July 18, (Revision 3)
|
|
- Winfred Sullivan
- 5 years ago
- Views:
Transcription
1 3D Tool 2.0 User Guide July 18, 2011 (Revision 3) Copyright Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc. The ProfessionalFeed is a trademark of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners. Tenable Network Security, Inc Columbia Gateway Drive, Suite 100, Columbia, MD sales@tenable.com
2 Table of Contents Introduction... 3 Standards and Conventions... 4 Prerequisites... 4 Important Terms... 4 Topology... 4 Modifier... 4 Layout... 5 Architecture... 5 SecurityCenter Communication... 5 Installing the 3D Tool... 5 Upgrading... 5 Configuring the 3D Tool... 6 Configure SecurityCenter Queries... 6 Load CCD (Compiled Chart Data)... 6 Load DTA (Data Table File)... 6 Configure a New Topology... 7 Modifiers...13 Node Traits List...14 Connections List...20 Counts List...23 About Tenable Network Security...28 Introduction Copyright Tenable Network Security, Inc. 2
3 INTRODUCTION This document covers the installation and operation of Tenable s 3D Tool. Please share your comments and suggestions with us by ing them to support@tenable.com. A basic understanding of the SecurityCenter including types of vulnerabilities, asset lists, and Nessus traceroute scans is assumed. Tenable s 3D Tool is a Windows application that is used to query data from a SecurityCenter 4 server and present it in an interactive visual console to facilitate presentations and security analysis. Tenable developed the 3D Tool to help better communicate different types of information available in SecurityCenter, such as: > Nessus vulnerability data > Network topologies > PVS data, including passively discovered vulnerabilities, network connections and new network devices > Event data discovered and normalized by the Log Correlation Engine (LCE), including intrusion detection, firewall, netflow and syslog data Many people are visual learners, preferring to use images, colors and charts to organize information and communicate with others. The 3D Tool provides a mechanism to communicate large amounts of technical data in visual terms that are easier to understand than written text. Using three dimensions to visualize network topology is easier than using two dimensions. Most Tenable customers have routing networks that are sufficiently complex enough to clutter any 2D topology map. Using 3D provides a visual display of the network topology and events that is easier to understand and navigate interactively. The 3D Tool can be applied in a number of different ways depending on the requirements. The typical application is to install it on a desktop in a network that can access the SecurityCenter continuously so the data can be updated. However, once the data is loaded on the 3D Tool desktop, it no longer needs this connectivity. This enables managers and technical staff to examine security data from remote locations. The desktops that are used to run the 3D Tool will contain sensitive data from the SecurityCenter. It is assumed that these desktops will be secured from unauthorized access according to the organization s site security policy. The 3D Tool is available to all SecurityCenter customers and can be obtained from the Tenable Support Portal. For more information, please contact Tenable Support. The 3D Tool is available for all major Windows releases and works on most hardware platforms, although increased memory, multi-cpu and high-end graphic card configurations will greatly improve performance. Copyright Tenable Network Security, Inc. 3
4 Tenable has encountered some performance issues with dual monitor configurations with video chipsets that did not perform video acceleration for the second monitor. STANDARDS AND CONVENTIONS Throughout the documentation, filenames, daemons and executables are indicated with a courier bold font such as gunzip, httpd and /etc/passwd. Important notes and considerations are highlighted with this symbol and grey text boxes. Tips, examples and best practices are highlighted with this symbol and white on blue text. PREREQUISITES The 3D Tool operates on Microsoft Windows 7, Vista, XP, 2000, 2003 and The 3D Tool also requires one or more installed SecurityCenters with valid organizational login accounts to access data. 3D Tool users launch the application on their system and then use their SecurityCenter account to retrieve data. Retrieved data can be saved for access later, even if the SecurityCenter is not available. The 3D Tool does not require a specific license key, but users must agree to the Software License Agreement (SLA) before installation will proceed. Users can install multiple 3D Tools, each one of which can communicate with multiple SecurityCenters. Tenable has performed a variety of testing on different display resolutions. If you encounter a compatibility issue with your display, please contact Tenable support. IMPORTANT TERMS This document extensively uses 3D Tool-specific terms that are defined in this section to aid in fully understanding how to use the 3D Tool. Topology A topology is a saved configuration file (.ccd extension) that is a visual representation of the network layout with or without any applied modifiers and is based on a vulnerability query using the Detailed Vulnerability List analysis tool. There must be a SecurityCenter query that includes results from Nessus plugin (Traceroute) for a topology to be built. Topologies can be saved for later reuse, such as off-line situations where demonstrations are required. Modifier A modifier is a saved configuration file (.mld extension) that contains modifications to the visual attributes of the topology to highlight important host or event traits. For example, a modifier could be created that changes the icons displayed on all hosts that are running Copyright Tenable Network Security, Inc. 4
5 Linux. Groups of modifiers can be saved as modlists for convenience and then applied to a selected topology. Modlists expedite the process of loading previously saved custom topology configurations. Layout A layout is a saved configuration file (.vlo extension) that contains the current topology display based on the screen configuration. For example, it is possible to use the 3D Tool with five monitors and multiple split screens (e.g., two views per monitor). Loading a saved layout loads the previously saved display settings. ARCHITECTURE The 3D Tool architecture is based on the ability to query a complex network topology and create a graphic that is easy to understand at varying levels. It does so by directly querying SecurityCenter for event, vulnerability and asset data over port 443 (configurable) using a SecurityCenter organizational user s account. The 3D Tool is able to query all data available to that user using SecurityCenter predefined queries. Communications occur in a one-way data flow from SecurityCenter to the Windows 3D Tool host. Data displayed using the 3D Tool is saved to binary files for rapid reload. Saved data files from a topology can be transferred to any other host running the 3D Tool to facilitate presentations in off-line modes. SecurityCenter Communication The 3D Tool uses SSL certificates to communicate with SecurityCenter to perform queries. These SSL certificates can be verified using the 3D Tool user interface for authenticity to ensure the remote host is correct. Once data resides on the 3D Tool, connectivity to the SecurityCenter is no longer needed. It is only necessary to log in to the SecurityCenter to retrieve new data. INSTALLING THE 3D TOOL Follow these simple steps to install the 3D Tool on a Windows system: 1. Download the setup executable from the Tenable Support Portal located at: Confirm the integrity of the installation package by comparing the download md5 checksum with the one listed in the product release notes. 