Archive | March, 2016

Vendor Security Assessment Questionnaires

When sharing data with a vendor, it is important to ensure that the vendor will handle your data with the same level of care and protection that your organization expects or requires.

Google has just released an interactive questionnaire application to help support these security reviews by facilitating not only the collection of information, but also the redisplay of collected data in templated form.

You can test the Google Vendor Security Assessment Questionnaire or contribute and setup your own questionnaire using the source. Specific questionnaires are available below:

Censys Search Shortcuts

Use Censys to discover which of your devices are connected to the Internet, where they are located and who is using them.

Censys supports both full-text searches and structured queries. The search Dell will find any hosts where the word Dell appears. However, you can also compose more complex queries. For example, the query ip: AND metadata.manufacturer:”Dell” will find any Dell devices in the specified network.

Boolean Logic
You can compose multiple statements using AND, OR, NOT, and parentheses. For example, (“Schneider Electric” OR Dell) AND ip: By default, all terms are optional (e.g., executed as an or statement) unless specified otherwise.

You can search for ranges of numbers using [ and ] for inclusive ranges and { and } for exclusive ranges. For example, 80.http.get.status_code:[200 TO 300]. You can search for IP addresses using CIDR notation, e.g., ip: Timestamps should be queried using the following syntax: [2012-01-01 TO 2012-12-31].

By default, Censys will search for complete words. In other words, the search Del will not return results with the word Dell. If you want to search for words that start with Del, you would search for Del*. You can also search for D?ll.

DNS Queries
You can perform inline DNS A and MX queries using the following syntax: and
Regular Expressions
You can also search using regular expressions, e.g., metadata.manufacturer:/De[ll]/. Full syntax is available here.

The boost operator (^) can be used to make one term more relevant than another. For example, metadata.manufacturer: Dell^2 OR Schneider Electric puts more preference on the Dell keyword.

Reserved Characters
The following characters must be escaped with a backslash: + – = && || > < ! ( ) { } [ ] ^ ” ~ * ? : \ /

Symantec Endpoint Protection Versions

Symantec has a full list of Symantec Product Versions and release dates at Symantec Endpoint Protection, however, the Symantec Endpoint Protection Wikipedia page appears to be maintained more frequently.

RTM – Release To Manufacturing

MR – Maintenance Release (replaced by RU)

RU – Release Update

MP – Maintenance Patch

PP – Point Patch

Source: Symantec Endpoint Protection