Network Assessment

Total Page:16

File Type:pdf, Size:1020Kb

Network Assessment Asset Detail Report Network Assessment Prepared for: CONFIDENTIALITY NOTE: The information contained in this report is for the exclusive use of Sample Company the client specified above and may contain confidential, privileged, and non-disclosable information. If you are not the client or addressee, you are strictly prohibited from reading, Prepared by: photocopying, distributing, or otherwise using this report or its contents in any way. AMS Networks Scan Date: 01-Apr-2014 22-Feb-2019 Asset Detail Report NETWORK ASSESSMENT Table of Contents 1 - Domain: CORP.MYCO.COM 1.1 - BKRICKEY-WIN7 1.2 - COSTEN-SG 1.3 - DAVIS-XP 1.4 - DC01 1.5 - DC02 1.6 - DC03 1.7 - DELL120720 1.8 - DEV_2012-CORE 1.9 - DEVTFS 1.10 - DEVWIKI 1.11 - DHAROLD-PC 1.12 - ENGINEERS 1.13 - ENTCERTS 1.14 - EXCHANGE2013 1.15 - FILE2012-1 1.16 - FTDELLLAPTOP 1.17 - FT-LENOVO 1.18 - GHAMMOND-LT 1.19 - HJOEL-VM-WIN764 1.20 - HJOEL-WIN764 1.21 - HPV00 1.22 - HV01 1.23 - HV02 1.24 - HV03 1.25 - HV04 1.26 - HV05 1.27 - HV2012-1 1.28 - HYPERV-02 1.29 - HYPERV-03 1.30 - ISA1 PROPRIETARY & CONFIDENTIAL Page 2 of 373 Asset Detail Report NETWORK ASSESSMENT 1.31 - JAGA 1.32 - JAMIE-PC 1.33 - JIM-WIN7 1.34 - JIM-WIN8 1.35 - JOES-PC 1.36 - MARKETING-1 1.37 - MELKINS-HP 1.38 - MIGTEST 1.39 - MMAYHEMON1 1.40 - MMAYHEMON-HP 1.41 - MSUMMER-LT 1.42 - MWEST-WIN864 1.43 - MYCO 1.44 - MYCO30DEV 1.45 - MYCO-ATL-CORE 1.46 - MYCODEMO 1.47 - MYCO-INSPIRON1 1.48 - MYCOPATCH 1.49 - MYCOROOTAUTH 1.50 - OPS001 1.51 - PABUILD 1.52 - PKWIN7ENT 1.53 - PKWIN8 1.54 - PS01 1.55 - PSIMPSON1 1.56 - PSIMPSON-WIN764 1.57 - PSIMPSON-WIN7TEST 1.58 - QB02 1.59 - QBSERVER 1.60 - RANCOR 1.61 - REMOTE 1.62 - REX 1.63 - RS01 PROPRIETARY & CONFIDENTIAL Page 3 of 373 Asset Detail Report NETWORK ASSESSMENT 1.64 - SALES01 1.65 - SE-DAVIS 1.66 - SHAREPOINT-01 1.67 - SHARLISE-WIN8 1.68 - SHREDDER 1.69 - SLOWE-WIN8 1.70 - SPIELÖÄÜ 1.71 - SQL2012-01 1.72 - STORAGE01 1.73 - TANDEM 1.74 - THRASH2 1.75 - USER-PC23 1.76 - UTIL01 1.77 - UTIL12 1.78 - VM-JDAVIS-WIN7 1.79 - VM-WIN7 1.80 - WINDESKTOP 1.81 - WIN-HNQ8G0O1RAI 1.82 - WINXP32 1.83 - WINXP64 2 - No Domain 2.1 - SLOWE-WIN7.CORP.MYCO.COM 3 - Printers 4 - Network Devices PROPRIETARY & CONFIDENTIAL Page 4 of 373 Asset Detail Report NETWORK ASSESSMENT 1 - Domain: Corp.MyCo.com 1.1 - CORP.MYCO.COM\BKRICKEY-WIN7 Computer IP address Windows 7 Enterprise (x86) Service Pack 1 (Build 7601) 10.0.7.74 Risk Section System Risk Score System Issue Score Issues n Operating system in Extended Support (20 pts) System Profile Profile OS Windows 7 Enterprise Windows Key BBBBB-BBBBB-BBBBB-BBBBB-BBBBB Manufacturer Dell Inc./Vostro 230 Service Tag/Serial Number 830TRL1 Processor Pentium(R) Dual-Core CPU E5400 @ 2.70GHz 64-bit ready Multi-core (2 total) Not hyper-threaded OS Install Date 06-Jun-2012 12:14:51 PM Last Active Directory Check-in 01-Apr-2014 7:35:21 PM System Memory Memory Serial # Speed Size PROPRIETARY & CONFIDENTIAL Page 5 of 373 Asset Detail Report NETWORK ASSESSMENT Memory Bank: Memory Bank0 (In Use) 1333 2048 MB MHz Memory Bank: Memory Bank1 (In Use) 1333 1024 MB MHz Total Memory 