Unified CCE Security Compliance for Windows Server 2012 R2
|
|
- Priscilla Armstrong
- 6 years ago
- Views:
Transcription
1 Unified CCE Security Compliance for Windows Server 2012 R2 This topic contains the security baseline for hardening Windows Server 2012 R2 Servers running Unified CCE. This baseline is essentially a collection of Microsoft recommended group policy settings which are determined by using the Microsoft Security Compliance Manager 3.0 tool. The baseline includes only those settings whose severity qualifies as Critical and Important. The settings with Optional and None severity qualification are not included in the baseline. Network security: LAN Manager authentication level Network security: Allow LocalSystem NULL session fallback Microsoft network client: Send unencrypted password to third-party SMB servers Network security: Allow Local System to use computer identity for NTLM Network security: Do not store LAN Manager hash value on next password change Network security: Minimum session security for NTLM SSP based (including secure RPC) servers Interactive logon: Smart card removal behavior Send NTLMv2 response only Not defined Not defined No minimum No Action Send NTLMv2 response only. Refuse LM & NTLM Require NTLMv2 session security Require 128-bit encryption Lock Workstation 1
2 Network security: Minimum session security for NTLM SSP based (including secure RPC) clients Interactive logon: Number of previous logons to cache (in case domain controller is not available) Network access: Let Everyone permissions apply to anonymous users Network access: Do not allow anonymous enumeration of SAM accounts and shares Shutdown: Clear virtual memory pagefile No minimum 10 logons Require NTLMv2 session security Require 128-bit encryption 4 logons Network access: Remotely accessible registry paths Shutdown: Allow system to be shut down without having to log on System objects: Require case insensitivity for non-windows subsystems Network access: Sharing and security model for local accounts Interactive logon: Do not require CTRL+ALT+DEL Devices: Allowed to format and eject removable media System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies* Network access: Allow anonymous SID/Name translation Control\ProductOptions System\ CurrentControlSet\Control\ Server Applications Software\ Microsoft\Windows NT\ CurrentVersion Classic - local users authenticate as themselves Control\ProductOptions System\ CurrentControlSet\ Control\ Server Applications Software\ Microsoft\Windows NT\ CurrentVersion Classic - local users authenticate as themselves 2
3 Network access: Remotely accessible registry paths and sub-paths Control\Print\Printers System\ CurrentControlSet\Services\Eventlog Software\Microsoft\OLAP Server Software\Microsoft\ Windows NT\CurrentVersion\ Print Software\Microsoft\Windows NT\CurrentVersion\Windows System\ CurrentControlSet\ Control\ContentIndex System\ CurrentControlSet\Control\Terminal Server Control\Terminal Server\UserConfig Control\Terminal Server\ DefaultUserConfiguration Software\ Microsoft\Windows NT\CurrentVersion\Perflib System\CurrentControlSet \Services\SysmonLog Control\Print\Printers System\ CurrentControlSet\Services\Eventlog Software\ Microsoft\OLAP Server Software\ Microsoft\Windows NT\CurrentVersion\Print Software\ Microsoft\Windows NT\CurrentVersion\Windows Control\ContentIndex System\ CurrentControlSet\Control\ Terminal Server System\ CurrentControlSet\Control\ Terminal Server\UserConfig Control\Terminal Server\ DefaultUserConfiguration Software\Microsoft\ Windows NT\CurrentVersion\ Perflib Services\SysmonLog Recovery console: Allow automatic administrative logon Turn off Autoplay Network access: Restrict anonymous access to Named Pipes and Shares Recovery console: Allow floppy copy and access to all drives and all folders Audit Policy: System: IPsec Driver Audit Policy: System: Security System Extension Audit Policy: Account Management: Security Group Management Not Configured Turn off Autoplay on: All drives and Failure and Failure and Failure 3
4 Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings Audit Policy: Account Management: Other Account Management Events Audit Policy: System: Security State Change Audit Policy: Detailed Tracking: Process Creation Not defined and Failure and Failure Audit Policy: System: Other System Events Audit Policy: Logon-Logoff: Account Lockout Audit Policy: Policy Change: Audit Policy Change Audit Policy: Logon-Logoff: Special Logon Audit Policy: Account Management: User Account Management Audit Policy: Account Logon: Credential Validation Audit Policy: Logon-Logoff: Logon Audit Policy: Account Management: Computer Account Management Audit Policy: Privilege Use: Sensitive Privilege Use Audit Policy: Logon-Logoff: Logoff Audit Policy: Policy Change: Authentication Policy Change Audit Policy: System: System Integrity and Failure and Failure and Failure and Failure and Failure and Failure and Failure and Failure and Failure 4
