Summer Internship Project Report on Open Source Intrusion Detection

Total Page:16

File Type:pdf, Size:1020Kb

Summer Internship Project Report on Open Source Intrusion Detection Summer Internship Project Report On Open Source Intrusion Detection System Carried Out At IDRBT Hyderabad 29 th May 2014 to 30 th July 2014 Submitted By: Guided By: Sambit Sarkar Dr. N.P.Dhavale Roll No.: 114112079 Deputy General Manager B.Tech.: Production (2 nd year) IDRBT Hyderabad Indian Institute of Technology Acknowledgement It gives me immense pleasure in presenting my summer internship report. I would like to take this opportunity to express my deepest gratitude to the people, who would have contributed their valuable time for helping me to successfully complete this internship. With great pleasure and acknolodgement I extend my deep gratitude to Shri B. Sambamurthy, Director, IDRBT Hyderabad, for giving me opportunity to accomplish internship at this esteemed organization. It is my profound privilege to express my deep sense of gratitude to Dr. N.P.Dhavale, Deputy General Manager, IDRBT Hyderabad for his precious guidance, constructive encouragement and support throughout the development of the project. Without his help and guidence, it was really difficult to complete this project on time. I am also thankfull to the Shri V.S.Mahesh, Assistant General Manager, IDRBT Hyderabad, Shri E. Shrihari, Project Officer, IDRBT Hyderabad and Shri Sudhir Kumar Jha, Manager, IDRBT Hyderabad for their guidance and support. Finally, I would like to thank the Institute for Development and Research in Banking Technology Hyderabad for conducting such kind of training and I am also grateful to all the other people who have directly or indirectly helped me in my summer internship. Sambit Sarkar B.Tech. (2 nd year) Production Engineering National Institute Of Technology Trichy Certificate This is to verify that the summer internship project report entitled Open Source Intrusion Detection System submitted by Sambit Sarkar, B. Tech. (2 nd Year) in Production Engineering, National Institute of Technology Trichy to Institute for Development and Research in Banking Technology (IDRBT), Hyderabad is a record of bonafied work carried out by him under my supervision and guidance during 29 th May 2014 to 30 th July 2014. (Dr. N.P.Dhavale) Deputy General Manager, IDRBT Hyderabad Project Guide Contents 1. Introduction 1 2. Objectives 2 3. Tools Used 2 4. Architecture 7 5. Setup 9 6. Deliverables 16 Introduction An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. There are network based (NIDS) and host based (HIDS) intrusion detection systems. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization. Since commercial IDS' can be very very expensive, people who believe that internet security shouldn't be so expensive , have come up with Open Source alternatives for the commercial IDS'. Now most of these open source IDS' are free to use and the rules are also freely availabe but some are not. And by open source, I mean that anyone can look and meddle with the source code provided they play well with the GNU Public License and give the same freedom to others when they build something on it. Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS)[4] created by Martin Roesch in 1998.[5] Snort is now developed by Sourcefire, of which Roesch is the founder and CTO.[6] In 2009, Snort entered InfoWorld's Open Source Hall of Fame as one of the "greatest [pieces of] open source software of all time". It has the ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching, and content matching. These basic services have many purposes including application- aware triggered quality of service, to de-prioritize bulk traffic when latency-sensitive applications are in use. Snort when coupled with Barnyard2, BASE, LAMP and ADOdb becomes a really powerful NIDS which is very user friendly and easy to use. Objectives 1. Build an Open Source Network Intruion Detection System with Snort 2. Use Barnyard2 to inject snort's logs into a MySQL database 3. Use BASE and ADOdb to display the alerts in a GUI The purpose of the IDS is to log all the IPs connecting to the CA server. Tools Used 1. Snort: Snort's open source network-based intrusion detection system (NIDS) has the ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks. Snort performs protocol analysis, content searching, and content matching. These basic services have many purposes including application-aware triggered quality of service, to de-prioritize bulk traffic when latency-sensitive applications are in use. The program can also be used to detect probes or attacks, including, but not limited to, operating system fingerprinting attempts, common gateway interface, buffer overflows, server message block probes, and stealth port scans. Snort can be configured in three main modes: sniffer, packet logger, and network intrusion detection. In sniffer mode, the program will read network packets and display them on the console. In packet logger mode, the program will log packets to the disk. In intrusion detection mode, the program will monitor network traffic and analyze it against a rule set defined by the user. The program will then perform a specific action based on what has been identified. 