3072 MB Disk Space Utilization Volumes Driv Volume Label Filesyste Capacit Used % Used Availabl % e m y e Available C: C Drive 288.05 45.51 15.80% 242.54 84.20% GB GB GB D: RECOVERY 10 GB 4.69 GB 46.90% 5.31GB 53.10% Physical Drives Model Serial Number Type Size Volumes WDC WD3200AAKS-75L9A0 2020202057202d Hard Drive 298.09 ATA Device 444d5756415632 GB 303033343036 Windows IP Configuration Unknown Type adapter : Description Broadcom NetLink (TM) Gigabit Ethernet Physical Address 00:26:2D:28:C5:47 IPv4 Address 10.0.7.74;fe80::8176:9cb6:2173:b513 Default Gateway 10.0.1.1 Endpoint Security Security Center Antivirus PROPRIETARY & CONFIDENTIAL Page 6 of 373 Asset Detail Report NETWORK ASSESSMENT GFI Software VIPRE Enabled Yes Up-to-date No Antispyware GFI Software VIPRE Enabled Yes Up-to-date No Windows Defender Enabled No Up-to-date Yes Firewall GFI Software VIPRE Enabled No Up-to-date No Windows Firewall Enabled Yes Domain Setting On Private Setting On Public Setting On Detected by Services Antivirus GFI Languard Enabled Yes Antispyware GFI Languard Enabled Yes Firewall No firewall services found that were not already in Security Center Patch Status PROPRIETARY & CONFIDENTIAL Page 7 of 373 Asset Detail Report NETWORK ASSESSMENT MBSA Issue Score Assessment Security Updates Unable to scan Cannot contact Windows Update Agent on target computer, possibly due to firewall settings. Local Account Password Strength Assessment Assessment: Strong Security Administrator - Weak, Disabled Guest - Weak, Disabled Connected Printers (from WMI) IP Address Printer Name Accessed From Location Location 10.0.7.74 Brother MFC- 9320CW Printer Shares UNC PATH Remark \\BKRICKEY-WIN7\ADMIN$ C:\Windows \\BKRICKEY-WIN7\C$ C:\ \\BKRICKEY-WIN7\D$ D:\ \\BKRICKEY-WIN7\IPC$ \\BKRICKEY-WIN7\Temp C:\Temp Installed Applications Windows Applications Application Name Version Adobe Flash Player 12 ActiveX 12.0.0.77 Adobe Flash Player 12 Plugin 12.0.0.77 Adobe Reader X (10.1.9) 10.1.9 CCleaner 4.00 Citrix Online Launcher 1.0.122 PROPRIETARY & CONFIDENTIAL Page 8 of 373 Asset Detail Report NETWORK ASSESSMENT Application Name Version GFI Business Agent 6.2.5505 Microsoft .NET Framework 4.5.1 4.5.50938 Microsoft Office Professional Plus 2013 15.0.4420.1017 Microsoft Online Services Sign-in Assistant 7.250.4287.0 Microsoft Silverlight 5.1.30214.0 Microsoft SQL Server 2005 Compact Edition [ENU] 3.1.0000 Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 9.0.30729.4148 Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 9.0.30729.6161 MSXML 4.0 SP2 Parser and SDK 4.20.9818.0 QuickBooks File Doctor 3.5.3 QuickBooks Premier: Professional Services Edition 2012 22.0.4008.2206 ScreenConnect Client (2872323bbe412f4c) 4.1.6060.5144 TreeSize Free V2.4 2.4 VirtualCloneDrive Windows Live Essentials 16.4.3505.0912 License Keys None Detected Common Listening Ports Remote RDP IP Address Computer Name (3389/TCP) 10.0.7.74 BKRICKEY-WIN7 ü Local Unable to collect remotely PROPRIETARY & CONFIDENTIAL Page 9 of 373 Asset Detail Report NETWORK ASSESSMENT 1.2 - CORP.MYCO.COM\COSTEN-SG Computer IP address Windows 7 Enterprise 10.0.7.24 Risk Section System Risk Score System Issue