2. Run the installation program, named similar to 3D_Tool_2_x_x_x32.exe. 3. Click Next when prompted to install the Tenable 3D Tool v2 on your computer and click Install to begin the installation. The executable will launch the installer, prompt for an installation location and create a Tenable Network Security program group that contains a link to the 3D Tool application. No manual configuration is performed during the installation process. 4. Once installation is complete, the 3D Tool can be launched via a desktop shortcut or from the Tenable Network Security start menu. UPGRADING As newer versions of the 3D Tool become available, users can run the new.exe. The upgrade will maintain data from previous installations of the 3D Tool v2 and backup data from legacy installations of the 3D Tool v1.x. Although legacy data 3D Tool v1 data is backed up it is not available through the new installation. Copyright Tenable Network Security, Inc. 5
6 CONFIGURING THE 3D TOOL Click on the question mark icon in the upper right-hand corner of the user interface and drag it over any item that you are uncertain about to obtain more detailed information. CONFIGURE SECURITYCENTER QUERIES Before launching the 3D Tool, one or more custom queries that are used by the 3D Tool must be created on the SecurityCenter to perform two primary functions: 1. Generate the initial topology map vulnerability query based on plugin and the Detailed Vulnerability List analysis tool. When selecting a topology query from the main screen, only queries that match these criteria are shown. 2. Facilitate modifier creation queries based on either vulnerability or event data to modify the topology view (e.g., add custom icons based on Operating System). These queries are selected by clicking on Modifier and choosing the desired modifier. The list below provides available query types for each modifier that can be applied to the base topology: > Node Traits List Modifier Asset List, Vulnerability IP Summary, Events IP Summary > Connections List Modifier List of Events or Show Connections (uses Detailed Vulnerability List and PVS plugin ID 3) > Counts Modifier Vulnerability IP Summary or Events IP Summary The Modifiers section of this document provides more detail about the modifier creation process and specific query requirements. LOAD CCD (COMPILED CHART DATA) Choose this option to load a previously saved.ccd file. When a topology diagram is created, all of the data required to display and manage it is stored as a binary file. This.ccd file format is designed to allow the program to load the diagram quickly and to use less space in computer memory to represent a network topology and its associated data. LOAD DTA (DATA TABLE FILE) DTA files are not currently the native format used by the 3D Tool, and are currently required only at the direction of Tenable s Support team. They may also be used for future 3D Tool enhancement. Choose this option to make and load a new CCD (.ccd file extension) file from a.dta file. The 3D Tool is designed to accept data from multiple sources to use for its displays. The.dta file is an intermediate file format that is designed to store a wide variety of data standardized as an efficient source for various purposes. Copyright Tenable Network Security, Inc. 6
7 When you choose this option, the newly created.ccd file will have the same base name and location as the.dta file that you select. When a.dta file is created, it is saved for later use by functions of the 3D Tool that may be able to relate data across various presentation types from the same source. CONFIGURE A NEW TOPOLOGY Use the steps below to create and configure a new topology view: 1. Launch the 3D Tool interface by double-clicking on the desktop or start menu icon. Once launched, a screen similar to the one below is displayed. The top two configuration panes will automatically hide when not in use and can be displayed by clicking in the 3D Tool window towards the top of the visible area. The lower configuration pane contains several elements that can be used to assist with the configuration process: To the right of the configuration gear icon are two icons that determine whether the interface is displayed vertically or horizontally. If the display is split vertically, the resulting topology might look similar to the one below: Copyright Tenable Network Security, Inc. 7
8 In the same way, the display can be split horizontally numerous times to allow multiple 3D visualizations to be shown vertically. If a layout was previously created, click the arrow icon layout to use. Otherwise, click the gear icon next to the save icon in the upper pane and choose the to start the configuration process. Use the pin icon to keep the desired configuration pane open at all times. If at any point you want more information about a particular option, click on the question mark icon and drag it over the item that you wish to obtain more information about for a detailed description. 2. If not previously performed, select the SC4 Query section to enter a SecurityCenter login. This login data will be reused with subsequent accesses to retrieve updated data. Copyright Tenable Network Security, Inc. 8
9 Click the Manage Logins command button to enter a SC4 login that will be used to retrieve data. Complete all required fields similar to the screen capture below: A default login named Default Login will already exist. Double-click the name field to create your own login. Copyright Tenable Network Security, Inc. 9
10 After clicking on Test Login for the first time, a certificate warning is displayed. Assuming you trust the remote host, click through the warning to perform the login. 3. Once the test login has been successfully performed, click Done to save your new login and continue. The new login is now listed in the login dropdown box. If at any point you wish to view the certificate of the remote host after performing the first query, click View Cert to display the certificate of the remote host. 4. Click List Queries to retrieve a list of available queries from the remote SecurityCenter. The 3D Tool will now log into the SecurityCenter and retrieve a list of available queries. For a new topology to be built, the query type must be Vunerability, the analysis tool must be Detailed Vulnerability List, and there must be query results from Nessus plugin (Traceroute). Once completed, the Queries dropdown will appear similar to the following: Copyright Tenable Network Security, Inc. 10
11 5. Select the desired query and then click Query Now to continue. At this point you will be prompted to save a Compiled Chart File. 6. Enter the desired name for this file that is saved for later reuse and then click Create. Copyright Tenable Network Security, Inc. 11
12 Allow the records to complete processing and populate your new topology. Depending on the number of records, this process can take anywhere from several seconds to over an hour. Please allow adequate time for this process to complete. After the data has been retrieved, the topology screen is automatically populated, similar to the screen capture below: Copyright Tenable Network Security, Inc. 12