2. Barnyard2: Barnyard (now known only as Barnyard2) is an open sourced-based parsing program designed to retrieve logs written by Snort or Suricata i n the Unified2 format and convert and write them to a database. Unified2 is a special type of binary file format for IDS which softwares l ike barnyard2 parse to a recognizable format (mysql). The formats supported by Barnyard2 are: - MySQL - MSSQL - Oracle - PostgreSQL - SQLite Barnyard makes Snort's work easier by gethering, formatting and writing it to the database. If Snort was to write the logs to the database, it must send the alert to the database and wait for confirmation of a successful write. The situation is made worse if the database is on another server. This could lead to packet drops by snort. Snorts dumps the alerts in unified2 file format. This is very quick, since no processing needs to be performed on the data. Barnyard reads this file, formats the alert data, and write to the chosen output mechanism. The output mechanism can be the conventional Snort logfile, syslogs, comma-seperated-value formatted (CSV) file or a database server. Configuring Snort to run in unified2 file format is very simple. We just need to change the log_unified: in the snort.conf file according to our output format. 3. LAMP: LAMP stands for Linux Apache Mysql PHP. LAMP is an acronym for an archetypal model of web service solution stacks, originally consisting of largely interchangeable components: Linux, the Apache HTTP Server, the MySQL relational database management system, and the PHP programming language. As a solution stack, LAMP is suitable for building dynamic web sites and web applications. The LAMP model has since been adapted to other componentry, though typically consisting of free and open-source software. As an example, the equivalent installation on a Microsoft Windows operating system is known as WAMP. With the growing use of the archetypal LAMP, variations and retronyms appeared for other combinations of operating system, web server, database, and software language. For example the equivalent installation on a Microsoft Windows operating system is known as WAMP. An alternative running IIS in place of Apache called WIMP. Variants involving other operating systems include MAMP (Macintosh), SAMP (Solaris), FAMP (FreeBSD) and iAMP (iSeries). The web server or database management system also vary. LEMP is a version where Apache has been replaced with the more lightweight web server Nginx. A version where MySQL has been replaced by PostgreSQL is called LAPP, or sometimes by keeping the original acronym, LAMP (Linux / Apache / Middleware (Perl, PHP, Python, Ruby) / PostgreSQL). 4. BASE: Basic Analysis and Security Engine is a web interface that lets you view alerts generated by the software for intrusion detection Snort . The interface allows the classification of group alerts, display charts and alerts search by various criteria. BASIC is a program under GPL written in php and built on the ACID code. You can choose to install the program in French. 5. ADOdb: ADOdb is a database abstraction library for PHP and Python based on the same concept as Microsoft's ActiveX Data Objects. It allows developers to write applications in a fairly consistent way regardless of the underlying database system storing the information. The advantage is that the database system can be changed without re- writing every call to it in the application. ADOdb supports the following databases: ActiveX Data Objects DB2 Firebird Foxpro FrontBase Informix Interbase LDAP Microsoft Access Microsoft SQL Server MySQL Netezza Oracle PostgreSQL SAP DB SQLite Sybase Teradata Valentina generic ODBC and ODBTP ADOdb uses SQL. Since each database system implements SQL slightly differently, the developer will need to be aware of the database- specific features and functions to avoid if they want to maintain portability. ADOdb provides date conversion functions so that you can create dates in any format and insert them into your SQL in the correct format for your database; which is one step toward database system independent SQL.
