Skip to main content
Documents

Hacking Team RCS 9 Administrator’s Guide

Oct. 30, 2014

1/61
Download
Page 1 from Hacking Team RCS 9 Administrator’s Guide
]Haci<ngTeam[ RCS 9 The hacking suite for governmental interception Administrator's Guide 55?h X: <5 Administratnr's Guide - 1Jeri-fl
]Haci<ngTeam[ RCS 9 The hacking suite for governmental interception Administrator's Guide 55?h X: <5 Administratnr's Guide - 1Jeri-fl
Page 2 from Hacking Team RCS 9 Administrator’s Guide
Information ownership COPYRIGHT 2013, HT S.r.l. All rights reseryed in all countries. No part of this manual can be translated into other languages andfor adapted andf'or reproduced in other formats andf'or mechanically, electronically processed or photocopied, recorded or otherwise without prior written authorization from HackingTeam. All corporations and product names may be legal or registered trademarks, property of their respective owners. Specifically Internet Explorer? is a Microsoft Corporation registered trademark. Albeit text and images being selected with the utmost care, HackingTeam reseryes the right to change andf'or update the information hereto to correct typos andfor errors without any prior notice or additional liability. Any reference to nam es, data and addresses of companies not in the HackingTeam is purely coincidental and, unless otherwise indicated, included as examples to better clarify product use. NOTE: requests for additional copies of this manual or product technical information should be addressed to: HT S.r.l. yia della Moscoya, 13 20121 Milano (MI) Italy Tel.: 39 02 29 060 603 Fax: 39 02 63 118 946 e-mail: info@hackingteam.com
Information ownership COPYRIGHT 2013, HT S.r.l. All rights reseryed in all countries. No part of this manual can be translated into other languages andfor adapted andf'or reproduced in other formats andf'or mechanically, electronically processed or photocopied, recorded or otherwise without prior written authorization from HackingTeam. All corporations and product names may be legal or registered trademarks, property of their respective owners. Specifically Internet Explorer? is a Microsoft Corporation registered trademark. Albeit text and images being selected with the utmost care, HackingTeam reseryes the right to change andf'or update the information hereto to correct typos andfor errors without any prior notice or additional liability. Any reference to nam es, data and addresses of companies not in the HackingTeam is purely coincidental and, unless otherwise indicated, included as examples to better clarify product use. NOTE: requests for additional copies of this manual or product technical information should be addressed to: HT S.r.l. yia della Moscoya, 13 20121 Milano (MI) Italy Tel.: 39 02 29 060 603 Fax: 39 02 63 118 946 e-mail: info@hackingteam.com
Page 3 from Hacking Team RCS 9 Administrator’s Guide
Contents Glossary _.iv Guideintroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 1 New guide features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 2 Supplied documentation 2 Printconcepts for notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 3 Printconcepts for format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 3 Product and guide addressees 4 Software author identification data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 4 RC5 {Remote Control SystemDifferences between PCS 8.0 and PCS 16 versions 7? Glossarv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 7? RC5 Console for the Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 8 Starting the PCS Console .. 9 What the login page looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 9 Open RCS Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 9 Homepage description .. 10 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 What it looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 10 Wizards in the homepage _.11 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..11 Whatitlooks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..11 Shared interface elements and actions _.12 What the PCS Console looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 Actions alwavs available on the interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..14 Change interface language or password 14 Converting the PCS Console date?time to the actual time zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 14 Table actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..1S Administrator's procedures .. 16 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..16 Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 16 Preparing the PCS for use bv other users .. 16 Opening an investigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 16 Closing an investigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Monitoring the svstem Managing RCS login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 What vou should know about users and groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 19 Introduction _.19 Login privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 19 administrator's Guide ver.1.4 SE RES -pag.
Contents Glossary _.iv Guideintroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 1 New guide features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 2 Supplied documentation 2 Printconcepts for notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 3 Printconcepts for format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 3 Product and guide addressees 4 Software author identification data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 4 RC5 {Remote Control SystemDifferences between PCS 8.0 and PCS 16 versions 7? Glossarv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 7? RC5 Console for the Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 8 Starting the PCS Console .. 9 What the login page looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 9 Open RCS Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 9 Homepage description .. 10 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 What it looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 10 Wizards in the homepage _.11 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..11 Whatitlooks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..11 Shared interface elements and actions _.12 What the PCS Console looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 Actions alwavs available on the interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..14 Change interface language or password 14 Converting the PCS Console date?time to the actual time zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 14 Table actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..1S Administrator's procedures .. 16 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..16 Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 16 Preparing the PCS for use bv other users .. 16 Opening an investigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 16 Closing an investigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Monitoring the svstem Managing RCS login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 What vou should know about users and groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 19 Introduction _.19 Login privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 19 administrator's Guide ver.1.4 SE RES -pag.
