Halo Issues, Events, and Alerts

Size: px
Start display at page:

Download "Halo Issues, Events, and Alerts"

Transcription

1 Halo Issues, Events, and Alerts Addressing Scan Results and Security Notifications The security logging and alerting capabilities of Halo record and report on a broad range of important audit events and detailed scan results. A Halo user specifies which issues are to be logged as events, which ones should be considered critical, which should generate alerts, and who should receive the alerts that are sent. Given the flexibility and speed of Halo, you can use server groups and alert profiles, along with a special events policy and scan results to create the right alerting scenarios for rapid security response and compliance automation. Topics: About Issues, Events, and Alerts Setting Up Logging and Alerting Set Up Alert Profiles Set Up a Special Events Policy Flag Policy Issues for Logging and Alerting Respond to Alerts Addressing Issues View a Server Group's Summary of Issues Inspect a Server's Current Issues View the History of an Issue Act On Reported Issues Addressing Events View a Server Group's Summary of Events Inspect a Server's Most Recent Events Filter and View a Server or Group's Event History Act On Reported Events Appendix: Interpreting File Access Permissions About Issues, Events, and Alerts Halo reports important security-related occurrences or situations in your servers in two forms as issues and as events. Also, Halo notifies you of these results in two ways as results reported in the Halo portal, and as alerts. These terms are are distinct but closely interrelated: An issue is a scan result such as a detected software vulnerability, a failed configuration policy rule, or a changed file integrity target. For configuration scanning, file integrity scanning, and log-based intrusion dettection scanning, the rules and targets in your policies list the violations that are to be considered issues. For vulnerability 1

2 scanning, the current state of the NIST database defines what software packages, if present, will be flagged as issues by Halo. An event is a logged issue or other special event (as defined by your special events policy; see Set Up a Special Events Policy). For configuration scanning, file integrity scanning, and log-based intrusion dettection scanning, you specify for each policy rule or target whether its violation should not only generate an issue, but be logged as an event as well. For special events, you similarly specify for each potential event whether or not you want it to be logged as an event. (Special events do not appear as issues.) Audit events make up another class of events. They are user actions, such as logins to Halo or changes to a policy, that are recorded for auditing purposes. By default all audit events are logged, but those settings are configurable on the Site Admoinistration page of the Halo portal. An alert is an notification sent to you or others to announce that a particular event has occurred. Alerts can give your security personnel essentially immediate notice that an event, possibly critical, has occurred in your servers or network. The details of the event are described in the alert so that immediate action can be taken. For configuration scanning, file integrity scanning, and special events, you indicate for each specified event whether it should also trigger an alert. (By default audit events are not alertable, but those settings also are configurable on the Site Admoinistration page of the Halo portal.) You can think of issues as casting the broadest net to capture potential security risks on your servers. The set of events that you define can be just as broad (if you log every issue), or it can be somewhat more targeted toward those issues that you feel are more likely to indicate a significant security problem. And the set of alerts you define should be much smaller, restricted to the subset of events for which time-critical response is imperative. Where do you go to view and address these occurrences? You can view issues on an individual server's Scan Details page (accessed from the portal Dashboard), on a server's Scan History page (accessed from its Scan Details page), or on the general Server Scan History page (accessed from the Servers menu). You can view events on an individual server's Security Events page (accessed from the Dashboard) and on the general Security Events History page (accessed from the Servers menu). Alerts appear in the in-boxes of the individuals (who do not have to be Halo users) who have been specified as alert recipients. Typically, there is a large overlap between issues and events. Most issues that you want to be reported should probably also be logged as event, so you will mark them for logging. However, any rules or targets that you do not mark for logging will appear as scan-result issues but will not appear as events. The rest of this document describes how to set up, make use of, and interpret your issues, events, and alerts. Setting Up Logging and Alerting In Halo, it is the responsibility of your organization to define The specific set of configurations or occurrences that should be considered security issues. The subset of issues that should be flagged as critical. The subset of issues that should trigger events. The set of other events that should be defined. The subset of events that should trigger alerts to appropriate personnel. Even if you use the default security polices provided with Halo, you still need to make these decisions; some default policies may not flag any issues as critical and may not mark any events to trigger alerts. 2

3 Set Up Alert Profiles When Halo generates an event, if the event is flagged to generate an alert, a notification is sent to a prespecified set of Halo users. Every server group can have different lists of users that receive alerts, and within each list different users can be selected to receive all events or critical events only. These lists are called alert profiles; you can create any number of them in the Halo portal, and you assign one or more to the server group appropriate for the persons on the list(s). Note: If no alert profile is assigned to a server group, alerts will by default go to all Halo site administrators on your account. You'll need to set up your own alert profiles if you want to control who receives alerts. You might create different alert profiles for different server groups if, for example, you have different security specialists monitoring each group. Or, create a profile just for managers and auditors, if you want them to receive alerts much less frequently (say, once a week) than security specialists who must be prepared to respond immediately. To create and assign a new alert profile: 1. In the Halo portal, go to Policies > Alert Profiles and click Add New Alert Profile. 2. Enter a name and optional description for the profile, and specify a batching frequency for sending alerts from "Instant" (to send each notification separately, as soon as the event is created) to "Every week" (to batch all events for the week into a single alert). 3. Select one or more of your company's Halo users, or one or more external recipients, to receive the alerts. Also specify whether each user should receive all alerts or just a subset based on event criticality. Then click Save. 4. Assign the profile to a server group: On the Halo Dashboard page, click the name of the server group you want to assign the profile to, then click Edit Details below the name. On the Edit Group Details page, select the name of your new alert profile from the Alert Profiles drop-down list. Then click Save. That's it. Your designated users will receive an when a security event that fits your settings occurs. And you can repeat this procedure to create other alert profiles for other server groups. Set Up a Special Events Policy The Halo special-events alerting system notifies you of unusual occurrences in your cloud installation that may have security implications. For example, if a server unexpectedly restarts, if its IP address changes, or if a firewall 3