Score Issues n Inactive computers (15 pts) System Profile Profile OS Windows 7 Enterprise Processor Last Active Directory Check-in 08-Jun-2013 3:39:38 AM System Memory None Detected Disk Space Utilization None Detected Windows IP Configuration None Detected PROPRIETARY & CONFIDENTIAL Page 10 of 373 Asset Detail Report NETWORK ASSESSMENT Endpoint Security Security Center Antivirus Unable to scan Antispyware Unable to scan Firewall Unable to scan Detected by Services Antivirus Unable to scan Antispyware Unable to scan Firewall Unable to scan Patch Status Unable to scan Local Account Password Strength Assessment Unable to scan Connected Printers Unable to scan Shares Unable to scan Installed Applications PROPRIETARY & CONFIDENTIAL Page 11 of 373 Asset Detail Report NETWORK ASSESSMENT Windows Applications None Detected License Keys Unable to scan Common Listening Ports Remote None Detected Local Unable to collect remotely PROPRIETARY & CONFIDENTIAL Page 12 of 373 Asset Detail Report NETWORK ASSESSMENT 1.3 - CORP.MYCO.COM\DAVIS-XP Computer IP address Windows 8 Enterprise (x64) unknown (Build 9200) 10.0.7.10 Risk Section System Risk Score System Issue Score Issues n Inactive computers (15 pts) System Profile Profile OS Windows 8 Enterprise Manufacturer Gateway/DX4870 Processor Intel(R) Core(TM) i3-2130 CPU @ 3.40GHz 64-bit ready Multi-core (2 total) Not hyper-threaded OS Install Date 18-Feb-2014 5:51:03 AM Last Active Directory Check-in 23-Sep-2013 11:36:56 AM System Memory Memory Serial # Speed Size Memory Bank: Memory Bank0 (In Use) 1333 MHz 4096 MB Memory Bank: Memory Bank1 (In Use) 1333 MHz 2048 MB Total Memory 6144 MB PROPRIETARY & CONFIDENTIAL Page 13 of 373 Asset Detail Report NETWORK ASSESSMENT Disk Space Utilization Volumes % Filesyste Availabl Drive Volume Label Capacity Used % Used Availabl m e e C: 127 GB 33.14 GB 26.09% 93.86GB 73.91% Physical Drives Model Serial Number Type Size Volumes ST500DM002-1BD142 S2ALCY6M Hard Drive 465.76 GB Windows IP Configuration Unknown Type adapter : Description Intel(R) 82579V Gigabit Network Connection Physical Address 4C:72:B9:8A:AC:85 IPv4 Address 10.0.7.10;fe80::f4f2:7d07:6fb1:1b96 Default Gateway 10.0.1.1 Endpoint Security Security Center Antivirus Windows Defender Enabled Yes Up-to-date Yes Antispyware PROPRIETARY & CONFIDENTIAL Page 14 of 373 Asset Detail Report NETWORK ASSESSMENT Windows Defender Enabled Yes Up-to-date Yes Firewall Windows Firewall Enabled Yes Domain Setting On Private Setting On Public Setting On Detected by Services Antivirus No antivirus services found that were not already in Security Center Antispyware No antispyware services found that were not already in Security Center Firewall No firewall services found that were not already in Security Center Patch Status MBSA Issue Score Assessment Security Updates Unable to scan Cannot contact Windows Update Agent on target computer, possibly due to firewall settings. Local Account Password Strength Assessment Assessment: Strong Security Administrator - Weak, Disabled Guest - Weak, Disabled Connected Printers PROPRIETARY & CONFIDENTIAL Page 15 of 373 Asset Detail Report NETWORK ASSESSMENT None Detected Shares UNC PATH Remark \\DAVIS-XP\ADMIN$ C:\Windows \\DAVIS-XP\C$ C:\ \\DAVIS-XP\IPC$ Installed Applications Windows Applications Application Name Version
