IBM Security AppScan Enterprise v9.0.1 Importing Issues from Third Party Scanners

Size: px
Start display at page:

Download "IBM Security AppScan Enterprise v9.0.1 Importing Issues from Third Party Scanners"

Transcription

1 IBM Security AppScan Enterprise v9.0.1 Importing Issues from Third Party Scanners Anton Barua October 14, 2014 Abstract: To manage the challenge of addressing application security at the enterprise level, security teams must take a risk-based approach and prioritize assets, focus on identifying areas of highest risk, and then mitigate the risk. Addressing application security at an enterprise level goes beyond scanning applications for vulnerabilities. Large organizations might have thousands of applications that serve various purposes. If you use third-party scanners such as Nessus Vulnerability Scanner, or conduct manual pen testing to discover security issues, you can import these issues into AppScan Enterprise v9.0.1 for triaging. This white paper shows you how to: Edit an issue profile template to create customized attributes for the imported issues Customize a scanner profile template for Nessus Vulnerability Scanner and edit its issue attributes so that AppScan Enterprise understands them during the import process Import issues discovered by the Nessus Vulnerability Scanner Triage the issues after they are imported into AppScan Enterprise

2 Table of Contents 1Introduction Understanding Issue Attributes Understanding Scanner Profiles...4 2Importing issues from third party scanners Understanding Third-Party Scanner Issue Attributes Editing the Issue Attribute Profile Template Creating a Scanner Profile Importing Issues from CSV files Triaging Issues Triage a group of issues Summary Resources About the Author...18 Table of Figures Figure 1: Nessus scan data in CSV format...4 Figure 2: Navigating to the Issue Profile Template editor...5 Figure 3: Preconfigured AppScan Enterprise issue attributes...6 Figure 4: Creating custom attributes to consme Nessus issue data...6 Figure 5: Navigating to the Scanner Profile Template editor...7 Figure 6: Creating the Nessus Scanner Profile...8 Figure 7: Mapping Nessus attributes to AppScan Enterprise Issue Attributes...9 Figure 8: Before editing layout...10 Figure 9: After editing layout...10 Figure 10: Importing third party issues into Demo App...10 Figure 11: Import Issues dialog box...11 Figure 12: Importing issues...11 Figure 13: Nessus Issues imported into AppScan Enterprise...12 Figure 14: Updating issue attributes via import...12 Figure 15: Group issues by severity...13 Figure 16: Group issues by type...13 Figure 17: Mark issues as noise...14 Figure 18: After marking issues as noise...14 Figure 19: After marking issues to be In Progress...15 Figure 20: After marking issues as fixed...15 Figure 21: Change severity of a single issue...16 Figure 22: About Issue dialog box...16 Figure 23: Edit and save the severity value of an issue...17 Figure 24: After changing severity value of an issue...17 Figure 25: Edit and save the Source File attribute of an issue...18 Index of Tables Table 1: Issue attribute examples...3

3 1 Introduction An organization might have numerous applications that serve various purposes. It is the task of the security team to discover any vulnerability present in those applications, assess the risk of those applications, triage the security issues, and mitigate the risks. The security team might use various scanning tools or perform manual pen testing to discover security issues in the applications. Managing issues found by multiple scanning tools soon becomes a tedious task. Because each tool uses its own data format to produce and display scan results, inter-operability between these tools can sometimes be difficult. AppScan Enterprise v9.0.1 provides a centralized console where an organization can manage the security risks of all its applications. It provides security teams with the capability to import security issues found by other third-party scanner tools as well as from penetration testing exercises. It also provides the flexibility to customize necessary attributes to manage the imported issues. Users can create and customize profiles for different scanners to make regular issue import an easier process. Furthermore, users can integrate their existing tools with AppScan Enterprise's REST APIs to automate the security scanning and risk management tasks. In this article, I will describe the basic concepts behind these ideas and present a real world example of how a security team can import scan data from a well-known vulnerability scanning tool. 1.1 Understanding Issue Attributes Security issues are found after scanning a vulnerable application. A security issue in an application represents a potential vulnerability that can be exploited by an attacker. To easily search, filter, triage, and group security issues, Appscan Enterprise reports each issue by using a number of descriptive attributes. DAST Issue Attributes SAST Issue Attributes Severity: High Severity: Medium Location: Location: old_num_to_string_conversions.c (821) Issue Type: Cross-Site Scripting Issue Type: Buffer Overflow Application Name: Altoro 2.0 Application Name: Caretex Namtech Discovery Method: DAST Discovery Method: SAST Path: /disclaimer.htm Source File: %TestApps %\CPP\VS\all_c_vulns\all_c_vulns\all_c_vulns\ol d_num_to_string_conversions.c Domain: demo.testfire.net API: _gcvt Table 1: Issue attribute examples Table 1: Issue attribute examples contains examples of issue attributes of two issues found by Dynamic Analysis Security Testing (DAST) and Static Analysis Security Testing (SAST). The DAST issue is a high-severity Cross-Site Scripting issue found in the page of the web application Altoro 2.0. The SAST issue is a medium severity buffer overflow issue found in line 821 of the old_num_to_string_conversions.c file of the Caretex Namtech application. Some attributes

