Security Edge Filter For Lync Server 2013, 2010 and Office Communications Server 2007 R2

Size: px
Start display at page:

Download "Security Edge Filter For Lync Server 2013, 2010 and Office Communications Server 2007 R2"

Transcription

1 Security Edge Filter For Lync Server 2013, 2010 and Office Communications Server 2007 R2 Lync-Solutions.com

2 Version Version Date Author Remarks /05/2011 Fabian Kunz Initial draft created /29/2011 Rui Maximo Edited /1/2012 Fabian Kunz Updated screenshots in section, Security Filter in Action /2/2012 Fabian Kunz Updated screenshots order in section, Installation on the Lync Edge Server /19/2013 Rui Maximo Update PowerShell registration commands. Current Document properties Property Status Status Final Publish date 11/22/2013 Lync-Solutions.com 2013 all rights reserved. This document is intellectual property of Lync-Solutions.com. No duplication or distribution allowed without written notice of the owner. No distribution outside the customer s organization allowed.

3 Table of contents

4 1 Introduction This documentation describes the requirements and installation procedure for the Standard Edition version of the Security Filter. 1.1 Problem: Denial of Service (DoS) Why are DoS attacks disruptive to your organization? Here are the most common reasons: Each failed authentication attempt to your extranet counts in Active Directory as a failed login. It becomes trivial for a remote attacker to lock out any of your AD accounts if they know (or can guess) the login name. No further credentials or privilege is required for this attack. In severe cases such as a distributed denial of service attack, this can represent a substantial vulnerability to your network. 1.2 Solution The Security Filter augments the capabilities of Microsoft s Lync Edge Server to allow a soft lockout. Security Filter is designed to tract denied authentication attempts and block further login attempts before the AD lockout limit is reached. This provides an additional tier of account security, safely locking the account out of the extranet. Security Filter prevents password guessing on the extranet by blocking authentication attempts for that account once the number of failed authentication attempts reaches a threshold. Even when the account is locked out from the extranet, the user can still login from within your corporate network or through a VPN. Thus, the DoS risk is substantially mitigated, with a minimum inconvenience. Security Filter can enforce external users to login to Lync Server from a corporate issued computer. By blocking NTLM authentication, external users are forced to sign-in using TLS- DSK authentication, which requires a client certificate to be installed on the user s computer when connected to the corporate network.

5 2 Functionality In this extraordinarily interconnected world, companies want to allow the utmost flexibility and mobility for their employees, many of whom may work remotely. Consequently, almost every organization exposes services to the Internet. However, there s always the threat of attacks. Companies are particularly concerned with Denial of Service (DoS) and password brute-force attacks. These types of attacks can be disruptive to users and consume internal server resources. The primary trouble with DoS attacks is that they re nearly indistinguishable from legitimate signin requests. The only differentiation is the frequency of sign-in attempts and their origin. A large number of sign-in attempts in rapid succession can be indicative of a DoS attack. Most DoS attacks attempt to guess the user s password to gain unauthorized access. They often result in locking out the user account if the security policy is enabled in Active Directory Domain Services, and has a maximum number of log-in attempts. The Microsoft Lync Edge Server protects against unauthorized access using industry-standard security measures. It monitors sign-in requests and enforces account lockout at the network perimeter. All communications are encrypted and authenticated. Edge Server does not protect against DoS attacks. However, Lync Server provides a flexible programming platform you can use to create server applications to intercept Session Initiation Protocol (SIP) messages on the server and perform specialized logic using the Microsoft SIP Processing Language (MSPL). This is how the security filter operates. It inspects all incoming sign-in requests on the Edge Server. The remote user is not authenticated at the Edge Server, so the sign-in request is passed to the Director or directly to the internal pool, which then performs the authentication process. The response is then passed back to the Edge Server. The security filter inspects both the request and the response. If the sign-in fails, the security filter tracks the number of failed attempts for each user account. The next time a client attempts to sign in to the same user account, and the number of failed attempts exceeds the maximum number of allowed sign-in attempts, the security filter immediately rejects the request without passing the request to the Director or internal pool for authentication. By enforcing account lockout at the Edge Server, the security filter blocks DoS attacks at the edge of the network perimeter. As a result, the security filter protects the internal Lync Server resources. Using the security filter to prevent Windows NT LAN Manager (NTLM) version 2 authentication, companies can force users to only sign in from authorized company-issued laptops. With