13 Notice in the display above that a cloud icon is displayed in the upper lefthand section of the user interface. This icon represents the public Internet with each of the dots surrounding it representing a particular public Class A subnet. This representation is useful to display connections to and from public Internet sites. 7. Use your mouse s right/left buttons and scroll button to move or rotate the display as desired. In addition, the arrow keys on the keyboard can be used to adjust the display. MODIFIERS Modifiers are options that can be applied to specialize or modify the topology display based on your unique needs. There are three available modifier types: Node Traits List, Connections List and Counts List. The Node Traits List modifier allows you to adjust host attributes such as color, shape, icon and vertical offset. The Connections List modifier visually displays connections using lines of varying height and source/destination color for contrast. The Counts List modifier displays counts of vulnerability and/or events per host with a vertical bar. Copyright Tenable Network Security, Inc. 13
14 Node Traits List As mentioned earlier, a Node Traits List is a modifier that is used to modify the host icon based on detected host attributes. For example, hosts can be assigned special icons based on the detected operating system. There are four types of connections list queries: Default, Asset List, Vuln IP Summary and Event IP Summary. These are the queries that must exist on the SecurityCenter for this modifier to obtain its data. The table below describes each of these queries in detail: Table 1: Nodes List Query Types Option Default Asset List Description Uses a query type of Vulnerability displayed with the IP Summary analysis tool. All records are requested. All asset lists are requested. Vuln IP Summary Event IP Summary Uses a query type of Vulnerability displayed with the IP Summary analysis tool. The query s filters are used. Uses a query type of Event displayed with the IP Summary analysis tool. The query s filters are used. Use the steps below to add a Node Traits List (host modifier). 1. Load the desired topology and click the Modifiers button at the top of the topology configuration screen below the title bar. A screen similar to the one below is displayed: Copyright Tenable Network Security, Inc. 14
15 2. Click New to add a new modifier. After selecting the desired modifier type, you are prompted to save a file that will contain the modifier definitions. Enter the desired name of this file and then click Create : Copyright Tenable Network Security, Inc. 15
16 3. Highlight the modifier in the list and click Edit and then Configure to add attributes. 4. A screen similar to the following is displayed: Copyright Tenable Network Security, Inc. 16
17 5. Use the login ( test in this case) created during the initial topology creation. 6. Under Query Type choose Asset List. 7. Choose List Queries and then select the desired query. In our case, the query name was OS Windows. Then click Perform Query to pull the assets that match this query on the remote SecurityCenter. After clicking Perform Query, you will be prompted to choose from a repository on the remote host that contains the desired host data. Either select Use all repositories, or individually select the desired repository. 8. For Trait Select choose Icon and then choose the default Windows icon. Copyright Tenable Network Security, Inc. 17
18 9. Click Done and a list of affected hosts is displayed. In addition to the display list, existing modifier lists can be updated by clicking on Update as shown in the screen capture below. Copyright Tenable Network Security, Inc. 18
19 10. Click Done again. Copyright Tenable Network Security, Inc. 19
20 Connections List A Connections List is used to modify the display based on detected events or PVS connection data. Events are connections from one host to another host at a specific point in time. Connection lines are displayed based on connection attributes such as source host, destination host and event query parameters. There are three types of connections list queries: Default, Show Connections and List of Events. These are the queries that must exist on the SecurityCenter for this modifier to obtain its data. The table below describes each of these queries including parameters that must be used to create them: Table 2: Connections List Query Types Option Default Description Uses a query type of Event displayed with the List of Events analysis tool. All records are requested. Copyright Tenable Network Security, Inc. 20
21 Show Connections This query is based on PVS connection records. Setting the appropriate filters is important with this query because PVS connection counts can be quite large and unfiltered can lead to a lengthy record download time. Uses a query type of Vulnerability with the Detailed Vulnerability List analysis tool. Only records based on PVS plugin ID 3 are displayed and the query s filters are also used. List of Events Uses a query type of Event displayed with the List of Events analysis tool. The query s filters are used. The example below displays all connections where the target port is 21 (FTP). The source portion of the line is displayed in red, while the destination of the connection is displayed in blue. Hovering the cursor over the source of one of these events displays the IP address of the source in the lower right-hand corner of the interface. Copyright Tenable Network Security, Inc. 21
22 Use the steps below to add a connections list similar to the one shown above. 1. Load the main topology screen and click the configure icon ( ) to begin the configuration process. 2. Next to the modifiers list, click New to create a new modifier and choose Connections List from the dropdown. 3. In the File box at the top of the screen, enter a descriptive name to be assigned the modifier and click Create. 4. Click Configure to start editing your new modifier. 5. The modifier edit screen looks similar to the screen capture below: Copyright Tenable Network Security, Inc. 22
23 6. In this example, we have used our main login named SC4 under Manage Logins. We then clicked on List Queries to display all available queries of this type. The chosen query (FTP Events) was created to only show events whose target port is port 21. After clicking on Perform Query we were prompted to select the repository from which the data will be obtained. This helps narrow down the data retrieval location. 7. For event source color, destination color and line height, we chose display options that would help us readily differentiate the source from the destination of the event. The Line Height and Lines drawn above layout options affect the manner in which the connection lines are drawn. Since the display is a 3D display that can be rotated, edit these options to help the user best understand the underlying data source events. 8. Click Done to display a list of affected hosts and then click Done again to display the topology with the new modifier elements. Counts List The Counts List modifier is used to demonstrate counts of events or vulnerabilities per host using a bar representation per host. The display below is a topology view containing a counts list modifier that visualized hosts with critical vulnerabilities by using a red bar. The longer the bar, the more critical vulnerabilities were found in the query parameters. There are three types of counts list queries: Default, Vuln IP Summary and Event IP Summary. These are the queries that must exist on the SecurityCenter for this modifier to obtain its data. The table below describes each of these queries in detail: Table 3: Counts List Query Types Copyright Tenable Network Security, Inc. 23