4 such as Path and Domain are only relevant to DAST issues. Similarly, Source file and API are relevant to SAST issues only. AppScan Enterprise describes issues according to an Issue Profile Template, which is preconfigured with a number of attributes that are used to describe issues it finds. A security analyst (with product administrator privileges in AppScan Enterprise) can customize the Issue Profile Template to facilitate importing issues that are found by third-party scanners, such as the Nessus Vulnerability Scanner. The security analyst can add custom attributes to the Issue Profile Template to describe different forms of data such as text, date, URL, etc. Furthermore, attributes can be enabled or disabled to show or hide those attributes' data from the AppScan Enterprise Monitor view. 1.2 Understanding Scanner Profiles Users can import scan data in a Comma-Separated Value (CSV) file format from third-party scanners. Third-party scanners use various attribute names to describe issues they discover. These issue attribute data must be normalized and converted into AppScan Enterprise's issue attribute format before they are imported. Security analysts (with product administrator privileges in AppScan Enterprise) can create scanner profiles for third-party scanners in AppScan Enterprise. A Scanner Profile is a one-to-one mapping from a third-party scanner's issue attributes to AppScan Enterprise's issue attributes. During the import process, AppScan Enterprise uses this mapping to convert the third-party scanner's issues into its own format. Normalizing issues data in this way provides an organization with a centralized issue management capability as issues found using multiple scanners across multiple applications can be triaged using a common issue management view. 2 Importing issues from third party scanners In this real-life example of importing data from a third-party scanner into AppScan Enterprise, I will use the Nessus Vulnerability Scanner. In this step-by-step guide, I will show you how to: Understand the issue attributes of Nessus Customize the issue attribute profile template of AppScan Enterprise to prepare it for managing issues found by Nessus Create a Nessus Scanner Profile in AppScan Enterprise to import issues found by Nessus Import issues found by Nessus 2.1 Understanding Third-Party Scanner Issue Attributes Figure 1: Nessus scan data in CSV format Security issues can be exported from Nessus Vulnerability Scanner in CSV format. Figure 1: Nessus scan data in CSV format shows a snippet of issues found by a Nessus scan (for brevity, only a subset of

5 the attributes that Nessus exports are shown). Here we can see that Nessus describes issues using these attributes: Plugin ID, CVE, Risk, Host, Protocol, Port, Name, and Synopsis. Among the attributes, the CVE attribute describes the Common Vulnerabilities and Exposures ID (see Resources) of the issue. Host, Protocol, and Port describe the network-related artifacts associated with the issue. Risk describes the potential risk if the issue is exploited. Name describes the type of the issue found, and Synopsis gives a brief summary of the issue. These attributes must be mapped to AppScan Enterprise's issue attributes before they are imported. 2.2 Editing the Issue Attribute Profile Template To import issues found by Nessus, prepare AppScan Enterprise to consume the data. Some of the Nessus Issue attributes can be mapped to the preconfigured attributes of AppScan Enterprise. For the remaining Nessus attributes, the security analyst creates corresponding attributes in AppScan Enterprise to use the correct data type. Figure 2: Navigating to the Issue Profile Template editor To add custom issue attributes for Nessus, navigate to the Edit Issue Profile Template dialog box by clicking the Edit Issue Profile Template menu item from the Portfolio tab in the IBM AppScan Enterprise "Monitor" view (see Figure 2: Navigating to the Issue Profile Template editor). Figure 3: Preconfigured AppScan Enterprise issue attributes shows the Issue Profile Template editor dialog box and highlights the preconfigured attributes that are potential candidates for matching attribute data exported by Nessus in red. The Issue Type attribute can be used to consume the Name attribute data from Nessus, which describes the type of the Issue. Similarly, Description, Severity Value, and Port can be used to consume data from Synopsis, Risk, and Port Nessus attributes. However, if none of the preconfigured attributes is a potential match, the security analyst can create new attributes.

6 Figure 3: Preconfigured AppScan Enterprise issue attributes Figure 4: Creating custom attributes to consme Nessus issue data

7 Figure 4: Creating custom attributes to consme Nessus issue data shows an example of creating four custom attributes for consuming the The best practice for creating custom Issue Host, Protocol, CVE, and Plugin ID attributes from Nessus. Because Attributes is to match the these attributes contain textual data that that is relatively short in data type that is the same or length, these attributes use Single Value as the Type. For longer text closest to the attribute data data (i.e., Synopsis), AppScan Enterprise provides a Long Text data type. Similarly, for date and Internet addresses, Date and URL attribute to be imported. types are provided. For attributes that can contain values from a finite set, the Dropdown attribute type is provided. For example, the Risk attribute in Nessus can only contain values from the set {High, Medium, Low, None}. For attributes that contain more than one value (i.e., a list of ports), the Comma Separated Value type is provided. 2.3 Creating a Scanner Profile After creating custom attributes to enable AppScan Enterprise to consume Nessus issue attributes, the security analyst creates a Scanner profile that will map Nessus attributes to the corresponding AppScan Enterprise issue attributes. To create a new scanner profile, navigate to the Edit Scanner Profile template dialog box (see Figure 5: Navigating to the Scanner Profile Template editor). Figure 5: Navigating to the Scanner Profile Template editor In the Edit Scanner Profile Template dialog box, a new Scanner profile can be added by clicking Add (see Figure 6: Creating the Nessus Scanner Profile). After creating the template for the Nessus scanner, define the mapping that will allow AppScan Enterprise to import Nessus issues. Navigate to the Edit Nessus Profile dialog box by clicking the Edit button next to the Nessus Scanner profile.

8 Figure 6: Creating the Nessus Scanner Profile In the Edit Nessus Profile dialog box, a one-to-one mapping is created between Nessus attributes and AppScan Enterprise attributes. Click Add to create a new mapping. For each mapping, provide the Nessus Attribute name. Then, select the corresponding AppScan Enterprise attribute from the Issue Attribute Name list. Figure 7: Mapping Nessus attributes to AppScan Enterprise Issue Attributes contains a snapshot of the mapping for the Nessus scanner.

