Download

Section categories

Access Control Utilities [1366]
Anti-Virus Utilities [584]
Automation Utilities [694]
Backup and Copy Utilities [243]
Clipboard Management Tools [188]
Command Shells [60]
Compression and Zip File Utilities [292]
Disk Analysis Utilities [273]
Disk Maintenance and Repair Utilities [53]
Explorer Add-ons [101]
Explorer Replacements [97]
File Cataloging Utilities [1531]
File Cleanup Utilities [412]
File Encryption Utilities [501]
File Maintenance and Repair Utilities [534]
File Search Utilities [207]
File Splitting Utilities [183]
File Synchronizing Utilities [154]
Misc Encryption Utilities [155]
Misc Text Editing Tools [123]
Misc Utilities [2767]
Mouse and Keyboard Utilities [217]
Music Utilities [15]
Password Management Utilities [728]
Patches and Updates [42]
PGP Encryption Utilities [68]
Required Components [4]
Required Files [8]
System Analysis Utilities [77]
System Maintenance and Repair Utilities [947]
Text Editors A-G [82]
Text Editors H-P [25]
Text Editors Q-Z [24]
Text Form Editors [15]
Text Search and Replace Tools [74]
Text Viewers [35]

Our poll

How often do you buy software?
Total of answers: 4

Statistics


Total online: 1
Guests: 1
Users: 0

Login form

File Catalog

Main » Files » Utilities » Access Control Utilities

ThreatSentry 1.0
01.02.2011, 23:52
Designed to protect servers running Microsoft? Internet Information Services, (IIS), ThreatSentry? is an advanced neural application that continuously collects, analyze and organizes server events into an evolving baseline of acceptable activity. Each server connection is compared against this baseline to identify and take action against any activity falling outside of acceptable parameters. Upon installation ThreatSentry begins to collect and organize IIS-specific data into clusters that reflect the normal use patterns (both trusted and untrusted) within the server environment, ("Training Mode"). The process of organizing these clusters is guided through the use of a built-in knowledgebase of published attack signatures. Once the required number of training events has been collected, ThreatSentry shifts automatically into "Monitor" mode. In "Monitor Mode" ThreatSentry compares all incoming requests to IIS against the Training Database to determine whether it falls within acceptable distance of trusted activity. If it does, the process continues. If it does not, ThreatSentry initiates whatever action/s have been configured, ranging from posting an on screen alert, to blocking the untrusted connection, or shutting down IIS. Maintaining ThreatSentry is simple. As described in the maintenance tips above, proper classification of events is essential and can be accomplished as Security Alerts are displayed, or during periodic review of the Security Alert Log. After one or more events have been reclassified, the Training Database should be "Re-Trained" upon which ThreatSentry will remember not only the correct classification of the particular event/s, but also its various characteristics which will be applied to the analysis of subsequent events.

Category: Access Control Utilities | Added by: File-Post
Views: 75 | Downloads: 0 | Rating: 0.0/0
Total comments: 0
Only registered users can add comments.
[ Registration | Login ]

Search

Site friends

add site