SlideShare a Scribd company logo
1 of 3
2012 - 2013 RSA Installation
1. Install Universal Windows RSA Client
serv1wpublicRSA AgentsAgent 7.1.1 for WindowsRSA_Authentication_Agent_7.1x64RSA Authentication Agent
x64.msi
2. Point to SDCONF.REC file
2012 - 2013 RSA Installation
3. Create local group for server named “RSA Exclusions” and add known service accounts to be excluded from
challenge.
4. During testing, we found that the RSA client is dependent on .Net 3.5 being installed on server.
2012 - 2013 RSA Installation
5. Ensure that you add the local “RSA Exclusions” group to the RSA Control Center challenge process.
6. Ensure that Remote Desktop Control uses the RSA Security Layer when accessing this server.

More Related Content

What's hot

What's hot (20)

CIS14: Trusted Tokens: An Identity Game Changer
CIS14: Trusted Tokens: An Identity Game ChangerCIS14: Trusted Tokens: An Identity Game Changer
CIS14: Trusted Tokens: An Identity Game Changer
 
SharePoint and Office 365 Security Tool - SysKit Security Manager
SharePoint and Office 365 Security Tool - SysKit Security ManagerSharePoint and Office 365 Security Tool - SysKit Security Manager
SharePoint and Office 365 Security Tool - SysKit Security Manager
 
Jenkins Terraform Vault
Jenkins Terraform VaultJenkins Terraform Vault
Jenkins Terraform Vault
 
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
 
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
Citrix TechEdge 2014 - Understanding and Troubleshooting Authentication Flow ...
 
Veracode Integration Adapter - Datasheet
Veracode Integration Adapter - DatasheetVeracode Integration Adapter - Datasheet
Veracode Integration Adapter - Datasheet
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ....NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
 
The Key to Strong Cloud Security
The Key to Strong Cloud SecurityThe Key to Strong Cloud Security
The Key to Strong Cloud Security
 
Secrets as Code
Secrets as CodeSecrets as Code
Secrets as Code
 
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
 
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
 
The Rise of Secrets Management
The Rise of Secrets ManagementThe Rise of Secrets Management
The Rise of Secrets Management
 
Qualys lab
Qualys labQualys lab
Qualys lab
 
Basics of Microservice Architecture
Basics of Microservice ArchitectureBasics of Microservice Architecture
Basics of Microservice Architecture
 
How to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScalerHow to Protect Against top Web Security Issues With Citrix NetScaler
How to Protect Against top Web Security Issues With Citrix NetScaler
 
Automation Patterns for Scalable Secret Management
Automation Patterns for Scalable Secret ManagementAutomation Patterns for Scalable Secret Management
Automation Patterns for Scalable Secret Management
 
VMware vRealize Network Insight Frequently Asked Questions FAQ
VMware vRealize Network Insight Frequently Asked Questions FAQVMware vRealize Network Insight Frequently Asked Questions FAQ
VMware vRealize Network Insight Frequently Asked Questions FAQ
 
Password Express - Data Sheet
Password Express - Data SheetPassword Express - Data Sheet
Password Express - Data Sheet
 
What is FIWARE Lab
What is FIWARE LabWhat is FIWARE Lab
What is FIWARE Lab
 

Viewers also liked

SOP - 2013 Server Build
SOP - 2013 Server BuildSOP - 2013 Server Build
SOP - 2013 Server Build
Robert Jones
 
Auto NAS Data Move.cmd
Auto NAS Data Move.cmdAuto NAS Data Move.cmd
Auto NAS Data Move.cmd
Robert Jones
 
My Illustrator Project Defended
My Illustrator Project DefendedMy Illustrator Project Defended
My Illustrator Project Defended
flyingstairs
 
Infrastructure Strategy
Infrastructure StrategyInfrastructure Strategy
Infrastructure Strategy
Robert Jones
 

Viewers also liked (15)

VDI-POC
VDI-POCVDI-POC
VDI-POC
 
SOP - 2013 Server Build
SOP - 2013 Server BuildSOP - 2013 Server Build
SOP - 2013 Server Build
 
Auto NAS Data Move.cmd
Auto NAS Data Move.cmdAuto NAS Data Move.cmd
Auto NAS Data Move.cmd
 
Material de conteo para niños sordos
Material de conteo para niños sordosMaterial de conteo para niños sordos
Material de conteo para niños sordos
 
ProdQMScripts.cmd
ProdQMScripts.cmdProdQMScripts.cmd
ProdQMScripts.cmd
 
Metodos y ITS
Metodos  y ITSMetodos  y ITS
Metodos y ITS
 
Aluminium boxes for the offshore industry - Offshore competencies en
Aluminium boxes for the offshore industry - Offshore competencies enAluminium boxes for the offshore industry - Offshore competencies en
Aluminium boxes for the offshore industry - Offshore competencies en
 
Archiváló doboz - Office box BB 345 hu
Archiváló doboz - Office box BB 345 huArchiváló doboz - Office box BB 345 hu
Archiváló doboz - Office box BB 345 hu
 
Estrategia el rincón de la matemática
Estrategia el rincón de la matemáticaEstrategia el rincón de la matemática
Estrategia el rincón de la matemática
 
Alukoffer - Alap box DL 540 hu
Alukoffer - Alap box DL 540 huAlukoffer - Alap box DL 540 hu
Alukoffer - Alap box DL 540 hu
 
Material de conteo para niños sordos
Material de conteo para niños sordosMaterial de conteo para niños sordos
Material de conteo para niños sordos
 
Aluminium katonai doboz - Katonai box NA 740 hu
Aluminium katonai doboz - Katonai box NA 740 huAluminium katonai doboz - Katonai box NA 740 hu
Aluminium katonai doboz - Katonai box NA 740 hu
 
Material de conteo para niños sordos 1
Material de conteo para niños sordos 1Material de conteo para niños sordos 1
Material de conteo para niños sordos 1
 
My Illustrator Project Defended
My Illustrator Project DefendedMy Illustrator Project Defended
My Illustrator Project Defended
 
Infrastructure Strategy
Infrastructure StrategyInfrastructure Strategy
Infrastructure Strategy
 

2012 -2013 RSA Install

  • 1. 2012 - 2013 RSA Installation 1. Install Universal Windows RSA Client serv1wpublicRSA AgentsAgent 7.1.1 for WindowsRSA_Authentication_Agent_7.1x64RSA Authentication Agent x64.msi 2. Point to SDCONF.REC file
  • 2. 2012 - 2013 RSA Installation 3. Create local group for server named “RSA Exclusions” and add known service accounts to be excluded from challenge. 4. During testing, we found that the RSA client is dependent on .Net 3.5 being installed on server.
  • 3. 2012 - 2013 RSA Installation 5. Ensure that you add the local “RSA Exclusions” group to the RSA Control Center challenge process. 6. Ensure that Remote Desktop Control uses the RSA Security Layer when accessing this server.