Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
compliances , o-s , projects , security

Netsparker now Invicti  field Notes

November 20, 2022

The new features automatic configuration of URL rewrite rules and Scan Policy Optimizer will automate more of the pre-scan process for you, making the scanning of hundreds and thousands of websites an easier task. We are also introducing the new proof of exploitation, which will definitely ease the post...

Img
compliances , o-s , policies , security

Legacy Netsparker Notes

November 19, 2022

Files is in a bundled .zip file for storage convenience only. Legacy Netsparker Policy Options.docxNetsparker Options.docx Legacy Netsparker Policies.xlsLegacy Netsparker Logging.xls

Img
compliances

BURP – PRO Notes

November 18, 2022

Files is in a bundled .zip file for storage convenience only. Burp Pro Notes.docx

Img
compliances , policies , sample-it-spreadsheets , security

Rapid7 Appliance Deployment Checklist

November 17, 2022

Files is in a bundled .zip file for storage convenience only. Rapid7 Appliance Deployment Checklist.doc

Img
compliances , o-s , policies , security

Rapid7 Insight Product Field Notes

November 16, 2022

InsightIDR User Behavior Analytics & SIEM   InsightVM Vulnerability Management   InsightAppSec Dynamic Application Security Testing   InsightConnect Orchestration & Automation   InsightOps Log Management   DivvyCloud by Rapid7 Continuous Security and Compliance for Cloud The core of the Rapid7 Insight cloud:  InsightVM gives you live vulnerability management and endpoint...

Img
compliances , policies , sample-it-spreadsheets , security

Rapid7 Appliance Datasheet

November 15, 2022

Files is in a bundled .zip file for storage convenience only. Appliance Data Sheet.docx

Img
compliances , o-s , policies , security

Rapid7 Pro’s – Con’s

November 15, 2022

Executive Summary Nexpose is Rapid’s 7 vulnerability solution for scanning network and devices similar to Tenable Nessus / Security Center. The service utilizes two types of components, NSC (Security Console) and NSE (Scan Engines). Scan engine do the scanning and send back summary info to the console which houses...

Img
compliances , policies , sample-it-spreadsheets , security

Rapid7 Overview

November 14, 2022

Files is in a bundled .zip file for storage convenience only. Rapid7 Overview.pdf

Img
compliances , policies , sample-it-spreadsheets , security

Nexpose 1000 Series Appliance Data Sheet

November 13, 2022

Files is in a bundled .zip file for storage convenience only. Nexpose 1000 Series Appliance Data Sheet.doc

Img
compliances , policies , security

The Process that Rapid7 goes through when Scanning Hosts

November 12, 2022

Rapid7 scanning methodology mainly focuses on the different steps that an attacker might follow in order to perform an attack. It tries to use exactly the same discovering and information gathering techniques that will be used by an attacker. The scanning engine is composed of different modules that handle...

Img
visio-stencils

Sample Visio – How o365 Alerting Works

November 11, 2022

Document download How o365 Alerting Works.vsdx

Img
visio-stencils

Sample Visio – o365 Anomaly Detection Architecture

November 10, 2022

Document download o365 Anomaly Detection Architecture.vsdx

Img
security , visio-stencils

Usable Visio – BigFix – QRadar: Integration Overview

November 9, 2022

Document download QRadar BigFix Integration.vsdx

Img
compliances , security , visio-stencils

Sample Visio – Governance, ITSM, Financial Stewardship Management Model

November 8, 2022

Document download Governance, ITSM, Financial Stewardship Management Model.vsd

Img
compliances , o-s , policies

Windows 20xx Configuration Files

November 7, 2022

Required files On Intel based machines: On RISC based machines:   BOOT.INI BOOT.INI is stored in the root directory of the computers primary boot partition and contains the menu of operating systems that may be booted. Has two sections: Options are: To modify this file, you must change its...