6 additional security measures (like using BitLocker and Group Policy to prevent users from installing unauthorized software), the corporate-issued laptops can themselves serve as a smartcard to provide two-factor authentication. To prevent brute-force attacks on user accounts, many organizations enforce an Active Directory Group Policy to lock out the account after a certain number of failed attempts. The side effect of this countermeasure is that the attacker can lock out a user s account by simply launching multiple attempts. This amounts to a DoS attack. If the account isn t protected by an Active Directory Group Policy, the attacker can use this type of brute-force attack on the user s password. These attacks use up valuable internal server resources and deny users access to their account. Uniquely identifying the user can prevent attacks on user accounts. There are several options with which to do this. You could use the source IP address, the sign-in name (that is, the SIP URI), the account name or even a combination of any of these options. After investigating each option, it seems that rogue clients mounting a DoS attack could spoof the source IP address, eliminating this choice as a way to uniquely identify the user. The sign-in name, although required to successfully sign in to Lync Server, does not authenticate the user. A sign-in name can be varied during sign-in requests, yet still lock out the same user account. Therefore, neither the source IP address nor the sign-in name are good sources with which to identify the user. Only the account name uniquely identifies the user account. You can only extract the account name, which consists of the user name and domain name, from the authentication protocol. Remote users trying to sign in and authenticate use the NTLM v2 protocol, not Kerberos. The NTLM protocol uses a three-stage handshake authentication process. The client passes the user s credentials in the third stage of the NTLM handshake. The security filter runs as a trusted server application on the Edge Server, so it s allowed to intercept this sign-in request. The security filter decodes the user name and domain name from the NTLM authentication message. Because the account name isn t available in the response, the security filter maps the response to the request using the message ID. When either the internal pool or the Director sends the authentication response to the Edge Server, the security filter captures the Register response. If the sign-in failed, the security filter counts the failed attempts. If the sign-in succeeds, the security filter resets the count of failed attempts to zero. Every time the Edge Server receives a sign-in request, it s passed to the security filter. It checks whether the sign-in request has exceeded the maximum number allowed for that particular user

7 account. If the request has not exceeded the maximum lockout count permitted, the security filter allows the request to continue to either the internal pool or the Director. If the request exceeds the maximum lockout count permitted, the security filter blocks the request and returns a 403 response. This summarily rejects the request. Any further sign-in attempts are rejected for the duration of the lockout period. After the lockout period expires, it s reset to permit new sign-in requests. One problem can occur when users sign in from a computer not joined to the corporate Active Directory domain. Lync 2013/2010 can automatically attempt to sign in using the user s local computer credentials. Because those credentials aren t corporate domain credentials, the authentication will fail. The user will eventually be blocked from signing in to Lync Server. To prevent the security filter from locking out valid users, it doesn t count these attempts against the user. Lync Server 2010 introduces support for an additional authentication protocol called TLS-DSK. This requires users to supply a client certificate for authentication. The Lync client requests certificates from Lync Server. This is an automatic process that happens the first time the user signs in to Lync Server from within the corporate network where the user is authenticated using Kerberos. This client certificate is used for authentication with any subsequent log-in attempts. This is a selfsigned certificate issued by Lync Server, not a Certificate Authority. If that same user tries to sign in to Lync from a different computer, he s authenticated using Kerberos (if inside the corporate network) or using NTLM v2 (if outside the corporate network). The process of obtaining another client certificate starts all over. TLS-DSK provides a level of security that s very close to two-factor authentication. When combined with Windows BitLocker, the computer or laptop acts as the equivalent of a smartcard (something you have). The password that BitLocker requires to boot your computer is equivalent to the pin required to authorize the use of the smartcard (something you know). There s the remote possibility someone could steal the client certificate from the user s computer, but you can mitigate this risk. Make sure corporate-issued computers are locked down to prevent users from downloading unauthorized applications. You can force the Edge Server to negotiate the authentication protocol down from TLS-DSK to NTLM v2. In this case, the attacker can still target the user s account, as discussed earlier. To prevent this scenario, the security filter provides an option to reject all NTLM v2 authentication requests, forcing TLS-DSK-only authentication. This doesn t affect federated partner connections or PIC connections.

8 3 Security Filter Design The Security Filter registers with the Edge Server where it is collocated. It intercepts all SIP REGISTER requests, extracts the user s unique login name, and tracks the number of failed login responses sent back to the remote client. When the number of failed login attempts exceeds an administrator specified threshold, the Security Filter blocks all further login attempts until the lockout period expires. This is illustrated in Figure 1, which describes the Security Filter design. Figure Security Filter Architecture 4 Security Filter Editions The Security Filter is available in two different editions. Standard Edition The Standard Edition is the perfect choice for a single Lync Edge Server deployment. There are no other requirements like a Microsoft SQL Database in the Enterprise Edition version. There is a simple installation procedure for this Edition. Enterprise Edition Deployments with multiple Edge Servers should deploy the Enterprise Edition version of the Security Filter. The Enterprise Edition version is a two-tier architecture. Every Edge Server with the Security Filter installed logs the information about the bad login attempts

9 to a Microsoft SQL Database. This guarantees that all Edge Server shares the same information about the current bad login status. 5 Considerations 5.1 Microsoft Exchange The Security Filter prevents DoS attacks over the Lync Edge Server. You should consider that Lync clients outside of the company network also authenticate users against the Microsoft Exchange environment for accessing the Exchange Availability Service and Unified Messaging information s from the internet. It is strongly recommended to implement a solution with the same functionality for Microsoft Exchange Microsoft Unified Access Gateway (UAG) 2010 If you use Microsoft UAG 2010 for Exchange publishing you can configure similar settings as for the Security Filter in the Advanced Trunk Configuration settings. For more Information about Microsoft UAG visit the Microsoft Technet Site for UAG Microsoft Threat Management Gateway (TMG) 2010 If you use Microsoft TMG 2010 for Lync publishing, consider using the Security Web Filter for TMG to prevent similar kinds of attacks. In addition to DoS and password brute-force attacks, the Security Web Filter performs deep packet inspection for XSS and SOAP layer attacks.

