud Gateway What can it d fr me? Aviatrix Clud Gateway prvides an end t end secure netwrk

More information

The QMF Family V Newsletter 3rd Quarter 2013 Edition

The QMF Family V Newsletter 3rd Quarter 2013 Edition The QMF Family Newsletter 3rd Quarter 2013 Editin In This Issue Dive int QMF at the IBM Infrmatin On Demand Cnference irtual data surces and analytic queries in QMF A message frm the develpers f QMF: Changing

More information

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform Supprt Guide Yur New Service Request Prcess: Technical Supprt Reference Guide fr Cisc Custmer Jurney Platfrm September 2018 2018 Cisc and/r its affiliates. All rights reserved. This dcument is Cisc Public

More information

VMware Horizon Mirage Web Manager Guide v4.2

VMware Horizon Mirage Web Manager Guide v4.2 VMware Hrizn Mirage Web Manager Guide v4.2 June 2013 Cntents Overview... 3 Installatin Ntes... 3 Lgging In... 3 Perfrming a Quick Search... 4 Perfrming an Advanced Search... 5 Selecting a User-Device...

More information

Troubleshooting Citrix- Published Resources Configuration in VMware Identity Manager

Troubleshooting Citrix- Published Resources Configuration in VMware Identity Manager Trubleshting Citrix- Published Resurces Cnfiguratin in VMware Identity Manager VMware Identity Manager SEP 2 0 1 8 V 4 Table f Cntents Overview... 1 Supprted Versins f Cmpnents... 1 Prerequisites... 1

More information

Proper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page

Proper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page Managing the News Page TABLE OF CONTENTS: The News Page Key Infrmatin Area fr Members... 2 Newsletter Articles... 3 Adding Newsletter as Individual Articles... 3 Adding a Newsletter Created Externally...

More information

Level 2 Development Training

Level 2 Development Training Level 2 Develpment Training Level 2 Develpment Training Level 2 Develpment Training Vide Capture RSS 4000 Level 2 Develpment Training Vide Capture Cntents 1 Intrductin... 3 Intrductin... 3 Available Resurces...

More information

ClubRunner. Volunteers Module Guide

ClubRunner. Volunteers Module Guide ClubRunner Vlunteers Mdule Guide 2014 Vlunteer Mdule Guide TABLE OF CONTENTS Overview... 3 Basic vs. Enhanced Versins... 3 Navigatin... 4 Create New Vlunteer Signup List... 5 Manage Vlunteer Tasks... 7

More information

Compliance Guardian 4. User Guide

Compliance Guardian 4. User Guide Cmpliance Guardian 4 User Guide Issued September 2015 Table f Cntents What's New in this Guide... 3 Abut Cmpliance Guardian... 4 Cmplementary Prducts... 5 Submitting Dcumentatin Feedback t AvePint... 6

More information

Planning, installing, and configuring IBM CMIS for Content Manager OnDemand

Planning, installing, and configuring IBM CMIS for Content Manager OnDemand Planning, installing, and cnfiguring IBM CMIS fr Cntent Manager OnDemand Cntents IBM CMIS fr Cntent Manager OnDemand verview... 4 Planning fr IBM CMIS fr Cntent Manager OnDemand... 5 Prerequisites fr installing

More information

Copy your Course: Export and Import

Copy your Course: Export and Import Center f elearning The exprt curse feature creates a ZIP file f yur curse cntent yu will imprt t yur new curse. Exprt packages are dwnladed and imprted as cmpressed ZIP files. D nt unzip an exprt package

More information

Integrating QuickBooks with TimePro

Integrating QuickBooks with TimePro Integrating QuickBks with TimePr With TimePr s QuickBks Integratin Mdule, yu can imprt and exprt data between TimePr and QuickBks. Imprting Data frm QuickBks The TimePr QuickBks Imprt Facility allws data

More information

Performance testing. Test approach The below diagram illustrates the approach that is used for performance testing a Pega 7 application.

Performance testing. Test approach The below diagram illustrates the approach that is used for performance testing a Pega 7 application. The Pega Platfrm is different t the standard Java applicatin in a number f ways; hwever, the apprach t perfrmance testing and tuning Pega 7 is n different. There are a number f key cnsideratins that yu

More information

UC Mobile Admin Guide. Release Android, ios. Document Version Maryland Way, Suite 300 Brentwood, TN Tel

UC Mobile Admin Guide. Release Android, ios. Document Version Maryland Way, Suite 300 Brentwood, TN Tel UC Mbile Admin Guide Release 20.1.1 Andrid, 20.1.2 ios Dcument Versin 1.0 5121 Maryland Way, Suite 300 Brentwd, TN 37027 Tel +1 615.465.4001 WWW.ALTUSUC.COM Table f Cntents 1 Summary f Changes... 1 1.1

More information

DNS (Domain Name Service)

DNS (Domain Name Service) mywbut.cm DNS (Dmain Name Service) The internet primarily uses IP addresses fr lcating ndes. Hwever, its humanly nt pssible fr us t keep track f the many imprtant ndes as numbers. Alphabetical names as

More information