4. Getting started: Performing an audit
|
|
|
- Emery Simpson
- 10 years ago
- Views:
Transcription
1 4. Getting started: Performing an audit Introduction Security scans enable systems administrators to identify and assess possible risks within a network. Through GFI LANguard N.S.S. this is performed automatically, without all the unnecessary repetitive and time-consuming tasks related to performing them manually. In this chapter you will discover how to perform security scans using default and custom settings, how to start scans directly from the toolbar and how to configure scan ranges. To perform a security audit the scanning engine requires you to specify three primary parameters: 1. Target computer(s) to scan for security issues. 2. Scanning profile to use (specifies vulnerability checks/tests to be done against the specified targets). 3. Authentication details to be used to log on to the target computer(s). For a thorough security scan use the Full Scan option. About authentication credentials When performing a security scan GFI LANguard N.S.S. must authenticate to the target computer(s) in order to execute the vulnerability checks and retrieve system information. To achieve this, GFI LANguard N.S.S. must physically log on to the target computer(s) with administrative rights i.e. using a local administrator account, domain administrator, enterprise administrator account or any other account that has administrative privileges over the target computer(s). Different systems often require different authentication methods. For example, to scan Linux systems you are often required to provide a private key file instead of the conventional password string. NOTE 1: For more information about authentication methods refer to the Computer Profiles section in the Configuring GFI LANguard N.S.S. chapter. NOTE 2: For more information about Public Key authentication, refer to the About SSH Private Key file authentication section in the Configuring GFI LANguard N.S.S. chapter. About the scanning process The target computer scanning process has three distinct stages. Stage 1: Determine availability of target computer: During this stage, GFI LANguard N.S.S. will determine whether a target computer is available for vulnerability scanning. This is GFI LANguard Network Security Scanner 4. Getting started: Performing an audit 15
2 achieved through connection requests that are sent in the form of NETBIOS queries, SNMP queries and/or ICMP pings. NOTE: By default, GFI LANguard N.S.S. will NOT scan the devices that fail to respond to the connection requests sent via NETBIOS queries/snmp queries/icmp pings. Stage 2: Establish connection with target device: In the second stage of its target scanning process, GFI LANguard N.S.S. will establish a direct connection with the target computer by remotely logon on to it. This is achieved using the scan credentials configured in step 5 of the new scan wizard. Stage 3: Execute vulnerability checks: During this final stage, GFI LANguard N.S.S. will execute the vulnerability checks configured within the selected scanning profile. This will result in the identification and reporting of specific weaknesses present on your target computer. NOTE 1: GFI LANguard N.S.S. ships with a default list of scanning profiles that are preconfigured with vulnerability checks. Nevertheless you can also customize both the scanning profiles and the vulnerability checks contained within. For more information on how to achieve this refer to the Scanning Profiles chapter. NOTE 2: Please note that if any type of Intrusion Detection Software (IDS) is running during scans, GFI LANguard N.S.S. will set off a multitude of IDS warnings and intrusion alerts in these applications. If you are not responsible for the IDS system, make sure to inform the person in charge about any planned security scans. NOTE 3: Along with the IDS software warnings, kindly note that a lot of the scans will show up in log files across diverse systems. UNIX logs, web servers, etc. will all show the intrusion attempts made by the computer running GFI LANguard N.S.S. If you are not the sole administrator at your site make sure that the other administrators are aware of the scans you are about to run. Performing a security scan using default settings Out of the box, GFI LANguard N.S.S. includes default configuration settings that allow you to run immediate scans soon after the installation is complete. For a default scan you must only specify which target computer(s) you wish to audit and GFI LANguard N.S.S. will automatically: Authenticate to the targets using the currently logged on user account credentials (i.e. the credentials under which GFI LANguard N.S.S. is currently running). Use a thorough list of default vulnerability checks that are preconfigured in the Full scanning profile. This is one of the default scanning profiles that ships with GFI LANguard N.S.S. To perform your first scan, do as follows: 1. Click on New Scan button Getting started: Performing an audit GFI LANguard Network Security Scanner
3 Screenshot 12 - Selecting the type of security scan 2. Select one of the following scanning operations and click Next: Vulnerability Scanning Use this scanning operation to enumerate all the vulnerabilities present on target computers including missing patches. Patching status Use this scanning operation to enumerate only missing patches on target computers. Network and Software Auditing Use this scanning operation to enumerate system information without including vulnerabilities and missing patches. Complete/Combination scan Use this scanning operation to retrieve system information and enumerate all vulnerabilities including missing patches. GFI LANguard Network Security Scanner 4. Getting started: Performing an audit 17