9 Figure 7: Mapping Nessus attributes to AppScan Enterprise Issue Attributes One important aspect of creating a scanner profile template is to define which attribute(s) can uniquely identify an issue. For example, the exported scan data might contain an auto-incremented integer field for each row. In this case, that field alone can distinguish one issue from another. For our example data in Figure 1: Nessus scan data in CSV format, the fields that distinguish one issue from the next are Plugin ID, CVE, Host, Port, and Protocol. If two rows contain the same data for all of the uniqueness contributor fields, it means that the two issues are essentially duplicates. The uniqueness contributor fields provide a way to reduce duplicate issues from being imported. The uniqueness contributor attributes must be chosen carefully by examining a portion of the scan data and understanding which attribute values can distinguish one issue from the other. In Figure 7: Mapping Nessus attributes to AppScan Enterprise Issue Attributes, the Unique check box is enabled for the attributes mentioned above. If you want to change the order in which the imported issue attributes will be displayed, you can change it via the Edit Layout option (see Figure 7: Mapping Nessus attributes to AppScan Enterprise Issue Attributes). Figure 8: Before editing layout shows the initial ordering of the Nessus scanner profile attributes. The order can be changed by selecting an attribute from the menu and clicking the up/down arrow buttons on the right. Figure 9: After editing layout shows the ordering after the position of some of the attributes were changed. After reordering the attributes, the change can be seen in the About Issue dialog (see Section 3.2: Edit the attributes of a single issue).

10 Figure 8: Before editing layout Figure 9: After editing layout After defining the mapping, the security analyst saves the Scanner Profile by clicking Ok in the Edit Nessus Attribute dialog box and clicking Save in the Edit Scanner Profile Template dialog box. Now AppScan Enterprise is ready to import issues from the Nessus Vulnerability Scanner. Note: Creating a scanner profile is a one-time operation that is performed by the security analyst. After a profile has been created, other users can import issues using that scanner profile. The users do not need to create scanner profiles repeatedly for each of their import operations. 2.4 Importing Issues from CSV files In our example, the Nessus Vulnerability Scanner has run a scan against an application named Demo App. The scan results are exported from Nessus into a CSV file named CITM_ne33ch_orig.csv. In your organization, it might be a developer, quality assurance specialist, or the security analyst who is responsible for scanning applications. Click Import Issues on the Demo App tab in the Appscan Enterprise Monitor view to open the Import Issues dialog box. Figure 10: Importing third party issues into Demo App shows the navigation for performing this action. Figure 10: Importing third party issues into Demo App

11 Figure 11: Import Issues dialog box Figure 11: Import Issues dialog box shows the Import Issues from.csv File dialog box. Select the Scanner profile from the Scanner menu. In addition to the Scanner Profile, a name for the scan is also required. Finally, select a.csv file from the file system using the Select dialog box and click Import. Figure 12: Importing issues shows the progress information shown during an import. The Added, Updated, and Skipped statistics show how many issues were imported, updated (if the same issue existed before), and skipped during the import. After the import process is completed, examine the import log to get a detailed description of the import, such as how many issues were skipped, whether any attribute contained invalid data, and so forth. Figure 12: Importing issues Figure 13: Nessus Issues imported into AppScan Enterprise shows the issues after the Nessus scan data has been successfully imported into AppScan Enterprise. Now, you can view the issues, edit issue details, and triage the issues for performing application risk management tasks.

12 Figure 13: Nessus Issues imported into AppScan Enterprise After import, you may need to edit the values of some attributes. For example, you may need to edit the description attribute of an issue. You can change the value of the attribute in the CSV file and import the file again. This action will update the attribute value for the corresponding issue. Figure 14: Updating issue attributes via import shows such an example where the Description attribute of Issue#2381 was updated. In this way, multiple issues can be updated at once. You can also update the attributes of a single issue via the AppScan Enterprise user interface (see Section 3.2: Edit the attributes of a single issue). Figure 14: Updating issue attributes via import 3 Triaging Issues After importing third-party security scan results into AppScan Enterprise, the security team can proceed to the next task: triaging issues. This task is essential to effectively mitigate security vulnerabilities in an application and reduce the overall risk of the application. Issue triaging has the following benefits: Reduce noise to better focus on the real issues: After discovering vulnerabilities in the application, the security team needs to assign these vulnerabilities to the developers to fix. However, some of the issues found by the scans might be false positives which do not need fixing. These issues can be marked as Noise. In addition, some issues might be already fixed and are awaiting manual verification or review. These issues can be marked as Passed. After classifying

13 issues as Noise or Passed, the security team can then shift the focus on other issues, such as Open, Reopened and In Progress. Issues that are Open or Reopened have a negative impact on the overall risk of an application. Track progress toward remediation: The security team can track progress by evaluating each open issue and classifying it as Fixed, In Progress, Noise, or Passed. Assigning issues a status helps better manage large volumes of issue data. The security team can identify and track what issues to fix first and what does not need to be fixed at all. Show positive results: Classifying issues also allows the security team to show positive results or progress in the organization to give key stakeholders a more realistic picture of the application's security risk. 3.1 Triage a group of issues You can group of issues by severity or by their type. Figure 15: Group issues by severity and Figure 16: Group issues by type shows the IBM AppScan Enterprise Monitor view when issues are grouped by severity and type, respectively. Figure 15: Group issues by severity Figure 16: Group issues by type Mark a group of issues as noise You mark a group of issues as noise to indicate that the issues are not relevant and should no longer be considered as vulnerabilities. Issues are often marked as noise because they are false positives. After import, all issues will be marked as Open by default. To mark a group of issues as noise, select the issues that you have determined as noise. The issue triage action menu will display. From the menu, click Noise. Figure 17: Mark issues as noise shows an example of this action. Also notice that, 176 issues are currently in Active/Open state after import.

14 Figure 17: Mark issues as noise Figure 18: After marking issues as noise shows the result after 4 issues were marked as noise. Notice that the number of Active/Open issues have been reduced to 172 and 4 issues have been resolved as a result of this action. Figure 18: After marking issues as noise Mark a group of issues to be in progress You assign a group of issues as in progress to indicate that you triaged them and determined that these are real vulnerabilities that must be addressed. To mark issues in progress, select issues from the list, and click In Progress in the Issue Triage menu. Figure 19: After marking issues to be In Progress shows the result after 5 issues were selected and marked as In Progress.