4 configuration is changed outside of Halo, it could be a signal that something malicious has happened and you may want Halo to log the event, and possibly alert you or others in real time. Also, all vulnerabilities detected by software vulnerability scans are recorded as special events. You set up special events by implementing a special events policy and assigning it to a server group. You can then use the policy and an alert profile to customize alerting for any of the events. Note: Halo automatically assigns the default Global Events Policy to every server group. However, that policy by default generates no events or alerts, so you'll need to either customize the global policy or create a new one for special events to be effective. Take these steps to create a special events policy: 1. In the portal, go to Policies > Special Events Policies and click Add New Special Events Policy. 2. Enter a name and optional description for the policy. Then select, from the available set of security events, the specific events that you want this policy to monitor. If you want the policy to monitor a given event, check Log event. If you consider the event critical, check Flag critical. If you want an notification to be sent when an event occurs, check Generate an alert. A few of the events are marked as Linux-only and are not available for Windows servers. Note: To help you decide which special events you want to monitor, it may be helpful to review the discussion Act on special event and audit events, later in this document. 3. Click Save to save the policy. Then assign it to your server group navigate to the portal Dashboard page, click Edit Details for your server group, and select your policy from the Special Events Policy drop-down list. Then click Save. Special-event logging is now set up for your server group. Repeat the process for other groups as needed. Flag Policy Issues for Logging and Alerting When you create or edit a Halo security policy, you may be able to enable logging, issue/event criticality, and alert triggering for individual rules in the policy. Different Halo modules handle event logging somewhat differently. Click the headings below to see the differences. 4

5 Respond to Alerts Once logging and alerting is configured, Halo's continual monitoring of your servers will result in events being logged and alerts being sent, as specified in your security policies. When Halo logs an event that a policy has flagged for generating an alert, you (or the appropriate administrators or security specialists specified in the server group's assigned alert profile) will receive an notification of the event, within a few minutes of its detection. The alert looks something like this: If you are the security specialist that receives the alert, follow the link in the to the Halo portal, where you can address the issue. 1. First, examine and interpret the specific nature of the event, as described in the issue-specific subsections of Inspect a Server's Current Issues. 2. Depending on the nature of the event and your judgment as to its severity or potential danger to your organization, choose one of several courses of action. See Act on Reported Events for specific suggestions. Addressing Issues Reviewing the results of a Halo scan involves examining all reported issues in sufficient depth to determine which ones represent valid security risks. You then can take appropriate action to address the valid risks and you may also take other actions to eliminate or suppress the invalid ones from future scan results. View a Server Group's Summary of Issues The Dashboard pages in the Halo portal are server-group summary pages. For the selected Halo feature (for example, Configuration risks) and for the selected server group, the page lists all servers in the group and summarizes each server's status in regard to that feature. 5

6 Some items on the Server Group Summary pages are common to all or most Halo features: Search. Lets you search for any server in the group by name. You can also find servers by browsing the paginated server list or by re-sorting the displayed columns. Actions. Lets you move selected servers to another server group, delete them, or manually scan them. Server/OS/agent Status. These columns name each server in the group, indicate its operating system, and give you the status of its Halo agent: "Active" (the Halo agent has recently communicated with the Halo analytics engine), "Deactivated" (the server was shut down or the agent was stopped), or "Missing" (agent-engine communication has been interrupted). These controls and columns can help you to locate a server and identify servers that have shut down or crashed. The two columns to the right of agent Status are Halo feature-specific. They help you to find servers and server groups on which Halo has detected security issues, as shown below. If you have clicked a link to view details for an individual server, the server's Scan Results or Server Details page appears, as described next. Inspect a Server's Current Issues When you click the appropriate link for a server on the Dashboard, or the More detail link on a Server Summary page, the Scan Results or Server Details page opens, displaying detailed information for that specific server and Halo feature. 6

7 Some items on the Scan Results or Server Details pages are common to all or most Halo features: Navigation links. Click the center link ("Web-27" in the above example) to jump to this server's Server Summary page (see About the Server Summary Page), which summarizes the server's status across all Halo features. Trend graphs. Use these sparkline graphs to note spikes and to interpret general trends in the number of issues reported for this server and this Halo feature, across various time ranges. Scan metrics. For scans, lists the timing and status of the most recent scan. You may see these status values: "completed": The scan was successful, and (for a configuration scan) no rule checks failed. "completed w/errors": The scan was successful, some rule checks failed. (Applies to configuration scans only.) "failed": The scan was not successful. Policies used. Lists the policies that are currently in force or were applied to the most recent scan. Click the name of a policy to view or edit its details. Get PDF Report (action). Display a PDF version of this page to use as a report. You may save or print it as you wish. Server Scan History (action). Examine the Scan History page for this server (see To view an individual server's scan history) to review the history of any issue in this scan. (For example, is it a new occurrence? A recurrence? When was it first reported?) This icon ( ) appears beside issues of critical severity. You can sort the list of issues so that all critical ones are displayed at the top. Other information, table columns, and links on the page are specific to each Halo module, as shown below. Click a heading to display the content. About the Server Summary Page Whenever you are viewing any of the Server Details pages described above, you can optionally jump to a page that summarizes at a glance the server's status and configuration for all Halo features. At the top left of the Server Details page, click the server name in the navigation links: The Server Summary page appears, displaying a section for each configured Halo feature for that server. Links in the sections take you to more detailed information. 7