4 Screenshot 13 - Choose the scanning profile 3. Select the required scanning profile and click Next. NOTE: For a detailed description of what each individual scanning profile does please refer to the Scanning profile description section in the Scanning Profiles chapter in this document. Screenshot 14 - Selecting scan range 4. Select one of the following scan target types and click Next: Scan single computer Select this option to scan a single computer Getting started: Performing an audit GFI LANguard Network Security Scanner
5 Scan range of Computers Select this option to scan a specific range of computers. Scan list of Computers Select this option to scan a custom list of computers. Scan a Domain Select this option to scan an entire Windows domain. Screenshot 15 - New Scan range options dialogs. 5. Specify scan target details (i.e. host name, IP, range of IPs or domain name) and click Next. NOTE: When configuring IP ranges, GFI LANguard N.S.S. 8.0 also allows you to specify which IPs must be excluded from this range. For more information on this feature please refer to Configuring scan ranges section in this document. GFI LANguard Network Security Scanner 4. Getting started: Performing an audit 19
6 Screenshot 16 - Specify the scan credentials 6. Specify the authentication details to be used during this scan. Click on the Scan button to initiate the scanning process. Quick-start scans using currently logged on user credentials You can trigger network vulnerability scans directly from the toolbar without having to perform major configurations as well as without bringing up the new scan wizard. To achieve this: Screenshot 17 - GFI LANguard N.S.S. new scan toolbar 1. From credentials drop-down list provided in the toolbar select the Currently logged on user option. Screenshot 18 - GFI LANguard N.S.S. target details toolbar 2. In Scan Target drop down, specify the targets to be scanned using these credentials (for example, TMJason, , etc.). 3. From the Profile drop down select the scanning profile to be used for this network vulnerability scan Getting started: Performing an audit GFI LANguard Network Security Scanner
7 4. Click on Scan to initiate the scanning process. Quick-start scans using alternative logon credentials To run a network security audit using alternative logon credentials: Screenshot 19 - GFI LANguard N.S.S. new scan toolbar: Authentication methods drop down list 1. From credentials drop-down list provided in the toolbar select the Alternative credentials option. 2. In the adjacent fields specify the username and password to be used during this scan. 3. Configure the rest of the options as described in the Quick-start scans using currently logged on user credentials section above. Quick start scans using SSH Private Key To run a network security audit using SSH Private key credentials do as follows: Screenshot 20 - GFI LANguard N.S.S. new scan toolbar: Authentication methods drop down list 1. From credentials drop-down list provided in the toolbar select the SSH Private key option. 2. In the adjacent fields specify the username and private key file to be used during this scan. 3. Configure the rest of the options as described in the Quick-start scans using alternative credentials section above. Quick-start scans using a null session One of the most serious threats in a network system is the misconfiguration of passwords. Default passwords or even worse blank password (technically referred to as null passwords) are a big vulnerability because they could easily allow malicious users to gain access to your system without any considerable effort. GFI LANguard N.S.S. allows you to specifically verify whether your target computers have null passwords through a null session. During null sessions, the scanning engine will attempt to logon to a target computer with blank credentials. The benefit of such an exercise is that is such a scan is successful, it means your target is accessible without the need of logon credentials. To run a null session: GFI LANguard Network Security Scanner 4. Getting started: Performing an audit 21
8 1. From credentials drop-down list provided in the toolbar select the Null Settings option. 2. In Scan Target drop down, specify the targets to be scanned during this null session. 3. From the Profile drop down select the scanning profile to be used during this network vulnerability scan. 4. Click on Scan to initiate the scanning process Getting started: Performing an audit GFI LANguard Network Security Scanner
Installing GFI LANguard Network Security Scanner
Installing GFI LANguard Network Security Scanner System requirements Install GFI LANguard Network Security Scanner on a computer which meets the following requirements: Windows 2000 (SP4) / XP (SP2) /
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as
2. Installing GFI LANguard Network Security Scanner
2. Installing GFI LANguard Network Security Scanner System requirements Install GFI LANguard N.S.S on a computer that meets the following requirements: Windows 2000 (SP4), XP (SP2), 2003, 2008, VISTA (SP1),
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.
GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
GFI LANguard Network Security Scanner 3.3. Manual. By GFI Software Ltd.
GFI LANguard Network Security Scanner 3.3 Manual By GFI Software Ltd. GFI SOFTWARE Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies,
Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.
Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive
Tenable for CyberArk
HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments
GFI LANguard 9. Manual. By GFI Software Ltd.
GFI LANguard 9 Manual By GFI Software Ltd. http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are
GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.
GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
Discovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
Manual. By GFI Software Ltd. GFI Network Server Monitor
GFI Network Server Monitor 6 Manual By GFI Software Ltd. GFI Network Server Monitor Contents i http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies,
Kaseya 2. User Guide. for Network Monitor 4.1
Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Hosts HARDENING WINDOWS NETWORKS TRAINING
BROADVIEW NETWORKS Hosts HARDENING WINDOWS NETWORKS TRAINING COURSE OVERVIEW A hands-on security course that teaches students how to harden, monitor and protect Microsoft Windows based networks. A hardening
Rebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
Configuring WMI Performance Monitors
Configuring WMI Performance Monitors With WMI, WhatsUp Gold Premium Edition monitors and sends alerts based on performance counters that are reported from Microsoft Windows devices. The data collected
Audit Tools That Won t Break the Bank
Audit Tools That Won t Break the Bank 2011 Date or subtitle Presented by: Mark Scholl, Partner 1 Background These tools do not require a strong technical background! Do not scan or install tools without
Advanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
Where can I install GFI EventsManager on my network?
Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location
GFI Product Manual. Installation and Setup Guide
GFI Product Manual Installation and Setup Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express
Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.
Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09
Registering and Activating a License on the Cisco ISA500 Security Appliance
Application Note Registering and Activating a License on the Cisco ISA500 Security Appliance This application note provides information about registering and activating a license on the Cisco ISA500 Series
How to Launch WebXtender for BDM. Banner Document Management (BDM)
(BDM) How to Launch WebXtender for BDM 1 Table of Contents 1. Overview 3 2. Launching WebXtender from Banner 4 3. Launching WebXtender from Direct Login 7 Appendix A 9 2 1. Overview WebXtender is the web
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Management Utilities Configuration for UAC Environments
Management Utilities Configuration for UAC Environments For optimal use of SyAM Management Utilities, Windows client machines should be configured with User Account Control disabled or set to the least
Using MailStore to Archive MDaemon Email
Using MailStore to Archive MDaemon Email This guide details how to archive all inbound and outbound email using MailStore, as well as archiving any emails currently found in the users accounts in MDaemon.
Active Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
Using Device Discovery
2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Kaseya 2. Quick Start Guide. for Network Monitor 4.1
Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
Paranet Solutions Network Discovery Client. Paranet Professional Services
Paranet Solutions Network Discovery Client Paranet Professional Services Contents 1. INTRODUCTION... 3 1.1 1.2 PURPOSE OF THIS DOCUMENT... 3 WHAT S IN THIS DOCUMENT... 3 2. SCANNING INSTRUCTIONS... 4 3.
AeroLab Wireless Network Code of Conduct. Connecting to the AeroLab Wireless Network
AeroLab Wireless Network Code of Conduct The AeroLab wireless network is intended for academic use only. Any use of the wireless network for BitTorrent or other Peer-to-Peer file sharing is strictly prohibited.
LucidNAS Quick Start Guide
LucidNAS Quick Start Guide This section demonstrates the initial preparation that should be performed before you start using the LucidNAS system. Set Administrative Access By default, no password is required
Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server.