15 Figure 19: After marking issues to be In Progress Mark a group of issues as Fixed After marking issues to be In Progress, the developers can investigate the issues and fix them. After the issues are fixed, you can mark those issues as fixed. Fixed issues should not be found in subsequent security scans of the application. Figure 20: After marking issues as fixed shows the result after three issues that were in progress have been fixed. Figure 20: After marking issues as fixed 3.2 Edit the attributes of a single issue You can change the status attribute of an issue from the Monitor view using the Issue Triage menu. However, if you want to change the values of other attributes such as the severity of an imported issue, you can navigate to the About Issue view to perform this task. For example, take a look at issue #2293:

16 SSL Certificate Cannot Be Trusted in Figure 21: Change severity of a single issue. This issue was classified as a Medium severity issue by Nessus. After triage, you may decide that this issue should be treated as a High severity issue. To make this change, click the Issue ID link to open the About Issue dialog. Figure 21: Change severity of a single issue Figure 22: About Issue dialog box shows the attribute values for issue #2293. To change the value of an attribute, click Edit Attributes in the top right corner. Figure 22: About Issue dialog box

17 Figure 23: Edit and save the severity value of an issue shows the About Issue dialog box in edit mode. The severity value of the issue has been changed from Medium to High. Notice that you can also change the Issue status in this dialog. After the necessary attribute values have been edited, click on Save Attributes in the top right corner to save the issue. Figure 24: After changing severity value of an issue shows Issue#2293 grouped under the High severity group after saving. Figure 23: Edit and save the severity value of an issue Figure 24: After changing severity value of an issue You can also change the value of issue attributes which are not part of the scanner profile mapping. For example, if an issue is found in the source file Authentication.java, you can manually edit the issue attribute called Source File to update this information for the issue (see Figure 25: Edit and save the Source File attribute of an issue). You can also add custom issue attributes by adding them to the Issue Attribute Template and edit the attribute value in the About Issue dialog.

18 Figure 25: Edit and save the Source File attribute of an issue 4 Summary To effectively manage the security risks of all the applications in an organization, security teams may use a variety of scanning tools. AppScan Enterprise v9.0.1 has the capability to import security issues found by third-party tools, providing security teams a convenient way to manage the security risks of their application inventory. In this white paper I have provided a step-by-step guide on importing issues from a well known scanning tool into AppScan Enterprise and explained the various triaging techniques that can be used after the import. 5 Resources View a video about triaging issues: Visit the Common Vulnerabilities and Exposures website to find more about CVE Ids. About the Author Anton Barua is a software developer on the IBM Security AppScan Enterprise development team. Prior to this, he was a research assistant in the Queen's Reliable Software Technology Group at Queen's University, Kingston, Canada, where his research focused on the security of web browser extensions.

Chapter 5: Vulnerability Analysis

Chapter 5: Vulnerability Analysis Chapter 5: Vulnerability Analysis Technology Brief Vulnerability analysis is a part of the scanning phase. In the Hacking cycle, vulnerability analysis is a major and important part. In this chapter, we

More information

AppScan Deployment APPLICATION SECURITY SERVICES. Colin Bell. Applications Security Senior Practice Manager

AppScan Deployment APPLICATION SECURITY SERVICES. Colin Bell. Applications Security Senior Practice Manager APPLICATION SECURITY SERVICES AppScan Deployment Colin Bell Applications Security Senior Practice Manager Copyright 2017 HCL Products & Platforms www.hcltech.com The Evolution of Devops 2001 - Continuous

More information

ForeScout Extended Module for Qualys VM

ForeScout Extended Module for Qualys VM ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...

More information

Web Applications (Part 2) The Hackers New Target

Web Applications (Part 2) The Hackers New Target Web Applications (Part 2) The Hackers New Target AppScan Source Edition Terence Chow Advisory Technical Consultant An IBM Rational IBM Software Proof of Technology Hacking 102: Integrating Web Application

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

Tenable.io User Guide. Last Revised: November 03, 2017

Tenable.io User Guide. Last Revised: November 03, 2017 Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link

More information

Tenable.io for Thycotic

Tenable.io for Thycotic How-To Guide Tenable.io for Thycotic Introduction This document describes how to deploy Tenable.io for integration with Thycotic Secret Server. Please email any comments and suggestions to support@tenable.com.

More information

Configuring Security Mitigation Settings for Security Bulletin HPSBPI03569 Protecting Solution Installation Settings

Configuring Security Mitigation Settings for Security Bulletin HPSBPI03569 Protecting Solution Installation Settings Technical White Paper Configuring Security Mitigation Settings for Security Bulletin HPSBPI03569 Protecting Solution Installation Settings Table of contents Overview... 2 Using the Embedded Web Server

More information

ForeScout CounterACT. Configuration Guide. Version 5.0

ForeScout CounterACT. Configuration Guide. Version 5.0 ForeScout CounterACT Core Extensions Module: Reports Plugin Version 5.0 Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Verify That the Plugin Is Running... 5

More information

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018 How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

8 Must Have. Features for Risk-Based Vulnerability Management and More

8 Must Have. Features for Risk-Based Vulnerability Management and More 8 Must Have Features for Risk-Based Vulnerability Management and More Introduction Historically, vulnerability management (VM) has been defined as the practice of identifying security vulnerabilities in

More information

Trustwave Managed Security Testing

Trustwave Managed Security Testing Trustwave Managed Security Testing SOLUTION OVERVIEW Trustwave Managed Security Testing (MST) gives you visibility and insight into vulnerabilities and security weaknesses that need to be addressed to

More information

Manual Physical Inventory Upload Created on 3/17/2017 7:37:00 AM

Manual Physical Inventory Upload Created on 3/17/2017 7:37:00 AM Created on 3/17/2017 7:37:00 AM Table of Contents... 1 Page ii Procedure After completing this topic, you will be able to manually upload physical inventory. Navigation: Microsoft Excel > New Workbook

More information

<Partner Name> RSA ARCHER GRC Platform Implementation Guide. RiskLens <Partner Product>

<Partner Name> RSA ARCHER GRC Platform Implementation Guide. RiskLens <Partner Product> RSA ARCHER GRC Platform Implementation Guide 2.4.1 Wesley Loeffler, RSA Engineering Last Modified: April 25 th, 2018 2.4 Solution Summary The & Archer integration connects