5 Turn off toast notifications on the lock screen Microsoft network server: Amount of idle time required before suspending session Interactive logon: Machine inactivity limit Microsoft network server: Disconnect clients when logon hours expire Network security: Force logoff when logon hours expire Sign-in last interactive user automatically after a system-initiated restart Interactive logon: Do not display last user name Interactive logon: Machine account lockout threshold Devices: Prevent users from installing printer drivers Create global objects Access this computer from the network Modify an object label Generate security audits Increase scheduling priority Force shutdown from a remote system Allow log on through Remote Desktop Services* Change the system time 15 minutes Not defined Not defined, Service, Local Service, Network Service Everyone,, Users, Backup Operators None Local Service, Network Service, Remote Desktop Users, Local Service 15 minutes 900 seconds 10 invalid logon attempts, Service, Local Service, Network Service, Authenticated Users Local Service, Network Service, Remote Desktop Users, Local Service 5
6 Create a pagefile Profile single process Deny log as a batch job Act as part of the operating system Guests Change time zone Lock pages in memory Access Credential Manager as a trusted caller Create a token object Debug programs Deny log on as a service Deny access to this computer from the network Back up files and directories Shut down the system Deny log on locally Replace a process level token Modify firmware environment values Allow log on locally* Restore files and directories Profile system performance Perform volume maintenance tasks Manage auditing and security log, Local Service Guests, Backup Operators, Backup Operators, Users Guests Local Service, Network Service Guests,, Users, Backup Operators, Backup Operators, NT SERVICE\ WdiServiceHost, Local Service Guests Guests, NT AUTHORITY\Local account, and members of group Guests Local Service, Network Service, Users, NT SERVICE\ WdiServiceHost 6
7 Enable computer and user accounts to be trusted for delegation Impersonate a client after authentication Load and unload device drivers Take ownership of files or other objects Adjust memory quotas for a process Create symbolic links Create permanent shared objects Domain member: Require strong (Windows 2000 or later) session key Password protect the screen saver WDigest Authentication (disabling may require KB ) System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links) Enable screen saver Force specific screen saver Microsoft network client: Digitally sign communications (if server agrees) Network security: LDAP client signing requirements Microsoft network client: Digitally sign communications (always) Microsoft network server: Digitally sign communications (always), Service, Local Service, Network Service, Local Service, Network Service Negotiate signing, Service, Local Service, Network Service, Local Service, Network Service Screen saver executable name : scrnsave.scr Negotiate signing 7
8 Domain member: Digitally sign secure channel data (when possible) Domain member: Digitally encrypt or sign secure channel data (always) Microsoft network server: Digitally sign communications (if client agrees) Domain member: Digitally encrypt secure channel data (when possible) Specify the maximum log file size (KB) - Application Specify the maximum log file size (KB) - System Specify the maximum log file size (KB) - Security Audit: Shut down system immediately if unable to log security audits Accounts: Limit local account use of blank passwords to console logon only Domain member: Disable machine account password changes Domain member: Maximum machine account password age Interactive logon: Prompt user to change password before expiration Allow indexing of encrypted files Do not display network selection UI Allow Microsoft accounts to be optional Accounts: Guest account status KB KB KB 30 days 14 days Maximum Log Size (KB) = Maximum Log Size (KB) = Maximum Log Size (KB) = days 14 days 8