Recommended publications
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • What Is Active Directory
    What is Active Directory Originally created in the year 1996, Active Directory, also referred as an AD, was first used with Windows 2000 Server as a directory service for Windows domain networks. Active Directory is a special purpose database, which serves as a central location for authenticating and authorizing all the users and computers within a network. Active Directory uses the Lightweight Directory Access Protocol (LDAP), an application protocol used for accessing and maintaining directory information services distributed over an IP network. What is Active Directory? The basic internal structure of the Active Directory consists of a hierarchical arrangement of Objects which can be categorized broadly into resources and security principles. Some of the examples of Active Directory objects are users, computers, groups, sites, services, printers, etc. Every Object is considered as a single entity with some specific set of attributes. The attributes of Objects along with the kind of objects that can be stored in the AD are defined by a Schema. The intrinsic framework of Active Directory is divided into a number of levels on the basis of visibility of objects. An AD network can be organized in four types of container structure namely, Forest, Domains, Organizational Units and Sites. y Forests: It is a collection of AD objects, their attributes and set of attribute syntax. y Domain: Domain is a collection of computers objects in the AD which share a common set of policies, a name and a database of their members. y Organizational Units: OUs are containers in which domains are grouped. They are used to create a hierarchy for the domain to resemble the structure of the Active Directory's company in organizational terms.
    [Show full text]
  • Cygwin User's Guide
    Cygwin User’s Guide i Cygwin User’s Guide Cygwin User’s Guide ii Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012 Red Hat, Inc. Permission is granted to make and distribute verbatim copies of this documentation provided the copyright notice and this per- mission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this documentation under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this documentation into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the Free Software Foundation. Cygwin User’s Guide iii Contents 1 Cygwin Overview 1 1.1 What is it? . .1 1.2 Quick Start Guide for those more experienced with Windows . .1 1.3 Quick Start Guide for those more experienced with UNIX . .1 1.4 Are the Cygwin tools free software? . .2 1.5 A brief history of the Cygwin project . .2 1.6 Highlights of Cygwin Functionality . .3 1.6.1 Introduction . .3 1.6.2 Permissions and Security . .3 1.6.3 File Access . .3 1.6.4 Text Mode vs. Binary Mode . .4 1.6.5 ANSI C Library . .5 1.6.6 Process Creation . .5 1.6.6.1 Problems with process creation . .5 1.6.7 Signals . .6 1.6.8 Sockets . .6 1.6.9 Select .