Recommended publications
  • Mysql Connector/ODBC Release Notes
    MySQL Connector/ODBC Release Notes Abstract This document contains release notes for the changes in each release of MySQL Connector/ODBC. For additional Connector/ODBC documentation, see MySQL Connector/ODBC Developer Guide. Updates to these notes occur as new product features are added, so that everybody can follow the development process. If a recent version is listed here that you cannot find on the download page (https://dev.mysql.com/ downloads/), the version has not yet been released. The documentation included in source and binary distributions may not be fully up to date with respect to release note entries because integration of the documentation occurs at release build time. For the most up-to-date release notes, please refer to the online documentation instead. For legal information, see the Legal Notices. For help with using MySQL, please visit the MySQL Forums, where you can discuss your issues with other MySQL users. Document generated on: 2021-09-23 (revision: 23350) Table of Contents Preface and Legal Notices ............................................................................................................ 3 Changes in MySQL Connector/ODBC Version 8.0 ......................................................................... 4 Changes in MySQL Connector/ODBC 8.0.26 (2021-07-20, General Availability) ....................... 4 Changes in MySQL Connector/ODBC 8.0.25 (2021-05-11, General Availability) ....................... 5 Changes in MySQL Connector/ODBC 8.0.24 (2021-04-20, General Availability) ....................... 5 Changes in MySQL Connector/ODBC 8.0.23 (2021-01-18, General Availability) ....................... 6 Changes in MySQL Connector/ODBC 8.0.22 (2020-10-19, General Availability) ....................... 7 Changes in MySQL Connector/ODBC 8.0.21 (2020-07-13, General Availability) ....................... 8 Changes in MySQL Connector/ODBC 8.0.20 (2020-04-27, General Availability) ......................
    [Show full text]
  • Portable Database Access for Javascript Applications Using Java 8 Nashorn
    Portable Database Access for JavaScript Applications using Java 8 Nashorn Kuassi Mensah Director, Product Management Server Technologies October 04, 2017 Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | 3 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | 4 Speaker Bio • Director of Product Management at Oracle (i) Java integration with the Oracle database (JDBC, UCP, Java in the database) (ii) Oracle Datasource for Hadoop (OD4H), upcoming OD for Spark, OD for Flink and so on (iii) JavaScript/Nashorn integration with the Oracle database (DB access, JS stored proc, fluent JS ) • MS CS from the Programming Institute of University of Paris • Frequent speaker JavaOne, Oracle Open World, Data Summit, Node Summit, Oracle User groups (UKOUG, DOAG,OUGN, BGOUG, OUGF, GUOB, ArOUG, ORAMEX, Sangam,OTNYathra, China, Thailand, etc), • Author: Oracle Database Programming using Java and Web Services • @kmensah, http://db360.blogspot.com/, https://www.linkedin.com/in/kmensah Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Program Agenda 1 The State of JavaScript 2 The Problem with Database Access 3 JavaScript on the JVM - Nashorn 4 Portable Database Access 5 Wrap Up Copyright © 2017, Oracle and/or its affiliates.
    [Show full text]
  • Conversion of Microsoft SQL/ASP Applications to Postgresql
    Conversion of Microsoft SQL/ASP applications to PostgreSQL Written by Ethan Townsend, Produced by Project A 6/23/05 Introduction: This manual was compiled by Project A Web Development (http://www.projecta.com) as a project supported by Jim Teece. It was written by Ethan Townsend as a documented means of migrating our ADO ASP application, SIB (Site-in-a- box), from Microsoft SQL Server 7.0 to an open source database. SIB is a large database- driven application that includes many views, stored procedures, and complex SQL executed from the ASP pages. The primary goals were to: 1) Modify the application so that it could seamlessly switch between the existing SQL Server database and the new open source database. 2) Have the ability to offload existing databases from SQL Server to the new database server. 3) Make no modifications to the existing, working SQL Server. 4) Maximize ease-of-use, stability, performance, and security. The following open source database servers were installed and analyzed to determine their feasibility in replacing SQL Server: ● MySQL 4.1: The stable version of MySQL at the time of testing. ● MySQL 5: The development version of MySQL. ● PostgreSQL 7.4: ● PostgreSQL 8.0.3: ● Firebird 1.5.3: ● MaxDB 7.5: ● MaxDB 7.6: After reviewing the alternatives, we settled on PostgreSQL 8.0 for the following reasons: ● Good documentation, ● Best performance on Windows platform (using the included ODBC driver). ● Custom operators and functions allowed a compatibility layer to minimize code changes (only about 300 changes were necessary in ~700,000 lines of code).