More information

How-to Guide: Tenable Nessus for BeyondTrust. Last Revised: November 13, 2018

How-to Guide: Tenable Nessus for BeyondTrust. Last Revised: November 13, 2018 How-to Guide: Tenable Nessus for BeyondTrust Last Revised: November 13, 2018 Table of Contents Welcome to Nessus for BeyondTrust 3 Integrations 4 Windows Integration 5 SSH Integration 10 API Configuration

More information

Risk Intelligence. Quick Start Guide - Data Breach Risk

Risk Intelligence. Quick Start Guide - Data Breach Risk Risk Intelligence Quick Start Guide - Data Breach Risk Last Updated: 19 September 2018 --------------------------- 2018 CONTENTS Introduction 1 Data Breach Prevention Lifecycle 2 Choosing a Scan Deployment

More information

Integrate IBM Rational Application Developer and IBM Security AppScan Source Edition

Integrate IBM Rational Application Developer and IBM Security AppScan Source Edition Integrate IBM Rational Application Developer and IBM Security AppScan Source Edition Security testing for the Rational Application Developer application G Kiran Kumar Singh & Arnab Roy July 19, 2012 Page

More information

How to Secure Your Cloud with...a Cloud?

How to Secure Your Cloud with...a Cloud? A New Era of Thinking How to Secure Your Cloud with...a Cloud? Eitan Worcel Offering Manager - Application Security on Cloud IBM Security 1 2016 IBM Corporation 1 A New Era of Thinking Agenda IBM Cloud

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

FedRAMP Security Assessment Plan (SAP) Training

FedRAMP Security Assessment Plan (SAP) Training FedRAMP Security Assessment Plan (SAP) Training 1. FedRAMP_Training_SAP_v6_508 1.1 FedRAMP Online Training: SAP Overview Splash Screen Transcript Title of FedRAMP logo. FedRAMP Online Training; Security

More information

IBM Security SiteProtector System User Guide for Security Analysts

IBM Security SiteProtector System User Guide for Security Analysts IBM Security IBM Security SiteProtector System User Guide for Security Analysts Version 2.9 Note Before using this information and the product it supports, read the information in Notices on page 83. This

More information

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun Reading This lecture [McGraw]: Ch. 7-9 2 Seven Touchpoints 1. Code review 2. Architectural

More information

IBM. Migration Cookbook. Migrating from License Metric Tool and Tivoli Asset Discovery for Distributed 7.5 to License Metric Tool 9.

IBM. Migration Cookbook. Migrating from License Metric Tool and Tivoli Asset Discovery for Distributed 7.5 to License Metric Tool 9. IBM License Metric Tool 9.x Migration Cookbook Migrating from License Metric Tool and Tivoli Asset Discovery for Distributed 7.5 to License Metric Tool 9.x IBM IBM License Metric Tool 9.x Migration Cookbook

More information

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints Reading This lecture [McGraw]: Ch. 7-9 CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun 2 Seven Touchpoints Application of Touchpoints

More information

CounterACT Reports Plugin

CounterACT Reports Plugin CounterACT Reports Plugin Version 4.1.8 and Above Table of Contents About the Reports Plugin... 3 Requirements... 3 Supported Browsers... 3 Accessing the Reports Portal... 5 Saving Reports and Creating

More information

User Interface. An Introductory Guide

User Interface. An Introductory Guide User Interface An Introductory Guide Last update: 18 May 2017 Index Introduction 3 Vulnerability Database 4 Overview 5 Targets 6 Findings 7 Vulnerability Details 8 Risk Acceptance 9 Network Interface Configuration

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

WHITEHAT SECURITY. T.C. NIEDZIALKOWSKI Technical Evangelist. DECEMBER 2012

WHITEHAT SECURITY. T.C. NIEDZIALKOWSKI Technical Evangelist. DECEMBER 2012 WHITEHAT SECURITY DECEMBER 2012 T.C. NIEDZIALKOWSKI Technical Evangelist tc@whitehatsec.com WhiteHat Security Company Overview Headquartered in Santa Clara, CA WhiteHat Sentinel SaaS end-to-end website

More information

TRIPWIRE VULNERABILITY RISK METRICS CONNECTING SECURITY TO THE BUSINESS

TRIPWIRE VULNERABILITY RISK METRICS CONNECTING SECURITY TO THE BUSINESS CONFIDENCE: SECURED WHITE PAPER IRFAHN KHIMJI, CISSP TRIPWIRE VULNERABILITY RISK METRICS CONNECTING SECURITY TO THE BUSINESS ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE EXECUTIVE SUMMARY A vulnerability

More information

Data Breach Risk Scanning and Reporting

Data Breach Risk Scanning and Reporting Data Breach Risk Scanning and Reporting 2017. SolarWinds. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document

More information

RiskSense Attack Surface Validation for Web Applications

RiskSense Attack Surface Validation for Web Applications RiskSense Attack Surface Validation for Web Applications 2018 RiskSense, Inc. Keeping Pace with Digital Business No Excuses for Not Finding Risk Exposure We needed a faster way of getting a risk assessment

More information

Perceptive Matching Engine

Perceptive Matching Engine Perceptive Matching Engine Advanced Design and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: January 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

Security Configuration Assessment (SCA)

Security Configuration Assessment (SCA) Security Configuration Assessment (SCA) Getting Started Guide Security Configuration Assessment (SCA) is a lightweight cloud service which can quickly perform the configuration assessment of the IT assets,

More information

Pure Storage FlashArray Management Pack for VMware vrealize Operations Manager User Guide. (Version with Purity 4.9.