8 Note: The Server Summary page is also the page that you jump to whenever you click the name of a server in the server list on the Halo Dashboard page, regardless of which server group or Halo feature is selected. View the History of an Issue For configuration scans, file integrity scans, software vulnerability scans, and server access scans, the Server Details pages always show the results of only the most recent scan. You may be able to gain historical insight into any of your current reported scan issues by examining the results of earlier scans. For example, you might possibly narrow down the time of occurrence of a bad configuration setting or a file tampering incident by finding the first scan that detected it. Or you might learn that one of your software packages that is now reported as vulnerable was reported as "OK" in earlier scans meaning that it contains a recently discovered vulnerability. In the Halo portal, an individual server's scan history page lists all scans of all types for that one server. The portal's Server Scan History page lists all scans of all types for all of your Halo-protected servers. Here is how you can use either of those pages to look at historical scans. To view an individual server's scan history 1. On the portal Dashboard, select a server group and click the appropriate feature icon (such as for configuration scans), then click the name of the server whose historical scans you want to view. 2. On the Server Details page, click Scan History to view the Scan History page for that server. 3. Locate a particular scan that is of interest perhaps because it is immediately previous to the most recent scan of 8

9 the type you are interested in, or because it shows a significant increase in critical issues from even earlier scans, or because errors occurred during the scan. Note that the list is sorted by date, with the most recent at the top. Scroll through the list to look for earlier scans of that type that may be of interest. 4. Make note of the scan's status, completed date-time, and number of critical and non-critical issues. Then click Details to see the Scan Details page for that scan. The details page for a historical scan is similar to the Scan Details page for the most recent scan, and you can, for example, examine it to see whether an issue of interest that occurred in the most recent scan also occurred in this historical scan, or what issues it detected that were not in earlier scans. To view scan history for all servers 1. In the portal, navigate to Servers > Scan History. The Server Scan History page appears. 2. To view only one kind of scan (for example, configuration scans), sort by the Scan Type column and scroll as necessary to view those scans. 3. Locate a scan of interest from a particular server, and note its status, requested and completed date-time, and number of critical and non-critical issues. Then click Details to see the Scan Details page for that scan. The details page for a historical scan is similar to the Scan Details page for the most recent scan, and you can, for example, examine it to see whether an issue of interest that occurred in the most recent scan also occurred in this historical scan, or what issues it detected that were not in earlier scans. Act On Reported Issues A significant number of the issues or events reported from your scans may not be actual indicators of malicious activity. Those you can either ignore or (preferably) take steps to clear them from future scans. For significant security issues, you'll need to address the underlying security risk that caused the issue. See below. 9

10 Addressing Events Most security issues detected by Halo are logged and are therefore viewable as Halo events. Halo events include all logged security issues, plus all Halo special events and audit events. You review Halo security events by by viewing the "Security Events" Dashboard page on the Halo portal, by performing filtered searches for events on the portal's Security Events History page, or by responding to alerts that you receive. You should examine each event in sufficient depth to determine whether it represents a valid security risk. You then can take appropriate action to address the risk if it is valid or you may take a different action to prevent an invalid event from being generated or sent as an alert. View a Server Group's Summary of Events To view the most recently generated events for a server group, click the Events icon ( or navigate to Servers > Security Events. Then select the server group of interest. ) on the Halo Dashboard, This page summarizes the total number of critical and non-critical security events (not including audit events) for each server in the selected server group. You can sort the display by any of the columns in the table. Like the Dashboard pages for other Halo features, this page also lists the server platform and the agent status, and it allows you to take various actions on a set of selected servers, as described in View a Server Group's Summary of Issues and Maintain and Manage Your Servers. You can see at a glance which servers in the group have had significant security events. Click the number of critical or non-critical events for a server (in the Critical or Other column) to get more details (next). Inspect a Server's Most Recent Events Clicking the number of a server's events in the Dashboard's Security Events table displays that server's Security Events Details page. 10

11 This page displays a server's most recent file integrity scan events, configuration scan events, and Halo special events. (Audit events do not appear on this page.) The event type, time of creation, and details appear in the line for each event. You can also link to the details of the policy involved. Based on an event's criticality, type, creation time, and path, you may be able to determine whether it represents a valid risk that merits further investigation. Filter and View a Server or Group's Event History 1. Navigate to the Security Events History page, at Servers > Security Events History. 2. Filter the display as necessary: Specify one or all server groups, and one or all individual servers within your specified group. Specify a date range for the events. Choose one or more event types to view: To view only file integrity scanning events, choose "File Integrity change detected". This event type occurs when a file has been removed from or added to a directory target in a firewall policy, or when a change has occurred to any target's contents, ownership, or permissions. To view only configuration scanning events, choose "Configuration rule matched". This event type occurs whenever a check in a configuration policy rule fails, which can occur in many ways see Configuration Policy Rule Checks for details. To view only Halo special events, choose from among the special events that are marked for logging in your currently applied special events policy for example, "agent compromised" or "Server firewall modified". To view only audit events, choose from among the many remaining event types. See Act on audit events for a list of them. Specify the server operating system(s), and whether you want to see only critical, only non-critical, or all events. 11