24 Option Default Vuln IP Summary Event IP Summary Description Uses a query type of Vulnerability displayed with the IP Summary analysis tool. All records are requested. Uses a query type of Vulnerability with the IP Summary analysis tool. The query s filters are used. Uses a query type of Event displayed with the IP Summary analysis tool. The query s filters are used. The screen capture below contains a sample counts list display view: Use the steps below to add a counts list modifier similar to the one shown above. 1. Load the main topology screen and click the configure icon ( ) to begin the configuration process. Copyright Tenable Network Security, Inc. 24
25 2. Next to the modifiers list, click New to create a new modifier and choose Counts List from the dropdown. 3. In the File box at the top of the screen, enter a descriptive name to be assigned the modifier and click Create. 4. Select the new modifier from the list of modifiers and click Edit and then Configure to begin the configuration process. 5. In this example, we have used our main login named SC4 under Manage Logins. We then clicked List Queries to display all available queries of this type. The chosen query (Critical Vulns) was created to only show only critical vulnerabilities. After clicking Perform Query we were prompted to select the repository from which the data will be obtained. This helps narrow down the data retrieval source. Use the table below to help understand the various bar configuration options: Table 2: Counts List Bar Configuration Options Option Which Bar Bar Color Description Every node icon in a diagram has four places above and four places below to host a count line. This dropdown list specifies where the bar will be displayed on the icon. Click on the color swatch to specify the bar color. Copyright Tenable Network Security, Inc. 25
26 To draw colors based on the values, you could break the source data (queries) up into value regions (such as severities), and make a separate modifier for each. This would allow you to set the color separately for each value region. Max Bar Height Height Relative To Min Clamp This is the amount of vertical diagram space the lines of this modifier are permitted to consume. All of the returned values are spread out evenly across the display space. The smallest value will have no relative height, and the greatest value will have the full height of this setting. This setting specifies which of the count modifiers will share the same vertical space as this modifier. All of the values from all of the modifiers that are related this way will have the same scaling applied to the values, so they can be visually compared to each other. After all of the calculations to determine the height of the line have been performed, this value is the minimum line height permitted. This is useful where the minimum value must be a small stub of a line, rather than no line. Max Clamp After all of the calculations to determine the height of the line have been performed, this value is the maximum line height allowed to be displayed. This is useful where some values of the data set are too large to be useful relative to others. Value Distribution This setting allows you to modify the bar for displays with a large range of values. For example, in some cases there may be numerous bars with values < 10 and a single bar with a count of 9,000 (e.g., vulnerabilities). In a case like this, displaying the bars in a linear fashion would make the bars with low values hard to see and make it very difficult to represent low-end value differences. To better represent the low-end differences, change to a Cubed Top Compressed view (described below), which will compress values at the top end and spread out low end values (e.g., counts between zero and ten). Selection descriptions: 1. Linear Use this when the relationships between the values have about the same level of concern at the top end as those at the bottom end. 2. Squared Top Compressed This is used when the values at the bottom end should show their differences more than those at the top end. 3. Cubed Top Compressed This is similar to item two, Copyright Tenable Network Security, Inc. 26
27 but the values are spread out even more at the bottom end and compressed even more at the top end. 4. Squared Bottom Compressed This is used when the values at the top end should demonstrate their differences more than those at the bottom end. 5. Cubed Bottom Compressed This is similar to item four, but the values are spread out even more at the top end, and compressed even more at the bottom end. 6. Click Done and a list of affected hosts is displayed. 7. Repeat the steps for High and Medium vulnerability hosts choosing a different bar color and Which Bar value for each and then click Done again to display the topology with the new modifier elements. Copyright Tenable Network Security, Inc. 27
28 ABOUT TENABLE NETWORK SECURITY Tenable Network Security, the leader in Unified Security Monitoring, is the source of the Nessus vulnerability scanner and the creator of enterprise-class, agentless solutions for the continuous monitoring of vulnerabilities, configuration weaknesses, data leakage, log management and compromise detection to help ensure network security and FDCC, FISMA, SANS CAG and PCI compliance. Tenable s award-winning products are utilized by many Global 2000 organizations and Government agencies to proactively minimize network risk. For more information, please visit Tenable Network Security, Inc Columbia Gateway Drive Suite 100 Columbia, MD Copyright Tenable Network Security, Inc. 28
Tenable Hardware Appliance Upgrade Guide
Tenable Hardware Appliance Upgrade Guide June 4, 2012 (Revision 3) The newest version of this document is available at the following URL: http://static.tenable.com/prod_docs/tenable_hardware_appliance_upgrade.pdf
More informationLog Correlation Engine 4.0 High Performance Configuration Guide
Log Correlation Engine 4.0 High Performance Configuration Guide July 10, 2012 (Revision 2) Copyright 2002-2012 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered
More informationLog Correlation Engine 4.0 Statistics Daemon Guide. August 13, 2012 (Revision 1)
Log Correlation Engine 4.0 Statistics Daemon Guide August 1, 2012 (Revision 1) Table of Contents Introduction... Standards and Conventions... Basic Operation... Configuring the Statistics Daemon... 6 File
More informationSecurityCenter 5.0 SCAP Assessments. May 28, 2015 (Revision 2)
SecurityCenter 5.0 SCAP Assessments May 28, 2015 (Revision 2) Table of Contents Overview... 3 Standards and Conventions... 3 Abbreviations... 3 Simple Assessment Procedure... 4 XCCDF Certified vs. Lower-Tier
More informationInstallation of RHEL 5 for Tenable SecurityCenter Evaluation
Installation of RHEL 5 for Tenable SecurityCenter Evaluation These instructions are for the installation of Red Hat Enterprise Linux (RHEL) 5 in preparation for installing Tenable SecurityCenter 4.4 for
More informationSecurityCenter 4.8.x Upgrade Guide. December 16, 2014 (Revision 1)
SecurityCenter 4.8.x Upgrade Guide December 16, 2014 (Revision 1) Table of Contents Introduction... 3 Standards and Conventions... 3 Software Requirements... 4 Supported Operating Systems... 4 Dependencies...