Pure Storage FlashArray Management Pack for VMware vrealize Operations Manager User Guide. (Version with Purity 4.9. Pure Storage FlashArray Management Pack for VMware vrealize Operations Manager User Guide (Version 1.0.139 with Purity 4.9.x or higher) Sunday, November 27, 2016 16:13 Pure Storage FlashArray Management

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System and Software Architecture Description (SSAD) The Los Angeles Community Garden Inventory and Locator Team 13 Ardalan Yousefi Cole Cecil Jeff Tonkovich Shi-Xuan Zeng Project Manager Integrated Independent

More information

IBM Proventia Network Enterprise Scanner

IBM Proventia Network Enterprise Scanner Protecting corporate data with preemptive risk identification IBM Proventia Network Enterprise Scanner Identifying risk and prioritizing protection IBM Proventia Network Enterprise Scanner * (Enterprise

More information

ForeScout CounterACT. Configuration Guide. Version 2.2

ForeScout CounterACT. Configuration Guide. Version 2.2 ForeScout CounterACT Core Extensions Module: IOC Scanner Plugin Version 2.2 Table of Contents About the CounterACT IOC Scanner Plugin... 4 Use Cases... 5 Broaden the Scope and Capacity of Scanning Activities...

More information

CounterACT IOC Scanner Plugin

CounterACT IOC Scanner Plugin CounterACT IOC Scanner Plugin Version 2.0.1 Table of Contents About the CounterACT IOC Scanner Plugin... 4 Use Cases... 5 Broaden the Scope and Capacity of Scanning Activities... 5 Use CounterACT Policy

More information

Tenable.io Evaluation Workflow. Last Revised: August 22, 2018

Tenable.io Evaluation Workflow. Last Revised: August 22, 2018 Tenable.io Evaluation Workflow Last Revised: August 22, 2018 Table of Contents Welcome 3 Part One 4 Create User(s) and Group(s) 5 Create Target Group(s) 6 Create Exclusion Lists 7 Create an External Scan

More information

SHA-1 to SHA-2. Migration Guide

SHA-1 to SHA-2. Migration Guide SHA-1 to SHA-2 Migration Guide Web-application attacks represented 40 percent of breaches in 2015. Cryptographic and server-side vulnerabilities provide opportunities for cyber criminals to carry out ransomware

More information

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018 How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

Skybox. Change Manager Help

Skybox. Change Manager Help Skybox Change Manager Help 8.5.600 Proprietary and Confidential to Skybox Security. 2017 Skybox Security, Inc. All rights reserved. Due to continued product development, the information contained in this

More information

Collaborate in Qlik Sense. Qlik Sense February 2018 Copyright QlikTech International AB. All rights reserved.

Collaborate in Qlik Sense. Qlik Sense February 2018 Copyright QlikTech International AB. All rights reserved. Collaborate in Qlik Sense Qlik Sense February 2018 Copyright 1993-2018 QlikTech International AB. All rights reserved. Copyright 1993-2018 QlikTech International AB. All rights reserved. Qlik, QlikTech,

More information

How-to Guide: Tenable.io for Lieberman. Last Revised: August 14, 2018

How-to Guide: Tenable.io for Lieberman. Last Revised: August 14, 2018 How-to Guide: Tenable.io for Lieberman RED Last Revised: August 14, 2018 Table of Contents Introduction 3 Integrations 4 Windows Integration 5 SSH Integration 11 Database Integration 17 Additional Information

More information

Virto SharePoint Forms Designer for Office 365. Installation and User Guide

Virto SharePoint Forms Designer for Office 365. Installation and User Guide Virto SharePoint Forms Designer for Office 365 Installation and User Guide 2 Table of Contents KEY FEATURES... 3 SYSTEM REQUIREMENTS... 3 INSTALLING VIRTO SHAREPOINT FORMS FOR OFFICE 365...3 LICENSE ACTIVATION...4

More information

MarkLogic Server. Query Console User Guide. MarkLogic 9 May, Copyright 2018 MarkLogic Corporation. All rights reserved.

MarkLogic Server. Query Console User Guide. MarkLogic 9 May, Copyright 2018 MarkLogic Corporation. All rights reserved. Query Console User Guide 1 MarkLogic 9 May, 2017 Last Revised: 9.0-7, September 2018 Copyright 2018 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Query Console User Guide

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2 Forescout Version 2.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

This shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict

This shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict 1 This shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict access between segments This creates a layered defense

More information

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

Vulnerability Validation Tutorial

Vulnerability Validation Tutorial Vulnerability Validation Tutorial Last updated 01/07/2014-4.8 Vulnerability scanning plays a key role in the vulnerability management process. It helps you find potential vulnerabilities so that you can

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...

More information

ehepqual- HCV Quality of Care Performance Measure Program

ehepqual- HCV Quality of Care Performance Measure Program NEW YORK STATE DEPARTMENT OF HEALTH AIDS INSTITUTE ehepqual- HCV Quality of Care Performance Measure Program USERS GUIDE A GUIDE FOR PRIMARY CARE AND HEPATITIS C CARE PROVIDERS * * For use with ehepqual,

More information

How to Transition from Nessus to SecurityCenter Reports

How to Transition from Nessus to SecurityCenter Reports HOW-TO GUIDE How to Transition from Nessus to SecurityCenter Reports Using SecurityCenter for continuous network monitoring and vulnerability assessment will give you a greatly expanded set of features

More information

MWR InfoSecurity Security Advisory. IBM Lotus Domino Accept- Language Stack Overflow. 20 th May Contents

MWR InfoSecurity Security Advisory. IBM Lotus Domino Accept- Language Stack Overflow. 20 th May Contents Contents MWR InfoSecurity Security Advisory IBM Lotus Domino Accept- Language Stack Overflow 20 th May 2008 2008-05-20 Page 1 of 8 Contents Contents 1 Detailed Vulnerability Description...5 1.1 Introduction...5

More information

Imagine. Create. Discover. User Manual. TopLine Results Corporation

Imagine. Create. Discover. User Manual. TopLine Results Corporation Imagine. Create. Discover. User Manual TopLine Results Corporation 2008-2009 Created: Tuesday, March 17, 2009 Table of Contents 1 Welcome 1 Features 2 2 Installation 4 System Requirements 5 Obtaining Installation

More information

User Guide. Version R95. English

User Guide. Version R95. English Software Management User Guide Version R95 English September 22, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

MarkLogic Server. Query Console User Guide. MarkLogic 9 May, Copyright 2017 MarkLogic Corporation. All rights reserved.

