Architecture Overview

Total Page:16

File Type:pdf, Size:1020Kb

Architecture Overview ARCHITECTURE OVERVIEW WHISTLER BY FAIRWORDS 1 | Page 2 | Page TABLE OF CONTENTS Architecture Overview ................................................................................... 4 Data storage ................................................................................................................................................. 4 Cloud ......................................................................................................................................................... 4 Installation Summary ................................................................................................................................... 4 Email and Instant Messanger ................................................................................................................... 4 Email Setup ................................................................................................... 5 On – Premise Exchange 2010 ....................................................................................................................... 5 Outlook ......................................................................................................................................................... 6 Instant Message Setup ................................................................................... 8 AIM ............................................................................................................................................................... 8 On – Premise LYNC (Skype For Business) 2013 .......................................................................................... 10 Traditional Skype (Version 6 and higher) ................................................................................................... 11 ICE Instant messaging (IceChat) ................................................................................................................. 13 3 | Page ARCHITECTURE OVERVIEW DATA STORAGE CLOUD All data is securely archived in the cloud: • Data stored in secured archives, best-in-class, long-term storage • Advanced Encryption Standard (AES) 256-bit symmetric keys and supports secure transfer of your data over Secure Sockets Layer (SSL) • Up to 40TB of data at once, SEC Rule 17a-4(f) and CFTC Reg 1.31(b)-(c) complaint • WORM • Recording of all parties accessing the data • Access to audit logs anytime • Asset (data) security • Super-owner notified in an event of data being accessed INSTALLATION SUMMARY EMAIL AND INSTANT MESSANGER Details on the installation process and how data are fetched for Exchange 2010, AOL Instant Messenger, and Lync 2013, are described below. Configuration happens usually in under an hour, and then, depending on the amount of data, complete data transfer takes place over the subsequent couple of days. However, no IT team is needed to for that process, which runs in the background, and data transfer does not interrupt day to day operations. After configuration and transfer are complete, every inbound and outbound written message will be monitored and archived in real-time. 4 | Page EMAIL SETUP ON – PREMISE EXCHANGE 2010 ARCHITECTURE 1. Whistler needs "Exchange Journaling" to be enabled in order to forward all inbound and outbound emails through our automatic surveillance system. To do this, we use a secure TLS connection with Username and password authentication to forward all email domains in the Exchange Store. 2. The session is initiated by sending the server a message to establish the connections security. The server then selects a digital certificate containing a public key. 3. Whistler responds with an encrypted message containing its public key and other information including a random number that only the server can decrypt. 4. Whistler and the server then generate key material for encryption and decryption and the secure session is initiated and the data can be exchanged. 5. Whistler opens the Envelope, analyzes the header and routes the email to the appropriate Archive, with full support for BCC, SMTP Mail FROM and distribution list email. 6. The Whistler system can unify multiple domains, domain aliases, instant messaging (IM) and import legacy email with no message size limitations. 7. Whistler supports unlimited domains and Customers. Once Exchange Journaling is configured, email for any new domain added to the Exchange Store will be automatically forwarded to the Whistler Archive. 5 | Page OUTLOOK ARCHITECTURE 1. Login to FairWords which will then require information from Office 365. FairWords redirects you to the Azure AD authentication endpoint. 