12 3. Click Filter to display the filtered list. You can sort the resulting list of events by criticality, creation date, event type, server group, and server, to display the events of most interest to you toward the top of the list. You can examine and interpret the events just as you would their equivalent issues. See: View an issue from a configuration scan View an issue from a file integrity scan View an issue from a vulnerability scan View a log-based intrusion detection event Interpret Halo special events according to their individual significance, as noted in your special events policy, See Set Up a Special Events Policy. You can take action to address any of these events as described in Act On Reported Events (next). Act On Reported Events The actions you can take to address an event depend on what sort of event it is. Act on scan-related events: Configuration events. If the event type is "Configuration rule matched", act on the event as you would a configuration issue. See Act on reported configuration issues. File integrity events. If the event type is "File Integrity object added", "File Integrity object missing", or "File Integrity object signature changed", act on the event as you would a file integrity issue. See Act on reported file integrity issues. Log-based intrusion detection events. If the event type is "File Integrity object added", "File Integrity object missing", or "File Integrity object signature changed", act on the event as you would if it were reported as an issue. See Act on reported log-based intrusion detection events. Software vulnerability events. If the event type is "Vulnerable software package found", act on it as described in Act on reported software vulnerabilities. (Note that even though this event type is scan-related, it is classified as a special event.) Server account events. If the event type is "Multiple Root Accounts Detected" or "Multiple accounts detected with same UID", verify the event by directly accessing the server in question. If there are indeed multiple root accounts or if any account's UID is not unique, and this violates your organization's security policies, either delete the extra accounts or immediately start an investigation. (This event type also is scan-related, but classified as a special event.) Act on special events and audit events: Firewall events. If the event type is "Server firewall modified", an individual server's firewall has been changed 12

13 outside of Halo. If you know of or approve of the change, either re-assign the firewall policy to the server group to restore the proper firewall, or modify the group's firewall policy to make it consistent with the server's new state. If the change was not approved or known of by anyone in your organization, start an investigation. agent security events. If the event type is "agent compromised", the Halo agent on a server has failed its self-verification test (see Agent Settings in the Halo Operations Guide). A new agent must be re-installed before the server can be used again. If the cause of the failure is unknown and may be suspicious, start an immediate investigation. Audit-type special events. Other special events do not themselves constitute direct evidence of a security problem or risky occurrence, but like the general category of audit events described next they may provide supporting evidence to the forensics or incident response team investigating a potential server compromise. They also are useful for generating documentary evidence of compliance with various security policies or standards. Examples of this type of special event include "Server retired", "Server IP address changed", "Local account created", and "agent version changed". To generate a report for compliance purposes, filter for an appropriate set of these types of special event on the Security Event History page, pick a date range and other parameters, and click Filter. Act on audit events: Halo defines a large number of security events that, for auditing purposes, are always logged and can be displayed on the Security Events History page of the Halo portal. Over 80 event types are captured, within the following categories: API Keys: Created, deleted, modified, secret key viewed Authorized IPs: Modified Automatic file integrity scans: Disabled, enabled, schedule modified Configuration policy: Assigned, created deleted, exported, imported, modified, unassigned File integrity baseline: Created, deleted, expired, failed, re-baseline File integrity: Exception created, exception deleted, exception expired, scan requested File integrity policy: Assigned, created, deleted, exported, imported, modified, unassigned GhostPorts (multi-factor network authentication): Login failure, login success, provisioning, session close Halo firewall policy: Assigned, created, deleted, modified, unassigned Halo login: failure, success, logout Halo password: Changed, recovery request failed, recovery requested, recovery success Halo session: Timeout Halo user: Authentication modified, deactivated, invited, modified, reactivated, re-invited, authentication settings modified, account locked, account unlocked, activation failed Server : Firewall restore requested, SMS: Phone number verified The records of these events may provide supporting evidence to the forensics or incident response team investigating a potential server compromise. Audit events are useful also for generating documentary evidence of compliance with various security policies or standards. To generate a report for compliance purposes, filter for an appropriate set of these types of audit event on the Security Event History page, pick a date range and other parameters, and click Filter. A complete list of supported event types is available on the Audit Events tab of the Site Administration page in the Halo portal, and in the documentation for the Events API endpoint in the Halo REST API Developer Guide. 13

14 Appendix: Interpreting File Access Permissions Unexpected changes in a file or directory's access permissions can be indicative of an attack or intrusion. Halo displays the permissions for a changed file integrity target in a scan's event details, and also indicates whether the permissions themselves have changed. You can examine the permissions to determine whether a change to them is suspicious. Linux Permissions Every file and directory on a Linux system is owned by a user and by a group. Permissions for accessing that file are defined separately for the user, for the group, and for all others. "Other" is defined as a user that is not the owning user and is not a member of the owning group. Linux supports three types of access permission: read. For a file, the ability to open it and read its contents. For a directory, the ability to list its contents. write. For a file, the ability to modify it (write new data to it). For a directory, the ability to add, remove, or rename files within the directory. execute. For a file, the ability to execute it as a program or script. For a directory, the ability to make it the current directory (as with the cd shell command), and the ability to access files within it. Halo displays a Linux file or directory's permissions using the symbolic mode common to shell displays, with three sets of three single character symbols, specifying the permissions of the owner, group, and others, respectively. For example: In this example, the user owner has full permissions on the file, the owning group can read and execute the file but not modify it, and others can open and read the file, but not modify or execute it. Special Linux permissions. The above permissions string can include several additions or substitutions in special cases: Directory. If the file is a directory, the permissions string may be prefixed with d. For example: drwxr-xr-- setuid /setgid bit. If the executable file's setuid or setgid bit is set (meaning that the file will execute as the user owner or group owner, with the owner's permissions), s or S is substituted for r in in the "User" or "Group" permission. For example: swxr-xr-- or rwxs-xr-- Sticky bit. If a directory's sticky bit is set (meaning that no users except the directory's owner and the superuser can rename or delete files within the directory), t or T is is substituted for x in the "Others" (all users) permission. For example: drwxr-xr-t Windows Access Control Entries All Windows securable objects such as files and registry keys have security descriptors, which allow the system to determine whether access should be granted to the object. A security descriptor identifies the object's owner and contains, among other things, a discretionary access control list (ACL). The ACL is an ordered list of zero or more access control entries (ACEs). Each ACE specifies the type of access being addressed (allow, deny, audit), includes inheritance flags, identifies the principal (user or group) for whom this 14