9 Prevent enabling lock screen slide show Prevent enabling lock screen camera Settings marked with an asterix (*) are a deviation from Microsoft recommended values because they disrupt some functionalities of Unified CCE. 9
10 10
Password policy settings control the complexity and lifetime for passwords. This section discusses each specific password policy setting
Windows Security Reference This document is a checklist of the security options with reference material (provided by Microsoft) for a Windows server implementation. The options are based on Windows 2003
More informationSECURITY AUDIT CHECKLIST FOR WINDOWS ACTIVE DIRECTORY
SL.NO POLICY NAME AUDIT STEPS DEFAULT VALUE OBSERVED VALUE 1 Password Policy 24 passwords Settings\Account Policies\Password Policy\Enforce remembered password hisry 2 Set 'Maximum password age' 60 or
More informationGroup Policy Reference
Report Number: C4-053R-00 Group Policy Reference Systems and Network Attack Center (SNAC) Author: David C. Rice Updated: March 2, 2001 Version 1.0.8 National Security Agency 9800 Savage Rd. Suite 6704
More informationConfigure advanced audit policies
7 LESSON Configuring Advanced Audit Policies 70-411 EXAM OBJECTIVE Objective 2.4 Configure advanced audit policies. This objective may include but is not limited to: implement auditing using Group Policy
More informationSERVER HARDENING CHECKLIST
SERVER HARDENING CHECKLIST WINDOWS 2003 SERVER CHECKLIST This checklist contains server hardening procedures for Windows 2003 Server. The procedures listed in this document are a balance of industry best
More informationMcAfee Policy Auditor Content Update Summary. New Checks
2016-May-12 McAfee Policy Auditor Content Update Summary Product / Version Content Version McAfee Policy Auditor 6.x 1185 New Checks Oval ID oval:com.mcafee.oval.common:def:2485824 oval:com.mcafee.oval.common:def:2485826
More informationNetworks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003
Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,
More informationHow To Reset Local Group Policy Objects To Default Settings Windows 7
How To Reset Local Group Policy Objects To Default Settings Windows 7 more information. Group policy unable to apply firewall change on Windows 7 cilent - blocked Try to reset GPO settings to default values
More informationRemote Administration
Windows Remote Desktop, on page 1 pcanywhere, on page VNC, on page 6 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2012 R2 from a range of devices
More informationCISNTWK-11. Microsoft Network Server. Chapter 4
CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows
More informationLepideAuditor. Compliance Reports
Compliance Compliance Table of Contents 1. Introduction... 2 2. Purpose of this Document... 2 3. FISMA Compliance... 3 4. GLBA Compliance... 4 5. HIPAA Compliance... 5 6. PCI Compliance... 6 7. SAS Compliance...
More informationCOPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51
Acknowledgments Introduction Part I: The Basics in Depth 1 Chapter 1: Windows Attacks 3 Attack Classes 3 Automated versus Dedicated Attacker 4 Remote versus Local 7 Types of Attacks 8 Dedicated Manual
More informationInformation Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES
Information Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES Category: G950A Server Operating System; Initial Security Requirements CONTENTS: I. Definition
More informationHIPAA Controls. Powered by Auditor Mapping.
HIPAA Controls Powered by Auditor Mapping www.tetherview.com About HIPAA The Health Insurance Portability and Accountability Act (HIPAA) is a set of standards created by Congress that aim to safeguard
More informationServer. Client LSA. Winlogon LSA. Library SAM SAM. Local logon NTLM. NTLM/Kerberos. EIT060 - Computer Security 2
Local and Domain Logon User accounts and groups Access tokens Objects and security descriptors The Register Some features in Windows 7 and Windows 8 Windows XP evolved from Windows 2000 Windows 10, 8,
More informationHPE Security ArcSight Connectors
HPE Security ArcSight Connectors SmartConnector for Microsoft Windows Event Log Unified Configuration Guide May 16, 2016 SmartConnector for Microsoft Windows Event Log Unified Configuration Guide SmartConnector
More informationManaging and Maintaining a Microsoft Windows Server 2003 Environment
COURSE OVERVIEW This course combines five days of instructor-led training with additional e-learning content to provide students with the knowledge and skills that are required to manage accounts and resources,
More information90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government