2. You authenticate and give consent. FairWords will be preset to only request the services you actually require, and specify the least level of permissions in each service that still enable required functions to be performed. Permission levels are additive; there is no need to request multiple permission levels for a given API, as the more expansive permission level already includes the more restricted permission. For example, for the Mail API, the Send email as a user permission already includes the Read and write access to users' email permission. 3. FairWords is configured with restricted access rights. Azure AD issues an authorization codes which are used to request access codes for specific resources. 6 | Page 4. After FairWords has the authorization code, the application can request access and refresh tokens. FairWords passes the authorization code the Azure AD token issuance endpoint. Azure AD returns access and refreshes tokens. 5. FairWords can then use the access and refresh tokens to access the Office 365 API endpoints and return data. FairWords can then present these tokens, on behalf of the user, to the Office 365 API service(s). 7 | Page INSTANT MESSAGE SETUP AIM ARCHITECTURE 1. AIM gives users the option to change the server address it connects to during sign in. Here, Whistler will change it to our hostname and port. Please note the following below: a. To stop the AIM client from possibly bypassing Whistler IM Gateway, the block port will be assigned to all inbound/outbound traffic other than the Whistler IM Gateway b. Hosts files or DNS ‘A’ records can no longer be used to configure AIM, because AIM clients 6.x and higher use encryption that requires a strict SSL certificate check at connection, and as a result, redirection causes the SSL connection to not pass because it is not what is identified in the SSL certificate. 2. To begin configuration, we will remove existing AIM entries from users’ Hosts files. After that we will: a. Launch AOL Instant Messenger. b. Go to the Options menu, and then select Settings. c. Click on the Connection tab. 3. In the “Server” section, Whistler will enter our Host aimhost.fairwords.co and Port, 5190 4. Click Save. 5. After we have configured the AIM client, we then have to disable the Auto-Update and Auto-Upgrade feature in AIM. This allows us to ensure users won’t use unsupported versions of AIM without our knowledge, and guarantees the IM client’s settings are not overwritten. 8 | Page 6. To disable the Auto-Update and Auto-Upgrade in AIM: a. Launch AOL Instant Messenger. b. Go to the Options menu, and then select Settings. c. Click on the Sign In/ Sign Out tab. d. Make sure the Automatically download and install upgrade when AIM starts option under “AIM Upgrades” is not selected. 7. Click Save. 9 | Page ON – PREMISE LYNC (SKYPE FOR BUSINESS) 2013 Whistler can capture and securely IM’s between two or more parties via Lync (Skype for Business) messaging to help companies adhere to compliance regulations, and serve e-discovery and audit inquiries. Since Lync / Skype for business provides a mechanism for logging conversations (via Microsoft Archiving server Database), Whistler can provide software to be installed locally which directly extracts these conversations, converts them to an intermediary markup language, and delivers them to Whistler repository. The repository maintains messages in their original format, along with detailed summaries (including usernames, number of messages, number of participants, etc.), and then time-date stamped, serialized, indexed, and preserved on tamperproof storage with write-verification. Some firms have groups of employees whose messages require special archiving procedures due to security, compliance, or retention concerns. For example, a firm may use a dedicated archive to store the messages of its traders separately from other employees. Whistler integrates with your Active Directory to provide granular control over which users’ messages are archived and in which repository they are preserved. ARCHITECTURE 1. Whistler for Lync/Skype for Business service is installed on the client’s server. 2. As users create IM conversations, Microsoft Archiving Server’s LCSLog database logs these messages. 3. Whistler then extracts all messages contained in Microsoft Archiving Server database, turns them into an email, and forwards them to Whistler Archiving via IMAP or SMTP. 10 | Page TRADITIONAL SKYPE (VERSION 6 AND HIGHER) ARCHITECTURE Some companies have settled upon “traditional” skype, i.e. not skype for business. Traditional Skype can also be configured to be compliant via Whistler’s customized connectors, without the need to transition users to Lync / Skype for Business. To enable traditional Skype for compliance: 1. Back up old logs to an archive file. a. The last 30 days of your conversation history are stored in the cloud, so you can access it when you’re signed in to Skype on any device. b.
