Host. Computer system #1. Host Hardening

Size: px
Start display at page:

Download "Host. Computer system #1. Host Hardening"

Transcription

1 Host Hardening Series of actions to be taken in order to make it hard for an attacker to successfully attack computers in a network environment (March 28, 2016) Abdou Illia Spring 2016 Host In network computing, the term host refers to a computer that hosts and delivers service to other computers By extension, any device with an IP address is called a host Question: What kind of device can be a host? 2 Computer system #1 Intel Core i7 Processor (3.20GHz) 2GB SDRAM PC3200 (800MHz), Dual Channel 1TB Serial ATA 7200rpm Hard Disk Drive 16x Multi-Format DVD Writer (DVD±R/±RW) Gateway 7-Bay Tower Case Integrated Ultra ATA Controller (1) PCI-E x16 Expansion Slot, (1) PCI-E x1, (3) PCI with 2 available for use (7) USB 2.0 (6 in back and 1 in front in the media card reader), (2) IEEE 1394 Firewire Ports, Parallel, Serial and (2) PS/2 20" Black LCD Flat Panel Display (19" viewable) Gateway Premium 104+ Keyboard Two-Button PS/2 Wheel Mouse Napster 2.0 and 150 Song Sampler Intel High Definition Audio GMAX Speakers with Subwoofer 56K PCI data/fax modem 10/100/1000 (Gigabit) Ethernet Microsoft Office 2010 Professional on DVD 3 1

2 Computer Hardware & Software Productivity Software Operating System Computer Hardware 4 Computer system #2 Intel Core i7 Processor (3.20GHz) 2GB SDRAM PC3200 (800MHz), Dual Channel 1TB Serial ATA 7200rpm Hard Disk Drive 16x Multi-Format DVD Writer (DVD±R/±RW) Gateway 7-Bay Tower Case Integrated Ultra ATA Controller (1) PCI-E x16 Expansion Slot, (1) PCI-E x1, (3) PCI with 2 available for use (7) USB 2.0 (6 in back and 1 in front in the media card reader), (2) IEEE 1394 Firewire Ports, Parallel, Serial and (2) PS/2 20" Black LCD Flat Panel Display (19" viewable) Gateway Premium 104+ Keyboard Two-Button PS/2 Wheel Mouse Napster 2.0 and 150 Song Sampler Intel High Definition Audio GMAX Speakers with Subwoofer 56K PCI data/fax modem 10/100/1000 (Gigabit) Ethernet Windows 7 Professional Google Chrome 16 installed 5 Microsoft Office 2010 Professional installed Computer Hardware & Software Web browser Productivity Software Operating System Computer Hardware 6 2

3 Computer system #3 Intel Core i7 Processor (3.20GHz) 2GB SDRAM PC3200 (800MHz), Dual Channel 1TB Serial ATA 7200rpm Hard Disk Drive 16x Multi-Format DVD Writer (DVD±R/±RW) Gateway 7-Bay Tower Case Integrated Ultra ATA Controller (1) PCI-E x16 Expansion Slot, (1) PCI-E x1, (3) PCI with 2 available for use (7) USB 2.0 (6 in back and 1 in front in the media card reader), (2) IEEE 1394 Firewire Ports, Parallel, Serial and (2) PS/2 20" Black LCD Flat Panel Display (19" viewable) Gateway Premium 104+ Keyboard Two-Button PS/2 Wheel Mouse Napster 2.0 and 150 Song Sampler Intel High Definition Audio GMAX Speakers with Subwoofer 56K PCI data/fax modem 10/100/1000 (Gigabit) Ethernet Windows Server 2008 Enterprise installed Internet Explorer 8 installed 7 IIS 6.0 installed Computer Hardware & Software Web service software (IIS, Apache,...) Web browser Productivity Software Operating System Client & server application programs Computer Hardware 8 Your knowledge about Host hardening Which of the following is most likely to make a computer system unable to perform any kind of work or to provide any service? a) Client application programs get hacked b) Server application programs (web service software, database service, network service, etc.) get hacked c) The operating system get hacked d) The connection to the network/internet get shut down 9 3

4 OS Vulnerability test 2013 by omnired.com OS tested: Win XP, Win Server 2003, Vista Ultimate, Win 7 OS market share Mac OS Classic, OS X 10.4 Server, OS X 10.4 Tiger FreeBSD 6.2, Solaris 10, Fedora Core 6, Slackware 11.0, Suse Enterprise 10, Ubuntu 6.10 Tools used to test vulnerabilities: Scanning tools (Track, Nessus) Network mapping (Nmap command) All host with OS installation defaults Results Microsoft's Windows and Apple's OS X are ripe with remotely accessible vulnerabilities and allow for executing malicious code The UNIX and Linux variants present a much more robust exterior to the outside Once patched, however, both Windows and Apple s OS are secure. 10 Your knowledge about Host hardening You performed an Out-of-the-box installation of Windows XP and Linux FreeBSD 6.2 on two different computers. Which computer is likely to be more secure? a) Windows XP b) Linux FreeBSD 6.2 c) They will have the same level of security What needs to be done, first, in order to prevent a hacker from taking over a server with OS installation defaults that has to be connected to the Internet? a) Lock the server room b) Configure the firewall to deny all inbound traffic to the server c) Download and install patches for known vulnerabilities 11 Security Baseline Because it s easy to overlook something in the hardening process, businesses need to adopt a standard hardening methodology: standard security baseline Need to have different security baseline for different kind of host; i.e. Different security baselines for different OS and versions Different security baselines for different types of server applications (web service, service, etc.) Different security baselines for different types of client applications. 12 4