10 6 Requirements The Microsoft.NET 4 Framework must be installed with the latest available patches for the.net Framework on the Lync Edge Server before you start the Security Filter installation. Create a service account on the Lync Edge Server and make this account a member of the RTC Server Applications group (see Figure 2). Figure Service account for the Security Filter 7 Install Procedure 7.1 Prepare Lync Edge Server Before you can run the Security Filter, you must first register the application with your Edge Server. You only need to do this registration once by taking the following steps. Run these Lync Server 2013/2010 Windows PowerShell cmdlets with Lync Server administrative permissions: 1. Run the following Windows PowerShell cmdlet to register the security_filter application from any Lync Server except the Edge Server. Specify the fully qualified domain name (FQDN) of the Edge Server in the parameter, <Edge Server FQDN>, and KEEP the -uri parameter value set to " new-csserverapplication -identity "EdgeServer:<Edge Server FQDN>/security_filter" -uri " -critical $false

11 2. Run the following Windows PowerShell cmdlet to initiate the replication of Central Management Store configuration to the Edge Server. invoke-csmanagementstorereplication 3. Run the following Windows PowerShell cmdlet on the Edge Server to verify the proper registration of the security_filter. get-csserverapplication -localstore 4. Run the following Windows Powershell cmdlet to enable the application from any Lync Server except the Edge Server. Specify the fully qualified domain name (FQDN) of the Edge Server in the parameter <Edge Server FQDN>. Set-CsServerApplication Identity service:<edge Server FQDN>/security_filter Enabled $true 7.2 Installation on the Lync Edge Server The Security Filter requires the installation of.net 4 Framework and all available patches of this version of the.net 4 Framework. This pre-requisite can be downloaded here. The following table details the installation steps for setting up the Security Filter on your Edge Server. - Once you ve downloaded the Security Filter, run the setup.exe with local administrator privileges. - The Security Filter comprises the following two files: SecurityFilterSetup.msi Setup.exe

12 - Click Next - This page lists the PowerShell cmdlets that must be run to register the Security Filter with your Edge Server. These steps are detailed in the previous section, Preparing Lync Edge Server. - Click Next - Accept the License Agreement - Click Next

13 The Security Filter does not overwrite any changes to Active Directory's lockout counter. That value is managed internally by the domain controllers. For the next 4 screens, specify the following parameters for each unique internal Active Directory (AD) forests you may have. If you have less than four AD forests, leave the fields blank. Nebtios domain: This field specifies one of your internal domain names. This is the domain name used by remote users to authenticate to your internal Lync Servers when connecting through your Edge Server. For example, if your company, Woodgrove Bank, has the following three internal Active Directory forests (a legacy from mergers and acquisitions), woodgrovebank.com, contoso.com and fabrikam.com, and employees have accounts from each of these AD forests, you should specify the Netbios name, "woodgrovebank", as the value for this parameter, and the other two AD forest names,,contoso and fabrikam, in the same field of the subsequent two screens. These domain names are used to verify that remote users who are trying to sign in to Lync Server are connecting using credentials from one of these three domains (e.x. contoso\bob or fabrikam\alice ). Corresponding UPN suffix: The Lync client also allows users to login using their UPN name (e.x. Fabian@contoso.com) instead of their Netbios name (e.x. contoso\fabian). Specify the UPN suffix, for example contoso.com, in this field. - Click Next

14 Specify the lockout count and lockout period. Lockout count: This is the number of failed sign-in attempts that are allowed before an account lock out is enforced. The lockout count value must be set lower than the Account lockout threshold value in Active Directory. If you have multiple domains consider the Account lockout threshold value from all your domains. Lockout period (minutes): This parameter is the account lockout period. After an account is locked out, this lockout period specifies how long the account remains locked before another sign-in attempt is allowed. Any signin attempts during this lockout period are immediately rejected at the Edge Server without being proxied to the internal Lync Server for verification. The defined value should be set to a higher value than the Reset account lockout counter after value in Active Directory. Since the clocks on Lync Edge and the domain controllers may not be synchronized exactly, you should specify a higher value in the security filter settings than in Active Directory, by 3-5 minutes. This mitigates the risk that the Security Filter allows the logon attempt to be proxied by the Edge Server to the internal Lync Server for authentication while the bad password count is still in effect by the Active Directory directory service. You should also ensure that the clocks on the Lync Edge and the domain controllers are not allowed to

