SekChek Local
Encyclopedia
SekChek Local is a set of automated computer security audit and benchmarking tools developed by SekChek IPS in March 2008.

The product analyses security controls on Hosts or domains across an organisation’s LAN
Län
Län and lääni refer to the administrative divisions used in Sweden and previously in Finland. The provinces of Finland were abolished on January 1, 2010....

 and produces reports relating to the security on the network. The reporting engine is based on a portable Microsoft Access
Microsoft Access
Microsoft Office Access, previously known as Microsoft Access, is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. It is a member of the Microsoft Office suite of...

 database. The product comprises 3 built-in security analysis tools: SekChek for SAM, SekChek for AD and SekChek for SQL.

Supported Platforms and Technologies

SekChek Local supports:
  • Microsoft platforms: Windows NT4
    Windows NT
    Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993. It was a powerful high-level-language-based, processor-independent, multiprocessing, multiuser operating system with features comparable to Unix. It was intended to complement...

    , 2000
    Windows 2000
    Windows 2000 is a line of operating systems produced by Microsoft for use on personal computers, business desktops, laptops, and servers. Windows 2000 was released to manufacturing on 15 December 1999 and launched to retail on 17 February 2000. It is the successor to Windows NT 4.0, and is the...

    , 2003, XP
    Windows XP
    Windows XP is an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops and media centers. First released to computer manufacturers on August 24, 2001, it is the second most popular version of Windows, based on installed user base...

    , Vista
    Windows Vista
    Windows Vista is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs...

    , 2008, 7, Active Directory
    Active Directory
    Active Directory is a directory service created by Microsoft for Windows domain networks. It is included in most Windows Server operating systems. Server computers on which Active Directory is running are called domain controllers....

    , MS-Exchange
    Microsoft Exchange Server
    Microsoft Exchange Server is the server side of a client–server, collaborative application product developed by Microsoft. It is part of the Microsoft Servers line of server products and is used by enterprises using Microsoft infrastructure products...

     and Microsoft SQL Server 2000, 2005 and 2008.


SekChek Classic
SekChek Classic
SekChek Classic comprises a set of automated computer security audit and benchmarking tools for non-mainframe platforms developed by SekChek IPS in 1996....

, an alternate offering supports a wider range of platforms:
  • Microsoft platforms: Windows NT4, 2000
    Windows 2000
    Windows 2000 is a line of operating systems produced by Microsoft for use on personal computers, business desktops, laptops, and servers. Windows 2000 was released to manufacturing on 15 December 1999 and launched to retail on 17 February 2000. It is the successor to Windows NT 4.0, and is the...

    , 2003, XP
    Windows XP
    Windows XP is an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops and media centers. First released to computer manufacturers on August 24, 2001, it is the second most popular version of Windows, based on installed user base...

    , Vista
    Windows Vista
    Windows Vista is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs...

    , 2008, 7, Active Directory
    Active Directory
    Active Directory is a directory service created by Microsoft for Windows domain networks. It is included in most Windows Server operating systems. Server computers on which Active Directory is running are called domain controllers....

  • UNIX platforms: HP-UX
    HP-UX
    HP-UX is Hewlett-Packard's proprietary implementation of the Unix operating system, based on UNIX System V and first released in 1984...

     (including C2/TCB
    Trusted computing base
    The trusted computing base of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system...

    ), AIX, SUN/Solaris, OSF/1, DG-UX, SCO
    SCO OpenServer
    SCO OpenServer, previously SCO UNIX and SCO Open Desktop , is, misleadingly, a closed source version of the Unix computer operating system developed by Santa Cruz Operation and now maintained by the SCO Group....

    , UnixWare
    UnixWare
    UnixWare is a Unix operating system maintained by The SCO Group . UnixWare is typically deployed as a server rather than desktop. Binary distributions of UnixWare are available for x86 architecture computers. It was originally released by Univel, a jointly owned venture of AT&T's Unix System...

    , Dynix
    Dynix
    Dynix is an operating system developed by Sequent. It is a flavor of Unix based on BSD. DYNIX was replaced by DYNIX/ptx, which was based on the System V version of UNIX produced by AT&T....

    , BSD, HI-UX, Nokia IPSO
    Nokia IPSO
    Check Point IPSO is the operating system for the 'Check Point firewall' appliance and other security devices, based on FreeBSD, with numerous hardening features applied.....

    , Linux
    Linux
    Linux is a Unix-like computer operating system assembled under the model of free and open source software development and distribution. The defining component of any Linux system is the Linux kernel, an operating system kernel first released October 5, 1991 by Linus Torvalds...

  • Netware platforms: Netware 4.x, 5.x, 6.x
  • AS400 platforms: iSeries (V2R3 to V7R1)


Encryption technologies
  • PKI
    Public key infrastructure
    Public Key Infrastructure is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate...

     (public key cryptography), RC2
    RC2
    In cryptography, RC2 is a block cipher designed by Ron Rivest in 1987. "RC" stands for "Ron's Code" or "Rivest Cipher"; other ciphers designed by Rivest include RC4, RC5 and RC6....

    , RC4
    RC4
    In cryptography, RC4 is the most widely used software stream cipher and is used in popular protocols such as Secure Sockets Layer and WEP...

