CANES Flashcards
(299 cards)
Directive that Defines measures that protect information and information systems
Ensures Availability, Integrity, Authentication, Confidentiality, non-repudiation
Includes measures to provide restoration of information
Protection, Detection, Reaction
Successful protection of assets requires:
Compliance
Understanding Vulnerabilities
Cybersecurity DoD 8500.01 Directive
To WSUS patch administration steps
Login to CM01
From the Windows Start Menu open Windows Administrative Tools
Windows Server Update Services
How to Modify Times for Automated synchronization in Windows Server Update Services (WSUS)
In the left pane of the WSUS management console, expand CM01, and select Options > Synchronization Schedule
Add WSUS email notifications
In the left pane of the WSUS management console, expand the node labeled with the computer name and select Options. All available options appear in the center pane.
Select e-mail notifications
Add user to the WSUS Domain Administrators Group
Windows Administrative Tools > Computer Management
System tools > Local Users and Groups > Groups
Set the WSUS Server to Autonomous Mode
From WSUS, expand the node, Options, Update Source and Proxy Server, Update Source, Synchronize from another Windows Server Update Services Server radio button.
Ensure This server is a replica of the upstream server checkbox is NOT selected and click OK
How to filter WSUS Update Reporting Views
Expand Updates node > All Updates > Actions > New Update View > Select Properties
View appears in the tree view pane under Updates, it displays like the standard views, in the center pane when selected
What server to access WSUS from
CM01
Log in to Exchange Admin Center
From MRDS01 desktop, double-click the Exchange Administrative Center (EAC) icon
Set up email forwarding
From EAC > Set up an email contact > Recipients > mailboxes > Select user > edit > mailbox features > Mail flow View details > Enable forwarding
EAC
Exchange Administrative Center
Set up an email contact
From EAC, select recipients in the left pane and select contacts from the top menu. Click the Add (+) icon, select Mail contact
First Name, Last Name, Display Name, Name, Alias, External email address (address to forward to)
Log in to Exchange Toolbox and use Queue Viewer
Remote IAEXET > Windows Star Menu > Microsoft Exchange Server 2016 > Exchange Toolbox > Queue Viewer
What does Suspend in Queue Viewer do?
Prevents the email from leaving
River City
OP SEC CON
4 everyone access
3 Chiefs
2 DH
1 Triad
HBSS
Host Based Security System: Provides tools to prevent, detect track, report, and remediate malicious computer-related activities and incidents across all Department of Defense (DoD) networks
McAfee Agent and Modules
McAfee Agent
McAfee Host Intrusion Prevention System (HIPS)
McAfee Rogue System Detection
McAfee Policy Auditor
McAfee Asset Baseline Module
McAfee VirusScan Enterprise (VSE)
Is available only in extreme cases; can be initiated by the shipboard admin and will disable HIPS on entire network
SADR “Killswitch”
SADR
Super Agent Distributed Repository (SADR) HBSS Configuration
CANES security uses SADR HBSS configuration on unclassified and SECRET networks. HBSS on the Secret Releasable (SR) and Sensitive Compartmented Information (SCI) networks
SADR Servers
UNCLAS and SECRET enclaves each have two CANES SADR Servers (SADR01 and SADR02) that connect to the HBSS ePO Ashore server
Provide load balancing and fault tolerance
All CANES HBSS policies on UNCLAS and SECRET networks located on the Ashore HBSS Server
Access to Ashore HBSS Server via web interface
Circumstances required to use killswitch:
No access to Shore HBSS server - No way to modify
HIPS interfering with functionality of a system or programs on a system that has official mission requirements
Several systems need to have HIPS disabled, and individually unlocking the HIPS Client User Interface (UI) is not feasible
Shipboard admins are provided HIPS Client UI password to unlock individual computers for troubleshooting
VRAM
Vulnerability Remediation Asset Manager (VRAM)
Stores Assured Compliance Assessment Solution (ACAS) scans for:
Nonsecure Internet Protocol Router Network (NIPRNET)/UNCLAS
SECRET Internet Protocol Router Network (SIPRNET)/SECRET
ACAS personnel ensure assets (scanned IPs) are properly categorized
Which VM supports the synchronization of Microsoft Outlook with a PDA?
(Personal Device Assistant) BES/BUEM
Which Linux command is used to report the amount of disk space that files or directories occupy?
du