Re: Computer Associates eTrust

From: Endre Szekely-Bencedi (Endre.Szekely-Bencedi_at_hu-tcs.com)
Date: 05/11/04

  • Next message: Preston, Tony (N-AS&T): "RE: Administrator's Journal"
    To: SMiller@unimin.com
    Date: Tue, 11 May 2004 14:20:09 +0200
    
    

    Actually it was eTrust Intrusion Detection, I don't know if this ever got
    to the list; if yes, sorry for repeating.
    Someone told me I need to connect that certain machine to a hub port to be
    able to work.

    Greetings,
    Endre Szekely-Bencedi
    _____________________________________
    Tata Consultancy Services
    H-1054 Budapest, Kalman Imre u. 1.
    Tel.: +36 1 4751214
    FAX: +36 1 475 1111
    Email: Endre.Szekely-Bencedi@hu-tcs.com
    _____________________________________

    "THIS E-MAIL MESSAGE ALONG WITH ANY ATTACHMENTS IS INTENDED ONLY FOR THE
    ADDRESSEE and may contain confidential and privileged information. If the
    reader of this message is not the intended recipient, you are notified
    that any dissemination, distribution or copy of this communication is
    strictly prohibited. If you have received this message by error, please
    notify us immediately, return the original mail to the sender and delete
    the message from your system."

    SMiller@unimin.com
    05/11/2004 01:46 PM

     
            To: "Endre Szekely-Bencedi" <Endre.Szekely-Bencedi@hu-tcs.com>
            cc: security-basics@lists.securityfocus.com
            Subject: Re: Computer Associates eTrust

    Endre,

    You need to be a little more specific about what the product in question
    is. "eTrust" is the brand id for several comp sec products from CA. For
    example, we use eTrust Antivirus, but not the product you mention.

    -Scott

    "Specialists without spirit, sensualists without heart, this nullity
    imagines that it has attained a level of civilization never before
    achieved" - J. W. von Goethe

      
                          "Endre Szekely-Bencedi"
                          <Endre.Szekely-Bencedi@ To:
    security-basics@lists.securityfocus.com
                          hu-tcs.com> cc:
                                                         Fax to:
                          05/10/04 04:43 AM Subject: Computer
    Associates eTrust
      

    Hello List,

    I have downloaded the above-mentioned software and tried it. It seems a
    very nice tool to me, I don't even know how it works but heard about it
    (that can log network traffic, to block traffic etc). Now, the problem is
    that it's jost not blocking/logging anything, I was wondering if anyone
    knows why?
    It is blocking the localhost only, but it's not logging anything. Is this
    because it is a trial version? Or should I plug it into a hub to be able
    to sniff?
    And how can it block traffic? Should this machine be a gateway for the
    network?
    I haven't found much about this product on the Internet, I'd just like to
    know where to start .. how to use it, to be able to try it.

    Any useful comments would be appreciated.

    Greetings,
    Endre Szekely-Bencedi
    _____________________________________
    Tata Consultancy Services
    H-1054 Budapest, Kalman Imre u. 1.
    Tel.: +36 1 4751214
    FAX: +36 1 475 1111
    Email: Endre.Szekely-Bencedi@hu-tcs.com
    _____________________________________

    "THIS E-MAIL MESSAGE ALONG WITH ANY ATTACHMENTS IS INTENDED ONLY FOR THE
    ADDRESSEE and may contain confidential and privileged information. If the
    reader of this message is not the intended recipient, you are notified
    that any dissemination, distribution or copy of this communication is
    strictly prohibited. If you have received this message by error, please
    notify us immediately, return the original mail to the sender and delete
    the message from your system."

    ---------------------------------------------------------------------------
    Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
    any course! All of our class sizes are guaranteed to be 10 students or
    less

    to facilitate one-on-one interaction with one of our expert instructors.
    Attend a course taught by an expert instructor with years of in-the-field
    pen testing experience in our state of the art hacking lab. Master the
    skills
    of an Ethical Hacker to better assess the security of your organization.
    Visit us at:
    http://www.infosecinstitute.com/courses/ethical_hacking_training.html
    ----------------------------------------------------------------------------

    ---------------------------------------------------------------------------
    Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
    any course! All of our class sizes are guaranteed to be 10 students or less
    to facilitate one-on-one interaction with one of our expert instructors.
    Attend a course taught by an expert instructor with years of in-the-field
    pen testing experience in our state of the art hacking lab. Master the skills
    of an Ethical Hacker to better assess the security of your organization.
    Visit us at:
    http://www.infosecinstitute.com/courses/ethical_hacking_training.html
    ----------------------------------------------------------------------------


  • Next message: Preston, Tony (N-AS&T): "RE: Administrator's Journal"

    Relevant Pages

    • RE: Removing Local Admin Rights...
      ... Ethical Hacking at the InfoSec Institute. ... to facilitate one-on-one interaction with one of our expert instructors. ... Attend a course taught by an expert instructor with years of in-the-field ... pen testing experience in our state of the art hacking lab. ...
      (Security-Basics)
    • RE: Minimum password requirements
      ... Ethical Hacking at the InfoSec Institute. ... to facilitate one-on-one interaction with one of our expert instructors. ... Attend a course taught by an expert instructor with years of in-the-field ... pen testing experience in our state of the art hacking lab. ...
      (Security-Basics)
    • Betr.: RE: fax software in the domain
      ... Ethical Hacking at the InfoSec Institute. ... to facilitate one-on-one interaction with one of our expert instructors. ... pen testing experience in our state of the art hacking lab. ... Attend a course taught by an expert instructor with years of in-the-field ...
      (Security-Basics)
    • RE: HIPAA_Compliance
      ... Ethical Hacking at the InfoSec Institute. ... to facilitate one-on-one interaction with one of our expert instructors. ... Attend a course taught by an expert instructor with years of in-the-field ... pen testing experience in our state of the art hacking lab. ...
      (Security-Basics)
    • RE: Cisco CSA
      ... Ethical Hacking at the InfoSec Institute. ... to facilitate one-on-one interaction with one of our expert instructors. ... Attend a course taught by an expert instructor with years of in-the-field ... pen testing experience in our state of the art hacking lab. ...
      (Security-Basics)