15 access is specified, and contains an access mask that lists the operations that are allowed or denied to that principal. The access mask is represented as a 32 bit string; each bit location in the access mask represents a specific type of permission for the object. In file-integrity scan details, Halo represents an object's ACL as a sequence of text lines, one for each ACE that is, one for each principal with defined permissions on the object. In each ACE, Halo replaces the non-human-readable ACE bit mask with a series of multi-character codes specifying the permission details: These are values you might see for each of the ACE elements: Principal. This is the name of the user or group owner, preceded by a scope designation. The scope may be NT AUTHORITY, BUILTIN, the local domain (machine name), or Active Directory/LDAP domain. For local user accounts where the scope is the machine name, Halo replaces the machine name with "Local" so that events will not be created when local accounts on different machines differ only by the machine name. Inheritance. The inheritance strings can have these values and meanings: OI. Object inherit (applies only to folders and non-leaf registry keys) CI. Container inherit (applies only to folders and non-leaf registry keys) IO. Inherit only (applies only to folders and non-leaf registry keys) NP. Do not propagate the inherit (applies only to folders and non-leaf registry keys) I. Access control is inherited from parent container It is also possible for a file object to have no inheritance designation in its ACE. Type. The type of the access control entry can be either Allow or Deny. Permissions. The following are the rights that can appear in the permissions string in the Halo portal. Note that Halo displays only "specific rights," not the "simple rights" groupings that you may find using icacls or a similar tool. File or folder: AD. Append data/add subdirectory AS. Access system security DC. Delete child DE. Delete GA. Generic all GE. Generic execute GR. Generic read GW. Generic write MA. Maximum allowed RA. Read attributes RC. Read control RD. Read data/list directory REA. Read extended attributes S. Synchronize WA. Write attributes WD. Write data/add file WDAC. Write DAC WEA. Write extended attributes Registry key: CC. Create child CR. Control access DC. Delete child DT. Delete tree KA. Key all KR. Key read KW. Key write KX. Key execute LC. List children LO. List object RC. Read control RP. Read property SD. Standard delete SW. Self write WD. Write DAC WO. Write owner WP. Write property 15

16 WO. Write owner X. Execute/traverse Interpreting Colored Elements in a File Integrity Issue or Event In the more details display of a file integrity issue or event, colors indicate the nature of changed elements: Any file signature or critical metadata value that does not match the baseline is highlighted in red. Items that have been removed since the baseline scan are highlighted in red and lined-through. Items that have been added since the baseline scan are highlighted in green. Note that if permissions are added to or removed from a Windows object, the Permissions field in scan details may display other items twice once in lined-through red and once in green. This occurs because Halo examines the list in order from the top, and only items that have not changed in content or position remain black (unhighlighted) in the scanned object details. Any item whose position has shifted will appear twice, in green at its new position and in red at its old position. For example, in the scan details above, the first item in the list ("local\r9:...") was in the baseline scan but was replaced on this server with a different permission ("Local\QA:...") before the most recent scan. The remaining 3 items did not change their content or position in the list, so they remain black. The added item appears underlined in green at its appropriate point in the list, and the removed item appears after the list, lined-through in red. In another example of scan details (above), the first item in the list ("local\r9:...") was in the baseline scan but was removed from this server before the most recent scan. The remaining 3 items have changed position what was item two is now item one, and so on. Therefore the entire original list appears to have been removed (and is lined-through in red), and the server's entire current list appears to have been added (and is underlined in green). 16

17 Copyright 2015 CloudPassage Inc. All rights reserved. CloudPassage and Halo are registered trademarks of CloudPassage, Inc. 17

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

ForeScout Extended Module for Qualys VM

ForeScout Extended Module for Qualys VM ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation

More information

Data Insight Self Paced Lab

Data Insight Self Paced Lab Data Insight Self Paced Lab Objective: This lab is designed to introduce the high-level use cases within the Data Insight GUI. The Workspace provides an interactive view of the current environment. The

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

Vulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD.

Vulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 20 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Australia Online Forms for Research Software User Manual

Australia Online Forms for Research Software User Manual Australia Online Forms for Research Software User Manual Version 1.3 Released 21 August 2010 2 P a g e A u s t r a l i a O n l i n e F o r m s f o r R e s e a r c h Contents 1. Introduction 5 2. Getting

More information

Comodo Next Generation Security Information and Event Management Software Version 1.4

Comodo Next Generation Security Information and Event Management Software Version 1.4 rat Comodo Next Generation Security Information and Event Management Software Version 1.4 Administrator Guide Guide Version 1.4.101915 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table

More information

Windows Intune Trial Guide Getting the most from your Windows Intune trial. Simplify PC management. Amplify productivity.