Recommended publications
  • Download Windows Live Messenger for Linux Ubuntu
    Download windows live messenger for linux ubuntu But installing applications in Ubuntu that were originally made for I found emescene to be the best Msn Messenger for Ubuntu Linux so far. It really gives you the feel as if you are using Windows Live Messenger. Its builds are available for Archlinux, Debian, Ubuntu, Fedora, Mandriva and Windows. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger and Google Talk. While finding MSN Messenger for Linux / Ubuntu, I found different emesene is also available and could be downloaded and installed for. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger. A simple & beautiful app for Facebook Messenger. OS X, Windows & Linux By downloading Messenger for Desktop, you acknowledge that it is not an. An alternative MSN Messenger chat client for Linux. It allows Linux users to chat with friends who use MSN Messenger in Windows or Mac OS. The strength of. Windows Live Messenger is an instant messenger application that For more information on installing applications, see InstallingSoftware. sudo apt-get install chromium-browser. 2. After the installation is Windows Live Messenger running in LinuxMint / Ubuntu. You can close the. Linux / X LAN Messenger for Debian/Ubuntu LAN Messenger for Fedora/openSUSE Download LAN Messenger for Windows. Windows installer A MSN Messenger / Live Messenger client for Linux, aiming at integration with the KDE desktop Ubuntu: Ubuntu has KMess in its default repositories.
    [Show full text]
  • Instant Messaging
    Instant Messaging Internet Technologies and Applications Contents • Instant Messaging and Presence • Comparing popular IM systems – Microsoft MSN – AOL Instant Messenger – Yahoo! Messenger • Jabber, XMPP and Google Talk ITS 413 - Instant Messaging 2 Internet Messaging •Email – Asynchronous communication: user does not have to be online for message to be delivered (not instant messaging) • Newsgroups • Instant Messaging and Presence – UNIX included finger and talk • Finger: determine the presence (or status) of other users • Talk: text based instant chatting application – Internet Relay Chat (IRC) • Introduced in 1988 as group based, instant chatting service • Users join a chat room • Networks consist of servers connected together, and clients connect via a single server – ICQ (“I Seek You”) • Introduced in 1996, allowing chatting between users without joining chat room • In 1998 America Online (AOL) acquired ICQ and became most popular instant messaging application/network – AIM, Microsoft MSN, Yahoo! Messenger, Jabber, … • Initially, Microsoft and Yahoo! Created clients to connect with AIM servers • But restricted by AOL, and most IM networks were limited to specific clients • Only recently (1-2 years) have some IM networks opened to different clients ITS 413 - Instant Messaging 3 Instant Messaging and Presence • Instant Messaging – Synchronous communications: message is only sent to destination if recipient is willing to receive it at time it is sent •Presence – Provides information about the current status/presence of a user to other
    [Show full text]
  • Instant Messaging
    Instant Messaging what’s so gr8 about it? Cybertour | March 18 | Cindi Trainor 1 What is IM? Communicate real-time Users are notified when others come online Can share files, communicate via video with most programs IM vs “chat rooms”: When chat first came about, a user would log into a room full of people who were all interested in the same topic, and all those people saw everyone’s messages, but users could send “private” messages to an individual, if desired. IM is kind of the opposite: users primarily send messages to individuals but can set up multiple user chat rooms if desired (but users control who’s in a multi-user chat by invitation). 2 Why Use IM? Instant communication Send links, files, photos instantly Can multi-task Our users are familiar with it 3 Common Features Contacts list “Display picture” – an Customize your icon representing you messages’ Privacy features appearance Log conversations Games Set your status: Send and receive “away,” “offline,” files “busy,” etc. Multi-user chat Emoticons (“smilies”) Profiles With major IM programs, users add only the people that they want to chat with to a contacts list (buddy list, friends list). Messages’ appearance: font face, color, size Files: photos, dox, etc (can sometimes be slow vs using email with attachments) Multi-user chat: “chat rooms” Icons: some are static, some are animated or even customizable “avatars.” Privacy: can set it so that only your buddies can contact you; most have invisible mode 4 But… chat reference? IM is chat reference Hosted systems can be expensive, OR Use IM to supplement hosted system If you aren’t using chat reference in your library, IM is a cheap alternative to hosted systems to get your feet wet.