More informationSecurityCenter Upgrade Guide. July 21, 2015 (Revision 1)
SecurityCenter 5.0.1 Upgrade Guide July 21, 2015 (Revision 1) Table of Contents Introduction... 3 Standards and Conventions... 3 Software Requirements... 4 Supported Operating Systems... 4 Dependencies...
More informationSecurityCenter 5.1 Upgrade Guide. November 12, 2015 (Revision 2)
SecurityCenter 5.1 Upgrade Guide November 12, 2015 (Revision 2) Table of Contents Introduction... 3 Standards and Conventions... 3 Software Requirements... 4 Supported Operating Systems... 4 Dependencies...
More informationLog Correlation Engine 4.4 Statistics Daemon Guide. February 26, 2015 (Revision 1)
Log Correlation Engine 4.4 Statistics Daemon Guide February 26, 2015 (Revision 1) Table of Contents Introduction... Standards and Conventions... Basic Operation... Configuring the Statistics Daemon...
More informationLog Correlation Engine 3.4 Statistics Daemon Guide July 29, 2010 (Revision 3)
Log Correlation Engine 3.4 Statistics Daemon Guide July 29, 2010 (Revision 3) The newest version of this document is available at the following URL: http://cgi.tenablesecurity.com/lce_3.4_stats.pdf Table
More informationTenable for Palo Alto Networks
How-To Guide Tenable for Palo Alto Networks Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with Palo Alto Networks next-generation firewalls (NGFW).
More informationTenable for Google Cloud Platform
How-To Guide Tenable for Google Cloud Platform Introduction This document describes how to deploy Tenable SecurityCenter Continuous View (Security Center CV ) for integration with Google Cloud Platform.
More informationLCE Splunk Client 4.6 User Manual. Last Revised: March 27, 2018
LCE Splunk Client 4.6 User Manual Last Revised: March 27, 2018 Table of Contents Getting Started with the LCE Splunk Client 3 Standards and Conventions 4 Install, Configure, and Remove 5 Download an LCE
More informationForeScout Extended Module for Tenable Vulnerability Management
ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support
More informationTenable Network Security Support Portal. November 9, 2010 (Revision 8)
Tenable Network Security Support Portal November 9, 2010 (Revision 8) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 OBTAINING ACCESS TO THE TENABLE SUPPORT PORTAL... 3 MANAGING YOUR NESSUS
More informationHow-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018
How-to Guide: Tenable for McAfee epolicy Orchestrator Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable for McAfee epolicy Orchestrator 1 Introduction 3 Integration Requirements 4 Tenable
More informationTenable for McAfee epolicy Orchestrator
HOW-TO GUIDE Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments
More informationTenable for McAfee epolicy Orchestrator
How-To Guide Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments
More informationLog Correlation Engine 4.2 Quick Start Guide. September 4, 2014 (Revision 3)
Log Correlation Engine 4.2 Quick Start Guide September 4, 2014 (Revision 3) Table of Contents Introduction... 3 Standards and Conventions... 3 Product Overview... 3 Prerequisites... 3 LCE Quick Start...
More informationHow to Transition from Nessus to SecurityCenter Reports
HOW-TO GUIDE How to Transition from Nessus to SecurityCenter Reports Using SecurityCenter for continuous network monitoring and vulnerability assessment will give you a greatly expanded set of features
More informationTenable.io for Thycotic
How-To Guide Tenable.io for Thycotic Introduction This document describes how to deploy Tenable.io for integration with Thycotic Secret Server. Please email any comments and suggestions to support@tenable.com.
More informationNessus v6 SCAP Assessments. November 18, 2014 (Revision 1)
Nessus v6 SCAP Assessments November 18, 2014 (Revision 1) Table of Contents Overview... 3 Standards and Conventions... 3 Abbreviations... 3 Simple Assessment Procedure... 3 XCCDF Certified vs. Lower-Tier
More informationTenable for ServiceNow. Last Updated: March 19, 2018
Tenable for ServiceNow Last Updated: March 19, 2018 Table of Contents Tenable for ServiceNow 1 Introduction 3 Integration Requirements 4 Integration Configuration 5 Set up a Query in SecurityCenter 5 Configure
More informationTenable.io User Guide. Last Revised: November 03, 2017
Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link
More informationLegal Notes. Regarding Trademarks KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationUser Guide 701P Wide Format Solution Wide Format Scan Service
User Guide 701P44865 6204 Wide Format Solution Wide Format Scan Service Xerox Corporation Global Knowledge & Language Services 800 Phillips Road Bldg. 845-17S Webster, NY 14580 Copyright 2006 Xerox Corporation.
More informationDeltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide
Deltek Touch Expense for Ajera Touch 1.0 Technical Installation Guide June 01, 2018 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical
More informationMicrosoft Office Word 2016 for Mac
Microsoft Office Word 2016 for Mac Formatting Your Document University Information Technology Services Learning Technologies, Training & Audiovisual Outreach Copyright 2016 KSU Division of University Information
More informationEnterprise Guest Access
Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of
More informationForeScout Extended Module for Qualys VM
ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...
More informationInformation Security Office. Information Security Server Vulnerability Management Standards
Information Security Office Information Security Server Vulnerability Management Standards Revision History Revision Date Revised By Summary of Revisions Section(s) / Page(s) Revised 6/1/2013 S. Gucwa
More informationKYOCERA Net Viewer 5.3 User Guide
KYOCERA Net Viewer. User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationInfo Input Express Limited Edition
Info Input Express Limited Edition User s Guide A-61891 Table of Contents Using Info Input Express to Create and Retrieve Documents... 7 Compatibility... 7 Contents of this Guide... 7 Terminology... 9
More informationNessus Enterprise for Amazon Web Services (AWS) Installation and Configuration Guide
Due to technical issues with AWS, Nessus Enterprise for AWS is currently not available for purchase. To protect your AWS cloud infrastructure, please purchase Nessus Cloud http://www.tenable.com/products/
More informationEdupen Pro User Manual
Edupen Pro User Manual (software for interactive LCD/LED displays and monitors) Ver. 3 www.ahatouch.com Some services in Edupen Pro require dual touch capability. In order to use dual touch, your computer
More informationDDX-R Quick Start Guide
DDX-R Quick Start Guide Imaging Support 1-855-726-9995 www.scilvet.com Contents USING DDX-R... 2 Opening a Patient File... 2 Opening a New Patient File... 3 Screen Layout... 3 ACQUIRING IMAGES ON A PATIENT...
More informationStarTeam File Compare/Merge StarTeam File Compare/Merge Help
StarTeam File Compare/Merge 12.0 StarTeam File Compare/Merge Help Micro Focus 575 Anton Blvd., Suite 510 Costa Mesa, CA 92626 Copyright 2011 Micro Focus IP Development Limited. All Rights Reserved. Portions
More informationCreating a Website with Publisher 2016
Creating a Website with Publisher 2016 Getting Started University Information Technology Services Learning Technologies, Training & Audiovisual Outreach Copyright 2017 KSU Division of University Information
More informationTenable Common Criteria Evaluated Configuration Guide. October 29, 2009 (Revision 4)
Tenable Common Criteria Evaluated Configuration Guide October 29, 2009 (Revision 4) Table of Contents TABLE OF CONTENTS... 2 OVERVIEW... 3 SECURITY CENTER COMPONENTS... 3 NESSUS VULNERABILITY SCANNER...
More informationNetBrain POC Walk-Through
NetBrain POC Walk-Through For OE 4.1 Dynamic Documentation Visual Troubleshooting NetBrain Technologies, Inc. 2004-2013. All rights reserved +1.800.605.7964 support@netbraintech.com www.netbraintech.com
More informationBASIC MICROSOFT POWERPOINT
BASIC MICROSOFT POWERPOINT PART ONE PHONE: 504-838-1144 IT Training Team Jefferson Parish Library EMAIL: jpltrain@jplibrary.net In this class you will learn to: Launch, close, and interact with Microsoft
More informationRingtail Basics. Quick Start Guide
Ringtail Basics Quick Start Guide Ringtail 8 brings a new level of simplicity, ease of use, and efficiency to document review. The following pages walk through scenarios, based on common tasks, to show
More informationDCMS. User Manual. Version V1.0
DCMS User Manual Version V1.0 About This Document About This Document About This User Manual Please note the following points before using this user manual: This user manual is intended for persons who
More informationKMnet Viewer. User Guide
KMnet Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We cannot be
More informationInstallation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:
EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install
More informationPVS 5.1 User Guide. Last Updated: October 10, 2016
PVS 5.1 User Guide Last Updated: October 10, 2016 Table of Contents PVS 5.1 User Guide 1 Welcome to PVS 1 Getting Started with PVS 2 PVS Workflow 3 Hardware Requirements 4 Software Requirements 6 Licensing
More informationForeScout Extended Module for Bromium Secure Platform
ForeScout Extended Module for Bromium Secure Platform Version 1.3.0 Table of Contents About the Bromium Integration... 3 Additional Bromium Secure Platform Documentation... 3 About This Module... 3 How
More informationMicrosoft Word 2010 Tutorial
1 Microsoft Word 2010 Tutorial Microsoft Word 2010 is a word-processing program, designed to help you create professional-quality documents. With the finest documentformatting tools, Word helps you organize
More informationCollege of Pharmacy Windows 10
College of Pharmacy Windows 10 Windows 10 is the version of Microsoft s flagship operating system that follows Windows 8; the OS was released in July 2015. Windows 10 is designed to address common criticisms
More informationSecurityCenter 4.6 Administration Guide. April 11, 2013 (Revision 5)
SecurityCenter 4.6 Administration Guide April 11, 2013 (Revision 5) Table of Contents Introduction... 5 Standards and Conventions... 5 Abbreviations... 6 SecurityCenter Administrator Functions... 6 Starting/Halting
More informationNETWORK PRINT MONITOR User Guide
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change for improvement without notice. We
More informationKYOCERA Net Viewer User Guide
KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationWeb Console Setup & User Guide. Version 7.1
Web Console Setup & User Guide Version 7.1 1 Contents Page Number Chapter 1 - Installation and Access 3 Server Setup Client Setup Windows Client Setup Mac Client Setup Linux Client Setup Interoperation
More informationTelegram Messaging Application with Camera Mouse
Telegram Messaging Application with Camera Mouse Emily Fabius Boston College All rights reserved Copyright 2018 Boston College Page 1 / 21 Telegram Messaging Application with Camera Mouse INTRODUCTION
More informationNessus Network Monitor 5.4 User Guide. Last Updated: February 20, 2018
Nessus Network Monitor 5.4 User Guide Last Updated: February 20, 2018 Table of Contents Nessus Network Monitor 5.4 User Guide 1 Welcome to Nessus Network Monitor 8 NNM Workflow 9 System Requirements 10
More informationHow-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018
How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationPVS Subscription Registration Process
PVS Subscription Registration Process Create Your Tenable Support Portal Account 1. Click on the provided link to create your account. If the link does not work, please cut and paste the entire URL into
More informationXfmea Version 10 First Steps Example
Xfmea Version 10 First Steps Example This example provides a quick introduction to the Xfmea software by allowing you to experiment with the application s data management, analysis and reporting features.