Windows Intune Trial Guide Getting the most from your Windows Intune trial. Simplify PC management. Amplify productivity. Windows Intune Trial Guide Getting the most from your Windows Intune trial. Simplify PC management. Amplify productivity. CONTENTS 2 Overview 2 Trial Setup 3 Getting Started with the Administration Console

More information

Netwrix Auditor Competitive Checklist

Netwrix Auditor Competitive Checklist Netwrix Auditor Competitive Checklist DATA COLLECTION AND STORAGE Non-intrusive architecture Operates without agents so it never degrades system performance or causes downtime. Certified collection of

More information

ClientNet Admin Guide. Boundary Defense for

ClientNet Admin Guide. Boundary Defense for ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE

More information

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version 1.1.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo EDR...3 1.1 Purchase

More information

Sophos Central Admin. help

Sophos Central Admin. help help Contents About Sophos Central... 1 Activate Your License...2 Endpoint Protection...3 Dashboard...3 Alerts...4 Root Cause Analysis...9 Logs & Reports... 11 People... 24 Computers...33 Computer Groups...40

More information

WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5

WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5 WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5 ObserveIT s award-winning insider threat management software combines user monitoring, behavioral analytics, and now policy enforcement

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Detector Service Delivery System (SDS) Version 3.0

Detector Service Delivery System (SDS) Version 3.0 Detector Service Delivery System (SDS) Version 3.0 Detecting and Responding to IT Security Policy Violations Quick Start Guide 2018 RapidFire Tools, Inc. All rights reserved. V20180112 Contents Overview

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide

IBM Proventia Management SiteProtector Policies and Responses Configuration Guide IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

Cisco Threat Awareness Service - Quick Start Guide. Last Updated: 16/06/16

Cisco Threat Awareness Service - Quick Start Guide. Last Updated: 16/06/16 Cisco Threat Awareness Service - Quick Start Guide. Last Updated: 16/06/16 Contents Introduction... 1 Intended Use... 1 Portal Navigation... 2 Registering a Network Resource... 2 Adding the Network Resource

More information

Entropy Software General Administration & Configuration

Entropy Software General Administration & Configuration Entropy Software General Administration & Configuration V1.02 1 of 34 Contents 1. Customising your Entropy system... 4 1.1 Entering or editing your Organisation s name into Entropy... 4 1.2 Adding a Watermark...

More information

vcenter Operations Manager for Horizon View Administration

vcenter Operations Manager for Horizon View Administration vcenter Operations Manager for Horizon View Administration vcenter Operations Manager for Horizon View 1.5 vcenter Operations Manager for Horizon View 1.5.1 This document supports the version of each product

More information

Contents. Why You Should Read This Manual...ix. 1. Introduction... 1

Contents. Why You Should Read This Manual...ix. 1. Introduction... 1 Contents Why You Should Read This Manual...ix 1. Introduction... 1 Understanding Security... 2 Group and User Accounts... 2 Application Features... 3 Security Areas... 3 Using Windows Security... 7 Synchronizing

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

SkyFormation for Salesforce. Cloud Connector

SkyFormation for Salesforce. Cloud Connector SkyFormation for Salesforce Cloud Connector Overview Salesforce provides a broad set of customers and sales automation and management services delivered as a cloud service. Salesforce helps organizations

More information

ForeScout CounterACT. Configuration Guide. Version 5.0

ForeScout CounterACT. Configuration Guide. Version 5.0 ForeScout CounterACT Core Extensions Module: Reports Plugin Version 5.0 Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Verify That the Plugin Is Running... 5

More information

Managing Your Website with Convert Community. My MU Health and My MU Health Nursing

Managing Your Website with Convert Community. My MU Health and My MU Health Nursing Managing Your Website with Convert Community My MU Health and My MU Health Nursing Managing Your Website with Convert Community LOGGING IN... 4 LOG IN TO CONVERT COMMUNITY... 4 LOG OFF CORRECTLY... 4 GETTING

More information

Operating system security models

Operating system security models Operating system security models Unix security model Windows security model MEELIS ROOS 1 General Unix model Everything is a file under a virtual root diretory Files Directories Sockets Devices... Objects

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 5.1 Program Overview Contents About the Program Ekran Server & Management Tool Database Management Licensing Client Installation Monitoring Parameters Client Protection Advanced User Authentication

More information

Managing WCS User Accounts

Managing WCS User Accounts CHAPTER 7 This chapter describes how to configure global e-mail parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-1 Viewing or Editing User Information,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

CounterACT Reports Plugin

CounterACT Reports Plugin CounterACT Reports Plugin Version 4.1.8 and Above Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Accessing the Reports Portal... 5 Saving Reports and Creating

More information

HP Operations Manager

HP Operations Manager HP Operations Manager Software Version: 9.22 UNIX and Linux operating systems Java GUI Operator s Guide Document Release Date: December 2016 Software Release Date: December 2016 Legal Notices Warranty

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Minimum System Requirements The following are the minimum system requirements needed to run and install Premium Pro Enterprise:

Minimum System Requirements The following are the minimum system requirements needed to run and install Premium Pro Enterprise: Overview Premium Pro Enterprise is the next generation of the Premium Pro family of applications. It is a Javabased application that houses multiple products and tax years in a single interface. It requires

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM

More information

Sophos Enterprise Console Help. Product version: 5.3

Sophos Enterprise Console Help. Product version: 5.3 Sophos Enterprise Console Help Product version: 5.3 Document date: September 2015 Contents 1 About Sophos Enterprise Console 5.3...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

DocAve Online 3. User Guide. Service Pack 17, Cumulative Update 2

DocAve Online 3. User Guide. Service Pack 17, Cumulative Update 2 DocAve Online 3 User Guide Service Pack 17, Cumulative Update 2 Issued November 2017 Table of Contents What s New in the Guide... 8 About DocAve Online... 9 Submitting Documentation Feedback to AvePoint...