    [Show full text]
  • Mysql JSON New Data Type JSON in Mysql >= 5.7.8
    MySQL JSON New Data Type JSON in MySQL >= 5.7.8 Sergej Kurakin Sergej Kurakin Age: 36 Company: NFQ Technologies Position: Software Engineer MySQL 5.7 is in “General Availability” MySQL released version 5.7.9 and marked it with “General Availability” on October 21, 2015. Today is August 3, 2017... So why am I making this talk about MySQL JSON support 2 years after release? Reasons Yes, I’ve missed the release. My project upgraded to MySQL 5.7 just few months ago. Not all PHP libraries and frameworks support JSON as data type. Not all “stable” Linux distributions are already upgraded to MySQL 5.7. I think there are more people who missed the release of MySQL 5.7. I think there are more people who missed new MySQL type JSON. What does official documentation say? MySQL from version 5.7.8 supports new Data Type: JSON That new feature gives us some advantages! Automatic validation of JSON documents stored in JSON columns. Invalid documents produce an error. Now we might meet a project that validates JSON using calls to MySQL. I hope we not. Optimized storage format. JSON documents stored in JSON columns are converted to an internal format that permits quick read access to document elements. The space required to store a JSON document is roughly the same as for LONGBLOB or LONGTEXT The size of any JSON document stored in a JSON column is limited to the value of the max_allowed_packet system variable. A JSON column cannot have a default value, so default values is always NULL.
    [Show full text]
  • Download Date 04/10/2021 15:09:36
    Database Metadata Requirements for Automated Web Development. A case study using PHP. Item Type Thesis Authors Mgheder, Mohamed A. Rights <a rel="license" href="http://creativecommons.org/licenses/ by-nc-nd/3.0/"><img alt="Creative Commons License" style="border-width:0" src="http://i.creativecommons.org/l/by- nc-nd/3.0/88x31.png" /></a><br />The University of Bradford theses are licenced under a <a rel="license" href="http:// creativecommons.org/licenses/by-nc-nd/3.0/">Creative Commons Licence</a>. Download date 04/10/2021 15:09:36 Link to Item http://hdl.handle.net/10454/4907 University of Bradford eThesis This thesis is hosted in Bradford Scholars – The University of Bradford Open Access repository. Visit the repository for full metadata or to contact the repository team © University of Bradford. This work is licenced for reuse under a Creative Commons Licence. Database Metadata Requirements for Automated Web Development Mohamed Ahmed Mgheder PhD 2009 i Database Metadata Requirements for Automated Web Development A case study using PHP Mohamed Ahmed Mgheder BSc. MSc. Submitted for the degree of Doctor of Philosophy Department of Computing School of Computing, Informatics and Media University of Bradford 2009 ii Acknowledgements I am very grateful to my Lord Almighty ALLAH who helped me and guided me throughout my life and made it possible. I could never have done it by myself! I would like to acknowledge with great pleasure the continued support, and valuable advice of my supervisor Mr. Mick. J. Ridley, who gave me all the encouragement to carry out this work. I owe my loving thanks to my wife, and my children.
    [Show full text]
  • Developing PHP Applications for IBM Database Servers
    Front cover Developing PHP Applications for IBM Data Servers Develop and deploy Web solutions using PHP and IBM data servers See PHP with DB2, Informix IDS, and Cloudscape examples Port PHP applications from MySQL to DB2 Whei-Jen Chen Holger Kirstein Daniel Krook Kiran H Nair Piotr Pietrzak ibm.com/redbooks International Technical Support Organization Developing PHP Applications for IBM Data Servers May 2006 SG24-7218-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. First Edition (May 2006) This edition applies to DB2 UDB Version 8.2, Informix IDS Version 10, PHP Versions 4 and 5, Apache 1.3, and Apache 2. © Copyright International Business Machines Corporation 2006. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Tables . ix Notices . xi Trademarks . xii Preface . xiii The team that wrote this redbook. xiii Acknowledgement. xv Become a published author . xvi Comments welcome. xvi Chapter 1. Technology overview . 1 1.1 Web application environment . 2 1.1.1 Web application advantages . 2 1.1.2 Web application challenges . 3 1.1.3 The state of the Web application world . 4 1.1.4 Web application components . 4 1.2 IBM data servers . 5 1.2.1 DB2 data server . 5 1.2.2 Informix database server family . 8 1.2.3 Cloudscape . 10 1.3 HTTP Servers . 11 1.3.1 Apache HTTP Server . 12 1.3.2 IBM HTTP Server . 15 1.3.3 Which Web server do I choose? .