Img
compliances , o-s , security

MS Edge Configuration

November 6, 2022

MS word document download Internet Explorer DNS Devolution.doc

Img
compliances , o-s , security

IE Operational Details and Technology Flows

November 5, 2022

MS word document download IE Operational Details and Technology Flows.doc

Img
compliances , o-s , security

Internet Explorer specific Registry settings

November 3, 2022

MS word document download Internet Explorer specific Registry settings.doc

Img
compliances , o-s , security

Directx, Java and Activex runtime errors and diagnostics

November 2, 2022

MS Word Document download Directx Java and Activex runtime errors and diagnostics.doc

Img
networking , security , visio-stencils

Bluecoat SGS Notes

October 16, 2022

Sample SGS Common Filter ExpressionsFilter Expression Packets Capturedip host 10.25.36.47 Captures packets from a specific host with IP address 10.25.36.47.not ip host 10.25.36.47 Captures packets from all IP addresses except 10.25.36.47.ip host 10.25.36.47 and ip host 10.25.36.48 Captures packets from two IP addresses: 10.25.36.47 and 10.25.36.48.ether host 00:e0:81:01:f8:fc Captures...

Img
compliances , security , visio-stencils

Sample Visio – Identify and Access Management Conceptual Model

October 14, 2022

Document download IAM Conceptual Model.vsd

Img
networking , policies , security , visio-stencils

Latency – And Slow Performance Network Considerations

October 10, 2022

The following table can be used to determine the minimum TCP Receive Window size needed for given (1) downlink speed latency: Winsock – networking API designed to facilitate communication among TCPIP apps and protocol stacks NetBIOS Interface – most windows OS’s use IPC Inter-process Communications to allow for the...

Img
networking , policies , security , visio-stencils

Sample Bluecoat Proxy XML Input file

September 3, 2022

Select Policy Policy files Copy cpl / xml files to disk Brown to the disk and Open xml Edit the output .xml file Find </vpm-cat> <cr> Copy paste new xml source Save file Open proxy Install new .xml from copied source Open VPM Launch Open Web authentication layer Bypass-auth-dest...

Img
policies , security , visio-stencils

Bluecoat Webfilter Categories

August 15, 2022

Img
networking , policies , security , visio-stencils

DNS Verification Cheat Sheet

August 9, 2022

After you have setup your DNS Server, it’s very important to check that the entries which are populated to the Internet are correct. You can use the following checklist using nslookup. Start nslookup for the desired DNS Server nslookup> server 193.247.121.196Default Server: rabbit.akadia.chAddress: 193.247.121.196 Check – Start of Authority...

Img
networking , policies , security , visio-stencils

Bluecoat – High Level Design Questionnaire

August 5, 2022

By answering the following question, Content will be able to create a high level design If not, need to gather throughput and usage requirements New NAT / VIP? PAC File Changes? Bluecoat Rule updates?

Img
networking , policies , visio-stencils

Bluecoat Proxy – Policy Sync example

August 1, 2022

Img
compliances , security , visio-stencils

Sample Visio – Spam – Assassin Distributed Email Content Checker

July 10, 2022

Spam – Assassin Distributed Email Content Checker.vsd Files is in a bundled .zip file for storage convenience only

Img
compliances , security , visio-stencils

Sample Visio – Spam – Assassin Distributed Email Content Checker

July 9, 2022

Files is in a bundled .zip file for storage convenience only. Spam – Assassin Distributed Email Content Checker.vsd

Img
networking , policies , sample-it-spreadsheets , security , visio-stencils

Sample – Minimum Firewall Standards

July 8, 2022

Document download Minimum Firewall Standards.doc

Img
visio-stencils

Bluecoat – Information Gathering / Preinstall Questionaire

July 3, 2022

The first thing that needs to be accomplished is to gather all pertinent information regarding the install. Here are some items that need to be looked at: Note: Do not have the site install BCAAA on a server you do not have remote access to unless absolutely necessary. This...

Img