MarkLogic Server. Query Console User Guide. MarkLogic 9 May, Copyright 2017 MarkLogic Corporation. All rights reserved. Query Console User Guide 1 MarkLogic 9 May, 2017 Last Revised: 9.0-1, May, 2017 Copyright 2017 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Query Console User Guide 1.0

More information

CounselLink Reporting. Designer

CounselLink Reporting. Designer CounselLink Reporting Designer Contents Overview... 1 Introduction to the Document Editor... 2 Create a new document:... 2 Document Templates... 3 Datasets... 3 Document Structure... 3 Layout Area... 4

More information

Reinvent Your 2013 Security Management Strategy

Reinvent Your 2013 Security Management Strategy Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for

More information

Lionbridge Connector for Sitecore. User Guide

Lionbridge Connector for Sitecore. User Guide Lionbridge Connector for Sitecore User Guide Version 4.0.2 March 28, 2018 Copyright Copyright 2018 Lionbridge Technologies, Inc. All rights reserved. Lionbridge and the Lionbridge logotype are registered

More information

AlienVault USM Appliance for Security Engineers 5 day course outline. Module 2: USM Appliance Basic Configuration and Verifying Operations

AlienVault USM Appliance for Security Engineers 5 day course outline. Module 2: USM Appliance Basic Configuration and Verifying Operations AlienVault USM Appliance for Security Engineers 5 day course outline Course Introduction Module 1: Overview The Course Introduction provides students with the course objectives and prerequisite learner

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System and Software Architecture Description (SSAD) The Los Angeles Community Garden Inventory and Locator Team 13 Ardalan Yousefi Cole Cecil Jeff Tonkovich Shi-Xuan Zeng Project Manager Integrated Independent

More information

Collaborate in Qlik Sense. Qlik Sense April 2018 Copyright QlikTech International AB. All rights reserved.

Collaborate in Qlik Sense. Qlik Sense April 2018 Copyright QlikTech International AB. All rights reserved. Collaborate in Qlik Sense Qlik Sense April 2018 Copyright 1993-2018 QlikTech International AB. All rights reserved. Copyright 1993-2018 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik

More information

USING GOOGLE PRESENTATIONS A New Way to Present

USING GOOGLE PRESENTATIONS A New Way to Present USING GOOGLE PRESENTATIONS A New Way to Present OBJECTIVES 1. Creating a Google Account 2. Creating a New Presentation a. Choosing a Template b. Adding a File Name 3. Creating a Title Slide 4. Adding a

More information

Marketer's Guide. User guide for marketing analysts and business users

Marketer's Guide. User guide for marketing analysts and business users Marketer's Guide Rev: 18 November 2014 Email Campaign Manager 2.2 for Sitecore CMS 7.5 Marketer's Guide User guide for marketing analysts and business users Table of Contents Chapter 1 Introduction...

More information

Roxen Content Provider

Roxen Content Provider Roxen Content Provider Generation 3 Templates Purpose This workbook is designed to provide a training and reference tool for placing University of Alaska information on the World Wide Web (WWW) using the

More information

SOLUTION BRIEF. RiskSense Platform. RiskSense Platform the industry s most comprehensive, intelligent platform for managing cyber risk.

SOLUTION BRIEF. RiskSense Platform. RiskSense Platform the industry s most comprehensive, intelligent platform for managing cyber risk. RiskSense Platform RiskSense Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 27 RiskSense, Inc. Executive Summary The RiskSense Platform is a Software-as-a-Service

More information

CONFIGURING SAFE V4.0 IN THE IBM COLLABORATIVE LIFECYCLE MANAGEMENT

CONFIGURING SAFE V4.0 IN THE IBM COLLABORATIVE LIFECYCLE MANAGEMENT CONFIGURING SAFE V4.0 IN THE IBM COLLABORATIVE LIFECYCLE MANAGEMENT Abstract In this document, we provide step-by-step guidance to configure support for the SAFe V4.0 methodology in CLM tooling. Amy Silberbauer

More information

ThreatConnect Learning Exercises

ThreatConnect Learning Exercises ThreatConnect Learning Exercises The following exercises will teach you some of the important features within the ThreatConnect platform. You will learn various ways of adding intelligence data into ThreatConnect,

More information

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices

EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices EM L04 Using Workflow to Manage Your Patch Process and Follow CISSP Best Practices Hands-On Lab Description Most corporations today have some form of patch process in place. In this session, you will learn

More information

KYOCERA Net Viewer 5.3 User Guide

KYOCERA Net Viewer 5.3 User Guide KYOCERA Net Viewer. User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Guide to Importing Data

Guide to Importing Data Guide to Importing Data CONTENTS Data Import Introduction... 3 Who should use the Gold-Vision Import Client?... 3 Prepare your data... 3 Downloading and installing the import client... 7 Step One Getting

More information

Introduction to Qualtrics ITSC

Introduction to Qualtrics ITSC Introduction to Qualtrics ITSC August 2015 Contents A. General Information... 4 B. Login... 5 New Qualtrics User... 5 Existing Qualtrics User... 7 C. Navigating Qualtrics... 9 D. Create Survey... 10 Quick

More information

Tenant Administration. vrealize Automation 6.2

Tenant Administration. vrealize Automation 6.2 vrealize Automation 6.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.1.0 Table of Contents About this Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

Dell License Manager Version 1.2 User s Guide

Dell License Manager Version 1.2 User s Guide Dell License Manager Version 1.2 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either

More information

OnCommand Insight 7.2

OnCommand Insight 7.2 OnCommand Insight 7.2 Planning Guide for the Java UI March 2016 215-10395_A0 doccomments@netapp.com Table of Contents 3 Contents OnCommand Insight Plan features... 5 OnCommand Insight product portfolio...