LEPIDE SOFTWARE Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server. LepideAuditor Suite Lepide Software Private Limited, All
AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard
AlienVault Unified Security Management (USM) 5.1 Running the Getting Started Wizard USM v5.1 Running the Getting Started Wizard, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault
Patch Management Integration
Patch Management Integration January 10, 2012 (Revision 5) Copyright 2002-2012 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered trademarks of Tenable
1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
Sophos Enterprise Console Help
Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal
Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal This Application Note explains how to configure ConnectWise PSA (Professional Service Automation) application settings and Cisco
Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal
Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal This Application Note provides instructions for configuring Apps settings on the Cisco OnPlus Portal and Autotask application settings
Management, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)
Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning
Policy Compliance. Getting Started Guide. January 22, 2016
Policy Compliance Getting Started Guide January 22, 2016 Copyright 2011-2016 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM
IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system
Group Management Server User Guide
Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring
Installing GFI FAXmaker version 12
Installing GFI FAXmaker version 12 How to install GFI FAXmaker version 12 on the same machine as the SMTP server (non-exchange 2000/2003) This white paper explains how to install GFI FAXmaker for Exchange/SMTP
LepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
Installing GFI Network Server Monitor
Installing GFI Network Server Monitor System requirements Computers running GFI Network Server Monitor require: Windows 2000 (SP4 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
GFI EndPointSecurity 4.3. Getting Started Guide
GFI EndPointSecurity 4.3 Getting Started Guide http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein
SecurityCenter 5.1 with Nessus Agent Support. October 22, 2015
SecurityCenter 5.1 with Nessus Agent Support October 22, 2015 Table of Contents Introduction... 3 Adding an Agent Repository... 6 Add Agent Scans and Import Agent Scan Results... 7 Tips and Tricks... 8
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE
TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks
Sophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
Windows Vista: Connecting to the fastnsecure@hood wireless network at Hood College
Windows Vista: Connecting to the fastnsecure@hood wireless network at Hood College Please ensure your computer meets the following criteria in order to successfully make a connection to this network: 802.11n
Quickstart guide to Authentication
Quickstart guide to Authentication Introduction WebTitan provides the option to define how users authenticate themselves to WebTitan before accessing external web sites. By default, authentication is disabled,
Snow Active Directory Discovery
Product Snow Active Directory Discovery Version 1.0 Release date 2014-04-29 Document date 2014-04-29 Snow Active Directory Discovery Installation & Configuration Guide Page 2 of 9 This document describes
How to Access Coast Wi-Fi
How to Access Coast Wi-Fi Below is a summary of the information required to configure your device to connect to the coast-wifi network. For further assistance in configuring your specific device, continue
Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network
Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network Wireless Network Names and Credentials There are two wireless networks operating at the Goldfields
OrgPublisher EChart Security
OrgPublisher EChart Security Table of Contents Table of Contents EChart Security Overview... 3 EChart Rich and Thin Client Authentication... 3 Securing Fields... 4 Style Security EChart Rich Client...
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Microsoft Outlook 2010
Microsoft Outlook 2010 a. Open Outlook 2010. b. Click File i. Select Info. ii. Within Account Information, click Add Account. c. Within the Setup wizard select Manually configure server settings or additional
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
GFI Product Manual. Manual
GFI Product Manual Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,
GFI Network Server Monitor 7.0. Manual. By GFI Software Ltd.
GFI Network Server Monitor 7.0 Manual By GFI Software Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
Configuring an IP (SIP) Polycom Soundstation on the Avaya IP Office
Hardware used for this documentation Polycom Soundstation IP 6000 Avaya IP500V2 firmware 7.0.23 Set the Polycom with an IP Address Step 1: Initial setup If your Soundstation does not automatically register
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
Wireless Network Configuration Guide
CIT Table of Contents Introduction... 1 General Wireless Settings... 1 1. Windows XP Wireless Configuration... 2 2. Windows XP Intel Pro Wireless Tool... 7 3. Windows Vista Using the Windows Wireless Tools...
Extreme Networks Security Vulnerability Manager User Guide
Extreme Networks Security Vulnerability Manager User Guide 9034870 Published September 2015 Copyright 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Using WhatsUp IP Address Manager 1.0
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
Integration Guide. LogicNow MAXfocus
Integration Guide LogicNow MAXfocus Revised: 15 April 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration. Guide
Where can I install GFI EventsManager on my network?
Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
NetBrain Security Guidance
NetBrain Security Guidance 1. User Authentication and Authorization 1.1. NetBrain Components NetBrain Enterprise Server includes five components: Customer License Server (CLS), Workspace Server (WSS),
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
How To Monitor Your Network Server With Gfi Network Server Monitor
GFI Network Server Monitor 5.5 Manual By GFI Software Ltd. GFI SOFTWARE Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names,
Kaseya 2. User Guide. Version 1.1
Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright
MicroStrategy Intelligence Server Configuration Table of contents
MicroStrategy Intelligence Server Configuration Table of contents 1 Introduction... 2 1.1 Checklist...2 2 Connection to Metadata... 2 3 Connection to Knoa Databases... 10 1 Introduction This section configures
Secure Global Desktop (SGD)
Secure Global Desktop (SGD) Table of Contents Checking your Java Version...3 Preparing Your Desktop Computer...3 Accessing SGD...5 Logging into SGD...6 Using SGD to Access Your Desktop...7 Using SGD to
Monitoring SQL Server with Microsoft Operations Manager 2005
Monitoring SQL Server with Microsoft Operations Manager 2005 Objectives After completing this lab, you will have had an opportunity to become familiar with several key SQL Management Pack features including:
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
Kaseya 2. User Guide. Version R8. English
Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as