5 Options for Security Baselines Organizations use different standards OS vendors baselines and tools e.g. Follow MS Installation procedure and use Microsoft Baseline Security Analyzer (MBSA) Standards Agencies baselines e.g. CobiT* Security Baseline Companies own security baselines Security Baseline to be implemented by Server administrators known as systems admin * Control Objectives for Information and Related Technology 13 Elements of Hardening Physical security Secure installation and configuration Fix known vulnerabilities Remove/Turn off unnecessary services (applications) Harden all remaining applications Manage users and groups Manage access permissions For individual files and directories, assign access permissions to specific users and groups Back up the server regularly Advanced protections A c c b o a r s d e i l n i g n e t o 14 Example of Security Baseline for Win XP Clients OS Installation Create a single partition on HDD Format disk using NTFS file system Install Win XP and Service Pack 3 Fixing OS vulnerabilities Download and install latest patches Turn on Windows Automatic Updates checking Configure Windows Firewall Block incoming connections except KeyAccess and Remote Assistance Turn off unnecessary services Turn off Alerter, Network Dynamic Data Exchange, telnet Application Installation Centrally assign applications using group policies Fixing applications vulnerabilities Turn on each application s automatic update checking 15 5

6 Hardening servers The 5 P s of security and compliance: Proper Planning Prevents Poor Performance Plan the installation Identify The purpose of the server. Example: provides easy & fast access to Internet services The services provided on the server Network service software (client and server) The users or types of users of the server Determine Privileges for each category of users If and how users will authenticate How appropriate access rights will be enforced Which OS and server applications meet the requirements The security baseline(s) for installation & deployment Install, configure, and secure the OS according to the security baseline Install, configure, and secure server software according to sec. baseline Test the security Add network defences Monitor and Maintain 16 Hardening servers (cont.) Choose the OS that provides the following: Ability to restrict admin access (Administrator vs. Administrators) Granular control of data access Ability to control executables Ability to log activities Host-based firewall Support for strong authentication and encryption Disable or remove unnecessary services or applications If no longer needed, remove rather than disable to prevent re-enabling Additional services increases the attack vector More services can increase host load and decrease performance Reducing services reduces logs and makes detection of intrusion easier If a service is not used for now, disable it 17 Hardening servers (cont.) Configure user authentication Remove or disable unnecessary accounts (e.g. Guest account) Change names and passwords for default accounts Disable inactive accounts Assign rights to groups not individual users Don't permit shared accounts if possible Configure time sync Enforce appropriate password policy Use 2-factor authentication when necessary Always use encrypted authentication 18 6

7 UNIX / Linux Hardening Many versions of UNIX No standards guideline for hardening User can select the user interface Graphic User Interface (GUI) Command-Line Interfaces (CLIs) or shells CLIs are case-sensitive with commands in lowercase except for file names 19 UNIX / Linux Hardening Three ways to start services Start a service manually (a) through the GUI, (b) by typing its name in the CLI, or (c) by executing a batch file that does so Using the inetd program to start services when requests come in from users Using the rc scripts to start services automatically at boot up Inetd = Internet daemon; i.e. a computer program that runs in the background 20 UNIX / Linux Hardening Starting services upon client requests Services not frequently used are dormant Requests do not go directly to the service Requests are sent to the inetd program which is started at server boot up Program A Program B Program C Program D 4. Start and Process This Request inetd 3. Program C 2. Port Client Request To Port 123 Port 23 Program A Port 80 Program B Port 123 Program C Port 1510 Program D /etc/inetd.config 21 7

8 UNIX / Linux Hardening Turning On/Off unnecessary Services In UNIX Identifying services running at any moment ps command (process status), usually with aux parameters, lists running programs Shows process name and process ID (PID) netstat tells what services are running on what ports Turning Off Services In UNIX kill PID command is used to kill a particular process kill 47 (If PID=47) 22 Advanced Server Hardening Techniques File Integrity Checker Creates snapshot of files: a hashed signature (message digest) for each file After an attack, compares post-hack signature with snapshot This allows systems administrator to determine which files were changed Tripwire is a file integrity checker for Linux/UNIX, Windows, etc.: (ftp://coast.cs.purdue.edu/pub/tools/unix) 23 Advanced Server Hardening Techniques Reference Base 1. Earlier Time File 1 File 2 Other Files in Policy List Tripwire File 1 Signature File 2 Signature 3. Comparison to Find Changed Files 2. After Attack File 1 File 2 Other Files in Policy List Tripwire Post-Attack Signatures File 1 Signature File 2 Signature File Integrity problem: many files change for legitimate reasons. So it is difficult to know which ones the attacker changed. 24 8