    [Show full text]
  • X86 Disassembly Exploring the Relationship Between C, X86 Assembly, and Machine Code
    x86 Disassembly Exploring the relationship between C, x86 Assembly, and Machine Code PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 07 Sep 2013 05:04:59 UTC Contents Articles Wikibooks:Collections Preface 1 X86 Disassembly/Cover 3 X86 Disassembly/Introduction 3 Tools 5 X86 Disassembly/Assemblers and Compilers 5 X86 Disassembly/Disassemblers and Decompilers 10 X86 Disassembly/Disassembly Examples 18 X86 Disassembly/Analysis Tools 19 Platforms 28 X86 Disassembly/Microsoft Windows 28 X86 Disassembly/Windows Executable Files 33 X86 Disassembly/Linux 48 X86 Disassembly/Linux Executable Files 50 Code Patterns 51 X86 Disassembly/The Stack 51 X86 Disassembly/Functions and Stack Frames 53 X86 Disassembly/Functions and Stack Frame Examples 57 X86 Disassembly/Calling Conventions 58 X86 Disassembly/Calling Convention Examples 64 X86 Disassembly/Branches 74 X86 Disassembly/Branch Examples 83 X86 Disassembly/Loops 87 X86 Disassembly/Loop Examples 92 Data Patterns 95 X86 Disassembly/Variables 95 X86 Disassembly/Variable Examples 101 X86 Disassembly/Data Structures 103 X86 Disassembly/Objects and Classes 108 X86 Disassembly/Floating Point Numbers 112 X86 Disassembly/Floating Point Examples 119 Difficulties 121 X86 Disassembly/Code Optimization 121 X86 Disassembly/Optimization Examples 124 X86 Disassembly/Code Obfuscation 132 X86 Disassembly/Debugger Detectors 137 Resources and Licensing 139 X86 Disassembly/Resources 139 X86 Disassembly/Licensing 141 X86 Disassembly/Manual of Style 141 References Article Sources and Contributors 142 Image Sources, Licenses and Contributors 143 Article Licenses License 144 Wikibooks:Collections Preface 1 Wikibooks:Collections Preface This book was created by volunteers at Wikibooks (http:/ / en.
    [Show full text]
  • Netiq Securelogin Installation Guide 9 Installing, Configuring, and Deploying Desktop Automation Services 67 9.1 Installing Desktop Automation Services
    Installation Guide SecureLogin 8.0 October, 2013 www.netiq.com/documentation Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation.
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • IDOL Keyview Filter SDK 12.6 C Programming Guide
    KeyView Software Version 12.6 Filter SDK C Programming Guide Document Release Date: June 2020 Software Release Date: June 2020 Filter SDK C Programming Guide Legal notices Copyright notice © Copyright 2016-2020 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To check for updated documentation, visit https://www.microfocus.com/support-and-services/documentation/. Support Visit the MySupport portal to access contact information and details about the products, services, and support that Micro Focus offers. This portal also provides customer self-solve capabilities. It gives you a fast and efficient way to access interactive technical support tools needed to manage your business. As a valued support customer, you can benefit by using the MySupport portal to: l Search for knowledge documents of interest l Access product documentation l View software vulnerability alerts l Enter into discussions with other software customers l Download software patches l Manage software licenses, downloads, and support contracts l Submit and track service requests l Contact customer support l View information about all services that Support offers Many areas of the portal require you to sign in.
    [Show full text]
  • IDOL Connector Framework Server 12.0 Administration Guide
    Connector Framework Server Software Version 12.0 Administration Guide Document Release Date: June 2018 Software Release Date: June 2018 Administration Guide Legal notices Copyright notice © Copyright 2018 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Trademark notices Adobe™ is a trademark of Adobe Systems Incorporated. Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation. UNIX® is a registered trademark of The Open Group. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To verify you are using the most recent edition of a document, go to https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result?doctype=online help. You will also receive new or updated editions of documentation if you subscribe to the appropriate product support service. Contact your Micro Focus sales representative for details. To check for new versions of software, go to https://www.hpe.com/software/entitlements. To check for recent software patches, go to https://softwaresupport.softwaregrp.com/patches. The sites listed in this section require you to sign in with a Software Passport.