15 vary by more than this amount. - Click Next Specify whether remote users are permitted to authenticate using NTLM v.2. Allow remote users to login using NTLM v.2 credentials This option allows remote users to login using NLTM v2 credentials. This means that a user can log in from every computer with a Lync client installed even if this computer is not domain joined to your enterprise Active Directory and is an authorized computer. For example, select this option if your company allows users to login from their home PC s. Disallow remote users to login using NTLM v.2 credentials This option forces remote users to login using an authorized company-issued computer. With additional security measures (using BitLocker and Group Policy to prevent users from installing unauthorized software), the corporate-issued laptops can themselves serve as a smartcard to provide two-factor authentication. - Click Next

16 - To install the Security Filter to a different folder, specify the new path in the Folder field or click Browse. - Click Next - Click Next - Click Close

17 - Open the Services Management Console. - Locate the Security Filter service. - Modify the log on settings of the Security Filter service and specify the previously created service account. - Restart the Service 8 Security Filter in Action The Security Filter logs by default all information about login attempts and service interactions in the Application Windows Logs. The following table illustrates examples of possible event log entries. 1 st bad login attempt

18 Maximum bad login attempts reached and lockout enforced Lockout still enforced for an already blocked user

19 NTLM v2 login attempt rejected. Security Filter is configured only for TLS-DSK authentication and blocks NTLM v2 authentication. 9 Configuration The Security Filter installs all files to the default location, %ProgramFiles%\MB\Security Filter, during the installation process. All of the installation settings can be modified after the installation is complete from the file, security_filter_svc.exe.config. <?xml version="1.0" encoding="utf-8"?> <configuration> <appsettings> <add key="domaina" value="contoso" />

20 <add key="upna" value="contoso.com" /> <add key="domainb" value="" /> <add key="upnb" value="" /> <add key="domainc" value="" /> <add key="upnc" value="" /> <add key="domaind" value="" /> <add key="upnd" value="" /> <add key="count" value="5" /> <add key="period" value="10" /> <add key="disablentlm" value="false" /> <add key="path" value="c:\program Files\MB\Security Filter\" /> <add key="loglevel" value="verbose" /> </appsettings> </configuration> It s important to restart the Security Filter service once a change is made to make the new settings take effect. 10 Monitoring Enterprise IT environments with System Center Operations Manager (SCOM) can easily monitor bad login attempts and lockout enforcement from the Application Event Log. The most important event log entries are listed in the section, Security filter in Action.

MU2b Authentication, Authorization and Accounting Questions Set 2

MU2b Authentication, Authorization and Accounting Questions Set 2 MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2

More information

Exam Identity with Windows Server 2016

Exam Identity with Windows Server 2016 MCSA / MCSE for Windows Server 2016 Exam 70-742 Identity with Windows Server 2016 Version 15.35 (198 Questions) (70-742) Identify with Windows Server 2016 QUESTION 1 You have a server named Server1 that

More information

User Databases. ACS Internal Database CHAPTER

User Databases. ACS Internal Database CHAPTER CHAPTER 12 The Cisco Secure Access Control Server Release 4.2, hereafter referred to as ACS, authenticates users against one of several possible databases, including its internal database. You can configure

More information

Microsoft Designing and Implementing a Server Infrastructure. Download Full Version :

Microsoft Designing and Implementing a Server Infrastructure. Download Full Version : Microsoft 70-413 Designing and Implementing a Server Infrastructure Download Full Version : http://killexams.com/pass4sure/exam-detail/70-413 Explanation: Invoke-IpamGpoProvisioning Creates and links group

More information

CISNTWK-11. Microsoft Network Server. Chapter 4

CISNTWK-11. Microsoft Network Server. Chapter 4 CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows

More information

News and Updates June 1, 2017

News and Updates June 1, 2017 Microsoft Azure News and Updates June 1, 2017 Azure Backup for Windows Server System State Modern Backup Storage with Azure Backup Server v2 vcenter/esxi 6.5 support for Azure Backup Server Larger Disk

More information

Cisco VCS Authenticating Devices

Cisco VCS Authenticating Devices Cisco VCS Authenticating Devices Deployment Guide First Published: May 2011 Last Updated: November 2015 Cisco VCS X8.7 Cisco Systems, Inc. www.cisco.com 2 About Device Authentication Device authentication

More information

MANAGING LOCAL AUTHENTICATION IN WINDOWS

MANAGING LOCAL AUTHENTICATION IN WINDOWS MANAGING LOCAL AUTHENTICATION IN WINDOWS Credentials Manager Windows OS has a set of tools that help remedy some of the authentication challenges. For example, the Credential Manager in Windows 7 and newer

More information

Computer Networks Lab Lab 3 Managing User and Computer Accounts. Prepared By: Eng.Ola M. Abd El-Latif

Computer Networks Lab Lab 3 Managing User and Computer Accounts. Prepared By: Eng.Ola M. Abd El-Latif Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Lab 3 Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives Define user and computer account. Describe