9 Other types of host that can be Hardened Internetwork Operating System (IOS) For Cisco Routers, Some Switches, Firewalls Even cable modems with web-based management interfaces 25 9

SOFTWARE TECHNOLOGIES

SOFTWARE TECHNOLOGIES SOFTWARE TECHNOLOGIES (Week 2, Thursday 1/18/2007) BUS300 - Abdou Illia, Spring 2007 1 LEARNING GOALS Identify the different types of systems software. Explain the main functions of operating systems.

More information

LabSim Mapping Matrix

LabSim Mapping Matrix LabSim Mapping Matrix A+ Guide to Hardware Managing, Maintaining, and Troubleshooting Fourth Edition (220-601) Mapping: LabSim to Chapters LabSim Chapter Reference / 1.0 Computing Overview 1.1 Using the

More information

ACER INC. VERITON M200 QUICK SPEC

ACER INC. VERITON M200 QUICK SPEC ACER INC. VERITON M200 QUICK SPEC Designed to meet the demanding needs of your business Veriton M200-Q67 offers uncompromising value for money while focused on providing the maximum expandability that

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

Detailed specifications - ThinkCentre M57 (type 6019, 6066, 6072, 6077, 6087, 9181/ M57p (type 6064, 6067, 6073, 6078, 6088, and 9196)

Detailed specifications - ThinkCentre M57 (type 6019, 6066, 6072, 6077, 6087, 9181/ M57p (type 6064, 6067, 6073, 6078, 6088, and 9196) Страница 1 Detailed specifications - ThinkCentre M57 (type 6019, 6066, 6072, 6077, 6087, 9181/ M57p (type 6064, 6067, 6073, 6078, 6088, and 9196) Applicable countries and regions Architecture Communications

More information

ACER INC. VERITON M200 QUICK SPEC

ACER INC. VERITON M200 QUICK SPEC ACER INC. VERITON M200 QUICK SPEC Designed to meet the demanding needs of your business Veriton M200-M61 offers uncompromising value for money while focused on providing the maximum expandability that

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

IT Essentials: PC Hardware and Software v4.1 Mapping to CompTIA A Objectives

IT Essentials: PC Hardware and Software v4.1 Mapping to CompTIA A Objectives IT Essentials: PC Hardware and Software v4.1 Mapping to CompTIA A+ 220-702 Objectives 1.0 Hardware 1.1 Given a scenario, install, configure and maintain personal computer components Storage devices o HDD

More information

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Modified 2-22-14 Objectives Describe the enumeration step of security testing Enumerate Microsoft OS targets Enumerate NetWare OS targets

More information

HCL Infinity Orb K 6015 (Multimedia PC)

HCL Infinity Orb K 6015 (Multimedia PC) f Save Energy for Benefit of Self and Nation HCL Infinity Orb K 6015 (Multimedia PC) Desktop cabinet Micro ATX cabinet AMD Athlon 64 x 2 Dual Core 3800 + (2*512 KB L2 Cache and 2000 MHz system Bus) Motherboard

More information

ThinkCentre M57e systems offer excellent performance at a competitive price

ThinkCentre M57e systems offer excellent performance at a competitive price Lenovo Europe Announcement ZG08-0237, dated February 26, 2008 ThinkCentre M57e systems offer excellent performance at a competitive price Description...2 Warranty information... 5 At a glance Benefits

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

Hands-On Ethical Hacking and Network Defense 3rd Edition

Hands-On Ethical Hacking and Network Defense 3rd Edition Hands-On Ethical Hacking and Network Defense 3rd Edition Chapter 8 Desktop and Server OS Vulnerabilities Last updated 3-17-18 Objectives After reading this chapter and completing the exercises, you will

More information

Various editions of Windows 7

Various editions of Windows 7 Various editions of Windows 7 ( and their relationship to Windows Vista and XP) Windows 7 Windows Vista Windows XP Starter 1 Starter Starter Home Basic Basic Home Edition Home Premium Home Premium Media

More information

How NOT To Get Hacked

How NOT To Get Hacked How NOT To Get Hacked The right things to do so the bad guys can t do the wrong ones Mark Burnette Partner, LBMC -Risk Services October 25, 2016 Today s Agenda Protecting Against A Hack How should I start?