    [Show full text]
  • BTS Technology Standards Directory
    BTS Technology Standards Directory Technology Standards Directory City of Portland, Oregon Bureau of Technology Services Summer 2021 Adopted September 14, 2021 Updated September 20, 2021 BTS Infrastructure Board Page 1 Summer 2021 Adopted 9/14/2021 V1.1 9/20/2021 BTS Technology Standards Directory Table of Contents 37. Operational Support Tools .................... 47 Introduction .............................................. 4 38. Project Management Tools ................... 49 Standards ...................................................... 4 39. Radio / Ham Radio ................................ 50 Security .......................................................... 4 40. Server Base Software ........................... 50 Exception to Standards.................................. 5 41. Source Code Control System ............... 51 Standard Classification .................................. 5 42. Telecommunications ............................. 51 Support Model ............................................... 6 43. Web Tools ............................................. 52 Energy Efficiency ........................................... 8 44. Workstation Software ............................ 53 BTS Standard Owner ..................................... 8 BTS Standards Setting Process .................... 9 Security Technology Standards ............56 ADA Assistive Technologies ........................ 10 45. Authentication ....................................... 56 46. Encryption ............................................. 56 Hardware Standards
    [Show full text]
  • IDOL Keyview Filter SDK 12.1 Java Programming Guide
    KeyView Software Version 12.1 Filter SDK Java Programming Guide Document Release Date: October 2018 Software Release Date: October 2018 Filter SDK Java Programming Guide Legal notices Copyright notice © Copyright 2016-2018 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. You can check for more recent versions of a document through the MySupport portal. Many areas of the portal, including the one for documentation, require you to sign in with a Software Passport. If you need a Passport, you can create one when prompted to sign in. Additionally, if you subscribe to the appropriate product support service, you will receive new or updated editions of documentation. Contact your Micro Focus sales representative for details. Support Visit the MySupport portal to access contact information and details about the products, services, and support that Micro Focus offers. This portal also provides customer self-solve capabilities. It gives you a fast and efficient way to access interactive technical support tools needed to manage your business.
    [Show full text]
  • IDOL Keyview Viewing SDK 12.4 Programming Guide
    KeyView Software Version 12.4 Viewing SDK Programming Guide Document Release Date: October 2019 Software Release Date: October 2019 Viewing SDK Programming Guide Legal notices Copyright notice © Copyright 2016-2019 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To check for updated documentation, visit https://www.microfocus.com/support-and-services/documentation/. Support Visit the MySupport portal to access contact information and details about the products, services, and support that Micro Focus offers. This portal also provides customer self-solve capabilities. It gives you a fast and efficient way to access interactive technical support tools needed to manage your business. As a valued support customer, you can benefit by using the MySupport portal to: l Search for knowledge documents of interest l Access product documentation l View software vulnerability alerts l Enter into discussions with other software customers l Download software patches l Manage software licenses, downloads, and support contracts l Submit and track service requests l Contact customer support l View information about all services that Support offers Many areas of the portal require you to sign in.
    [Show full text]
  • OSINT Handbook September 2020
    OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 Aleksandra Bielska Noa Rebecca Kurz, Yves Baumgartner, Vytenis Benetis 2 Foreword I am delighted to share with you the 2020 edition of the OSINT Tools and Resources Handbook. Once again, the Handbook has been revised and updated to reflect the evolution of this discipline, and the many strategic, operational and technical challenges OSINT practitioners have to grapple with. Given the speed of change on the web, some might question the wisdom of pulling together such a resource. What’s wrong with the Top 10 tools, or the Top 100? There are only so many resources one can bookmark after all. Such arguments are not without merit. My fear, however, is that they are also shortsighted. I offer four reasons why. To begin, a shortlist betrays the widening spectrum of OSINT practice. Whereas OSINT was once the preserve of analysts working in national security, it now embraces a growing class of professionals in fields as diverse as journalism, cybersecurity, investment research, crisis management and human rights. A limited toolkit can never satisfy all of these constituencies. Second, a good OSINT practitioner is someone who is comfortable working with different tools, sources and collection strategies. The temptation toward narrow specialisation in OSINT is one that has to be resisted. Why? Because no research task is ever as tidy as the customer’s requirements are likely to suggest. Third, is the inevitable realisation that good tool awareness is equivalent to good source awareness. Indeed, the right tool can determine whether you harvest the right information.
    [Show full text]