Elite.Parts chervon right Manufacturers chervon right E chervon right ENTERASYS chervon right DSHSS-LNX
About product Datasheet FAQ

ENTERASYS DSHSS-LNX

Image of ENTERASYS DSHSS-LNX

Description

Dragon Host Sensor Software for Linux

Part Number

DSHSS-LNX

Price

Request Quote

Manufacturer

ENTERASYS

Lead Time

Request Quote

Category

INTRUSION DEFENSE

Datasheet

pdf file

DSHSS-AIX.pdf

155 KiB

Extracted Text

16234,9013546_DragonHost_DS 3/29/04 12:06 PM Page 1 Dragon™ Host Sensor • Host-based intrusion defense via a modular, flexible architecture for today’s most common operating system • Protects at the host and application level by monitoring the operating system and crucial applications • Application Intrusion Prevention module averts attacks on the most commonly targeted applications—DNS servers, mail servers, web servers • Application Intrusion Scalable, Flexible Host-Based Dragon Host Sensor deploys advanced Prevention Intrusion Defense techniques in identifying root-kits and buffer — Averts attacks on the overflows via its kernel-monitoring module. A host-based intrusion defense tool, Dragon most widely used web This module traps and analyzes all calls Host Sensor prevents web attacks and applications, IIS and into the kernel and can identify the monitors individual systems running today’s Apache existence of any kernel-level root-kit, most common operating systems, for evidence • File attribute monitoring an absolute requirement in identifying of malicious or suspicious activity in real time. — Monitors file attributes compromised systems before an attacker such as owner, group, Dragon Host Sensor may be deployed on a completely covers their tracks. It can also permissions, file size protected host where it uses a variety of identify anomalous privilege escalations • File integrity checking techniques to detect attacks and misuse on states resulting from successful buffer — Monitors files or dire c t o r i e s the system, including analyzing the security overflows. Dragon’s kernel monitoring to determine if content event log, checking the integrity of critical capabilities are an essential building block has been changed via configuration files, or checking for kernel- on the path to host-based intrusion preven- MD5 hash level compromises. This hybrid approach tion—failure to implement this step leaves • Log file analysis ensures that no misuse goes undetected. the host open to attacks that other intrusion — Analyzes any file or prevention solutions cannot detect. directory against a Dragon Host Sensor may also be deployed signature policy on a dedicated analysis system where logs Centrally managed via Dragon Enterprise • Windows event log analysis are forwared and analyzed from most M a n a g e m e n t Server for signature and — Monitors Windows event commercial firewalls, routers, switches and configuration updates, Dragon Host Sensor logs for sign of misuse or other IDS devices. Correlating events from also reports all information—including attack these devices and from Dragon Network event description, source/destination IP, • Windows registry analysis and Host Sensors is critical in identifying source/destination port, raw log (if applicable) — Analyzes the Windows which events are the most serious, as well and timestamp—to the Security Information registry for attributes that as understanding their origin and impact. Management functionality within Dragon should not be accessed Management Server for real-time alerting, and/or modified The new Dragon Host Sensor A p p l i c a t i o n forensic and trend analysis. • TCP/UDP service detection Intrusion Prevention module averts attacks on the most commonly targeted — Monitors for opened TCP and UDP ports, providing applications—such as DNS servers, mail critical protection against servers, and web servers running Microsoft backdoor services IIS and Apache. • Kernel monitoring Using non-conventional techniques to — Detects suspicious identify attempted intrusions or general privilege escalations and other signs of kernel-level misuse, the Host Sensor can be installed compromise on a dedicated system to create a “deceptive” • Custom module interface server designed to entice an alarm on attempted intrusions by simulating a fake — Provides an open and easy interface for custom web server, telnet server, or mail server. module development Page 1 of 2 • Data Sheet 16234,9013546_DragonHost_DS 3/29/04 12:06 PM Page 2 Specifications Technical Specifications Operating Systems Dragon Host Sensor: Windows NT/2K/XP, Sparc Solaris (versions 8 and 9), AIX (versions 4.3.3 and 5.X), HPUX (version 11.x), and Linux Distributions: Red Hat (versions 8.0 and 9.0), SuSE (version 8.1), Mandrake (version 9), Slackware (version 8.1) and Debian Ordering Information Host Sensor Software DSHSS-WIN Dragon Host Sensor software for Windows DSHSS-LNX Dragon Host Sensor software for Linux DSHSS-SOL Dragon Host Sensor software for Solaris DSHSS-HPX Dragon Host Sensor software for HP-UX DSHSS-AIX Dragon Host Sensor software for AIX Warranty Additional Information As a customer-centric company, Enterasys is committed to For more information about Enterasys Dragon, visit the providing the best possible workmanship and design in web at http://www.enterasys.com/products/ids our product set. The Dragon product family includes a Contact Information ninety (90) day warranty for software that covers defects in media only, and a one (1) year warranty for hardware. Contact Enterasys Sales at 877-801-7082 or Service and Support enterasys.com/ Enterasys Networks Enterasys understands that superior service and support is a Corporate Headquarters ™ critical component of Networks that Know. The Enterasys 50 Minuteman Road SupportNet Portfolio—a suite of innovative and flexible Andover, MA 01810 service and support offerings—completes the Enterasys solu- U.S.A tion. SupportNet offers all the post-implementation support services you need—online, onsite or over the phone—to maintain your network availability and performance. Dragon is a re g i s t e red trademark of Enterasys Networks. All other products or services mentioned are identified by the trademarks or service marks of their respective companies or organizations. NOTE: Enterasys Networks reserves the right to change specifications without notice. Please contact your representative to confirm current specifications. All contents are copyright © 2004 Enterasys Networks, Inc. All rights re s e r v e d . Lit. #9013546 3/04 Page 2 of 2 • Data Sheet