More informationEvaluation Guide Host Access Management and Security Server 12.4 SP1 ( )
Evaluation Guide Host Access Management and Security Server 12.4 SP1 (12.4.10) Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,
More informationOutline. Security. Security Ratings. TCSEC Rating Levels. Key Requirements for C2. Met B-Level Requirements
Outline Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Ratings System Components 2 Ratings TCSEC Rating Levels National Computer Center (NCSC) part of US Department of Defense
More informationSecurity. Outline. Security Ratings. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline Ratings System Components Logon Object (File) Access Impersonation Auditing 2 Ratings National Computer Center (NCSC) part
More informationDameware ADMINISTRATOR GUIDE. Version Last Updated: October 18, 2017
ADMINISTRATOR GUIDE Dameware Version 12.0 Last Updated: October 18, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/dameware_remote_support_mini_remote_control 2017
More informationMessage Networking 5.2 Administration print guide
Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do
More informationx CH03 2/26/04 1:24 PM Page
03 078973107x CH03 2/26/04 1:24 PM Page 45 3............................................. Setting Up, Managing, and Troubleshooting Security Accounts and Policies 1. You re a help desk technician for your
More informationSQL Server Hardening Considerations, on page 1 SQL Server 2014 Security Considerations, on page 3
Considerations, on page 1 SQL Server 2014 Security Considerations, on page 3 Considerations Top SQL Hardening Considerations Top SQL Hardening considerations: 1. Do not install SQL Server on an Active
More informationMANAGING LOCAL AUTHENTICATION IN WINDOWS
MANAGING LOCAL AUTHENTICATION IN WINDOWS Credentials Manager Windows OS has a set of tools that help remedy some of the authentication challenges. For example, the Credential Manager in Windows 7 and newer
More informationUnified Security Platform. Security Center 5.4 Hardening Guide Version: 1.0. Innovative Solutions
Unified Security Platform Security Center 5.4 Hardening Guide Version: 1.0 Innovative Solutions 2016 Genetec Inc. All rights reserved. Genetec Inc. distributes this document with software that includes
More informationAdvanced Security Measures for Clients and Servers
Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network
More informationAn Overview to Windows Server Security
An Overview to Windows Server Security Anil Sagar CERT-In Department of Information Technology Ministry of Communications & Information Technology Electronics Niketan, 6 C.G.O. Complex New Delhi- 110 003
More informationPass-the-Hash Attacks
Pass-the-Hash Attacks Mgr. Michael Grafnetter www.dsinternals.com Agenda PtH Attack Anatomy Mitigation Proactive Reactive Windows 10 + Windows Server 2016 Microsoft Advanced Threat Analytics PtH Attack
More informationSelect the Akeni Pro Server installation file that matches your operating system and double-click on the file.
Akeni Pro Server Administration Guide (Version 2) Contents Chapter 1 Chapter 2 Chapter 3 Getting Started.: 1 Pro Server Installation.: 2 Launching Akeni Pro Server.: 3 Pro Client Installation.: 4 Launching
More informationMCSM:Directory2012 MCM:Directory2008 MVP:Enterprise Security Certified Ethical Hacker CISA.
NTLM Ing. Ondřej Ševeček GOPAS a.s. MCSM:Directory2012 MCM:Directory2008 MVP:Enterprise Security Certified Ethical Hacker CISA ondrej@sevecek.com www.sevecek.com GOPAS: info@gopas,cz www.gopas.cz www.facebook.com/p.s.gopas
More informationSetup Smart Login for Windows V2
Setup Smart Login for Windows V2 Smart Login allows workstations to login to a Smart-Net server without having to join a domain. Smart Login is suitable for both laptops and desktop PC s. Features Users
More informationAIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION
More informationSecurity Essentials. Working with Systems Management Server (SMS) 2.0 to maximize SMS security and avoid security-related problems.
Security Essentials Working with Systems Management Server (SMS) 2.0 to maximize SMS security and avoid security-related problems. 2000 Microsoft Corporation. All rights reserved. The information contained
More informationDate 15/08/ :31:25. DEMO2012R2\sysadmin. Author. Version Product XIA Configuration Server [ ]
Date 15/08/2018 11:31:25 Author DEMO2012R2\sysadmin Version 1.28 Product XIA Configuration Server [10.2.2.20901] Page 6 of 172 Description Item Name Windows Server 2012 R2 running XIA Configuration.
