CyberGuard SG575 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Gateways / Controller CyberGuard SG575 herunter. ecurity and osting Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - SECURITY

SECURITYAND HOSTINGMortgage ComputerOgden, Utah

Seite 2

Attack Prevention ServicesAttack Prevention Services analyze attack readiness and provide recommendations for remediation.Prevention services are avai

Seite 3

Ozone is aggressively priced at $20 per VLAN (one template is allowed per VLAN). An additionalfee is charged for moving servers between VLANS. Custome

Seite 4 - Security and Hosting

Operating System HardeningOS Hardening, a process of securing, a server can serve to mitigate the risk of being hacked or ofsuffering a denial of serv

Seite 5 - System Requirements

Detection and Incident Response ServicesDetection and Response Services recognize and stop attempted intrusions, prevent further intrusionsfrom occurr

Seite 6 - The Data Center

The Planet monitors all traffic entering the network, except MatriXtreme, for possible networkfloods or Distributed Denial of Service (DDoS) with Arbo

Seite 7 - The Facilities

The Cyberguard SG575 Security Appliance enables administrators to deploy a powerful, fullyintegrated firewall, VPN and Intrusion Detection System (IDS

Seite 8

The PIX 515E “Unrestricted” (PIX 515E-UR), unrestricted software license model, extends thecapabilities of the family with support for stateful failov

Seite 9 - Securing The Planet

The Cisco PIX 535 Unrestricted (PIX 535-UR), unrestricted software license model, extends thecapabilities of the security appliance with support for s

Seite 10 - Attack Prevention Services

Cisco Guard DDoS MitigationThe Planet handles a DDoS attack with Cisco® Guard XT 5650 DDoS Mitigation Appliance. Whena flood attack is detected by Arb

Seite 11

SecurePack Security ReportingThe Planet’s all new security services reporting is available through SecurePack. Customers receiveaccess to Arbor, Tippi

Seite 12

PrefaceThe Hosted Server uses industry standard 128-bit data encryption with SSL public key/private key(PKI) certificates. All information relayed bet

Seite 13

Threat EliminationWhen new vulnerabilities are detected against any managed system, The Planet has a variety ofresponses available:C Managed Operating

Seite 14

Application Specific HardeningThe Planet’s Security Engineering Team, administrators and developers are experienced in securinga multitude of applicat

Seite 15

21MC Software Security and Hosting

Seite 17

Required Internet ExplorerBrowser Settings for MC SoftwareOpen your browser and click on Tools in either of the two locations indicated below.Select I

Seite 18

Browsing HistoryClick Settings under Browsing history.24MC Software Security and Hosting

Seite 19

C Under Check for newer versions of stored pages, indicate Every time I visit the webpage. C MC also recommends setting the Disk space to use to 1024.

Seite 20 - Threat Elimination

SecurityOn the Internet Options screen, select the Security tab.Click on Trusted Sites and then click Sites.26MC Software Security and Hosting

Seite 21 - Security Services at a Glance

C Remove the checkmark from Required server verification.C Use the Add this website to the zone option to add individual Web sites. Enter the Webaddre

Seite 22

Security LevelOn the same Security screen, make sure the Security level for this zone is set to Low.Click Apply.28MC Software Security and Hosting

Seite 24 - Required Internet Explorer

AdvancedOn the Internet Options screen, select the Advanced tab.Scroll down in the settings and uncheck the box for Reuse windows for launching shortc

Seite 25 - Browsing History

C Continue scrolling down and check the box for Empty Temporary Internet Files folderwhen browser is closed.C Click Apply to save the changes and then

Seite 28

MC Software Company LoginA different saying displays each time MC Software is selected.Enter the Company ID and Password unique to your organization a

Seite 29 - Security Level

MC Software Web LoginUser NameEnter your assigned user name. The program will only allow one logon per user name andpassword, and requires the passwor

Seite 30 - Advanced

Update PasswordCurrent PasswordEnter your current password. The program requires the current password to be sure thecorrect operator is requesting th

Seite 31

MC Software Helpful HintsAmpersand and Quotes The ampersand (&) and quotes (“ ”) are used in programminglanguage and are not to be used in the i

Seite 32 - Software

The Print button within the MC Software displays reports, forms,etc., in PDF (portable document format). The toolbar within the PDFdisplay screen cont

Seite 33

MC Software SecurityLogin NamesThe MC Software Maintenance program is flexible and powerful. Login Names and User Groupscontrol who is allowed to acce

Seite 34 - MC Software Company Login

Security and HostingContents - Updated October 18, 2013System Requirements ... 4The Data Center ..

Seite 35 - MC Software Web Login

NameFirst and last name of the operator.E-mailE-mail address of the operator. To send an e-mail, click on the e-mail address and the new e-mailmessage

Seite 36 - Update Password

Allowable IP and Subnet AddressesEach company hosted by Mortgage Computer will indicate an ACL (access control list), limitingthe IP addresses by user

Seite 37 - MC Software Helpful Hints

User Security AccessTo set up an individual operator's access within MC Software, click on Edit on the UserMaintenance screen after creating a us

Seite 38 - Expanded

Interviewer's License NumberEnter the operator's license number. The license number prints on Section X. Information forGovernment Monitorin

Seite 39

DU/LP Acct OverrideIf this option is enabled, the following screen displays to allow the input of the operator's username and password to overrid

Seite 40

Menu ItemsDetermine the items that will display on the main MC Software menu for each operator. If theitem is not checked, it will not display and, th

Seite 41

Although all MC Software options may display on themain menu, an operator's access to the fields within thoseoptions can be protected. Click on P

Seite 42 - User Security Access

User GroupsUser groups can be created for collectors, processors, loan officers, etc., to streamline the setupprocess and assure each operator's

Seite 43

As with Login Names, the access within each of the main menu options can also becontrolled. Click on the main menu option to display any additional pr

Seite 44

System RequirementsSupported SystemsWindows 7 or Windows 8 with all current service packs and critical updates applied. MC suggestsat least 4 gig mini

Seite 45

Data Center, Dallas, TexasThe Data Center5MC Software Security and Hosting

Seite 46

The FacilitiesThe data center that houses the servers is located in Dallas, Texas. The facility offers completeredundancy in power, HVAC, fire suppres

Seite 47 - User Groups

Security monitoring roomInside the computer roomPower equipment roomSecurity monitored 24x7Diesel generators outside data centerOne of the two diesel

Seite 48

Securing The PlanetThe Internet has experienced a surge in malicious traffic including denial of service attacks, wormsand viruses. Worldwide, in the

Kommentare zu diesen Handbüchern

Keine Kommentare