    [Show full text]
  • Admin Guide Reference for Administrators
    Admin Guide Reference for Administrators MantisBT Development Team <[email protected]> Admin Guide: Reference for Administrators by MantisBT Development Team Abstract This book is targeted at MantisBT administrators, and documents the installation, upgrade, configuration, customization and administration tasks required to operate the software. Copyright © 2016 MantisBT team. This material may only be distributed subject to the terms and conditions set forth in the GNU Free Documentation License (GFDL), V1.2 or later (the latest version is presently available at http://www.gnu.org/licenses/fdl.txt). Table of Contents 1. About MantisBT ............................................................................................................. 1 What is MantisBT? ..................................................................................................... 1 Who should read this manual? ...................................................................................... 1 License ..................................................................................................................... 1 How to get it? ............................................................................................................ 1 About the Name ......................................................................................................... 1 History ...................................................................................................................... 2 Support ....................................................................................................................
    [Show full text]
  • Aplicación De Marketing Electrónico Utilizando Phplist
    UNIVERSIDAD NACIONAL AUTÓNOMA DE NICARAGUA, MANAGUA RECINTO UNIVERSITARIO RUBEN DARIO FACULTAD DE CIENCIAS E INGENIERÍA. DEPARTAMENTO DE COMPUTACIÓN Seminario de graduación para optar al título de Licenciatura en Ciencias de la Computación. Tema: E-Marketing Subtema: Aplicación para el envío masivo de correo electrónico utilizando PhpList para la empresa COMVARSA en ciudad de Managua, año 2015. Autores: Br. Marjorie Lissbeth Jarquín González. Br. Darling Margine Blandón Jaime. Br. Yustin Pavel Álvarez Barrios. Tutor: MSc. Santiago Ramón Ríos Baca. Fecha: 08/10/2015 UNIVERSIDAD NACIONAL AUTÓNOMA DE NICARAGUA, MANAGUA RECINTO UNIVERSITARIO RUBEN DARIO FACULTAD DE CIENCIAS E INGENIERÍA. DEPARTAMENTO DE COMPUTACIÓN Seminario de graduación para optar al título de Licenciatura en Ciencias de la Computación. Tema: E-Marketing Subtema: Aplicación para el envío masivo de correo electrónico utilizando PhpList para la empresa COMVARSA en ciudad de Managua, año 2015. Autores: Br. Marjorie Lissbeth Jarquín González. Br. Darling Margine Blandón Jaime. Br. Yustin Pavel Álvarez Barrios. Tutor: MSc. Santiago Ramón Ríos Baca. Fecha: 08/10/2015 INDICE I. Resumen .................................................................................................................................... 11 II. Introducción .............................................................................................................................. 12 III. Antecedentes ...........................................................................................................................
    [Show full text]
  • Adodb Para PHP
    Programación en Internet 2008-2009 Departamento de Lenguajes y Sistemas Informáticos ADOdb para PHP Programación en Internet Curso 2008-2009 Programación en Internet – Curso 2008-2009 Índice • ¿Qué es? • Ejemplo de código • Instalación • Objetos y métodos principales • Como conectarse • Como ejecutar una consulta DLSI - Universidad de Alicante 1 Programación en Internet 2008-2009 Programación en Internet – Curso 2008-2009 ADOdb para PHP • ADOdb: Database Abstraction Library for PHP (Biblioteca de abstracción del acceso a datos para PHP). – Sitio web oficial: http://adodb.sourceforge.net/ • PHP y por tanto ADOdb suportan un gran número de motores de BDs. – MySQL, PostgreSQL, Interbase, Firebird, Informix, Oracle, MS SQL, Foxpro, Access, ADO, Sybase, FrontBase, DB2, SAP DB, SQLite, Netezza, LDAP, and generic ODBC, ODBTP. • Algunas de las aplicaciones web más populares (ACID, PostNuke, Xaraya, phpWiki, Mambo, PHP GACL, TikiWiki, eGroupWare, etc.) usan ADOdb como capa de abstracción de acceso a datos. Programación en Internet – Curso 2008-2009 Ejemplo de código include('/rutadondeeste/adodb.inc.php'); $DB = NewADOConnection('mysql'); $DB->Connect($server, $user, $pwd, $db); $rs = $DB->Execute("select * from tabla where dato=?",array($key)); while (!$rs->EOF) { print_r($rs->fields); $rs->MoveNext(); } DLSI - Universidad de Alicante 2 Programación en Internet 2008-2009 Programación en Internet – Curso 2008-2009 Instalación • Descargarse el paquete de la web • Descomprimir los ficheros del paquete descargado y moverlos a una ubicación pública del servicio web o accesible desde la aplicación web. • Para probarlo, se puede ejecutar el código de ejemplo anterior, tras dar valor a las variables y datos necesarios. Programación en Internet – Curso 2008-2009 Objetos y métodos • Dos objetos principales: – ADOConnection • Connect, Pconnect, Nconnect, close • Execute, prepare, prepareSP • Funciones de LOBs • Transacciones, binds • Errores y otros.