More information

Lionbridge Connector for Episerver CMS 11. User Guide

Lionbridge Connector for Episerver CMS 11. User Guide Lionbridge Connector for Episerver CMS 11 User Guide Version 1.4.2 June 8, 2018 Copyright Copyright 2018 Lionbridge Technologies, Inc. All rights reserved. Lionbridge and the Lionbridge logotype are registered

More information

HQ 754 th Electronic Systems Group. Application Software Assurance Center of Excellence (ASACoE) Maj Michael Kleffman, CTO ASACoE

HQ 754 th Electronic Systems Group. Application Software Assurance Center of Excellence (ASACoE) Maj Michael Kleffman, CTO ASACoE HQ 754 th Electronic Systems Group Application Software Assurance Center of Excellence (ASACoE) Maj Michael Kleffman, CTO ASACoE Overview Context and Mission Resources and Tempo Accomplishments Services

More information

Terms, Methodology, Preparation, Obstacles, and Pitfalls. Vulnerability Assessment Course

Terms, Methodology, Preparation, Obstacles, and Pitfalls. Vulnerability Assessment Course Terms, Methodology, Preparation, Obstacles, and Pitfalls Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/

More information

How-to Guide: JIRA Plug-in for Tenable.io. Last Revised: January 29, 2019

How-to Guide: JIRA Plug-in for Tenable.io. Last Revised: January 29, 2019 How-to Guide: JIRA Plug-in for Tenable.io Last Revised: January 29, 2019 Table of Contents Welcome to JIRA Plug-in for Tenable.io 3 Prerequisites 4 Custom Fields Created in JIRA 5 Install 10 Configure

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

A Strategic Approach to Web Application Security

A Strategic Approach to Web Application Security A STRATEGIC APPROACH TO WEB APP SECURITY WHITE PAPER A Strategic Approach to Web Application Security Extending security across the entire software development lifecycle The problem: websites are the new

More information

6. In the last Import Wizard dialog box, click Finish. Saving Excel Data in CSV File Format

6. In the last Import Wizard dialog box, click Finish. Saving Excel Data in CSV File Format PROCEDURES LESSON 39: WKING WITH FILE FMATS Using the Compatibility Checker 2 Click Info 3 Click Check for Issues 4 Click Check Compatibility 5 Review the issues and click OK Importing a File 1 Click the

More information

Introduction to rules

Introduction to rules Introduction to rules Rules allow you to control the behavior of a form by performing actions that take place based on conditions within the form, or events that take place when filling out a form. The

More information

ForeScout Extended Module for Bromium Secure Platform

ForeScout Extended Module for Bromium Secure Platform ForeScout Extended Module for Bromium Secure Platform Version 1.3.0 Table of Contents About the Bromium Integration... 3 Additional Bromium Secure Platform Documentation... 3 About This Module... 3 How

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

OpenForms360 Validation User Guide Notable Solutions Inc.

OpenForms360 Validation User Guide Notable Solutions Inc. OpenForms360 Validation User Guide 2011 Notable Solutions Inc. 1 T A B L E O F C O N T EN T S Introduction...5 What is OpenForms360 Validation?... 5 Using OpenForms360 Validation... 5 Features at a glance...

More information

Navigating the River of Woe to EPIC Vulnerability Assessments

Navigating the River of Woe to EPIC Vulnerability Assessments SEC460.3 Enterprise Threat and Vulnerability Assessment Navigating the River of Woe to EPIC Vulnerability Assessments Copyright 2016-2017 Matthew Toussain All Rights Reserved 2 CHOICE You dash out of the

More information

The CISO is the owner of the vulnerability management process. This person designs the process and ensures is implemented as designed.

The CISO is the owner of the vulnerability management process. This person designs the process and ensures is implemented as designed. University of Alabama at Birmingham VULNERABILITY MANAGEMENT RULE May 19, 2017 Related Policies, Procedures, and Resources Data Protection and Security Policy Data Classification Rule 1.0 Introduction

More information

Sophos Mobile. startup guide. Product Version: 8.1

Sophos Mobile. startup guide. Product Version: 8.1 Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

Certified Secure Web Application Engineer

Certified Secure Web Application Engineer Certified Secure Web Application Engineer ACCREDITATIONS EXAM INFORMATION The Certified Secure Web Application Engineer exam is taken online through Mile2 s Assessment and Certification System ( MACS ),

More information

12/05/2017. Geneva ServiceNow Security Management

12/05/2017. Geneva ServiceNow Security Management 12/05/2017 Security Management Contents... 3 Security Incident Response...3 Security Incident Response overview... 3 Get started with Security Incident Response... 6 Security incident creation... 40 Security

More information

Automated, Real-Time Risk Analysis & Remediation

Automated, Real-Time Risk Analysis & Remediation Automated, Real-Time Risk Analysis & Remediation TABLE OF CONTENTS 03 EXECUTIVE SUMMARY 04 VULNERABILITY SCANNERS ARE NOT ENOUGH 06 REAL-TIME CHANGE CONFIGURATION NOTIFICATIONS ARE KEY 07 FIREMON RISK

More information

Integrate Saint Security Suite. EventTracker v8.x and above

Integrate Saint Security Suite. EventTracker v8.x and above EventTracker v8.x and above Publication Date: June 6, 2018 Abstract This guide provides instructions to configure Saint Security Suite to send crucial events to EventTracker Enterprise by means of syslog.

More information

Contents. Add a Form Element to a Group Box Add a Field to a Form... 22

Contents. Add a Form Element to a Group Box Add a Field to a Form... 22 Workflow Design Guide Version 17 November 2017 Contents About This Guide... 7 Workflows and Forms Overview... 7 Security Permissions for Workflows and Forms... 8 Search for a Workflow Design, Workflow

More information

How-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018

How-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018 How-to Guide: Tenable for McAfee epolicy Orchestrator Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable for McAfee epolicy Orchestrator 1 Introduction 3 Integration Requirements 4 Tenable

More information