    [Show full text]
  • Implementing Reliable Instant Messaging at Your Library
    Implementing Reliable Instant Messaging at Your Library Karen McCoy Adult Services Librarian Farmington Public Library, NM Some background… More libraries are communicating with patrons in real time over the internet “Online real-time chat reference services have become increasingly prevalent in many types and sizes of libraries” (1). BUT… “Because no IM technology standard has been approved by all the major players, IM has long been problematic to libraries… but newer IM products can help resolve these dilemmas.”(2). 1. Kwon, Nahyun, & Gregory, Vicki L. (2007). The effects of librarians' behavioral performance on user satisfaction in chat reference services. Reference & User Services Quarterly. 47, 137-148, 137. 2. Rethlefsen, Melissa L. (Summer 2007). Product Pipeline. Netconnect, 14-16 Instant Messaging vs. Chat Software What’s the difference? Chat Software: fee-based, usually only used in businesses and libraries (usually part of a consortium to reduce cost) also referred to as “virtual reference” or “chat reference.” Instant Messaging: FREE to libraries and patrons, more often used by people in their daily lives, generally not platform dependent (1), more compatible in a Web 2.0 environment A recent trend in reference service seems to be a move from use of chat reference software to use of IM (2). 1. Johnson, Kris. “Pros & Cons of IM/SMS Virtual Reference.” NMLA/MPLA Presentation. March, 2007 2. Naylor, Sharon, Stoffel, Bruce, & Van Der Laan, Sharon (2008). Why isn't our chat reference used more? Reference & User Services Quarterly.
    [Show full text]
  • Instant Messaging on the Internet: Interoperability Issues of Competition and Fair Access
    Order Code RS20688 Updated March 28, 2002 CRS Report for Congress Received through the CRS Web Instant Messaging on the Internet: Interoperability Issues of Competition and Fair Access name redacted Analyst in Information Science and Technology Policy Resources, Science, and Industry Division Summary Instant Messaging (IM) is one of the fastest growing Internet applications. The recent debate about IM is related to the broad issues of open access rules and competition in the high speed Internet service and cable television markets. Although IM technology has evolved largely independent of formal regulation, a review of the AOL-Time Warner (AOL-TW) merger brought issues of interoperability (the ability to exchange messages between multiple IM services) among IM services under scrutiny both in the US and Europe. Concerns about open access and accessibility for the disabled, have been raised by Members of Congress, the Federal Trade Commission (FTC), the Federal Communications Commission (FCC), and the European Commission (EC). These issues highlight the growing complexity of regulating converging technologies. This report discusses the technology behind instant messaging and provides an overview of the issues. It will be updated as necessary. Background Instant messaging (IM) is one of the fastest growing free services on the Internet. IM combines the immediacy of a telephone call with the network presence of electronic mail (e-mail) to create an instantaneous system for exchanging messages between two people. In its simplest form, IM applications are used for the synchronous exchange of text messages. However, recent developments in IM technology also now allow users to exchange files, pictures, and even voice messages.
    [Show full text]
  • Vertical's Applications Aim to Address Retail's In-Store Customer Convergence Woes
    October 2013 Vertical’s Applications Aim to Address Retail’s In-Store Customer Convergence Analyst Insight Woes Aberdeen’s Insights provide the analyst’s perspective on the In an era of converged (physical and digital) retailing at store-level, customer research as drawn from an aggregated view of research connection areas such as voice-assisted selling and messaging, music service, surveys, interviews, and digital signage, automated applications, and other media-rich solutions are all data analysis. coming together to influence buying behavior. According to data from Aberdeen’s February 2011 Automated and Connected Store report, 63% of Vertical’s Retail Focus and retailers aspire to connect better with the customer’s emotions and Solutions mindshare. Due to the evolution of pre-shopping research by customers √ and access to omni-channel products, pricing, and promotions, 59% of Customers: Retailers using unified communications and retailers have indicated that convergence-ready stores are no longer IP-PBX applications. optional. √ Geo Focus: Global. The emergence of digitized retailing — i.e., the use of digital sales and service tools and processes such as voice, kiosks, mobile customer service, √ Customer Tier or Revenue- tablets, digital signage, etc. — is a necessity to create a productive, Size: Tier 1 and Tier 2 retail, information-rich, and connected omni-channel environment before, during, logistics, and other and after the shopping experience. As a result, the need for a customer- industries. Primarily over $500 million in revenue. connected store environment compels retailers to re-think their internal and external communications in terms of voice, video, data velocity, types, √ Sub-Segment Focus: Drug / and complexity.