More information

CompTIA A Practical Application Exam, 2009 Edition

CompTIA A Practical Application Exam, 2009 Edition CompTIA A+ 220 702. Practical Application Exam, 2009 Edition Examination Objectives Mapped to Chapters Chapters Domain Hardware 1.0 1.1 Given a scenario, install, configure and maintain personal computer

More information

Introduction to Operating Systems. Note Packet # 1. CSN 115 Operating Systems. Genesee Community College. CSN Lab Overview

Introduction to Operating Systems. Note Packet # 1. CSN 115 Operating Systems. Genesee Community College. CSN Lab Overview Introduction to Operating Systems Note Packet # 1 CSN 115 Operating Systems Genesee Community College CSN Lab Overview Dual booted Windows/Linux Workstations Linux workstations currently run CentOS and

More information

CELSIUS R670 The new uncompromising high-end workstation

CELSIUS R670 The new uncompromising high-end workstation Data Sheet The new uncompromising high-end workstation Issue: April 2009 The CELSIUS R series is the dual-processor platform for the mid-range and high-end segment with a great selection of graphics subsystems.

More information

Operating system hardening

Operating system hardening Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications

More information

IOPStor: Storage Made Easy. Key Business Features. Key Business Solutions. IOPStor IOP5BI50T Network Attached Storage (NAS) Page 1 of 5

IOPStor: Storage Made Easy. Key Business Features. Key Business Solutions. IOPStor IOP5BI50T Network Attached Storage (NAS) Page 1 of 5 IOPStor: Storage Made Easy Application data, virtual images, client files, email, the types of data central to running a successful business can seem endless. With IOPStor you finally have an advanced

More information

PARALLELS SERVER 4.0 FOR MAC BARE METAL EDITION README

PARALLELS SERVER 4.0 FOR MAC BARE METAL EDITION README PARALLELS SERVER 4.0 FOR MAC BARE METAL EDITION README February 18, 2010 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information

More information

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Modified 1-11-17 Objectives Describe the enumeration step of security testing Enumerate Microsoft OS targets Enumerate *NIX OS targets

More information

CELSIUS R570 Your compact powerhouse workstation

CELSIUS R570 Your compact powerhouse workstation Data Sheet CELSIUS R570 Your compact powerhouse workstation Issue: April 2009 CELSIUS R570 The CELSIUS R series is the dual-processor platform for the mid-range and highend segment with a great selection

More information

New ThinkCentre M57 systems offer Intel processor technology with the security and software tools to back up and protect your data

New ThinkCentre M57 systems offer Intel processor technology with the security and software tools to back up and protect your data Lenovo Europe Announcement ZG08-0275, dated May 13, 2008 New ThinkCentre M57 systems offer Intel processor technology with the security and software tools to back up and protect your data Description...2

More information

OptiPlex 380. OptiPlex: Secure Computing Made Simple. OptiPlex: The esential key to productivity

OptiPlex 380. OptiPlex: Secure Computing Made Simple. OptiPlex: The esential key to productivity Offering more form factors and configurations than ever before in an Essential Optiplex desktop, the new Dell is designed to deliver cost-effective business productivity for growing businesses and organizations.

More information

Computer Network Vulnerabilities

Computer Network Vulnerabilities Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like

More information

REQUEST FOR PROPOSAL FOR SUPPLY & INSTALLATION OF DESKTOPS AND LAPTOPS. Supply & installation of DESKTOPS and LAPTOPS in the following location.

REQUEST FOR PROPOSAL FOR SUPPLY & INSTALLATION OF DESKTOPS AND LAPTOPS. Supply & installation of DESKTOPS and LAPTOPS in the following location. REQUEST FOR PROPOSAL FOR SUPPLY & INSTALLATION OF DESKTOPS AND LAPTOPS General Scope of Work: Supply & installation of DESKTOPS and LAPTOPS in the following location. Location of Installation: ISI Kolkata,

More information

epldt Web Builder Security March 2017

epldt Web Builder Security March 2017 epldt Web Builder Security March 2017 TABLE OF CONTENTS Overview... 4 Application Security... 5 Security Elements... 5 User & Role Management... 5 User / Reseller Hierarchy Management... 5 User Authentication

More information

Turn On Windows Firewall Manually Windows 7 Remote Desktop

Turn On Windows Firewall Manually Windows 7 Remote Desktop Turn On Windows Firewall Manually Windows 7 Remote Desktop Learn how to use advanced settings for the Windows 7 firewall to create exceptions for specific services. In the right 7 firewall. Don't use Remote

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

Dynamic Datacenter Security Solidex, November 2009

Dynamic Datacenter Security Solidex, November 2009 Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic

More information

Networks with Cisco NAC Appliance primarily benefit from:

Networks with Cisco NAC Appliance primarily benefit from: Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,

More information

Key Features. DATA SHEET

Key Features.  DATA SHEET DATA SHEET Total Defense THREAT MANAGER r12 Overview: Total Defense Threat Manager r12 integrates anti-malware, groupware protection and network access control in one easy-touse solution, providing comprehensive