More informationBaseline Windows Vista Enterprise Computer Setup
Baseline Windows Vista Enterprise Computer Setup Version: 0.1.0 May 5, 2008 This documents the procedure that is recommended to enhance the security of a computer running Windows Vista Enterprise. These
More informationPre-Assessment Answers-1
Pre-Assessment Answers-1 0Pre-Assessment Answers Lesson 1 Pre-Assessment Questions 1. What is the name of a statistically unique number assigned to all users on a Windows 2000 system? a. A User Access
More informationHardening the CyberArk CPM and PVWA Servers
Hardening the CyberArk CPM and PVWA Servers June 2017 Copyright 1999-2017 CyberArk Software Ltd. All rights reserved. This document contains information and ideas, which are proprietary to CyberArk Software
More informationUser Databases. ACS Internal Database CHAPTER
CHAPTER 12 The Cisco Secure Access Control Server Release 4.2, hereafter referred to as ACS, authenticates users against one of several possible databases, including its internal database. You can configure
More informationActivity 1: Using Windows XP Professional Security Checklist
Activity 1: Using Windows XP Professional Security Checklist Verify that all Disk partitions are Formatted with NTFS NTFS partitions offer access controls and protections that aren't available with the
More informationMcAfee File and Removable Media Protection Product Guide
McAfee File and Removable Media Protection 5.0.8 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee
More informationGetting started with ActiveSecurity MyLogin
1 (5) Getting started with ActiveSecurity MyLogin 1 Introduction This document contains instructions for starting to use Aventra s ActiveSecurity MyLogin software and explanations of the basic settings.
More informationAventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
More informationZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016
ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,
More informationApplication User Setup
This chapter provides information on managing application user information. About, page 1 Add Application User, page 2 Application User Deletion, page 3 Application User Settings, page 3 Add Administrator
More informationLevel One Benchmark Windows NT 4.0 Operating Systems V1.0.3
Level One Benchmark Windows NT 4.0 Operating Systems V1.0.3 Copyright 2002, The Center for Internet Security www.cisecurity.org Terms of Use Agreement 1. Grant of Permission to use the Windows NT 4.0 Download
More informationApplication User Configuration
CHAPTER 87 The following topics contain information on managing application user information: Settings, page 87-1 Adding an Administrator User to Cisco Unity or Cisco Unity Connection, page 87-6 Changing
More information5 MANAGING USER ACCOUNTS AND GROUPS
MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content
More informationEvaluation Guide Host Access Management and Security Server 12.4
Evaluation Guide Host Access Management and Security Server 12.4 Copyrights and Notices Copyright 2017 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials
More informationDigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Quick Start Guide Version 5 DATA PROTECTION REMOTE ACCESS SECURE COMMUNICATION STRONG AUTHENTICATION ACCESS RECOVERY SINGLE SIGN-ON DigitalPersona Pro Enterprise DigitalPersona
More informationIntegration with Exchange 2007/2010
DME version 3.6 SP1 Integration with Exchange 2007/2010 Installing DME Created on 29-05-2012 Microsoft Exchange 2007/2010 Contents Integration with Microsoft Exchange 2007/2010 2 Active Directory preparation...
More informationThe Common Access Card The problems it solves (and the ones it doesn t) Quest Software/One Identity Dan Conrad Federal CTO
The Common Access Card The problems it solves (and the ones it doesn t) Quest Software/One Identity Dan Conrad Federal CTO 1 Disclaimer The views expressed in this presentation are those of the author(s)
More informationMAC HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your Mac computer
MAC HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your Mac computer WiseMo develops software for
More informationChapter 1: Windows Platform and Architecture. You will learn:
Chapter 1: Windows Platform and Architecture Windows 2000 product family. New features/facilities of. Windows architecture. Changes to the kernel and kernel architecture. New features/facilities. Kernel
More informationLesson 3: Identifying Key Characteristics of Workgroups and Domains
1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users
More informationGDPR Controls and Netwrix Auditor Mapping
GDPR Controls and Netwrix Auditor Mapping www.netwrix.com Toll-free: 888-638-9749 About GDPR The General Data Protection Regulation (GDPR) is a legal act of the European Parliament and the Council (Regulation
More informationNetIQ Advanced Authentication Framework - Group Policy Templates. Administrator's Guide. Version 5.1.0
NetIQ Advanced Authentication Framework - Group Policy Templates Administrator's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 4 About This Document 4 Group Policies 5 Adding
More informationStripe Terminal Implementation Guide
Stripe Terminal Implementation Guide 12/27/2018 This document details how to install the Stripe Terminal application in compliance with PCI 1 PA-DSS Version 3.2. This guide applies to the Stripe Terminal
More informationUser Manual. Admin Report Kit for IIS 7 (ARKIIS)
User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...