More information

Centrify for Dropbox Deployment Guide

Centrify for Dropbox Deployment Guide CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of

More information

Pass Microsoft Exam

Pass Microsoft Exam Pass Microsoft 98-367 Exam Number: 98-367 Passing Score: 700 Time Limit: 45 min File Version: 51.0 http://www.gratisexam.com/ Pass Microsoft 98-367 Exam Exam Name: Security Fundamentals Certdumps QUESTION

More information

Yubico with Centrify for Mac - Deployment Guide

Yubico with Centrify for Mac - Deployment Guide CENTRIFY DEPLOYMENT GUIDE Yubico with Centrify for Mac - Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

Remote Desktop Security for the SMB

Remote Desktop Security for the SMB A BWW Media Group Brand Petri Webinar Brief October 5th, 2018 Remote Desktop Security for the SMB Presenter: Michael Otey Moderator: Brad Sams, Petri IT Knowledgebase, Executive Editor at Petri.com There

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

Password Reset Server Installation

Password Reset Server Installation Password Reset Server Installation Vista/Server 08 and Windows 7/Server 2008 R2 Table of Contents I. Requirements... 4 A. System Requirements... 4 B. Domain Account Requirements... 5 C. Recommendations...

More information

System Structure. Steven M. Bellovin December 14,

System Structure. Steven M. Bellovin December 14, System Structure Steven M. Bellovin December 14, 2015 1 Designing a System We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin December 14, 2015

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Microsoft Unified Access Gateway 2010

Microsoft Unified Access Gateway 2010 RSA SecurID Ready Implementation Guide Partner Information Last Modified: March 26, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description Microsoft www.microsoft.com

More information

Microsoft Office 365. Identity Beta Service Description. Published: March 2011

Microsoft Office 365. Identity Beta Service Description. Published: March 2011 Microsoft Office 365 Identity Beta Service Description : The information contained in this document relates to pre-release software and services, which may be substantially modified before the first commercial

More information

NETWORK THREATS DEMAN

NETWORK THREATS DEMAN SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments

More information

Windows 10 and the Enterprise. Craig A. Brown Prepared for: GMIS

Windows 10 and the Enterprise. Craig A. Brown Prepared for: GMIS Windows 10 and the Enterprise Craig A. Brown Prepared for: GMIS 11-2-2015 Introduction Craig A. Brown Microsoft Practice Leader Global Knowledge MCT, Since 1996 MCSA / MCSE / NT / 2000 / 2003 MCDST MCITP:

More information

INSTALLATION GUIDE Spring 2017

INSTALLATION GUIDE Spring 2017 INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and

More information

Installation and configuration guide

Installation and configuration guide Winfrasoft HAS Installation and Configuration Guide Installation and configuration guide Winfrasoft HAS for Microsoft Forefront UAG 2010 Published: October 2011 Applies to: Winfrasoft HAS (Build 2.0.2300.4)

More information

MCSA Windows Server 2012

MCSA Windows Server 2012 MCSA Windows Server 2012 This Training Program prepares and enables learners to Pass Microsoft MCSA: Windows Server 2012 exams 1. MCSA: Windows Server 2012 / 70-410 Exam (Installing and Configuring Windows

More information

exam.75q. Number: Passing Score: 800 Time Limit: 120 min File Version: 1. Microsoft

exam.75q. Number: Passing Score: 800 Time Limit: 120 min File Version: 1. Microsoft 70-742.exam.75q Number: 70-742 Passing Score: 800 Time Limit: 120 min File Version: 1 Microsoft 70-742 Identity with Windows Server 2016 Exam A QUESTION 1 Note: This question is part of a series of questions

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

Integrating Microsoft Forefront Threat Management Gateway (TMG)

Integrating Microsoft Forefront Threat Management Gateway (TMG) Integrating Microsoft Forefront Threat Management Gateway (TMG) EventTracker v7.x Publication Date: Sep 16, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This

More information

VMware Horizon Session Recording Fling:

VMware Horizon Session Recording Fling: VMware Horizon Session Recording Fling: The VMware Horizon Session Recording fling allows administrators to record VMware Blast Extreme sessions to a central server for playback. These recordings can be

More information

Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs)

Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs) Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs) Microsoft Corporation Published: June 2004 Abstract This white paper describes how to configure

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

Credential Policy CHAPTER

Credential Policy CHAPTER CHAPTER 21 Cisco Unified Communications Manager authenticates user login credentials before allowing system access. To help secure user accounts, you can specify settings for failed logon attempts, lockout

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

Algo Lync Interface for 8180 SIP Audio Alerter User Guide

Algo Lync Interface for 8180 SIP Audio Alerter User Guide Algo Lync Interface for 8180 SIP Audio Alerter User Guide Introduction The Algo Lync Interface uses the Microsoft UCMA 4.0 framework to enable Algo 8180 SIP Audio Alerter devices to register indirectly