More information

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration

Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Hands-On Ethical Hacking and Network Defense Chapter 6 Enumeration Updated 3-3-18 Objectives Describe the enumeration step of security testing Enumerate Microsoft OS targets Enumerate *NIX OS targets Introduction

More information

Turn On Windows Firewall Manually Windows 7 Remote Desktop Through

Turn On Windows Firewall Manually Windows 7 Remote Desktop Through Turn On Windows Firewall Manually Windows 7 Remote Desktop Through Learn how to use advanced settings for the Windows 7 firewall to create exceptions for specific services. In the right 7 firewall. Don't

More information

Getting Started with VMware Fusion VMware Fusion for Mac OS X Version 1.0

Getting Started with VMware Fusion VMware Fusion for Mac OS X Version 1.0 VMware Fusion for Mac OS X Version 1.0 Getting Started with VMware Fusion Revision: 20070806 Item: VMF-ENG-Q307-295 You can find the most up-to-date technical documentation on our Web site at http://www.vmware.com/support/

More information

TENDER NOTIFICATION SUPPLY, INSTALLATION AND COMMISSIONING OF DESKTOP COMPUTERS

TENDER NOTIFICATION SUPPLY, INSTALLATION AND COMMISSIONING OF DESKTOP COMPUTERS TENDER NOTIFICATION SUPPLY, INSTALLATION AND COMMISSIONING OF DESKTOP COMPUTERS Income-tax Department, Bangalore invites tenders from eligible vendors dealing in Desktop computers to supply, install and

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email

More information

One Dell Way, Round Rock, Texas 78682

One Dell Way, Round Rock, Texas 78682 Dell Marketing L.P. One Dell Way, Round Rock, Texas 78682 US Air Force QEB 2013A QEB 2013A Multi-Domain Platform Dell OptiPlex 7010 MiniTower The Dell OptiPlex 7010 business client desktop delivers right-sized

More information

PLATO Learning Environment (v2.0) System and Configuration Requirements

PLATO Learning Environment (v2.0) System and Configuration Requirements PLATO Learning Environment (v2.0) System and Configuration Requirements For Workstations July 30, 2010 Windows XP Home and Professional (SP3) Windows Vista Home/Premium/Business/Ultimate Windows 7 Home/Premium/Business/Ultimate

More information

Data Sheet. CELSIUS M470 Your new thoroughbred workstation

Data Sheet. CELSIUS M470 Your new thoroughbred workstation Data Sheet CELSIUS M470 Your new thoroughbred workstation Issue: September 2009 CELSIUS M470 The CELSIUS M Series is the single-processor platform with a particularly wellbalanced ratio between price and

More information

SERVER HARDENING CHECKLIST

SERVER HARDENING CHECKLIST SERVER HARDENING CHECKLIST WINDOWS 2003 SERVER CHECKLIST This checklist contains server hardening procedures for Windows 2003 Server. The procedures listed in this document are a balance of industry best

More information

Contents at a Glance COPYRIGHTED MATERIAL. Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7

Contents at a Glance COPYRIGHTED MATERIAL. Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7 Contents at a Glance Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7 Chapter 1: Getting Acquainted with Enterprise Linux...9 Chapter 2: Exploring the Desktop...17 Chapter 3: Putting

More information

Chapter 12: Advanced Operating Systems

Chapter 12: Advanced Operating Systems : Advanced Operating Systems IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents,

More information

Integrated Ultra320 Smart Array 6i Redundant Array of Independent Disks (RAID) Controller with 64-MB read cache plus 128-MB batterybacked

Integrated Ultra320 Smart Array 6i Redundant Array of Independent Disks (RAID) Controller with 64-MB read cache plus 128-MB batterybacked Data Sheet Cisco MCS 7835-H1 THIS PRODUCT IS NO LONGER BEING SOLD AND MIGHT NOT BE SUPPORTED. READ THE END-OF-LIFE NOTICE TO LEARN ABOUT POTENTIAL REPLACEMENT PRODUCTS AND INFORMATION ABOUT PRODUCT SUPPORT.

More information

Part Number Class Category Title UPC Code Image Download Country of Origin Cost MSRP. Short Description. Long Description. Main Specifications

Part Number Class Category Title UPC Code Image Download Country of Origin Cost MSRP. Short Description. Long Description. Main Specifications Part Number Class Category Title UPC Code Image Download Country of Origin Cost MSRP Short Description Long Description Main Specifications Brand Form Factor Unit Dimension (DxWxH) Shipping Dimension (DxWxH)

More information

Technology in Action

Technology in Action Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral

More information

System Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements

System Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements System Requirements This section contains information on the minimum system requirements for Foglight NMS. Before you can begin to download Foglight NMS, you must make sure that your computer meets the

