Разделы презентаций


SAMHAIN

What is Samhain?The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes.Samhain been designed

Слайды и текст этой презентации

Слайд 1SAMHAIN

SAMHAIN

Слайд 2What is Samhain?
The Samhain host-based intrusion detection system (HIDS) provides file

integrity checking and log file monitoring/analysis, as well as rootkit detection, port

monitoring, detection of rogue SUID executables, and hidden processes.
Samhain been designed to monitor multiple hosts with potentially different operating systems, providing centralized logging and maintenance, although it can also be used as standalone application on a single host.
Samhain is an open-source multiplatform application for POSIX systems (Unix, Linux, Cygwin/Windows).

What is Samhain?The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as

Слайд 3Centralized Management
Samhain can be used standalone on a single host,

but its particular strength is centralized monitoring and management. The

complete management of a samhain system can be done from one central location. To this end, several components are required. A full samhain client/server system is built of the following components:
The samhain file/host integrity checker
The yule log server
A relational database
The Beltane web-based console
The deployment system
Centralized ManagementSamhain can be used standalone on a single host, but its particular strength is centralized monitoring

Слайд 4Host Integrity Monitoring
Samhain is extensible by modules that can

be compiled in at the users’ discretion. The following list

shows which modules are currently available.
Logfile monitoring/analysis
Windows registry check
Kernel integrity
SUID/SGID files
Open ports
Process check
Mount check
Login/logoff events
Host Integrity Monitoring Samhain is extensible by modules that can be compiled in at the users’ discretion.

Слайд 5Log Facilities
The verbosity and on/off status of each log

facility can be configured individually.
Central log server. Messages are

sent via encrypted TCP connections. Clients need to authenticate to the server.
Syslog.
Console (if daemon) / stderr.
Log file. To prevent unauthorized modifications of existing log records, the log file entries are signed.
E-mail (built-in mailer). E-mail reports are signed to prevent tampering. It is possible to configure different filters for different recipients.
Database (currently MySQL, PostgreSQL, and Oracle are supported; support for unixODBC is
untested).
Execute external program - this can be used to implement arbitrary additional logging facilities, or to perform active response to events.
Log Facilities The verbosity and on/off status of each log facility can be configured individually. Central log

Слайд 6Running Samhain

Running Samhain

Обратная связь

Если не удалось найти и скачать доклад-презентацию, Вы можете заказать его на нашем сайте. Мы постараемся найти нужный Вам материал и отправим по электронной почте. Не стесняйтесь обращаться к нам, если у вас возникли вопросы или пожелания:

Email: Нажмите что бы посмотреть 

Что такое TheSlide.ru?

Это сайт презентации, докладов, проектов в PowerPoint. Здесь удобно  хранить и делиться своими презентациями с другими пользователями.


Для правообладателей

Яндекс.Метрика