More informationClient Care Desktop V4
Client Care Desktop V4 V4.1 Quay Document Manager V4.1 Contents 1. LOCATIONS...3 1.1. Client... 3 1.2. Holdings... 4 1.3. Providers... 4 1.4. Contacts/Introducers... 5 1.5. Adviser... 5 2. ADDING EXISTING
More informationSecurityCenter 5.1 Administration Guide. November 12, 2015 (Revision 2)
SecurityCenter 5.1 Administration Guide November 12, 2015 (Revision 2) Table of Contents Introduction... 6 Standards and Conventions... 6 Abbreviations... 7 SecurityCenter Administrator Functions... 7
More informationHow-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018
How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationExtended Search Administration
IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using
More informationForeScout Extended Module for Advanced Compliance
ForeScout Extended Module for Advanced Compliance Version 1.2 Table of Contents About Advanced Compliance Integration... 4 Use Cases... 4 Additional Documentation... 6 About This Module... 6 About Support
More information1 Filter the search by entering search criteria; 2 Enter a range of dates in which to search. 3 You can filter the search by modality type.
efilm / Managing Studies STUDY MANAGER How to use the study manager The Study Manager can search for four different types of exams: Local Exams: studies stored on your workstation s hard drive. Remote
More informationTenable.io Evaluation Workflow. Last Revised: August 22, 2018
Tenable.io Evaluation Workflow Last Revised: August 22, 2018 Table of Contents Welcome 3 Part One 4 Create User(s) and Group(s) 5 Create Target Group(s) 6 Create Exclusion Lists 7 Create an External Scan
More informationCreating Interactive PDF Forms
Creating Interactive PDF Forms Using Adobe Acrobat X Pro for the Mac University Information Technology Services Training, Outreach, Learning Technologies and Video Production Copyright 2012 KSU Department
More informationMICROSOFT POWERPOINT 2016 Quick Reference Guide
MICROSOFT POWERPOINT 2016 Quick Reference Guide PowerPoint What is it? What s new in PowerPoint 2016? PowerPoint is a computer program that allows you to create, edit and produce slide show presentations.
More informationSAPPHIRE Viewer: The Collaboration Tool
SAPPHIRE Viewer: The Collaboration Tool MiTek SAPPHIRE Viewer is a scaled down version of SAPPHIRE Structure that allows users to open, view, comment on, and print Structure files. This free application
More informationSymptom Condition / Workaround Issue Full domain name is not resolved by the RDP- ActiveX Client.
Secure Remote Access Contents Platform Compatibility...1 Known Issues...1 Resolved Issues...3 Upgrading SonicOS SSL VPN Firmware Procedures...4 Related Technical Documentation...6 Platform Compatibility
More informationForescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2
Forescout Version 2.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationClient Care Desktop v4.3. Document Manager V4.3
Client Care Desktop v4.3 Document Manager V4.3 Contents 1. LOCATIONS... 3 1.1. Client... 3 1.2. Enquiries... 4 1.3. Holdings... 4 1.4. Providers... 5 1.5. Contacts/Introducers... 6 1.6. Adviser... 6 2.
More informationParallels Remote Application Server
Parallels Remote Application Server Parallels Client for Mac User's Guide v16 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 672 20 30 www.parallels.com Copyright
More informationVisualPST 2.4. Visual object report editor for PowerSchool. Copyright Park Bench Software, LLC All Rights Reserved
VisualPST 2.4 Visual object report editor for PowerSchool Copyright 2004-2015 Park Bench Software, LLC All Rights Reserved www.parkbenchsoftware.com This software is not free - if you use it, you must
More informationIBM Proventia Management SiteProtector Policies and Responses Configuration Guide
IBM Internet Security Systems IBM Proventia Management SiteProtector Policies and Responses Configuration Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports,
More informationPVS 4.4 User Guide. Revision April, 2016
PVS 4.4 User Guide Revision 2 18 April, 2016 PVS 4.4 User Guide 1 About PVS 1 Getting Started with PVS 2 Hardware Requirements 3 Software Requirements 5 Licensing Requirements 6 Install, Upgrade, Configure,
More informationWelcome to Selector2GO Help
Welcome to Selector2GO Help World Headquarters 445 Hamilton Avenue, 7th floor, White Plains, New York 10601 United States of America Support: +1 914 259 4900 support@rcsworks.com 2004-2018. All Rights
More informationLivescribe Connect User Guide. Draft P-2 May 23, 2011
Copyrights and Trademarks LIVESCRIBE, ECHO, PULSE, CONNECT, and NEVER MISS A WORD are trademarks of Livescribe Inc. All other trademarks are properties of their respective owners. Copyright 2007-2011.