More information

CORRIGENDUM IN TENDER NO. HWT

CORRIGENDUM IN TENDER NO. HWT BLOCK NO.-, 8 TH FLOOR, UDYOG BHAVAN, SECTOR-, GANDHINAGAR CORRIGENDUM IN TENDER NO. HWT02036353 Form no. T2 (TECHNICAL MINIMUM SPECIFICATIONS) SECTION ( PCs & other items) Sr. No. Item ) PC ( Intel Core

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Part Number Class Category Title UPC Code Image Download Country of Origin Cost MSRP. Short Description. Long Description. Main Specifications

Part Number Class Category Title UPC Code Image Download Country of Origin Cost MSRP. Short Description. Long Description. Main Specifications Part Number Class Category Title UPC Code Image Download Country of Origin Cost MSRP Short Description Long Description Main Specifications Brand Form Factor Unit Dimension (DxWxH) Shipping Dimension (DxWxH)

More information

Cyber Essentials Questionnaire Guidance

Cyber Essentials Questionnaire Guidance Cyber Essentials Questionnaire Guidance Introduction This document has been produced to help companies write a response to each of the questions and therefore provide a good commentary for the controls

More information

Network Projector Operation Guide

Network Projector Operation Guide Network Projector Operation Guide Table of contents Preparation...4 Connecting the projector with your computer...4 Wired connection... 4 Wireless connection (for selected models)... 5 QPresenter...8 Minimum

More information

Pass Microsoft Exam

Pass Microsoft Exam Pass Microsoft 98-367 Exam Number: 98-367 Passing Score: 700 Time Limit: 45 min File Version: 51.0 http://www.gratisexam.com/ Pass Microsoft 98-367 Exam Exam Name: Security Fundamentals Certdumps QUESTION

More information

Installing Cisco APIC-EM on a Virtual Machine

Installing Cisco APIC-EM on a Virtual Machine About the Virtual Machine Installation, page 1 System Requirements Virtual Machine, page 2 Pre-Install Checklists, page 4 Cisco APIC-EM Ports Reference, page 7 Verifying the Cisco ISO Image, page 8 Installing

More information

Securing CS-MARS C H A P T E R

Securing CS-MARS C H A P T E R C H A P T E R 4 Securing CS-MARS A Security Information Management (SIM) system can contain a tremendous amount of sensitive information. This is because it receives event logs from security systems throughout

More information

Extended Specification. P ProDesk 400 G2.5 Core i GHz 4 GB 500 GB. Personal computer small form factor

Extended Specification. P ProDesk 400 G2.5 Core i GHz 4 GB 500 GB. Personal computer small form factor P ProDesk 400 G2.5 Core i3 4170 3.7 GHz 4 GB 500 GB Localisation Personal computer small form factor English / United Kingdom Processor 1 x Intel Core i3 4170 / 3.7 GHz ( Dual Core ) Cache Memory Cache

More information

Dominion SX Release Notes

Dominion SX Release Notes Dominion SX Release Notes Dominion SX Release Notes and Compatibility Release 3.1.7 April 14, 2009 Document updated June 10, 2010 Contents Applicability... 2 Release Status... 2 Expiration Date of Content...

More information

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac. Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth

More information

SPECIFICATIONS OF CLUSTER SERVER

SPECIFICATIONS OF CLUSTER SERVER SPECIFICATIONS OF CLUSTER SERVER CLUSTER SERVER: Processor - Intel XEON 8 Core E5-2620 V4 Processor ( 2.GHz ) Max Turbo Frequency : 3.0GHz No. of Processors (Std/Max) - 2/2 Cache - 20MB SmartCache Chipset

More information

Cisco MCS 7845-H1 Unified CallManager Appliance

Cisco MCS 7845-H1 Unified CallManager Appliance Data Sheet Cisco MCS 7845-H1 Unified CallManager Appliance THIS PRODUCT IS NO LONGER BEING SOLD AND MIGHT NOT BE SUPPORTED. READ THE END-OF-LIFE NOTICE TO LEARN ABOUT POTENTIAL REPLACEMENT PRODUCTS AND

More information

Ftp Windows 7 64 Bit Requirements Recommendations Memory

Ftp Windows 7 64 Bit Requirements Recommendations Memory Ftp Windows 7 64 Bit Requirements Recommendations Memory RAM. 8 GB or more memory as required by application. *Use Windows 7 64-bit or Mac OS X 10.8 or higher if your computer is equipped with 4 GB of

More information

Table of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup

Table of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Server Setup Module 1 / Unit 1 Servers and Racks Server Hardware and Software

More information

UPLB-S , SUPPLY AND DELIVERY OF INFORMATION TECHNOLOGY PARTS, ACCESSORIES AND PERIPHERALS TECHNICAL SPECIFICATION FOR THE PUBLIC BIDDING OF:

UPLB-S , SUPPLY AND DELIVERY OF INFORMATION TECHNOLOGY PARTS, ACCESSORIES AND PERIPHERALS TECHNICAL SPECIFICATION FOR THE PUBLIC BIDDING OF: 1 1 BRANDED & BRAND NEW DESKTOP COMPUTER Form Factor: Tower Processor: Intel Pentium processor N3700 (1.6 GHz) Memory: 2GB Dual Channel DDR3 Hard Drive: 500 GB Optical Drive: 8X Super-Multi drive, 9.0

More information

Turn On Windows Firewall Manually Windows 7 Remote Desktop Connection

Turn On Windows Firewall Manually Windows 7 Remote Desktop Connection Turn On Windows Firewall Manually Windows 7 Remote Desktop Connection Learn how to use advanced settings for the Windows 7 firewall to create exceptions for specific services. In the right 7 firewall.