More information

NZ Online Forms for Research Software Manual

NZ Online Forms for Research Software Manual NZ Online Forms for Research Software Manual Version 1.5 Released May 2016 2 P a g e N Z O n l i n e F o r m s f o r R e s e a r c h 1 INTRODUCTION... 6 2 GETTING STARTED... 6 2.1 Creating an Account...

More information

FISMA Compliance. with O365 Manager Plus.

FISMA Compliance. with O365 Manager Plus. FISMA Compliance with O365 Manager Plus www.o365managerplus.com About FISMA The Federal Information Security Management Act (FISMA) is a United States federal law passed in 2002 that made it a requirement

More information

Administration 1. DLM Administration. Date of Publish:

Administration 1. DLM Administration. Date of Publish: 1 DLM Administration Date of Publish: 2018-07-03 http://docs.hortonworks.com Contents ii Contents Replication Concepts... 4 HDFS cloud replication...4 Hive cloud replication... 4 Cloud replication guidelines

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide February 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices Hands-On Lab Description Most corporations today have some form of patch process in place. In this session, you will learn

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2008 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

Workflow Templates in Compliance 360 Version 2018

Workflow Templates in Compliance 360 Version 2018 Workflow Templates in Compliance 360 Version 2018 Workflow Templates 5 Workflow Elements 6 Workflow Teams 6 Workflow Template Changes 6 Create or Edit a Workflow Template 8 Import and Export Workflow Templates

More information

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2 Forescout Version 2.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark for AIX 5.3 and 6.1 The software

More information

GDPR Controls and Netwrix Auditor Mapping

GDPR Controls and Netwrix Auditor Mapping GDPR Controls and Netwrix Auditor Mapping www.netwrix.com Toll-free: 888-638-9749 About GDPR The General Data Protection Regulation (GDPR) is a legal act of the European Parliament and the Council (Regulation

More information

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information

USM Anywhere AlienApps Guide

USM Anywhere AlienApps Guide USM Anywhere AlienApps Guide Updated April 23, 2018 Copyright 2018 AlienVault. All rights reserved. AlienVault, AlienApp, AlienApps, AlienVault OSSIM, Open Threat Exchange, OTX, Unified Security Management,

More information

Sophos Central Admin. help

Sophos Central Admin. help help Contents About Sophos Central...1 Activate Your License... 2 Overview...3 Dashboard... 3 Alerts...4 Logs & Reports... 15 People...31 Devices... 41 Global Settings... 57 Protect Devices... 90 Endpoint

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 13: Operating System Security Department of Computer Science and Engineering University at Buffalo 1 Review Previous topics access control authentication session

More information

Data Security Option DSI. Manual: MU Revision 55. This Photo by Unknown Author is licensed under CC BY-NC-SA

Data Security Option DSI. Manual: MU Revision 55. This Photo by Unknown Author is licensed under CC BY-NC-SA DSI Data Security Option Manual: MU00169-001 Revision 55 This Photo by Unknown Author is licensed under CC BY-NC-SA Data Sciences International 119 14 th Street NW, Suite 100 St. Paul, MN 55112 Phone:

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before installing and using the service, review the readme files, release

More information

ControlPoint. Evaluation Guide. November 09,

ControlPoint. Evaluation Guide. November 09, ControlPoint Evaluation Guide November 09, 2017 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2017 All rights reserved. No part or section of the contents of this

More information

DataCollect Administrative Tools Supporting DataCollect (CMDT 3900) Version 3.0.0

DataCollect Administrative Tools Supporting DataCollect (CMDT 3900) Version 3.0.0 Administrator Manual DataCollect Administrative Tools Supporting DataCollect (CMDT 3900) Version 3.0.0 P/N 15V-090-00054-100 Revision A SKF is a registered trademark of the SKF Group. All other trademarks

More information

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide You can find the most up-to-date technical

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

ControlPoint. for Office 365. User Guide VERSION 7.6. August 06,

ControlPoint. for Office 365. User Guide VERSION 7.6. August 06, ControlPoint for Office 365 User Guide VERSION 7.6 August 06, 2018 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2018 All rights reserved. No part or section of

More information

Overview Intrusion Detection Systems and Practices

Overview Intrusion Detection Systems and Practices Overview Intrusion Detection Systems and Practices Chapter 13 Lecturer: Pei-yih Ting Intrusion Detection Concepts Dealing with Intruders Detecting Intruders Principles of Intrusions and IDS The IDS Taxonomy

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Ekran System v.6.1 Troubleshooting

Ekran System v.6.1 Troubleshooting Ekran System v.6.1 Troubleshooting Quick Access to Log Files Table of Contents Quick Access to Log Files... 3 Database/Server... 4 Database/Server Related Issues... 4 Database/Server Related Error Messages...

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix Version 1.1 Table of Contents About BigFix Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 About Support for Dual Stack Environments... 5 Concepts, Components,

More information

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration.