More informationLevel One Benchmark Windows 2000 Operating System v1.2.2
Level One Benchmark Windows 2000 Operating System v1.2.2 Copyright 2004, The Center for Internet Security http://www.cisecurity.org Editor: Jeff Shawgo cis-feedback@cisecurity.org Agreed Terms of Use Background.
More informationfile:///c:/users/nsadmin/desktop/default%20domain%20policy.htm
Page 1 of 5 Data collected on: 1:22:33 PM General Details Domain Owner Created Modified User Revisions Computer Revisions Unique ID GPO Status naturalsmilesdentistry.com NS\Domain Admins 1/28/2012 11:09:00
More informationMOC 20411B: Administering Windows Server Course Overview
MOC 20411B: Administering Windows Server 2012 Course Overview This course is part two in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012
More informationGuide to Securing Microsoft Windows 2000 Group Policy: Security Configuration Tool Set
Report Number: C4-052R-00 Guide to Securing Microsoft Windows 2000 Group Policy: Security Configuration Tool Set Operational Network Evaluations Division of the Systems and Network Attack Center (SNAC)
More informationTable of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide
2 Wave Systems Corp. Client User Guide Table of Contents Overview... 3 What is the Trusted Drive Manager?... 3 Key Features of Trusted Drive Manager... 3 Getting Started... 4 Required Components... 4 Configure
More informationGuide to Securing Microsoft Windows 2000 Group Policy: Security Configuration Tool Set
Report Number: C4-052R-00 Guide to Securing Microsoft Windows 2000 Group Policy: Security Configuration Tool Set Network Security Evaluations and Tools Division of the Systems and Network Attack Center
More informationGFI EventsManager 8 ReportPack. Manual. By GFI Software Ltd.
GFI EventsManager 8 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-Mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationAppSense DataNow. Release Notes (Version 4.1) Components in this Release. These release notes include:
AppSense DataNow Release Notes (Version 4.1) These release notes include: Components in this Release Important Upgrade Information New Features Bugs Fixed Known Issues and Limitations Supported Operating
More informationThinkVantage Fingerprint Software
ThinkVantage Fingerprint Software 12 2 1First Edition (February 2006) Copyright Lenovo 2006. Portions Copyright International Business Machines Corporation 2006. All rights reserved. U.S. GOVERNMENT
More informationXerox VersaLink B7025/B7030/B7035 Multifunction Printer Security Function Supplementary Guide
Xerox VersaLink B7025/B7030/B7035 Multifunction Printer Document Version 1.0: March 2018 Contents Xerox VersaLink B7025/B7030/B7035 Multifunction Printer Before Using the Security Features... 5 Preface...
More informationConfiguring Content Authentication and Authorization on Standalone Content Engines
CHAPTER 10 Configuring Content Authentication and Authorization on Standalone Content Engines This chapter describes how to configure content authentication and authorization on standalone Content Engines
More informationContents User Guide... 1 Overview... 1 Create a New Report... 3 Create Report... 3 Select Devices... 3 Report Generation... 4 Your Audit Report...
User Guide Version 3.4 (Paws Studio 3.0.0) Titania Limited 2015. All Rights Reserved This document is intended to provide advice and assistance for the installation and running of Paws Studio. While Titania
More informationLabSim Mapping Matrix
LabSim Mapping Matrix A+ Guide to Software Managing, Maintaining, and Troubleshooting, Fourth Edition LabSim for A+ IT-Technician(220-602) Mapping: Chapters to LabSim Chapter Pages LabSim Chapter 1 Pages
More informationUser Guide. Version R94. English
AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
More informationManaging the VPN Client
Managing the VPN Client This chapter explains the tasks you can perform to manage connection entries, view and manage event reporting, and upgrade or uninstall the VPN Client software. The management features
More informationConfiguring the Management Interface and Security
CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various
More informationThis course provides students with the knowledge and skills to administer Windows Server 2012.
MOC 20411C: Administering Windows Server 2012 Course Overview This course provides students with the knowledge and skills to administer Windows Server 2012. Course Introduction Course Introduction 6m Module
More informationRequired privileges and permissions
Required privileges and permissions Table of contents Document summary ADSelfService Plus overview Required permissions Configuring permissions To delegate full control in ADUC to access all ADSelfService
More informationSoftware Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M
Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Topics: TACACS+ Authentication for Centralized Control of Switch Access Security (page 7) CDP (page
More informationPass-the-Hash Attacks. Michael Grafnetter
Pass-the-Hash Attacks Michael Grafnetter www.dsinternals.com Agenda PtH Attack Anatomy Mitigation Proactive Reactive Windows 10 + Windows Server 2016 PtH History and Future 1988 Microsoft releases Lan
More information3 ways of supporting a group of computers. Machine by machine Centrally structured Centrally managed (AD/Novell)
3 ways of supporting a group of computers Machine by machine Centrally structured Centrally managed (AD/Novell) Pre-reqs for Remote/Central Administration list of machines NT based OS Known Account w/
More informationvcloud Director User's Guide
vcloud Director 8.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationLocking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
More informationEkran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationIVE Quick Startup Guide - OS 4.0
IVE Quick Startup Guide - OS 4.0 Initial Setup Once you receive the IVE device, unpack the IVE and connect it to a PC or Laptop using the console (null modem) cable provided with the IVE. You have to connect
More informationAntivirus Solution Guide for Clustered Data ONTAP: Kaspersky
Technical Report Antivirus Solution Guide for Clustered Data ONTAP: Kaspersky Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp July 2016 TR-4445 Abstract An antivirus solution is key to enable enterprises
More informationWindows Server 2003 Network Administration Goals
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management
More informationMetastorm BPM Release 7.6
Metastorm BPM Release 7.6 Administration Guide May 2008 Metastorm Inc. email: inquiries@metastorm.com http://www.metastorm.com Metastorm BPM Release 7.6 Copyrights and Trademarks 1996-2008 Metastorm Inc.
More informationUser Guide. Version R92. English
AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationGood management is essential for all modern networks. Active Directory
CHAPTER 3 CREATING AND MANAGING USER ACCOUNTS After reading this chapter and completing the exercises, you will be able to: Understand the purpose of user accounts Understand the user authentication process
More informationCisco NAC Appliance Agents
10 CHAPTER This chapter presents overviews, login flow, and session termination dialogs for the following Cisco NAC Appliance access portals: Cisco NAC Agent, page 10-1 Cisco NAC Web Agent, page 10-28
More informationBlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry
More informationSecurity Service tools user IDs and passwords
IBM Systems - iseries Security Service tools user IDs and passwords Version 5 Release 4 IBM Systems - iseries Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information
More informationR5: Configuring Windows Server 2008 R2 Network Infrastructure
70-642 R5: Configuring Windows Server 2008 R2 Network Infrastructure Course Introduction Course Introduction Chapter 01 - Understanding and Configuring IP Lesson 1: Introducing the OSI Model Understanding
More informationWINDOWS HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your PC or Server
WINDOWS HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your PC or Server WiseMo develops software
More informationEveryonePrint Integration with Equitrac. Configuration Guide. EveryonePrint Integration with Equitrac Page 1 of 14
EveryonePrint Integration with Equitrac Configuration Guide EveryonePrint Integration with Equitrac 2014.06.02 Page 1 of 14 1. Overview... 3 1.1 Added features with Equitrac integration... 3 1.2 Prerequisites
More informationRED IM Integration with Bomgar Privileged Access
RED IM Integration with Bomgar Privileged Access 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the
More informationEmbedded for Xerox EPA-EIP Setup Guide
Embedded for Xerox EPA-EIP Setup Guide 2016 XRX-EPA-EIP-20160315 Equitrac Embedded for Xerox EPA-EIP Setup Guide Document History Date Description of Revision Changes March 15, 2016 Updated for Equitrac
More informationCNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
1800 ULEARN (853 276) www.ddls.com.au CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Length 5 days Price $5500.00 (inc GST) Overview The objective of Implementing Citrix NetScaler
More informationInterested in learning more about security? Windows Logon Forensics. Copyright SANS Institute Author Retains Full Rights
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Windows
More information