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

Client Automation v8.10 Enterprise, Standard, Starter*

Client Automation v8.10 Enterprise, Standard, Starter* Core Installation Satellite Installation Application Management Application Self Service Management Application Management Profiles Patch Management Security And Compliance Management OS Management Out-of-Band

More information

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Enterprise Network Security Describe the general methods used to mitigate security threats to Enterprise networks

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level 1.1 Utilize an Active Discovery Tool 1.2 Use a Passive Asset Discovery Tool 1.3 Use DHCP Logging to Update Asset Inventory 1.4 Maintain Detailed Asset Inventory 1.5 Maintain Asset Inventory Information

More information

Symantec Endpoint Protection Family Feature Comparison

Symantec Endpoint Protection Family Feature Comparison Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per

More information

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems 5.0 Introduction 1. What controls almost all functions on a computer? The operating system 5.1 Explain the purpose of an operating system 2.

More information

About the Presentations

About the Presentations About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning of each presentation. You may customize the presentations

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 2 was due before class Assignment 3 will be posted soon

More information

PRODUCT SPECIFICATION

PRODUCT SPECIFICATION A P P E N D I X A PRODUCT SPECIFICATION A-1 Processor Core Logic Processor and Core Logic Mobile Intel Pentium M (Banias), 1.5GHz-1.6GHz, 1 MB L2 with Error Correction Code, or Mobile Intel Pentium M (Dothan),

More information

Manually Windows Update Xp Sp3 Iso Bootable

Manually Windows Update Xp Sp3 Iso Bootable Manually Windows Update Xp Sp3 Iso Bootable Usb Hello, I've downloaded Windows XP Service Pack 3 - ISO-9660 CD Image File from microsoft website. May I know how can I create a bootable USB disk so that

More information

Strategic Infrastructure Security

Strategic Infrastructure Security Strategic Infrastructure Security Course Number: SCPSIS Length: Certification Exam There are no exams currently associated with this course. Course Overview This course picks up right where Tactical Perimeter

More information

Chapter 12: Advanced Operating Systems

Chapter 12: Advanced Operating Systems Chapter 12: Advanced Operating Systems IT Essentials: PC Hardware and Software v4.1 1 Chapter 12 Objectives 12.1 Select the appropriate operating system based on customer needs 12.2 Install, configure,

More information

Host Hardening Achieve or Avoid. Nilesh Kapoor Auckland 2016

Host Hardening Achieve or Avoid. Nilesh Kapoor Auckland 2016 Host Hardening Achieve or Avoid Nilesh Kapoor Auckland 2016 Introduction Nilesh Kapoor Senior Security Consultant @ Aura Information Security Core 8 years experience in Security Consulting Co- Author Security

More information

Perceptive TransForm. Technical Specifications. Version: 8.x Compatible with ImageNow 6.5.x to 6.7.x and Perceptive Content 7.x

Perceptive TransForm. Technical Specifications. Version: 8.x Compatible with ImageNow 6.5.x to 6.7.x and Perceptive Content 7.x Perceptive TransForm Technical s Version: 8.x Compatible with ImageNow 6.5.x to 6.7.x and Perceptive Content 7.x Written by: Product Knowledge, R&D Date: May 2018 2008-2018 Hyland Software, Inc. and its

More information

Qualifying Minimum Requirements

Qualifying Minimum Requirements REQUEST FOR PROPOSAL FOR SUPPLY & INSTALLATION OF DESKTOP General Scope of Work: Supply & installation of DESKTOP in the following location. Locations of Installation: ISI kolkata, 203 B.T. Road, Kolkata

More information

ARL 945/ ARL945-B User Reference Manual

ARL 945/ ARL945-B User Reference Manual ARL 945/ ARL945-B User Reference Manual Specifications Model No ARL945 ARL945-B CPU Intel Core 2 Duo T7500, 2.2GHz Processors (Option: Intel Core 2 Duo T9400, 2.53 GHz) Chipset Intel Gm45 Chipset + ICH9M

More information

Self-Hosted Hardware and Software Full Requirements

Self-Hosted Hardware and Software Full Requirements CGM webpractice v7.4 Self-Hosted Hardware and Software Full Requirements 2 Table of Contents Full System Requirements... 3 Server Specifications... 3 Client Computer Specifications... 5 Peripheral Specifications...