Frequently asked questions

What makes Elite.Parts unique?

chervon down
At GID Industrial (Elite.Parts' parent company), we specialize in procuring industrial parts. We know where to find the rare and obsolete equipment that our customers need in order to get back to business. There are other companies who claim to do what we do, but we're confident that our commitment to quality and value is unparalleled in our field.

What kind of warranty will the DSHSS-LNX have?

chervon down
Warranties differ by part and by which suppliers we use to procure it for you. Sometimes, a part will be sold as-is and without a warranty. Our specialty, single board computers, tend to receive a one-year warranty.

Which carriers does Elite.Parts work with?

chervon down
Elite.Parts can ship via FedEx, UPS, DHL, and USPS. We have accounts with each of them and generally ship using one of those, but we can also ship using your account if you would prefer. However, we can use other carriers if it will be more convenient for you.

Will Elite.Parts sell to me even though I live outside the USA?

chervon down
Absolutely! We are happy to serve customers regardless of location. We work with international clients all the time, and we are familiar with shipping to destinations all across the globe.

I have a preferred payment method. Will Elite.Parts accept it?

chervon down
All major credit cards are accepted: Visa, MasterCard, Discover, and American Express. We will also accept payment made with wire transfer or PayPal. Checks will only be accepted from customers in the USA. Terms may available for larger orders, upon approval.

Why buy from GID?

quality

Quality

We are industry veterans who take pride in our work

protection

Protection

Avoid the dangers of risky trading in the gray market

access

Access

Our network of suppliers is ready and at your disposal

savings

Savings

Maintain legacy systems to prevent costly downtime

speed

Speed

Time is of the essence, and we are respectful of yours

What they say about us

FANTASTIC RESOURCE

star star star star star

One of our top priorities is maintaining our business with precision, and we are constantly looking for affiliates that can help us achieve our goal. With the aid of GID Industrial, our obsolete product management has never been more efficient. They have been a great resource to our company, and have quickly become a go-to supplier on our list!

Bucher Emhart Glass

EXCELLENT SERVICE

star star star star star

With our strict fundamentals and high expectations, we were surprised when we came across GID Industrial and their competitive pricing. When we approached them with our issue, they were incredibly confident in being able to provide us with a seamless solution at the best price for us. GID Industrial quickly understood our needs and provided us with excellent service, as well as fully tested product to ensure what we received would be the right fit for our company.

Fuji

HARD TO FIND A BETTER PROVIDER

star star star star star

Our company provides services to aid in the manufacture of technological products, such as semiconductors and flat panel displays, and often searching for distributors of obsolete product we require can waste time and money. Finding GID Industrial proved to be a great asset to our company, with cost effective solutions and superior knowledge on all of their materials, it’d be hard to find a better provider of obsolete or hard to find products.

Applied Materials

CONSISTENTLY DELIVERS QUALITY SOLUTIONS

star star star star star

Over the years, the equipment used in our company becomes discontinued, but they’re still of great use to us and our customers. Once these products are no longer available through the manufacturer, finding a reliable, quick supplier is a necessity, and luckily for us, GID Industrial has provided the most trustworthy, quality solutions to our obsolete component needs.

Nidec Vamco

TERRIFIC RESOURCE

star star star star star

This company has been a terrific help to us (I work for Trican Well Service) in sourcing the Micron Ram Memory we needed for our Siemens computers. Great service! And great pricing! I know when the product is shipping and when it will arrive, all the way through the ordering process.

Trican Well Service

GO TO SOURCE

star star star star star

When I can't find an obsolete part, I first call GID and they'll come up with my parts every time. Great customer service and follow up as well. Scott emails me from time to time to touch base and see if we're having trouble finding something.....which is often with our 25 yr old equipment.

ConAgra Foods

Related Products

product

Dragon Remote Site Appliance

product

Dragon Enterprise Management Server

product

Dragon Enterprise Management Software

product

Dragon Event Flow Processor

product

Dragon Host Sensor for AIX

product

Dragon Host Sensor for HPUX