    , DES
    Data Encryption Standard
    The Data Encryption Standard is a block cipher that uses shared secret encryption. It was selected by the National Bureau of Standards as an official Federal Information Processing Standard for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is...

    , Triple DES
    Triple DES
    In cryptography, Triple DES is the common name for the Triple Data Encryption Algorithm block cipher, which applies the Data Encryption Standard cipher algorithm three times to each data block....

    , AES
    Advanced Encryption Standard
    Advanced Encryption Standard is a specification for the encryption of electronic data. It has been adopted by the U.S. government and is now used worldwide. It supersedes DES...

    , RSA, S/MIME, TLS/SSL (Transport Layer Security
    Transport Layer Security
    Transport Layer Security and its predecessor, Secure Sockets Layer , are cryptographic protocols that provide communication security over the Internet...

     / Secure Sockets Layer).


Microsoft Office versions:
  • Office 2000
    Microsoft Office 2000
    Microsoft Office 2000 is a release of Microsoft Office that succeeded Microsoft Office 97 and was designed as a fully 32-bit and Y2K compliant version to match Windows 2000 features. All the Office 2000 applications have OLE 2 capacity, which allows moving data automatically between various...

    , Office XP
    Microsoft Office XP
    Microsoft Office XP is a productivity suite written and distributed by Microsoft for their Windows operating system. Released on March 5, 2001, it is the successor to Office 2000 and the predecessor to Office 2003, and was known as Office 10 in the early stages of its development cycle...

    , Office 2003
    Microsoft Office 2003
    Microsoft Office 2003 is a productivity suite written and distributed by Microsoft for their Windows operating system. Released on October 21, 2003, it was the successor to Office XP and the predecessor to Office 2007.- Overview :...

    , Office 2007
    Microsoft Office 2007
    Microsoft Office 2007 is a Windows version of the Microsoft Office System, Microsoft's productivity suite. Formerly known as Office 12 in the initial stages of its beta cycle, it was released to volume license customers on November 30, 2006 and made available to retail customers on January 30, 2007...

    , Office 2010

Features

The tool benchmarks Windows OS security policies against data points contained in a statistics database. The statistics database contains over 30 million
Million
One million or one thousand thousand, is the natural number following 999,999 and preceding 1,000,001. The word is derived from the early Italian millione , from mille, "thousand", plus the augmentative suffix -one.In scientific notation, it is written as or just 106...

 anonymous security measures retrieved from over 60,000 analyzed systems located in 120 countries. The developers
Software developer
A software developer is a person concerned with facets of the software development process. Their work includes researching, designing, developing, and testing software. A software developer may take part in design, computer programming, or software project management...

 of the software designed the built-in reports to assist general management, IT & audit professionals to quickly assess the state of security. The tool provides customisable summary and detailed reports in graphical and tabular formats via Microsoft Access
Microsoft Access
Microsoft Office Access, previously known as Microsoft Access, is a relational database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. It is a member of the Microsoft Office suite of...

. MS-Access assists in sorting, filtering and querying the data.

The SAM tool analyses security policies and objects defined on Windows member computers. These include all versions of Windows servers from Windows NT 4.0 The company states that the SAM tool was designed to analyze security on multiple member Servers and Workstations running any version of Microsoft Windows. The product analyses the hosts details, User and Group accounts, Group memberships, Account Rights, Administrative privileges, Security policies, Security properties, Services, Audit Events, Network Shares, Disks and Host Properties.

The SekChek AD tool analyses the domain-wide security policies and security objects defined in an Active Directory
Active Directory
Active Directory is a directory service created by Microsoft for Windows domain networks. It is included in most Windows Server operating systems. Server computers on which Active Directory is running are called domain controllers....

 domain. The product analyzes the Domain account policies, Group Policy Objects (GPO) and links, User and Group accounts, Password Setting Objects (PSOs), DACLs and SACLs, Global Catalog Servers, Group memberships, Sites and Organizational Units, Trusts, Domain controllers and FSMO role owners.

SekChek for Exchange analyses Exchange organisations, Storage groups, Databases, Exchange servers and mail-enabled user objects.

The SekChek for SQL tool analyses database security settings, access rules and objects defined in Microsoft SQL Databases and supports versions of Microsoft SQL Server from SQL 2000. The product analyzes MS-SQL Server Settings, Logins, Server Roles, Database Users, Database Roles, Database Application Roles, Databases and file and directory Permissions.

Distinguishing features

  • The tools do not have an installation procedure.
  • The product does not depend on agent software.
  • Security data is imported into Microsoft Access, analysed and benchmarked locally.
  • Performs comparisons over time and system
  • Highlights changes made to security objects in Active Directory
    Active Directory
    Active Directory is a directory service created by Microsoft for Windows domain networks. It is included in most Windows Server operating systems. Server computers on which Active Directory is running are called domain controllers....

     since the previous scan
  • Includes embedded utilities: A PC Audit tool that performs a basic analysis of a client PC; Encryption software; Windows Firewall auditor; an Active Directory query tool; an Event Log query tool; Ping; File hashing tool; SID
    Security Identifier
    In the context of the Microsoft Windows NT line of operating systems, a Security Identifier is a unique name which is assigned by a Windows Domain controller during the log on process that is used to identify a subject, such as a user or a group of users in a network of NT/2000...

    resolver; and an Orphaned SID locator.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK