gosint Documentation Release Cisco CSIRT
|
|
- Dina Houston
- 6 years ago
- Views:
Transcription
1 gosint Documentation Release Cisco CSIRT Nov 20, 2017
2
3 Contents 1 Installation Quick Installation Manual Installation Warnings Pre-Requisites Step by Step NGINX Configuration Updates Configuration Twitter Threat Intel APIs CRITs Whitelists Indicator Feeds Use Pre-Processing Overview Searching/Sorting Indicators Editing Indicators Querying Third Party APIs Deleting Indicators Moving to Post-Processing Bulk Selecting Indicators Post-Processing Overview Searching/Sorting/Editing Indicators Deleting Indicators Transfer Station Overview Exporting via CRITs Ad Hoc Operations Ad Hoc Input Ad Hoc Investigate Recipe Manager Overview i
4 ii Creating a Recipe Metrics
5 The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs). GOSINT allows a security analyst to collect and standardize structured and unstructured threat intelligence. Applying threat intelligence to security operations enriches alert data with additional confidence, context, and cooccurrence. This means that you apply research from third parties to security event data to identify similar, or identical, indicators of malicious behavior. The framework is written in Go with a JavaScript frontend. Navigate to a section to begin traversing the documentation. Contents 1
6 2 Contents
7 CHAPTER 1 Installation It is recommended that GOSINT be installed on a GNU/Linux system with the latest version of the Go language available. 1.1 Quick Installation Option 1: Bash script install This process will allow GOSINT to be installed via pre-configured install scripts. Note that these scripts were tested on a 64-bit version of Ubuntu, and a 32-bit version of Ubuntu. 1. Navigate to bash-install directory in the repository 2. Execute sudo bash 1-install.sh and enter Y to all confirmation prompts. 3. At the conclusion, the GOSINT binary will be running. If all went well, open your web browser and navigate to to view the GOSINT dashboard. Option 2: Docker A community member has developed a version of GOSINT that runs on Docker as viewable here: https: //github.com/jsitech/dockerfiles/tree/master/gosint You can pull this from the Docker Hub as: docker pull jsitech/gosint Note: This repository may not have the latest updates of the official repository. To ensure you have the latest code, either use the pre-configured installation bash scripts (as above) or look below for the more manual process. 1.2 Manual Installation The following was prepared specifically for Ubuntu Server LTS. 3
8 1.2.1 Warnings Package managers may not provide up to date versions of the software and should be tested to ensure compatibility. It is strongly recommended that Go be installed with the latest version from Package managers may name packages differently depending on the specific package manager or OS release repository. For example, php-fpm may not exist; php7.0-fpm may be the correct name of the package Pre-Requisites GOSINT requires A working and up to date Go environment Mongo DB (Community Edition is ok) A reverse proxy/web server (NGINX preferred) PHP You can use your preferred package manager to install most of these environments and applications. For aptitude: sudo apt-get install mongodb php-fpm nginx git 1. Install MongoDB and ensure it is ONLY listening on your local loopback interface ( /localhost) if you are running it on the same host as GOSINT. Allowing your database to listen on any externally facing ports is a security risk, and should not be done without proper precautions taken to prevent unauthorized access. You can use aptitude to install an older version with the command sudo apt-get install mongodb, or you can follow the instructions at to install a more up to date version from the MongoDB repositories. 3. Install PHP (v5 or higher) and verify the installation was successful. 4. Install NGINX (or your preferred web server). You will need to configure NGINX to listen on a public interface at a port you specify. It is recommended that you install a valid certificate for HTTPS and enable some form of authorization (local auth or LDAP) to prevent unauthorized access to GOSINT. Please find the base nginx configuration file at NGINX Configuration Step by Step 1. Create a user for GOSINT to run on with minimal privileges. This user will run the backend binary which is responsible for pulling indicators and exposing an API for the frontend to use: sudo useradd -m gosint sudo su gosint 2. Install and test the Go environment. 4 Chapter 1. Installation
9 Download the GNU/Linux Go 1.8 package. 64 Bit: cd ~ && wget linux-amd64.tar.gz 32 Bit: cd ~ && wget linux-386.tar.gz Decompress archive. 64 Bit: tar zxvf go1.8.linux-amd64.tar.gz 32 Bit: tar zxvf go1.8.linux-386.tar.gz 3. Create project workspace and setup the environment: mkdir ~/projects export GOROOT=$HOME/go export PATH=$PATH:$GOROOT/bin export GOPATH=$HOME/projects export GOBIN=$GOPATH/bin export PATH=$GOPATH:$GOBIN:$PATH 4. Test Go environment using the instructions at 5. Install godep vendor management: go get github.com/tools/godep go install github.com/tools/godep 6. Clone GOSINT repository into your src directory in your go environment and build it: cd ~/projects/src git clone cd GOSINT godep go build -o gosint chmod +x gosint 7. Test GOSINT build:./gosint GOSINT will start and then error out trying to connect to the database if MongoDB has not yet been installed. For ease of use, it is recommended you use a terminal multiplexer such as GNU screen to keep the terminal open that GOSINT is running in: screen -dm./gosint If an alternate IP is needed to be specified for the Mongo DB server, you can use the flag -mongo to change it from the default Type./gosint -h for a list of available flags. If GOSINT starts up without any errors, and you have NGINX setup properly, you should now be able to navigate to the address and port specified in your webserver configuration and access the GOSINT web interface NGINX Configuration server { listen 80; 1.2. Manual Installation 5
10 root /home/gosint/projects/src/gosint/website; index index.php index.html index.htm; try_files $uri server_name someserver.yourcompany.com; gzip on; gzip_proxied any; gzip_types text/css text/javascript text/xml text/plain application/javascript application/x-javascript application/json; #location / { # try_files $uri $uri/ =404; #} error_page 404 /404.html; error_page /50x.html; location = /50x.html { root /usr/share/nginx/html; } { } proxy_pass location ~ \.php$ { try_files $uri =404; fastcgi_split_path_info ^(.+\.php)(/.+)$; # PHP 7 fastcgi_pass unix:/var/run/php/php7.0-fpm.sock; } } # PHP 5 # fastcgi_pass unix:/run/php5-fpm.sock; fastcgi_index index.php; fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; include fastcgi_params; 1.3 Updates Updating is simple and encouraged as bugs are reported and fixed or new features are added. To update your instance of GOSINT, pull the latest version of GOSINT from the repository and re-run the build command to compile the updated binary: godep go build -o gosint 6 Chapter 1. Installation
11 CHAPTER 2 Configuration GOSINT needs some quick initial configuration to start making use of the framework features. All the settings you will need to specify can be found under the Settings tab. 2.1 Twitter Twitter Consumer Key, Twitter Consumer Secret, Twitter Access Token, Twitter Access Secret Create a Twitter App. Upon creation of the app, the above Keys and Tokens will be displayed. Copy these from Twitter into the respective fields in GOSINT. Twitter Users In this field, enter the Twitter users that GOSINT should start following for relevant indicator information. Add new users by typing their usernames; separate users with a comma. 2.2 Threat Intel APIs AlienVault API Key Create an AlienVault API Key. Enter the API key and setup your AlienVault feed to receive indicators through AlienVault OTX. VirusTotal API Key Create a VirusTotal API Key. Enter the API key and setup your AlienVault feed to receive indicators through AlienVault OTX. VirusTotal Private API Access Select this option only if the VirusTotal API key used is for the private version, not public. 7
12 The public VirusTotal API, while sufficient for some features, is limited. Private API access will enable additional features in GOSINT such as reading comments for indicators on VirusTotal, allowing GOSINT to parse additional indicators from the comments. 2.3 CRITs CRITs Server Enter the full URL to the CRITs server that GOSINT should export indicators into. CRITs API User Enter the CRITs username that has API access. CRITs API Key Enter the respective CRITs user s API Key. 2.4 Whitelists Alexa Domains Whitelist This is intended to be used as an area for configuring the Alexa top domains you want to screen and reject indicators. For the most part, indicators involving these highly popular domains will not be malicious. Use this whitelist feature to make sure those top domains do not get recorded as IOCs. Whitelist Domains In addition to the Alexa Whitelist, this section is for any additional domains you want to also prevent from entering the framework. Some examples are security vendor websites, trusted blogs, comment and syndication servers, public sandboxes, etc. Whitelist ISPs Used to prevent IP addresses from specific Internet Service Providers (ISPs) from entering into the framework. This is accomplished by a reverse DNS lookup and keyword match against the ISP record. Be careful with this option as it could potentially ignore valid IOCs coming from a popular ISP. 2.5 Indicator Feeds Table Overview The table provides the user with an overview of the currently configured feeds. Feeds may be deleted by clicking the orange X button in the delete column. Create New Feed This form located below the table is to create a new feed for GOSINT to parse indicators from. Feed Name 8 Chapter 2. Configuration
13 Enter an alphanumeric feed name. Feed URL Enter the location of the feed. Parse Method Select either CSV or Smart parse method. If CSV is selected, the user must enter the column numbers of where the indicators and contexts are in the CSV Indicator Column and CSV Context Column fields, respectively. Cron Time Enter the frequency of how often to pull from the field. Upon successful creation of a feed, the new feed is displayed in the table overview. Click here for more detailed cron information Entry Description Equivalent Run once a year, midnight, Jan. 1st Run once a month, midnight, first of month * Run once a week, midnight on Sunday * * Run once a day, midnight * * Run once an hour, beginning of hour 0 0 * * * * After configuration, GOSINT is ready for use! Begin by navigating to the Pre-Processing page, where indicators will display once parsed by GOSINT from your configured feeds Indicator Feeds 9
14 10 Chapter 2. Configuration
15 CHAPTER 3 Use 3.1 Pre-Processing Overview The pre-processing page is where indicators are displayed that GOSINT has parsed from various sources, such as Twitter and indicator feeds Searching/Sorting Indicators GOSINT allows for searching and sorting the indicators. By default, indicators are sorted with the most recent indicators listed first. However, the indicators can be sorted by any field, including type, source, and context. Click on the column title in order to sort the indicators by these fields. We can also search for an indicator or for indicators from a specific source or with a specific context by using the search box located on the upper right of the table Editing Indicators If we find that GOSINT has incorrectly parsed an indicator (for example, if GOSINT has not properly defanged an indicator), or if we would like to add additional context with an indicator, we can manually edit the indicator by clicking on any of its fields. This opens a text box. Edit the field, and click confirm to save your changes. In addition, tags can be inserted on a per-indicator basis. To add a tag to an indicator, select the text box under the tags column, and type the tag you would like to associate. Tags can consist of a single word or a phrase. Enter a comma or hit Enter/Return on your keyboard to finalize adding the tag to the indicator. Remove a tag by clicking the X on the tag. 11
16 3.1.4 Querying Third Party APIs The pre-processing page is a analysis workspace used to determine whether the pending indicators are malicious or not. GOSINT has various third-party tools available for enriching raw indicators with additional context. By default, GOSINT supports Cisco Umbrella, ThreatCrowd, and VirusTotal. If these third-party APIs are not properly configured, GOSINT will display a notice advising the user that these APIs should be configured in the Settings page. To launch any of these APIs, click the buttons labeled Umbrella, ThreatCrowd, or VirusTotal. Click the Everything button to call all available APIs at once. When the 3rd party enrichment window is closed, the row containing the indicator becomes bold and italicized Deleting Indicators To delete an indicator that has been determined to be non-malicious, click the orange X button the indicator from the pre-processing table.. This removes Indicators that have been deleted are no longer visible on the pre-processing page again, however they are stored permanently in the backend of GOSINT to prevent their recurrence Moving to Post-Processing Once you confirm an indicator is valid and you want to keep it, click the green right-direction arrow button. The indicator is removed from the pre-processing table, and is added into the post-processing table Bulk Selecting Indicators To bulk select indicators, click the blue button with the bulleted items button for other indicators to add to the bulk selection. for an indicator. Continue clicking this Optionally, utilize the Select All on Current Page button on the bottom right of the table to select/deselect all indicators on the current page. Click Bulk Move to Post-Processing and Bulk Delete to perform the respective bulk options on the bottom right of the table. 3.2 Post-Processing Overview This page is where indicators that have been marked as malicious in pre-processing are loaded Searching/Sorting/Editing Indicators As with the pre-processing page, we can search, sort and edit indicators. 12 Chapter 3. Use
17 3.2.3 Deleting Indicators If an indicator was moved into post-processing by mistake, then we can remove the indicator by clicking the orange X button in the appropriate row. 3.3 Transfer Station Overview This page is where we can select indicators in the post-processing stage for export into various locations. Currently, GOSINT supports export into CSV and CRITs. Additional export mechanisms are planned for integration into tools. To select an indicator for export, simply click the appropriate indicator Exporting via CRITs CRITs is a well-known open-source malware and threat repository. You can download CRITs from io/ We can export indicators from GOSINT into CRITs by selecting CRITs as the export format. Ensure the appropriate settings are configured in the CRITs section of the settings page prior to utilizing CRITs export. Upon successful export via any mechanism, the indicators that were selected are removed from the post-processing stage. 3.4 Ad Hoc Operations GOSINT supports two Ad Hoc Operations. Ad Hoc Input: Enter any URL or a body of text to be parsed for potential indicators. Ad Hoc Investigate: Enter an indicator and conduct analysis on it, via supported APIs Ad Hoc Input Let us say that we have found an external report on a recent strain of malware on the Internet. How can we parse these indicators on an ad-hoc basis and have these indicators added into GOSINT? The ad hoc input page allows indicators to be parsed via URL, or a body of text. Input via URL: Enter a valid URL that contains parseable indicators. Input via General Text: For an external report in PDF or some other format, copy the text from the report into the General Text section for parsing. Context: We can assign a specific context to the report, which will allow for these indicators to be assigned this context in pre-processing. For example, we can place the title of the report in the Context so we know where these indicators came from. Click Submit to begin parsing the indicators. All indicators will display in the pre-processing stage with the associated context after GOSINT has parsed the indicators Transfer Station 13
18 3.4.2 Ad Hoc Investigate If you have encountered any arbitrary indicator and would like to call the APIs built in for GOSINT, you can use the Ad Hoc Investigate page. First, select the Indicator Type. You can select either Smart to allow GOSINT to auto-detect the type of indicator, or specify the indicator type manually (Domain, IP, etc.) Then, enter the Indicator you would like to analyze. Finally, select the API you would like to call, and the results will load on the page. 3.5 Recipe Manager Overview The Recipe Manager allows the user to set up tasks for automation with GOSINT. Recipes can be set up to take indicators from certain sources, apply an optional operator to analyze the indicators, and then place these indicators in a destination Creating a Recipe To create a recipe, drag a maximum of one source and maximum of one destination to the final recipe column on the right. The Recipe Overview section displays the recipe to be created. Enter a title for the recipe, and click Create Recipe to create the recipe. The recipe is displayed in the Past Recipes section below the recipe maker. Optionally, click Reset Recipe to clear out a pending recipe for creation and to start over. View and delete past recipes that have been created in the Past Recipes section of the Recipe Manager page. 3.6 Metrics The Metrics page displays interesting statistical information about indicators that have been processed with GOSINT. Indicators By Source: This displays a pie chart of the source of all indicators processed with GOSINT. Indicators By Type: This displays a pie chart of the type of all indicators processed with GOSINT. 14 Chapter 3. Use
Downloading and installing Db2 Developer Community Edition on Ubuntu Linux Roger E. Sanders Yujing Ke Published on October 24, 2018
Downloading and installing Db2 Developer Community Edition on Ubuntu Linux Roger E. Sanders Yujing Ke Published on October 24, 2018 This guide will help you download and install IBM Db2 software, Data
More informationUser Guide. Version R95. English
Software Management User Guide Version R95 English September 22, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationUSM Anywhere AlienApps Guide
USM Anywhere AlienApps Guide Updated April 23, 2018 Copyright 2018 AlienVault. All rights reserved. AlienVault, AlienApp, AlienApps, AlienVault OSSIM, Open Threat Exchange, OTX, Unified Security Management,
More informationPatch Server for Jamf Pro Documentation
Patch Server for Jamf Pro Documentation Release 0.8.2 Bryson Tyrrell Jun 06, 2018 Contents 1 Change History 3 2 Using Patch Starter Script 7 3 Troubleshooting 9 4 Testing the Patch Server 11 5 Running
More informationGenerate Reports to Monitor End-user Activity
This chapter contains the following sections: Overview of Reporting, on page 1 Using the Reporting Pages, on page 2 Enabling Reporting, on page 7 Scheduling Reports, on page 7 Generating Reports On Demand,
More informationCarbon Black QRadar App User Guide
Carbon Black QRadar App User Guide Table of Contents Carbon Black QRadar App User Guide... 1 Cb Event Forwarder... 2 Overview...2 Requirements...2 Install Cb Event Forwarder RPM...2 Configure Cb Event
More informationEkran System v Program Overview
Ekran System v. 5.1 Program Overview Contents About the Program Ekran Server & Management Tool Database Management Licensing Client Installation Monitoring Parameters Client Protection Advanced User Authentication
More informationTangeloHub Documentation
TangeloHub Documentation Release None Kitware, Inc. September 21, 2015 Contents 1 User s Guide 3 1.1 Managing Data.............................................. 3 1.2 Running an Analysis...........................................
More informationCMSilex Documentation
CMSilex Documentation Release 0.1 Leigh Murray December 01, 2016 Contents 1 Introduction 3 2 Usage 5 2.1 Installation................................................ 5 2.2 Bootstrap.................................................
More informationClientNet Admin Guide. Boundary Defense for
ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE
More informationGOBENCH IQ Release v
GOBENCH IQ Release v1.2.3.3 2018-06-11 New Add-Ons / Features / Enhancements in GOBENCH IQ v1.2.3.3 GOBENCH IQ v1.2.3.3 contains several new features and enhancements ** New version of the comparison Excel
More informationAnsible Tower Quick Setup Guide
Ansible Tower Quick Setup Guide Release Ansible Tower 2.4.5 Red Hat, Inc. Jun 06, 2017 CONTENTS 1 Quick Start 2 2 Login as a Superuser 3 3 Import a License 4 4 Examine the Tower Dashboard 6 5 The Setup
More informationTungsten Dashboard for Clustering. Eric M. Stone, COO
Tungsten Dashboard for Clustering Eric M. Stone, COO In this training session 1. Tungsten Dashboard Welcome 2. Tungsten Dashboard Overview 3. Tungsten Dashboard Prerequisites 4. Tungsten Dashboard Security
More informationINFUZE NGINX MODULE USER GUIDE
"The first step in a great mobile experience" INFUZE NGINX MODULE USER GUIDE Support The ScientiaMobile Support Forum is open to all WURFL users, both commercial license holders and evaluation users. It
More informationEnhancedEndpointTracker Documentation
EnhancedEndpointTracker Documentation Release 1.0 agccie Jul 23, 2018 Contents: 1 Introduction 1 2 Install 3 2.1 ACI Application............................................. 3 2.2 Standalone Application.........................................
More informationComodo Unknown File Hunter Software Version 2.1
rat Comodo Unknown File Hunter Software Version 2.1 Administrator Guide Guide Version 2.1.061118 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo
More informationZENworks Reporting System Reference. January 2017
ZENworks Reporting System Reference January 2017 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent
More informationUser Scripting April 14, 2018
April 14, 2018 Copyright 2013, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationFile Reputation Filtering and File Analysis
This chapter contains the following sections: Overview of, page 1 Configuring File Reputation and Analysis Features, page 5 File Reputation and File Analysis Reporting and Tracking, page 14 Taking Action
More informationIntroduction to application management
Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to
More informationEkran System v Program Overview
Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation
More informationContents. Common Site Operations. Home actions. Using SharePoint
This is a companion document to About Share-Point. That document describes the features of a SharePoint website in as much detail as possible with an emphasis on the relationships between features. This
More informationComodo One Software Version 3.3
rat Comodo One Software Version 3.3 Patch Management Module Administrator Guide Guide Version 2.2.101316 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1 Introduction
More information<Partner Name> RSA NETWITNESS Intel Feeds Implementation Guide. Kaspersky Threat Feed Service. <Partner Product>
RSA NETWITNESS Intel Feeds Implementation Guide Kaspersky Jeffrey Carlson, RSA Partner Engineering Last Modified: December 19 th, 2017 Solution Summary Kaspersky Lab offers
More informationDownloading and installing Db2 Developer Community Edition on Red Hat Enterprise Linux Roger E. Sanders Yujing Ke Published on October 24, 2018
Downloading and installing Db2 Developer Community Edition on Red Hat Enterprise Linux Roger E. Sanders Yujing Ke Published on October 24, 2018 This guide will help you download and install IBM Db2 software,
More informationCiphermail Webmail Messenger Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login
More informationRelease Preview Test Plan
Overview of Release Preview Information 1 Overview of Release Preview Information Preparing for Testing Recommended Test Plan Overview of Release Preview Information The Release Preview environment enables
More informationOBIEE. Oracle Business Intelligence Enterprise Edition. Rensselaer Business Intelligence Finance Author Training
OBIEE Oracle Business Intelligence Enterprise Edition Rensselaer Business Intelligence Finance Author Training TABLE OF CONTENTS INTRODUCTION... 1 USER INTERFACE... 1 HOW TO LAUNCH OBIEE... 1 TERMINOLOGY...
More informationUpgrade Instructions. NetBrain Integrated Edition 7.1. Two-Server Deployment
NetBrain Integrated Edition 7.1 Upgrade Instructions Two-Server Deployment Version 7.1a Last Updated 2018-09-04 Copyright 2004-2018 NetBrain Technologies, Inc. All rights reserved. Contents 1. Upgrading
More informationINSTITUTE BUSINESS SYSTEMS IMSS COGNOS REPORT STUDIO GUIDE
INSTITUTE BUSINESS SYSTEMS IMSS COGNOS REPORT STUDIO GUIDE Table of Contents Logging into Cognos... 3 Viewing Summary Information... 6 Running a Report... 6 Rerunning a Report... 9 Comparing Summary Information...
More informationwebsnort Documentation
websnort Documentation Release 0.8 Steve Henderson Jul 04, 2018 Contents 1 Features 3 2 Contents 5 3 Issues 15 Python Module Index 17 i ii Websnort is an Open Source web service for analysing pcap files
More informationSite Activity. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2018 SmarterTools Inc. Site Activity Traffic Traffic Trend This report displays your
More informationThe following topics describe how to work with reports in the Firepower System:
The following topics describe how to work with reports in the Firepower System: Introduction to Reports Introduction to Reports, on page 1 Risk Reports, on page 1 Standard Reports, on page 2 About Working
More informationWorkspace Administrator Help File
Workspace Administrator Help File Table of Contents HotDocs Workspace Help File... 1 Getting Started with Workspace... 3 What is HotDocs Workspace?... 3 Getting Started with Workspace... 3 To access Workspace...
More informationWorking with Reports
The following topics describe how to work with reports in the Firepower System: Introduction to Reports, page 1 Risk Reports, page 1 Standard Reports, page 2 About Working with Generated Reports, page
More informationTwo factor authentication for Apache using mod_auth_radius
Two factor authentication for Apache using mod_auth_radius sandbox-logintc.com/docs/connectors/apache.html Introduction LoginTC makes it easy for administrators to add multi-factor to Apache. This document
More informationQualys Cloud Suite 2.30
Qualys Cloud Suite 2.30 Here s what s new in Qualys Cloud Suite 2.30! AssetView ThreatPROTECT Dynamic tag support for Amazon EC2 Metadata Search Assets by Amazon EC2 Metadata Cloud Agent Download Search
More informationJexus Web Server Documentation
Jexus Web Server Documentation Release 5.8 Lex Li December 29, 2017 Contents 1 Topics 1 1.1 Getting Started.............................................. 1 1.2 Tutorials.................................................
More informationAccessData Forensic Toolkit 5.5 Release Notes
AccessData Forensic Toolkit 5.5 Release Notes Document Date: 8/20/2014 2014 AccessData Group, Inc. All rights reserved Introduction This document lists the new features, fixed issues, and known issues
More informationThis guide assumes that you are setting up a masternode for the first time. You will need:
KRT MN Guide Setting up a masternode requires a basic understanding of Linux and blockchain technology, as well as the ability to follow instructions closely. It also requires regular maintenance and careful
More informationCisco Threat Awareness Service - Quick Start Guide. Last Updated: 16/06/16
Cisco Threat Awareness Service - Quick Start Guide. Last Updated: 16/06/16 Contents Introduction... 1 Intended Use... 1 Portal Navigation... 2 Registering a Network Resource... 2 Adding the Network Resource
More informationSimulation Manager Configuration Guide
Cornell University College of Veterinary Medicine Student Training Simulation Project Simulation Manager Configuration Guide 2018-Oct-1 Version 1.9 Prepared by: I-Town Design David Weiner 117 Burleigh
More informationon CentOS 6.4 using Nginx
How to install RADIUSdesk on CentOS 6.4 using Nginx Freddy FALANGA With this document you will install step by step RADIUSdesk on CentOS 6.4 32 bits using nginx web server. Important This installation
More informationComodo SecureBox Management Console Software Version 1.9
6. Comodo SecureBox Management Console Software Version 1.9 Administrator Guide Guide Version 1.9.032817 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to
More informationAppendix A. Operating System Support Plan for the Test Delivery System
Appendices Secure Browser Configuration Proxy Settings for Desktop Secure Browsers Appendix A. Operating System Support Plan for the 2018 19 Test Delivery System A supported operating system is one for
More informationBIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0
BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web
More informationEveBox Documentation. Release. Jason Ish
EveBox Documentation Release Jason Ish Jan 25, 2018 Contents: 1 Installation 1 2 Server 3 2.1 Running................................................. 3 2.2 Oneshot Mode..............................................
More informationDocumentation for the new Self Admin
Documentation for the new Self Admin The following documentation describes the structure of the new Self Admin site along with the purpose of each site section. The improvements that have been made to
More informationSmart Install in LMS CHAPTER
CHAPTER 6 Smart Install (SI) is a plug-and-play configuration and image management feature that provides zero-touch deployment for new switches. You can configure SI on a switch which will then be the
More informationSetting up Docker Datacenter on VMware Fusion
Setting up Docker Datacenter on VMware Fusion With the release of Docker Datacenter, it seemed like a good idea to kick the tires on this new system to get a handle on what the experience is like installing,
More informationQuickReports Guide. Creating a New Report
QuickReports Guide Use QuickReports to produce lists, summaries and charts from the data in SupportDesk. Reports are accessed from the QuickReports option in the menu topbar. Clicking the QuickReports
More informationLogging into the Firepower System
The following topics describe how to log into the Firepower System: Firepower System User Accounts, on page 1 User Interfaces in Firepower Management Center Deployments, on page 3 Logging Into the Firepower
More informationSoftware Transfer Document. SensUs Digital. Valedictorian. Version July 6, 2017
Valedictorian Software Transfer Document Version 1.0.0 Project team J.M.A. Boender 0978526 R. Coonen 0902230 R.A.T. van Dijk 0864724 H.R. Galioulline 0927184 B.A.M. van Geffen 0892070 A.A.W.M. de Kroon
More informationARCHER Collaborative Workspace
ARCHER 1.0 ARCHER Collaborative Workspace System Administrator s Guide Installation Configuration Maintenance Overview... 3 Components... 3 Configuration... 5 Pre-requisites... 5 Installing Archer Collaborative
More informationPatch Server for Jamf Pro Documentation
Patch Server for Jamf Pro Documentation Release 0.7.0 Bryson Tyrrell Mar 16, 2018 Contents 1 Change History 3 2 Setup the Patch Server Web Application 7 3 Add Your Patch Server to Jamf Pro 11 4 API Authentication
More informationOn the Surface. Security Datasheet. Security Datasheet
Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record
More informationSIMSme Management Cockpit Documentation
Introduction SIMSme Management Cockpit Documentation Version 2.1 February 2018 Table of Contents 1 INTRODUCTION... 2 2 USERS... 3 3 LICENSES... 5 4 GROUPS... 7 5 CHANNELS... 8 6 DASHBOARD...10 7 APP SETTINGS...12
More informationCMX Dashboard Visitor Connect
CHAPTER 11 Cisco CMX Visitor Connect is a guest access solution based on Mobility Services Engine (MSE), Cisco Wireless LAN Controller (WLC) and Lightweight Access points (AP). The CMX Visitor Connect
More informationInstallation 3. Minimum system requirements 3. Download and installation on Windows 3. Download and installation on Linux 3
2 TABLE OF CONTENTS Installation 3 Minimum system requirements 3 Download and installation on Windows 3 Download and installation on Linux 3 Mail server configuration 4 Out-of-the-box integrations 4 ServiceDesk
More informationEveBox Documentation. Jason Ish
Jason Ish May 29, 2018 Contents: 1 Installation 1 2 Server 3 2.1 Running................................................. 3 2.2 Oneshot Mode.............................................. 4 2.3 Authentication..............................................
More informationData Explorer: User Guide 1. Data Explorer User Guide
Data Explorer: User Guide 1 Data Explorer User Guide Data Explorer: User Guide 2 Contents About this User Guide.. 4 System Requirements. 4 Browser Requirements... 4 Important Terminology.. 5 Getting Started
More information07/20/2016 Blackbaud Altru 4.91 Reports US 2016 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any
Reports Guide 07/20/2016 Blackbaud Altru 4.91 Reports US 2016 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,
More informationWordPress Maintenance For Beginners
WordPress Maintenance For Beginners Content Pages, posts, users, links, widgets, menus, comments, products, etc. Media Images, documents, videos, music, etc. Plugins Function, features, and facilities.
More informationAnomali ThreatStream IBM Resilient App
Anomali ThreatStream IBM Resilient App IBM Resilient App Guide Release: 2.0.1 August 24, 2018 Copyright Notice 2018 Anomali, Incorporated. All rights reserved. ThreatStream is a registered servicemark.
More informationWordPress Maintenance For Beginners
WordPress Maintenance For Beginners Content Pages, posts, users, links, widgets, menus, comments, products, etc. Media Images, documents, videos, music, etc. Plugins Function, features, and facilities.
More informationACTIVE Net Insights user guide. (v5.4)
ACTIVE Net Insights user guide (v5.4) Version Date 5.4 January 23, 2018 5.3 November 28, 2017 5.2 October 24, 2017 5.1 September 26, 2017 ACTIVE Network, LLC 2017 Active Network, LLC, and/or its affiliates
More informationInterface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)
McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1
More informationMicrosoft Windows SharePoint Services
Microsoft Windows SharePoint Services SITE ADMIN USER TRAINING 1 Introduction What is Microsoft Windows SharePoint Services? Windows SharePoint Services (referred to generically as SharePoint) is a tool
More informationCS 410/510: Web Security X1: Labs Setup WFP1, WFP2, and Kali VMs on Google Cloud
CS 410/510: Web Security X1: Labs Setup WFP1, WFP2, and Kali VMs on Google Cloud Go to Google Cloud Console => Compute Engine => VM instances => Create Instance For the Boot Disk, click "Change", then
More informationHOSTED CONTACT CENTRE
---------------------------------------------------------------------------- ------ HOSTED CONTACT CENTRE ANALYTICS GUIDE Version 9.4 Revision 1.0 Confidentiality and Proprietary Statement This document
More informationA Guide to Automation Services 8.5.1
A Guide to Automation Services 8.5.1 CONTENTS Contents Introduction...4 Where we're coming from...4 Conventions in this book...4 Understanding Automation Services...6 What is Automation Services?...6 Process
More informationBBVA Compass Spend Net Payables
User Guide BBVA Compass Spend Net Payables User Guide Vault Services Table of Contents Introduction 2 Technical Requirements 2 Getting started 3 Sign In 3 General Navigation 4 Upload/Create Payment 5
More informationGetting Started Guide
Getting Started Guide for education accounts Setup Manual Edition 7 Last updated: September 15th, 2016 Note: Click on File and select Make a copy to save this to your Google Drive, or select Print, to
More information0. Introduction On-demand. Manual Backups Full Backup Custom Backup Store Your Data Only Exclude Folders.
Backup & Restore 0. Introduction..2 1. On-demand. Manual Backups..3 1.1 Full Backup...3 1.2 Custom Backup 5 1.2.1 Store Your Data Only...5 1.2.2 Exclude Folders.6 1.3 Restore Your Backup..7 2. On Schedule.
More informationhalef Documentation ETS
ETS Apr 02, 2018 Contents 1 OpenVXML Without Tears 1 2 Halef Setup Process 19 i ii CHAPTER 1 OpenVXML Without Tears 1 Authors Vikram Ramanarayanan and Eugene Tsuprun (with inputs from the OpenVXML Setup
More informationNintex Reporting 2008 Help
Nintex Reporting 2008 Help Last updated: Thursday, 24 December 2009 1 Using Nintex Reporting 2008 1.1 Chart Viewer Web Part 1.2 Importing and Exporting Reports 1.3 Import Nintex report page 1.4 Item Level
More informationTwo factor authentication for Apache using mod_auth_xradius
Two factor authentication for Apache using mod_auth_xradius sandbox-logintc.com/docs/connectors/apache_alt.html Introduction LoginTC makes it easy for administrators to add multi-factor to Apache. This
More informationCSCI 201 Lab 1 Environment Setup
CSCI 201 Lab 1 Environment Setup "The journey of a thousand miles begins with one step." - Lao Tzu Introduction This lab document will go over the steps to install and set up Eclipse, which is a Java integrated
More informationOpenEMR Insights Configuration Instructions
OpenEMR Insights provides ETL and Dashboards to enhance your OpenEMR intelligence backed by Pentaho CE and Saiku Analytics CE. To see OpenEMR Insights in action, head over to www.oemr.org. There you will
More informationSetting up a LAMP server
Setting up a LAMP server What is a LAMP? Duh. Actually, we re interested in... Linux, Apache, Mysql, and PHP A pretty standard web server setup Not the only technology options! Linux Pick any! Common choices
More informationStyle Report Enterprise Edition
INTRODUCTION Style Report Enterprise Edition Welcome to Style Report Enterprise Edition! Style Report is a report design and interactive analysis package that allows you to explore, analyze, monitor, report,
More informationrat Comodo Valkyrie Software Version 1.1 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
rat Comodo Valkyrie Software Version 1.1 Administrator Guide Guide Version 1.1.122415 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo Valkyrie...
More informationInstallation and Upgrade Guide Zend Studio 9.x
Installation and Upgrade Guide Zend Studio 9.x By Zend Technologies, Inc. www.zend.com Disclaimer The information in this document is subject to change without notice and does not represent a commitment
More informationEMARSYS FOR MAGENTO 2
EMARSYS FOR MAGENTO 2 Integration Manual July 2017 Important Note: This PDF was uploaded in July, 2017 and will not be maintained. For the latest version of this manual, please visit our online help portal:
More informationLyna Framework Documentation
Lyna Framework Documentation Release 0.1 Nicolas Bounoughaz June 12, 2015 Contents 1 Features 3 2 Contribute 5 3 Support 7 4 License 9 5 Get started 11 5.1 Installation................................................
More informationInstalling MediaWiki using VirtualBox
Installing MediaWiki using VirtualBox Install VirtualBox with your package manager or download it from the https://www.virtualbox.org/ website and follow the installation instructions. Load an Image For
More informationTable of Contents. Developer Manual...1
Table of Contents Developer Manual...1 API...2 API Overview...2 API Basics: URL, Methods, Return Formats, Authentication...3 API Errors...4 API Response Examples...6 Get Articles in a Category...6 Get
More informationUSER GUIDE for Salesforce
for Salesforce USER GUIDE Contents 3 Introduction to Backupify 5 Quick-start guide 6 Administration 6 Logging in 6 Administrative dashboard 7 General settings 8 Account settings 9 Add services 9 Contact
More informationWorking with Reports. User Roles Required to Manage Reports CHAPTER
CHAPTER 10 Cisco Prime Network (Prime Network) provides a Report Manager that enables you to schedule, generate, view, and export reports of the information managed by Prime Network. You can save the generated
More informationGeneral Features Guide
General Features Guide 11/01/2017 Blackbaud Altru 4.98 General Features US 2017 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means,
More informationReporting Guide V7.0. iprism Web Security
V7.0 iprism Web Security 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo, iprism and iguard are trademarks of EdgeWave Inc. All other trademarks and registered
More informationDCLI User's Guide. Data Center Command-Line Interface 2.7.0
Data Center Command-Line Interface 2.7.0 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware Web site also provides the latest product
More informationDCLI User's Guide. Data Center Command-Line Interface
Data Center Command-Line Interface 2.10.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit
More informationInstallation and Upgrade Guide Zend Studio 9.x
Installation and Upgrade Guide Zend Studio 9.x By Zend Technologies, Inc. www.zend.com Disclaimer The information in this document is subject to change without notice and does not represent a commitment
More informationZephyr Kernel Installation & Setup Manual
Zephyr Kernel Installation & Setup Manual Zephyr kernel is a small footprint Single address space OS, i.e, it combines application specific code with a custom kernel to create a monolithic image that gets
More informationBitnami Piwik for Huawei Enterprise Cloud
Bitnami Piwik for Huawei Enterprise Cloud Description Piwik is a real time web analytics software program. It provides detailed reports on website visitors: the search engines and keywords they used, the
More informationSetting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1
Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date
More informationCloud Computing II. Exercises
Cloud Computing II Exercises Exercise 1 Creating a Private Cloud Overview In this exercise, you will install and configure a private cloud using OpenStack. This will be accomplished using a singlenode
More informationMarkLogic Server. Information Studio Developer s Guide. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved.
Information Studio Developer s Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Information
More information