    [Show full text]
  • Lessons Learned Research Partners Background Methods Aim
    Family engagement in child health Building Partnerships research needed. that Impact Communities 2019 ANNUAL CONFERENCE Kirsti Mardell1, Crystal Shannon1,2 1Kids Brain Health Network; 2University of British Columbia, Okanagan Background • Family engagement in research is needed in order to bring communities such as parents of children living with neurodevelopmental disabilities a Research Partners collaborative voice. • Researchers and families may have different reasons for wanting to participate in pediatric research; however, their goals may still align when the commitment to foster better outcomes and positive change for child health is present. • The authors formed a researcher- Crystal Shannon & Kirsti Mardell family partnership during the first cohort of the Family Engagement in Research (FER) Certificate of Dissemination Completion, sponsored by Kids Brain • The infographic is user-friendly and Health Network in partnership with can be widely distributed to a variety CanChild and McMaster University. of stakeholders using several • Together, Kirsti and Crystal, developed platforms including: facebook groups a knowledge translation (KT) tool in and organizations or can be posted on the form of an infographic to related websites including the Kids heighten awareness of the Brain Health Network. importance of integrated research teams. Next Steps Aim • Kirsti continues her mission to advocate for more supports and • The aim of the infographic is to services for families and children illustrate the importance of family living with neurodevelopmental engagement in research for child differences to benefit her rural health in a visually appealing manner community, the Regional Municipality that can be easily understood and of Wood Buffalo in Alberta where disseminated. resources are lacking.
    [Show full text]
  • On OSCAR File Transfers
    On Sending Files via OSCAR Google Summer of Code 2005 Gaim Project By Jonathan Clark On Sending Files via OSCAR Table of Contents Introduction................................................................................................................................................3 Contact Information.............................................................................................................................. 3 Acknowledgments.................................................................................................................................3 Who Should Read This..........................................................................................................................3 Background........................................................................................................................................... 3 Overview............................................................................................................................................... 4 Recommended Tools.............................................................................................................................4 Example Implementations.....................................................................................................................4 Conventions...........................................................................................................................................4 Data Structures...........................................................................................................................................5
    [Show full text]
  • Webex Productivity Tools Integration to Instant Messengers
    WebEx Productivity Tools Integration to Instant Messengers User Guide 072310 Copyright © 1997–2010 Cisco and/or its affiliates. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the Cisco WebEx logo are trademarks or registered trademarks of Cisco and/or its affiliated entities in the United States and other countries. Third-party trademarks are the property of their respective owners. U.S. Government End User Purchasers. The Documentation and related Services qualify as "commercial items," as that term is defined at Federal Acquisition Regulation ("FAR") (48 C.F.R.) 2.101. Consistent with FAR 12.212 and DoD FAR Supp. 227.7202-1 through 227.7202-4, and notwithstanding any other FAR or other contractual clause to the contrary in any agreement into which the Agreement may be incorporated, Customer may provide to Government end user or, if the Agreement is direct, Government end user will acquire, the Services and Documentation with only those rights set forth in the Agreement. Use of either the Services or Documentation or both constitutes agreement by the Government that the Services and Documentation are commercial items and constitutes acceptance of the rights and restrictions herein. Last updated: 072310 www.webex.com Table of Contents Chapter 1 Installing and Setting Up WebEx Productivity Tools.......................................... 3 Opening the WebEx Settings dialog box ................................................................................................. 3 Installing WebEx Productivity Tools ..........................................................................................................