More information

Hardware and Software Full Requirements

Hardware and Software Full Requirements CGM webpractice v7.4 Hardware and Software Full Requirements 2 CGM webpractice_v7 4_SystemReq Revised: 2.21.2019 Table of Contents Full System Requirements... 3 Client Computer Specifications... 3 Peripheral

More information

QuickStart Guide for Managing Computers. Version

QuickStart Guide for Managing Computers. Version QuickStart Guide for Managing Computers Version 10.6.0 copyright 2002-2018 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100

More information

Manually Join Domain Windows 7 Home Edition Workaround

Manually Join Domain Windows 7 Home Edition Workaround Manually Join Domain Windows 7 Home Edition Workaround It appears you possibly replied to ILUV via email but the solution was never posted here. I currently upgraded to Windows 7 Home Premium from Windows

More information

SCHOOL OF PHYSICAL, CHEMICAL AND APPLIED SCIENCES

SCHOOL OF PHYSICAL, CHEMICAL AND APPLIED SCIENCES PONDICHERRY DEPARTMENT UNIVERSITY OF PHYSICS SCHOOL OF PHYSICAL, CHEMICAL AND APPLIED SCIENCES QUOTATION INVITATION FOR THE PURCHASE OF PROCESSOR SERVER Ref: DST Project "Solitons and Modulational Systems"

More information

VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE. Version: 4.5

VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE. Version: 4.5 VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE This manual provides a quick introduction to Virtual Iron software, and explains how to use Virtual Iron VI-Center to configure and manage virtual

More information

A Technical Overview of the Lucent Managed Firewall

A Technical Overview of the Lucent Managed Firewall Lucent Managed Version 2.0 A Technical Overview of the Lucent Managed This document provides a technical overview of the Lucent Managed architecture. Key technical features and potential application scenarios

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 Revision A McAfee Network Security Platform 9.1 (9.1.7.73-9.1.3.11 Manager-M-series, Mxx30-series, and XC Cluster Release Notes) Contents About the release New features Enhancements Resolved Issues Installation

More information

Manager Appliance Quick Start Guide

Manager Appliance Quick Start Guide Revision D Manager Appliance Quick Start Guide The Manager Appliance runs on a pre-installed, hardened McAfee Linux Operating System (MLOS) and comes pre-loaded with the Network Security Manager software.

More information

CIS Controls Measures and Metrics for Version 7

CIS Controls Measures and Metrics for Version 7 Level One Level Two Level Three Level Four Level Five Level Six 1.1 Utilize an Active Discovery Tool Utilize an active discovery tool to identify devices connected to the organization's network and update

More information

6 x 3.5-inch SATA 6Gb/s, SATA 3Gb/s hard drive. 1. The standard system is shipped without HDD. 2. For the HDD compatibility list, please visit :

6 x 3.5-inch SATA 6Gb/s, SATA 3Gb/s hard drive. 1. The standard system is shipped without HDD. 2. For the HDD compatibility list, please visit : VS-6112 Pro+ Hardware Spec. Processor Memory HDD Capacity Dual-core Intel processor 4GB RAM 6 x 3.5-inch SATA 6Gb/s, SATA 3Gb/s hard drive NOTE: 1. The standard system is shipped without HDD. 2. For the

More information

The Center for Internet Security

The Center for Internet Security The Center for Internet Security Measurably reducing risk through collaboration, consensus, & practical security management Content of this Presentation: I. Background II. Univ. of CA Schools Rights and

More information

PRODUCT SPECIFICATION

PRODUCT SPECIFICATION A P P E N D I X A PRODUCT SPECIFICATION A-1 Processor Core Logic Processor and Core Logic Intel P4 (Prescott) 2.8 ~ 3.6 GHz, FC-mPGA4 Type, 1 MB L2, with Hyper Threading Technology Mobile Intel P4 (Prescott)

More information

2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product.

2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. GA-1310 Welcome 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45085373 5 May 2009 WELCOME 3 WELCOME This Welcome document provides

More information

ARP 945 User Reference Manual

ARP 945 User Reference Manual ARP 945 User Reference Manual Specifications Model No ARP945 ARP945-B CPU Intel Core 2 Duo T7500 (2.2GHz) Processors (Option: T9400, 2.53GHz) Slots Intel Gm45 Chipset + ICH9M Slot 3x PCI-E (x8) full-size

More information

The Cisco MCS 7835-H2 can run any of the following Cisco applications:

The Cisco MCS 7835-H2 can run any of the following Cisco applications: Cisco MCS 7835-H2 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks enabling easy collaboration every time from any workspace. Product

More information

Perceptive DataTransfer

Perceptive DataTransfer Perceptive DataTransfer System Overview Guide Version: 6.5.x Written by: Product Knowledge, R&D Date: May 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc.,

More information