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. Administrator Guide Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. The information and content in this document is provided for informational purposes

More information

Legacy Client Chart (LCC) Installation Guide for Purkinje System

Legacy Client Chart (LCC) Installation Guide for Purkinje System Legacy Client Chart (LCC) Installation Guide for Purkinje System A Guide to Run and Configure the Legacy Client Chart (LCC) Solution For questions about using this guide please contact IMS@aohc.org Table

More information

User s Manual. Version 5

User s Manual. Version 5 User s Manual Version 5 Copyright 2017 Safeway. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Implementing and Supporting Windows Intune

Implementing and Supporting Windows Intune Implementing and Supporting Windows Intune Module 3: Computer Administration by Using Windows Intune Module Overview Understanding Groups Creating and Populating Groups The Windows Intune Update Process

More information

The Lighthouse Case Management System

The Lighthouse Case Management System The Lighthouse Case Management System Get everything you need to track hotline reports from beginning to end in one easy-to-use online tool! For most organizations, keeping track of hotline reports can

More information

Connection Logging. Introduction to Connection Logging

Connection Logging. Introduction to Connection Logging The following topics describe how to configure the Firepower System to log connections made by hosts on your monitored network: Introduction to, page 1 Strategies, page 2 Logging Decryptable Connections

More information

User Manual. Version 5.8

User Manual. Version 5.8 User Manual Version 5.8 Information in this document is subject to change without notice. Copyright 2013-2018, Exacq Technologies, Inc. All rights reserved. Exacq Technologies is a trademark of Exacq Technologies,

More information

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Learning Objective Explain the importance of security audits, testing, and monitoring to effective security policy.

More information

If you require more information that is not included in this document, please contact us and we will be happy to provide you with further detail.

If you require more information that is not included in this document, please contact us and we will be happy to provide you with further detail. Summary This document is an introduction to how Neuxpower has designed and built NXPowerLite for File Servers to be a powerful technology, while respecting customer data and taking a safety-first approach

More information

Integrate Sophos Enterprise Console. EventTracker v8.x and above

Integrate Sophos Enterprise Console. EventTracker v8.x and above Integrate Sophos Enterprise Console EventTracker v8.x and above Publication Date: September 22, 2017 Abstract This guide provides instructions to configure Sophos Enterprise Console to send the events

More information

OUTLOOK HOW DO I? 2013

OUTLOOK HOW DO I? 2013 OUTLOOK HOW DO I? Click on a Link to take you to that Section OUTLOOK - GENERAL... 2 GENERAL How Do I Navigate the 2010 Outlook Screen?... 2 GENERAL: How Do I Change the Reading Pane View?... 7 GENERAL:

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Integrate Microsoft Office 365. EventTracker v8.x and above

Integrate Microsoft Office 365. EventTracker v8.x and above EventTracker v8.x and above Publication Date: March 5, 2017 Abstract This guide provides instructions to configure Office 365 to generate logs for critical events. Once EventTracker is configured to collect

More information

BMS Managing Users in Modelpedia V1.1

BMS Managing Users in Modelpedia V1.1 BMS 3.2.0 Managing Users in Modelpedia V1.1 Version Control Version Number Purpose/Change Author Date 1.0 Initial published version Gillian Dass 26/10/2017 1.1 Changes to User roles Gillian Dass 14/11/2017

More information

Welcome to the Investor Experience

Welcome to the Investor Experience Welcome to the Investor Experience Welcome to the Black Diamond Investor Experience, a platform that allows advisors to customize how they present information to their clients. This document provides important

More information

Remote Support Web Rep Console

Remote Support Web Rep Console Remote Support Web Rep Console 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

Comodo cwatch Network Software Version 2.23

Comodo cwatch Network Software Version 2.23 rat Comodo cwatch Network Software Version 2.23 Administrator Guide Guide Version 2.23.060618 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo cwatch

More information

CIS 5373 Systems Security

CIS 5373 Systems Security CIS 5373 Systems Security Topic 3.2: OS Security Access Control Endadul Hoque Slide Acknowledgment Contents are based on slides from Ninghui Li (Purdue), John Mitchell (Stanford), Bogdan Carbunar (FIU)

More information

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall ForeScout Extended Module for Palo Alto Networks Next Generation Firewall Version 1.2 Table of Contents About the Palo Alto Networks Next-Generation Firewall Integration... 4 Use Cases... 4 Roll-out Dynamic

More information

Raptor University. District Admin Training. Instructor: RAPTOR TECHNOLOGIES, LLC

Raptor University. District Admin Training. Instructor: RAPTOR TECHNOLOGIES, LLC Raptor University District Admin Training Instructor: RAPTOR TECHNOLOGIES, LLC This presentation includes instruction on the following topics to get you started using Raptor: Learning Objectives Navigating

More information

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere. HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD Automated PCI compliance anytime, anywhere. THE PROBLEM Online commercial transactions will hit an estimated

More information

Windows 8/RT Features Matrix

Windows 8/RT Features Matrix Windows 8/RT Features Matrix The following matrix shows what AirWatch features are available to the Windows 8.0/RT and the Windows 8.1/RT platforms. Feature Windows 8.0/RT Windows 8.1/RT Activation & Enrollment

More information

12/05/2017. Geneva ServiceNow Security Management

12/05/2017. Geneva ServiceNow Security Management 12/05/2017 Security Management Contents... 3 Security Incident Response...3 Security Incident Response overview... 3 Get started with Security Incident Response... 6 Security incident creation... 40 Security

More information

Microsoft Office SharePoint. Reference Guide for Contributors

Microsoft Office SharePoint. Reference Guide for Contributors Microsoft Office SharePoint Reference Guide for Contributors SharePoint: Reference Guide for Contributors Table of Contents INTRODUCTION... 3 FOLLOWING A SITE... 3 NAVIGATION... 4 LISTS AND LIBRARIES...

More information

ISO27001 Preparing your business with Snare

ISO27001 Preparing your business with Snare WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security

More information