    [Show full text]
  • Instant Messaging
    Instant Messaging Jabber Revision Date: October 29, 2013 Prepared by: William Fisher Contents Overview ....................................................................................................................................................... 2 Account Request ........................................................................................................................................... 2 Installation and Configuration ...................................................................................................................... 2 Chatting ......................................................................................................................................................... 4 Adding Contacts using a Directory Service ............................................................................................... 4 Chatting / IMing ........................................................................................................................................ 5 Presence Awareness ................................................................................................................................. 6 Page 1 of 6 Overview JCESR uses Jabber as its instant messaging service. Jabber is an open source, secure, ad-free alternative to consumer instant messaging (IM) services such AIM, ICQ, MSN and Yahoo. The service provides both an easy mechanism to chat and an organizational presence awareness (e.g. Available, Away etc. )Communications on the Jabber server are limited to JCESR collaborators.
    [Show full text]
  • Powerscan™ 9500 Family Industrial Corded Handheld Area Imager Bar Code Reader Powerscan PD9530/PBT9500/PM9500
    PowerScan™ 9500 Family Industrial Corded Handheld Area Imager Bar Code Reader PowerScan PD9530/PBT9500/PM9500 Product Reference Guide Datalogic ADC, Inc. 959 Terry Street | Eugene | OR 97402 | USA Telephone: (1) 541-683-5700 | Fax: (1) 541-345-7140 ©2013-2014 Datalogic, Inc. An Unpublished Work - All rights reserved. No part of the contents of this documentation or the procedures described therein may be reproduced or transmitted in any form or by any means without prior written permission of Datalogic ADC, Inc. or its subsidiaries or affiliates ("Datalogic" or “Datalogic ADC”). Owners of Datalogic products are hereby granted a non- exclusive, revocable license to reproduce and transmit this documentation for the purchaser's own internal business purposes. Purchaser shall not remove or alter any proprietary notices, including copyright notices, contained in this documentation and shall ensure that all notices appear on any reproductions of the documentation. Should future revisions of this manual be published, you can acquire printed versions by con- tacting your Datalogic representative. Electronic versions may either be downloadable from the Datalogic website (www.datalogic.com) or provided on appropriate media. If you visit our website and would like to make comments or suggestions about this or other Datalogic publi- cations, please let us know via the "Contact Datalogic" page. Disclaimer Datalogic has taken reasonable measures to provide information in this manual that is com- plete and accurate, however, Datalogic reserves the right to change any specification at any time without prior notice. Datalogic and the Datalogic logo are registered trademarks of Datalogic S.p.A. in many coun- tries, including the U.S.A.
    [Show full text]
  • Temporal Analysis Anomalies with Ios Imessage Communication Exchange
    Temporal Analysis Anomalies with iOS iMessage Communication Exchange Michelle Govan and Kenneth Ovens School of Engineering & Built Environment, Glasgow Caledonian University, Scotland. [email protected] [email protected] Abstract. The universal adoption of mobile devices provides an abun- dance of data for forensic investigators to extract, analyse, and recon- struct events. Unfortunately, anomalies produce misleading temporal data and other discrepancies which, without proper understanding, can hinder investigations. To ensure more data can be converted into reliable evidentiary material this paper presents a detailed study of an Apple iMessage communication exchange in iOS 7, explaining the occurrence of discrepancies and examining temporal data accuracy. The ability to establish a message origin on a system where multiple devices share a single account is also explored. Keywords: cyber forensics, temporal analysis, iMessage, iOS 1 Introduction The near ubiquitous use of mobile devices has created individual repositories that provide an abundance of data on a user's activities, which in turn provides investigators with potentially rich sources of information that previously may not have existed. However, such information can only become reliable evidence when there is a complete understanding of the data dynamics on devices that provide such data, and there are explanations for any apparent anomalies that arise. With reliable temporal data investigators can begin to reconstruct a chronolog- ical list of events to find out what happened, when it happened, and who was involved [1]. However, temporal data can also be misleading due to poor con- figuration, time-zone differences, daylight saving time, clock drift, or how the operating system and application have been programmed [2].
    [Show full text]