Security Manager for IIS |
Release Notes |
Date Published: March 2010 |
|
Security Manager for Microsoft Internet Information Services (IIS) helps secure your enterprise from internal and external attacks. Security Manager for IIS can monitor your IIS computers to identify intrusion events and perform forensic analysis on log files. The product reports events from FTP and IIS log files on monitored computers running IIS to identify a variety of occurrences. This module for the Security Manager product includes several new features. This version also improves usability and resolves several previous issues. Many of these improvements were made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. You can post feedback in the Security Manager forum on Qmunity, our community Web site that also includes product notifications, blogs, and the Security Manager user group. This document outlines why you should install this module, lists any installation requirements, and identifies any known issues. Supported ProductsThis release supports the following products:
Why Install This Module?Security Manager for IIS monitors, analyzes, and consolidates events from log files on monitored Windows computers to detect a variety of occurrences. The following sections outline the key features and functions provided by this version, as well as issues resolved in this release. Updated Platform SupportThis version of Security Manager for IIS provides support for IIS 7.5 on Windows Server 2008 R2 and Windows 7 computers, and includes new computer groups for those Windows versions. Processing Rules Moved From NetIQ Change Guardian for WindowsIn this release, the following event management processing rules have been moved from the NetIQ Change Guardian for Windows product (Change Guardian for Windows) to the Security Manager for IIS module:
The updated Security Manager for IIS module includes the same rules that were previously in Change Guardian for Windows, but with updated content. Installing Security Manager for IIS installs the updated rules in a new Processing Rule Group, and deletes the old versions of the rules from the Change Guardian for Windows Processing Rule Group. Module Renamed
In this release, objects in the Security Manager consoles that were previously named "Log Manager for IIS" have been renamed to "Support for IIS," and the IIS archival processing rules have been moved from the previous Log Manager for IIS module to the Support for IIS module. System RequirementsThe following table lists additional requirements for a Windows agent. For more information about agent requirements, see the Installation Guide for NetIQ Security Manager.
Installing This ModuleInstall the module using the Module Installer utility. If this is the first time you have installed the module, ensure you also add a license. For more information about installing modules, see the Installation Guide for NetIQ Security Manager. You can verify successful installation of the module in the Module Installer. After the installation completes, verify the Status column indicates the module is current and the module version listed in the Installed Version column is the same as the version in the Available Version column. After you install the module, run the Configuration Wizard to configure the module to enable FTP logging. For more information about using the Configuration Wizard, see the User Guide for NetIQ Security Manager. Upgrading This ModuleThe steps required to upgrade your environment to the latest version of Security Manager for IIS are different depending on what you currently have installed. Select the appropriate upgrade path from the following scenarios. To upgrade your environment:
Known IssuesNetIQ Corporation strives to ensure our products provide quality solutions for your enterprise software needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support. Superseded Release Notes Not Removed on UpgradeThe Security Manager for IIS module replaces the Log Manager for IIS module. However, a known issue exists where Security Manager cannot remove old release notes files when installing updated modules. Release notes are installed by default in the \Program Files\NetIQ Security Manager\OnePoint\Documentation\Release Notes folder on the central computer, but may have been moved or copied to a different location in your environment. After upgrading this module, you should manually delete any superseded release notes in the default folder or in other folders. Removal of Monitoring GuidesSince monitoring information for updated Security Manager modules is now available in the module release notes, monitoring guides have been discontinued. However, a known issue exists where Security Manager cannot remove old monitoring guides when installing updated modules. To reduce the risk of users referencing outdated monitoring guides, Security Manager now replaces the old monitoring guide in the default documentation folder with a blank monitoring guide. Monitoring guides are installed by default in the \Program Files\NetIQ Security Manager\OnePoint\Documentation\Monitoring Guides folder on the central computer, but may have been moved or copied to a different location in your environment. After installing an updated module, you should manually delete any outdated monitoring guides that were copied or moved to other folders. Contact InformationPlease contact us with your questions and comments. We look forward to hearing from you. For detailed contact information, see the Support Contact Information Web site. For interactive conversations with your peers and NetIQ experts, become an active member of Qmunity, our community Web site that offers product forums, product notifications, blogs, and user groups. Legal NoticeTHIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. © 2010 NetIQ Corporation. All rights reserved. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government's rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. Check Point, FireWall-1, VPN-1, Provider-1, and SiteManager-1 are trademarks or registered trademarks of Check Point Software Technologies Ltd. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the USA. All other company and product names mentioned are used only for identification purposes and may be trademarks or registered trademarks of their respective companies. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. | ||||||||||||
Template date: March 1, 2010 |