CyberGuard SG575 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Passerelles/contrôleurs CyberGuard SG575. ecurity and osting Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer

Résumé du contenu

Page 1 - SECURITY

SECURITYAND HOSTINGMortgage ComputerOgden, Utah

Page 2

Attack Prevention ServicesAttack Prevention Services analyze attack readiness and provide recommendations for remediation.Prevention services are avai

Page 3

Ozone is aggressively priced at $20 per VLAN (one template is allowed per VLAN). An additionalfee is charged for moving servers between VLANS. Custome

Page 4 - Security and Hosting

Operating System HardeningOS Hardening, a process of securing, a server can serve to mitigate the risk of being hacked or ofsuffering a denial of serv

Page 5 - System Requirements

Detection and Incident Response ServicesDetection and Response Services recognize and stop attempted intrusions, prevent further intrusionsfrom occurr

Page 6 - The Data Center

The Planet monitors all traffic entering the network, except MatriXtreme, for possible networkfloods or Distributed Denial of Service (DDoS) with Arbo

Page 7 - The Facilities

The Cyberguard SG575 Security Appliance enables administrators to deploy a powerful, fullyintegrated firewall, VPN and Intrusion Detection System (IDS

Page 8

The PIX 515E “Unrestricted” (PIX 515E-UR), unrestricted software license model, extends thecapabilities of the family with support for stateful failov

Page 9 - Securing The Planet

The Cisco PIX 535 Unrestricted (PIX 535-UR), unrestricted software license model, extends thecapabilities of the security appliance with support for s

Page 10 - Attack Prevention Services

Cisco Guard DDoS MitigationThe Planet handles a DDoS attack with Cisco® Guard XT 5650 DDoS Mitigation Appliance. Whena flood attack is detected by Arb

Page 11

SecurePack Security ReportingThe Planet’s all new security services reporting is available through SecurePack. Customers receiveaccess to Arbor, Tippi

Page 12

PrefaceThe Hosted Server uses industry standard 128-bit data encryption with SSL public key/private key(PKI) certificates. All information relayed bet

Page 13

Threat EliminationWhen new vulnerabilities are detected against any managed system, The Planet has a variety ofresponses available:C Managed Operating

Page 14

Application Specific HardeningThe Planet’s Security Engineering Team, administrators and developers are experienced in securinga multitude of applicat

Page 15

21MC Software Security and Hosting

Page 17

Required Internet ExplorerBrowser Settings for MC SoftwareOpen your browser and click on Tools in either of the two locations indicated below.Select I

Page 18

Browsing HistoryClick Settings under Browsing history.24MC Software Security and Hosting

Page 19

C Under Check for newer versions of stored pages, indicate Every time I visit the webpage. C MC also recommends setting the Disk space to use to 1024.

Page 20 - Threat Elimination

SecurityOn the Internet Options screen, select the Security tab.Click on Trusted Sites and then click Sites.26MC Software Security and Hosting

Page 21 - Security Services at a Glance

C Remove the checkmark from Required server verification.C Use the Add this website to the zone option to add individual Web sites. Enter the Webaddre

Page 22

Security LevelOn the same Security screen, make sure the Security level for this zone is set to Low.Click Apply.28MC Software Security and Hosting

Page 24 - Required Internet Explorer

AdvancedOn the Internet Options screen, select the Advanced tab.Scroll down in the settings and uncheck the box for Reuse windows for launching shortc

Page 25 - Browsing History

C Continue scrolling down and check the box for Empty Temporary Internet Files folderwhen browser is closed.C Click Apply to save the changes and then

Page 28

MC Software Company LoginA different saying displays each time MC Software is selected.Enter the Company ID and Password unique to your organization a

Page 29 - Security Level

MC Software Web LoginUser NameEnter your assigned user name. The program will only allow one logon per user name andpassword, and requires the passwor

Page 30 - Advanced

Update PasswordCurrent PasswordEnter your current password. The program requires the current password to be sure thecorrect operator is requesting th

Page 31

MC Software Helpful HintsAmpersand and Quotes The ampersand (&) and quotes (“ ”) are used in programminglanguage and are not to be used in the i

Page 32 - Software

The Print button within the MC Software displays reports, forms,etc., in PDF (portable document format). The toolbar within the PDFdisplay screen cont

Page 33

MC Software SecurityLogin NamesThe MC Software Maintenance program is flexible and powerful. Login Names and User Groupscontrol who is allowed to acce

Page 34 - MC Software Company Login

Security and HostingContents - Updated October 18, 2013System Requirements ... 4The Data Center ..

Page 35 - MC Software Web Login

NameFirst and last name of the operator.E-mailE-mail address of the operator. To send an e-mail, click on the e-mail address and the new e-mailmessage

Page 36 - Update Password

Allowable IP and Subnet AddressesEach company hosted by Mortgage Computer will indicate an ACL (access control list), limitingthe IP addresses by user

Page 37 - MC Software Helpful Hints

User Security AccessTo set up an individual operator's access within MC Software, click on Edit on the UserMaintenance screen after creating a us

Page 38 - Expanded

Interviewer's License NumberEnter the operator's license number. The license number prints on Section X. Information forGovernment Monitorin

Page 39

DU/LP Acct OverrideIf this option is enabled, the following screen displays to allow the input of the operator's username and password to overrid

Page 40

Menu ItemsDetermine the items that will display on the main MC Software menu for each operator. If theitem is not checked, it will not display and, th

Page 41

Although all MC Software options may display on themain menu, an operator's access to the fields within thoseoptions can be protected. Click on P

Page 42 - User Security Access

User GroupsUser groups can be created for collectors, processors, loan officers, etc., to streamline the setupprocess and assure each operator's

Page 43

As with Login Names, the access within each of the main menu options can also becontrolled. Click on the main menu option to display any additional pr

Page 44

System RequirementsSupported SystemsWindows 7 or Windows 8 with all current service packs and critical updates applied. MC suggestsat least 4 gig mini

Page 45

Data Center, Dallas, TexasThe Data Center5MC Software Security and Hosting

Page 46

The FacilitiesThe data center that houses the servers is located in Dallas, Texas. The facility offers completeredundancy in power, HVAC, fire suppres

Page 47 - User Groups

Security monitoring roomInside the computer roomPower equipment roomSecurity monitored 24x7Diesel generators outside data centerOne of the two diesel

Page 48

Securing The PlanetThe Internet has experienced a surge in malicious traffic including denial of service attacks, wormsand viruses. Worldwide, in the

Commentaires sur ces manuels

Pas de commentaire