More informationIn Depth: Writer. The word processor is arguably the most popular element within any office suite. That. Formatting Text CHAPTER 23
CHAPTER 23 In Depth: Writer The word processor is arguably the most popular element within any office suite. That said, you ll be happy to know that OpenOffice.org s Writer component doesn t skimp on features.
More informationHow-to Guide: Tenable.io for Lieberman. Last Revised: August 14, 2018
How-to Guide: Tenable.io for Lieberman RED Last Revised: August 14, 2018 Table of Contents Introduction 3 Integrations 4 Windows Integration 5 SSH Integration 11 Database Integration 17 Additional Information
More informationUnderstanding the Relationship with Domain Managers
4 CHAPTER Understanding the Relationship with Domain Managers Prime Central for HCS reports the events generated by underlying domain managers. Domain managers may also discover topology and relationships
More informationHow-to Guide: Tenable Nessus for BeyondTrust. Last Revised: November 13, 2018
How-to Guide: Tenable Nessus for BeyondTrust Last Revised: November 13, 2018 Table of Contents Welcome to Nessus for BeyondTrust 3 Integrations 4 Windows Integration 5 SSH Integration 10 API Configuration
More informationMagicInfo VideoWall Author
MagicInfo VideoWall Author MagicInfo VideoWall Author User Guide MagicInfo VideoWall Author is a program designed to construct a VideoWall layout and create VideoWall content by adding various elements
More informationInstallation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010
EventTracker Install Guide 8815 Centre Park Drive Publication Date: Feb 11, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install and configure
More informationInstallation Guide - Windows
Kony Visualizer Enterprise Installation Guide - Windows Release V8 SP3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version
More informationHow to Add, Deactivate, or Edit a Contact
How to Add, Deactivate, or Edit a Contact Add Contact (Add account option only available to the Primary Contact for the account) 1. Log in to the Tenable Support Portal with authorized credentials: https://support.tenable.com/
More informationProduct Enhancements May 2011
Product Enhancements May 2011 Features Product Enhancements May 2011 As part of our ongoing commitment to providing you with the most powerful, easy-to-use investment research tool, MarketSmith will implement
More informationRemote Access Application Viewer User Guide. Version 2.5
Remote Access Application Viewer User Guide Version 2.5 Table of Contents Table of Contents... 2 Logging into Application Viewer... 4 Setting up your browser for the first time... 8 Internet Explorer...
More informationTalend Open Studio for MDM Web User Interface. User Guide 5.6.2
Talend Open Studio for MDM Web User Interface User Guide 5.6.2 Talend Open Studio for MDM Web User Interface Adapted for v5.6.2. Supersedes previous releases. Publication date: May 12, 2015 Copyleft This
More informationHow Security Policy Orchestration Extends to Hybrid Cloud Platforms
How Security Policy Orchestration Extends to Hybrid Cloud Platforms Reducing complexity also improves visibility when managing multi vendor, multi technology heterogeneous IT environments www.tufin.com
More informationEMC Secure Remote Support Device Client for Symmetrix Release 2.00
EMC Secure Remote Support Device Client for Symmetrix Release 2.00 Support Document P/N 300-012-112 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
More informationSupply Chain Guru Network Optimization Tutorial. Version 8.2
Supply Chain Guru Network Optimization Tutorial Version 8.2 Supply Chain Guru 8.2 Network Optimization Tutorial January 2015 Copyright 2015 LLamasoft, Inc. All Rights Reserved. PC*MILER and ALK are registered
More informationSection 1 Getting Started
Section 1 Getting Started ECDL Section 1 Getting Started By the end of this section you should be able to: Understand PowerPoint Principles Start PowerPoint Use an Installed Template Recognise the Screen
More informationEnerdeq Browser Transition from PI/Dwights PLUS Data on CD
IHS > Critical Information Product Enerdeq Browser Transition from PI/Dwights PLUS Data on CD October, 2013 2013 IHS, All Rights Reserved. All trademarks belong to IHS or its affiliated and subsidiary
More informationServer Edition USER MANUAL. For Microsoft Windows
Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows
More informationRemote Access Application Viewer User Guide. Version 2.3
Remote Access Application Viewer User Guide Version 2.3 Table of Contents Table of Contents... 2 Logging into Application Viewer... 4 Setting up your browser for the first time... 8 Internet Explorer...
More informationGetting Started with. PowerPoint 2010
Getting Started with 13 PowerPoint 2010 You can use PowerPoint to create presentations for almost any occasion, such as a business meeting, government forum, school project or lecture, church function,
More informationWolf EMR SMART Forms Course workbook
SMART Forms Workbook.book Page 1 Monday, October 26, 2015 11:44 AM Wolf EMR SMART Forms Course workbook Wolf EMR v2015.1.7 Issue 01.02 SMART Forms Workbook.book Page 2 Monday, October 26, 2015 11:44 AM
More informationSkills Funding Agency
Provider Data Self-Assessment Toolkit (PDSAT) v17 User Guide Contents Introduction... 2 Compatibility and prerequisites... 2 1. Installing PDSAT... 3 2. Opening PDSAT... 6 2.1 Opening Screen... 6 2.2 Updates...
More informationIntermediate Word for Windows
Intermediate Word for Windows Version: 2002 Academic Computing Support Information Technology Services Tennessee Technological University September 2003 1. Opening Word for Windows In the PC labs, click
More informationAvigilon Control Center Virtual Matrix User Guide. Version 5.6
Avigilon Control Center Virtual Matrix User Guide Version 5.6 2006-2015, Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with respect to any copyright,
More information