GFI network security and PCI compliance power tools

For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities. These tasks are also key components for...

Descripción completa

Detalles Bibliográficos
Autor principal: Posey, Brien (-)
Otros Autores: Thompson, Troy
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Syngress Pub c2009.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627708906719
Tabla de Contenidos:
  • Front Cover; GFI Network Security and PCI Compliance Power Tools; Copyright Page; Technical Editor; Lead Author; Foreword Contributor; Contents; Foreword; Acknowledgements; Chapter 1: Installing GFI LANguard Network Security Scanner; Introduction; Installing GFI LANguard Network Security Scanner; Installing SQL Server; Continuing the GFI LANguard Network Security Scanner Setup Process; Configuring E-mail Notifications; Configuring a Standalone SMTP Server; Configuring GFI LANguard for Use With Microsoft Exchange Server; Continuing the Server Configuration Process; Summary
  • Solutions Fast TrackFrequently Asked Questions; Chapter 2: An Introduction to the GFI LANguard Network Security Scanner Management Console; Introduction; The Main Console Screen; The Configuration Screen; Scanning Profiles; The Settings Section; Computer Profiles; The General Section; The Tools Screen; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3: Performing a Security Scan; Introduction; Performing Your First Security Scan; A Shortcut to Scanning; Performing a Full Network Security Scan; Aborting a Scan; Summary; Solutions Fast Track; Frequently Asked Questions
  • Chapter 4: Analyzing the Scan ResultsIntroduction; Viewing the Scan Results; Viewing the Vulnerabilities that Were Detected; Potential Vulnerabilities; Saving the Scan Results; Printing the Scan Results; Getting More Information; Querying Open Ports; Filtering the Scan Results; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5: Using the ReportPack; Introduction; Installing the ReportPack; Creating a Report; Favorite Reports; Custom Reports; Creating Data Filters; Creating a Custom Report; Scheduled Reports; Other Options; Summary; Solutions Fast Track
  • Frequently Asked QuestionsChapter 6: Inventories and Auditing; Introduction; Performing a Hardware Inventory; Dealing With Information Overload; Compiling a Software Inventory; Analyzing the Results; Blacklisting and Whitelisting Applications; Network Documentation; Network Diagrams; Network Mapping for Windows XP; Network Mapping for Windows Server 2003; What Else is Missing?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7: Patch Management; Introduction; Downloading Microsoft Patches; Scanning for Missing Updates; Viewing the Report
  • Viewing Missing Patch Information Through the Management ConsoleApplying Microsoft Service Packs; Deploying Microsoft Patches; Double Check the Patch Management Status; Deploying a Specific Patch; Performing a Scan Comparison; Uninstalling a Patch; Deploying Custom Software; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8: Installing GFI EndPointSecurity; Introduction; Hardware and Software Requirements; Requirements for the GFI EndPointSecurity Server; The GFI EndPointSecurityAgent's Requirements; The Agent's Hardware Requirements; The Agent's Software Requirements
  • Installing GFI EndPointSecurity