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

Microsoft Selftestengine Exam Questions & Answers

Microsoft Selftestengine Exam Questions & Answers Microsoft Selftestengine 70-337 Exam Questions & Answers Number: 70-337 Passing Score: 800 Time Limit: 120 min File Version: 32.4 http://www.gratisexam.com/ Microsoft 70-337 Exam Questions & Answers Exam

More information

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017 Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Oracle Communications Services Gatekeeper

Oracle Communications Services Gatekeeper Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or

More information

PRO: Microsoft Lync Server 2010, Administrator

PRO: Microsoft Lync Server 2010, Administrator Microsoft 70665 PRO: Microsoft Lync Server 2010, Administrator Version: 7.2 Topic 1, A.Datum Corporation Microsoft 70665 Exam Company Overview A. Datum Corporation is a market research company that has

More information

Application User Configuration

Application User Configuration CHAPTER 87 The following topics contain information on managing application user information: Settings, page 87-1 Adding an Administrator User to Cisco Unity or Cisco Unity Connection, page 87-6 Changing

More information

DIGIPASS Authentication for Check Point VPN-1

DIGIPASS Authentication for Check Point VPN-1 DIGIPASS Authentication for Check Point VPN-1 With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 51 Disclaimer Disclaimer of Warranties and

More information

Identity Provider for SAP Single Sign-On and SAP Identity Management

Identity Provider for SAP Single Sign-On and SAP Identity Management Implementation Guide Document Version: 1.0 2017-05-15 PUBLIC Identity Provider for SAP Single Sign-On and SAP Identity Management Content 1....4 1.1 What is SAML 2.0.... 5 SSO with SAML 2.0.... 6 SLO with

More information

The Windows Server 2008 R2 Schema Extension Must Be Applied To The Ad Schema For The Forest

The Windows Server 2008 R2 Schema Extension Must Be Applied To The Ad Schema For The Forest The Windows Server 2008 R2 Schema Extension Must Be Applied To The Ad Schema For The Forest For Windows Server 2003 R2, see Extending Your Active Directory Schema in Windows of an AD DS installation or

More information

Dameware ADMINISTRATOR GUIDE. Version Last Updated: October 18, 2017

Dameware ADMINISTRATOR GUIDE. Version Last Updated: October 18, 2017 ADMINISTRATOR GUIDE Dameware Version 12.0 Last Updated: October 18, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/dameware_remote_support_mini_remote_control 2017

More information

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

RSA Authentication Manager 7.1 Help Desk Administrator s Guide RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

Microsoft Recertification for MCSE: Server Infrastructure. Download Full Version :

Microsoft Recertification for MCSE: Server Infrastructure. Download Full Version : Microsoft Recertification for MCSE: Server Infrastructure Download Full Version : https://killexams.com/pass4sure/exam-detail/ Answer: C QUESTION: 99 Your company has an office in New York. Many users

More information

Deployment of Unified Communication - Lync Server 2013 Steps: Lync Front End Server in a Domain. Few Screen Shots. Scroll down to start your drill

Deployment of Unified Communication - Lync Server 2013 Steps: Lync Front End Server in a Domain. Few Screen Shots. Scroll down to start your drill Deployment of Unified Communication - Lync Server 2013 Steps: Lync Front End Server in a Domain Few Screen Shots Scroll down to start your drill 1. Install Fresh Server 2012 2. Configure Static IP 3. Join

More information

Grandstream Networks, Inc. UCM series IP PBX Security Manual

Grandstream Networks, Inc. UCM series IP PBX Security Manual Grandstream Networks, Inc. UCM series IP PBX Security Manual Table of Contents OVERVIEW... 4 WEB UI ACCESS... 5 UCM HTTP Server Access... 5 Protocol Type... 5 User Login... 6 Login Settings... 8 User Management

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

Vendor: Microsoft. Exam Code: Exam Name: Managing Office 365 Identities and Requirements. Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Managing Office 365 Identities and Requirements. Version: Demo Vendor: Microsoft Exam Code: 70-346 Exam Name: Managing Office 365 Identities and Requirements Version: Demo Topic 1, Fabrikam, Inc OverView Fabrikam, inc is a financial services organization. Fabrikam

More information

Cloud Access Manager Overview

Cloud Access Manager Overview Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

CTS2134 Introduction to Networking. Module 08: Network Security

CTS2134 Introduction to Networking. Module 08: Network Security CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting

More information

Enable the Always Offline Mode to Provide Faster Access to Files

Enable the Always Offline Mode to Provide Faster Access to Files Enable the Always Offline Mode to Provide Faster Access to Files 13 out of 16 rated this helpful - Rate this topic Published: April 18, 2012 Updated: July 3, 2013 Applies To: Windows 8, Windows 8.1, Windows

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

Remote Administration

Remote Administration Windows Remote Desktop, on page 1 pcanywhere, on page VNC, on page 6 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2012 R2 from a range of devices

More information

Cisco TelePresence Conductor with Cisco Unified Communications Manager

Cisco TelePresence Conductor with Cisco Unified Communications Manager Cisco TelePresence Conductor with Cisco Unified Communications Manager Deployment Guide TelePresence Conductor XC4.0 Unified CM 10.5(2) January 2016 Contents Introduction 6 About this document 6 Related

More information

InterCall Virtual Environments and Webcasting

InterCall Virtual Environments and Webcasting InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT

More information

Grandstream Networks, Inc. UCM6100 Security Manual

Grandstream Networks, Inc. UCM6100 Security Manual Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL

More information

Copyright

Copyright This video will look at configuring the default password policy in Active Directory. These setting determines setting like how long a user password will be, if the password needs to complex, and how many

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Once all of the features of Intel Active Management Technology (Intel

Once all of the features of Intel Active Management Technology (Intel Chapter11 Connecting and Communicating with Intel Active Management Technology Disconnecting from change does not recapture the past. It loses the future. Kathleen Norris, O Magazine, January 2004 Once

More information

TECHNICAL WHITE PAPER AUGUST 2017 REVIEWER S GUIDE FOR VIEW IN VMWARE HORIZON 7: INSTALLATION AND CONFIGURATION. VMware Horizon 7 version 7.

TECHNICAL WHITE PAPER AUGUST 2017 REVIEWER S GUIDE FOR VIEW IN VMWARE HORIZON 7: INSTALLATION AND CONFIGURATION. VMware Horizon 7 version 7. TECHNICAL WHITE PAPER AUGUST 2017 REVIEWER S GUIDE FOR VIEW IN VMWARE HORIZON 7: INSTALLATION AND CONFIGURATION VMware Horizon 7 version 7.x Table of Contents Introduction.... 3 JMP Next-Generation Desktop

More information

Oracle Communications WebRTC Session Controller

Oracle Communications WebRTC Session Controller Oracle Communications WebRTC Session Controller Security Guide Release 7.0 E40975-01 November 2013 Oracle Communications WebRTC Session Controller Security Guide, Release 7.0 E40975-01 Copyright 2013,

More information

TLS Setup. TLS Overview. TLS Prerequisites

TLS Setup. TLS Overview. TLS Prerequisites Setup Overview, page 1 Prerequisites, page 1 Configuration Task Flow, page 2 Interactions and Restrictions, page 8 Overview Transport Layer Security () provides secure and reliable signaling and data transfer

More information

Progressive Authentication in ios

Progressive Authentication in ios Progressive Authentication in ios Genghis Chau, Denis Plotnikov, Edwin Zhang December 12 th, 2014 1 Overview In today s increasingly mobile-centric world, more people are beginning to use their smartphones

More information

The Common Access Card The problems it solves (and the ones it doesn t) Quest Software/One Identity Dan Conrad Federal CTO

The Common Access Card The problems it solves (and the ones it doesn t) Quest Software/One Identity Dan Conrad Federal CTO The Common Access Card The problems it solves (and the ones it doesn t) Quest Software/One Identity Dan Conrad Federal CTO 1 Disclaimer The views expressed in this presentation are those of the author(s)

More information

Chime for Lync High Availability Setup

Chime for Lync High Availability Setup Chime for Lync High Availability Setup Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation

More information

March 2011

March 2011 Oracle Enterprise Single Sign-on Logon Manager Best Practices: Configuring the ESSO-LM Agent Release 11.1.1.5.0 21004-01 March 2011 Oracle Enterprise Single Sign-on Logon Manager Best Practices: Configuring

More information

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1810

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1810 Kerberos Constrained Delegation Authentication for SEG V2 VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations 98-367 MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations Which are common symptoms of a virus infection? (Lesson 5 p 135-136) Poor system performance. Unusually low

More information

Cisco TelePresence Conductor with Unified CM

Cisco TelePresence Conductor with Unified CM Cisco TelePresence Conductor with Unified CM Deployment Guide TelePresence Conductor XC3.0 Unified CM 10.x Revised February 2015 Contents Introduction 5 About this document 5 Related documentation 5 About

More information

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks CISNTWK-440 Intro to Network Security Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of

More information

Status Web Evaluator s Guide Software Pursuits, Inc.

Status Web Evaluator s Guide Software Pursuits, Inc. Status Web Evaluator s Guide 2018 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 2 Installing Microsoft IIS... 2 Verifying Microsoft IIS Features... 9 Installing the

More information

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 Table of Contents Introduction to Horizon Cloud with Manager.... 3 Benefits of Integration.... 3 Single Sign-On....3

More information

70-742: Identity in Windows Server Course Overview

70-742: Identity in Windows Server Course Overview 70-742: Identity in Windows Server 2016 Course Overview This course provides students with the knowledge and skills to install and configure domain controllers, manage Active Directory objects, secure

More information

Implementing Security in Windows 2003 Network (70-299)

Implementing Security in Windows 2003 Network (70-299) Implementing Security in Windows 2003 Network (70-299) Level 1 Authorization & Authentication 2h 20m 20s 1.1 Group Strategy 1.2 Group Scopes 1.3 Built-in Groups 1.4 System or Special Groups 1.5 Administrating

More information

Cisco TelePresence Conductor with Cisco Unified Communications Manager

Cisco TelePresence Conductor with Cisco Unified Communications Manager Cisco TelePresence Conductor with Cisco Unified Communications Manager Deployment Guide XC2.2 Unified CM 8.6.2 and 9.x D14998.09 Revised March 2014 Contents Introduction 4 About this document 4 Further

More information

Implementing and Troubleshooting Account Lockout

Implementing and Troubleshooting Account Lockout Page 1 of 7 Implementing and Troubleshooting Account Lockout Launched: Aug 31, 2004 Updated: Nov 18, 2004 Section: Articles :: Authentication, Access Control & Encryption Author: Mitch Tulloch Rating:

More information

Authlogics Forefront TMG and UAG Agent Integration Guide

Authlogics Forefront TMG and UAG Agent Integration Guide Authlogics Forefront TMG and UAG Agent Integration Guide With PINgrid, PINphrase & PINpass Technology Product Version: 3.0.6230.0 Publication date: January 2017 Authlogics, 12 th Floor, Ocean House, The

More information

Identity Firewall. About the Identity Firewall

Identity Firewall. About the Identity Firewall This chapter describes how to configure the ASA for the. About the, on page 1 Guidelines for the, on page 7 Prerequisites for the, on page 9 Configure the, on page 10 Monitoring the, on page 16 History

More information

Configuring Content Authentication and Authorization on Standalone Content Engines

Configuring Content Authentication and Authorization on Standalone Content Engines CHAPTER 10 Configuring Content Authentication and Authorization on Standalone Content Engines This chapter describes how to configure content authentication and authorization on standalone Content Engines

More information

Vidder PrecisionAccess

Vidder PrecisionAccess Vidder PrecisionAccess Transparent Multi-Factor Authentication June 2015 910 E HAMILTON AVENUE. SUITE 430. CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview...

More information

Designing a System. We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin April 10,

Designing a System. We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin April 10, Designing a System We have lots of tools Tools are rarely interesting by themselves Let s design a system... Steven M. Bellovin April 10, 2007 1 Some of Our Tools Encryption Authentication mechanisms Access

More information

Cisco TelePresence Device Authentication on Cisco VCS

Cisco TelePresence Device Authentication on Cisco VCS Cisco TelePresence Device Authentication on Cisco VCS Deployment Guide Cisco VCS X8.5 December 2014 Contents About device authentication 4 Authentication policy 6 Configuring VCS authentication policy

More information

exam.72q.

exam.72q. 70-744.exam.72q Number: 70-744 Passing Score: 800 Time Limit: 120 min 70-744 Securing Windows Server 2016 Exam A QUESTION 1 Note: This question is part of a series of questions that present the same scenario.

More information

Citrix SCOM Management Pack 1.4 for ShareFile

Citrix SCOM Management Pack 1.4 for ShareFile Citrix SCOM Management Pack 1.4 for ShareFile Nov 27, 2017 Citrix SCOM Management Pack for ShareFile is an availability and performance management solution that extends end-toend service monitoring capabilities

More information

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems WHITEPAPER Vulnerability Analysis of Certificate Validation Systems The US Department of Defense (DoD) has deployed one of the largest Public Key Infrastructure (PKI) in the world. It serves the Public

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1811

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1811 Kerberos Constrained Delegation Authentication for SEG V2 VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide June, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Segmentation for Security

Segmentation for Security Segmentation for Security Do It Right Or Don t Do It At All Vidder, Inc. Segmentation for Security 1 Executive Summary During the last 30 years, enterprises have deployed large open (flat) networks to

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year! EXAMGOOD QUESTION & ANSWER Exam Good provides update free of charge in one year! Accurate study guides High passing rate! http://www.examgood.com Exam : 070-337 Title : Enterprise Voice & Online Services

More information

Evaluation Guide Host Access Management and Security Server 12.4

Evaluation Guide Host Access Management and Security Server 12.4 Evaluation Guide Host Access Management and Security Server 12.4 Copyrights and Notices Copyright 2017 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Mobile devices boon or curse

Mobile devices boon or curse Mobile devices boon or curse Oliver Ng - Director of Training Kishor Sonawane - India Lead Security Compass Consulting & Training Consumerization According to Apple s chief operating officer, 65 percent

More information

2018/5. Ver BthLogon. Windows Logon Authentication using Android Device. RiBiG Inc.

2018/5. Ver BthLogon. Windows Logon Authentication using Android Device. RiBiG Inc. 2018/5 Ver. 1.0 BthLogon Windows Logon Authentication using Android Device RiBiG Inc. http://www.ribig.co.jp/bthlogon Contents 1. Introduction... 4 1.1 Remote Desktop Support... 5 1.2 Security... 6 2.

More information