    [Show full text]
  • DB2 UDB Exploitation of the Windows Environment
    Front cover DB2 UDB Exploitationation of the Windowsws Environment Detailed examples for leveraging DB2 UDB V8.1 in Windows 2000 environment Installing, security, monitoring, performance, high availability Application development guidelines Whei-Jen Chen Chris Fierros Alexandre H. Guerra Thomas Mitchell Francis Reddington ibm.com/redbooks International Technical Support Organization DB2 UDB Exploitation of the Windows Environment March 2003 SG24-6893-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xvii. First Edition (March 2003) This edition applies to DB2 Universal Database Version 8.1 for use with Microsoft Windows 2000 operating system. © Copyright International Business Machines Corporation 2003. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . ix Tables . xv Notices . xvii Trademarks . xviii Preface . xix The team that wrote this redbook. xx Become a published author . xxii Comments welcome. xxiii Chapter 1. Introduction. 1 1.1 DB2 UDB overview . 2 1.1.1 DB2 family. 2 1.1.2 DB2 UDB for Windows, UNIX, and Linux . 2 1.2 DB2 UDB products on Windows . 29 1.2.1 Product descriptions . 29 1.2.2 Try and buy product availability. 33 1.3 Planning considerations . 33 1.3.1 Product selection guidelines . 33 1.3.2 Sample scenarios . 38 1.4 DB2 UDB Version 8 highlights . 39 1.5 DB2 UDB integration with Microsoft Windows . 41 1.5.1 Built for the Windows environment . 41 Chapter 2. Installation and deployment . 47 2.1 Installation preparation and considerations.
    [Show full text]
  • Mariadb Master Integration
    MariaDB master integration The settings shown below were added during your last Moodle upgrade. Make any changes necessary to the defaults and then click the "Save changes" button at the bottom of this page. New settings - General restore defaults Include users restore | restore_general_users Default: Yes Locked Sets the default for whether to restore users if they were included in the backup. Include enrolment methods restore | restore_general_enrolments Locked Yes, but only if users are included Default: Yes, but only if users are included Sets the default for restoring enrolment methods. Include role assignments restore | restore_general_role_assignments Default: Yes Locked If enabled by default roles assignments will be restored if they were included in the backup. Include activities and resources restore | restore_general_activities Default: Yes Locked Sets the default for restoring activities. Include blocks restore | restore_general_blocks Default: Yes Locked Sets the default for restoring blocks. Include filters restore | restore_general_filters Default: Yes Locked Sets the default for restoring filters. Include comments restore | restore_general_comments Default: Yes Locked Sets the default for restoring comments. Include badges restore | restore_general_badges Default: Yes Locked Sets the default for restoring badges. Include calendar events restore | restore_general_calendarevents Default: Yes Locked Sets the default for restoring calendar events. Include user completion information restore | restore_general_userscompletion Default: Yes Locked If enabled user completion information will be restored by default if it was included in the backup. Include logs restore | restore_general_logs Default: Yes Locked If enabled logs will be restored by default if they were included in the backup. Include histories restore | restore_general_histories Default: Yes Locked Sets the default for restoring user history if it was included in the backup.
    [Show full text]
  • Micro Focus Fortify Software System Requirements
    Micro Focus Fortify Software Software Version: 20.2.0 System Requirements Document Release Date: Revision 2: January 2021 Software Release Date: November 2020 System Requirements Legal Notices Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK https://www.microfocus.com Warranty The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Restricted Rights Legend Confidential computer software. Except as specifically indicated otherwise, a valid license from Micro Focus is required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Copyright Notice © Copyright 2001 - 2021 Micro Focus or one of its affiliates Trademark Notices All trademarks, service marks, product names, and logos included in this document are the property of their respective owners. Documentation Updates The title page of this document contains the following identifying information: l Software Version number l Document Release Date, which changes each time the document is updated
    [Show full text]