Page 4 from Hacking Team RCS 9 Administrator’s Guide
Functions enabled by single role ..19 User groups per operation ..20 User groups for system alarm alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ._20 User management .. 20 Purpose -.20 Next steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 What the function looks like ..21 To learn more ..22 Registering and enabling a user for RC5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Enablinngisabling a user .23 Immediately disconnecting a user -.23 Editing user data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 User data .24 Priyilege data ..25 Administrator authorizations .25 System administrator authorizations .25 Technician authorizations -.25 Analyst authorizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..26 Group management .. 26 Purpose -.26 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . To learn more .22 Creating a group and linking users and operations -28 Editing group data and removing users and operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Operation and target .29 What you should know about operations .30 What is an operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 Assigning the operation to a user group .30 What happens when a new operation is created .-30 What happens when an operation is closed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 What you should know about targets .. 30 What is a target .-30 Administrator tasks .30 What happens when a target is created .31 What happens when a target is closed -31 Opening and closing an operation ._31 Operation management ..31 Purpose -31 Next steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 32 What the function looks like .32 Administrator'sGuide yer.1.4 RES 201393 HT5.r.l. - pag. ll
Functions enabled by single role ..19 User groups per operation ..20 User groups for system alarm alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ._20 User management .. 20 Purpose -.20 Next steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 What the function looks like ..21 To learn more ..22 Registering and enabling a user for RC5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Enablinngisabling a user .23 Immediately disconnecting a user -.23 Editing user data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 User data .24 Priyilege data ..25 Administrator authorizations .25 System administrator authorizations .25 Technician authorizations -.25 Analyst authorizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..26 Group management .. 26 Purpose -.26 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . To learn more .22 Creating a group and linking users and operations -28 Editing group data and removing users and operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Operation and target .29 What you should know about operations .30 What is an operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 Assigning the operation to a user group .30 What happens when a new operation is created .-30 What happens when an operation is closed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 What you should know about targets .. 30 What is a target .-30 Administrator tasks .30 What happens when a target is created .31 What happens when a target is closed -31 Opening and closing an operation ._31 Operation management ..31 Purpose -31 Next steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 32 What the function looks like .32 Administrator'sGuide yer.1.4 RES 201393 HT5.r.l. - pag. ll
Page 5 from Hacking Team RCS 9 Administrator’s Guide
To learn more .33 Creating an operation .33 Editing operation data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 Closing an operation ..34 Deleting an operation -.34 Operation data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Operation page .35 Purpose -.35 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..35 To learn more Creating a target Closing a target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Editing target data .. 3? Deleting a target .36 Operation page data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Monitoring users .39 What you should know about user monitoring {Audit} -.40 What is user monitoring .. 40 How signaled actions are read .. 4D Selecting specific actions using filters -40 Exporta ble data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 40 User monitoring {Audit} ..41 Purpose -.41 What you can ..41 What the function looks like ..41 To learn more ..42 Selecting actions in a time range .. 42 Selecting actions based on proposed data .. 42 Remoying one or more filters -.43 Exporting displayed actions .. 43 User monitoring data {Audit} ..43 System monitoring ..45 System monitoring {Monitor..46 Purpose .. 46 What the function looks like ..46 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Define the alerting group or temporarily enablefdisa ble it .. 4? System monitoring data {Monitor} ..48 System component monitoring data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 48 License monitoring data .. 49 Administrator's Guide yer.1.4 RES 9 2613i? - pag. ll}
To learn more .33 Creating an operation .33 Editing operation data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 Closing an operation ..34 Deleting an operation -.34 Operation data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Operation page .35 Purpose -.35 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..35 To learn more Creating a target Closing a target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Editing target data .. 3? Deleting a target .36 Operation page data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Monitoring users .39 What you should know about user monitoring {Audit} -.40 What is user monitoring .. 40 How signaled actions are read .. 4D Selecting specific actions using filters -40 Exporta ble data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 40 User monitoring {Audit} ..41 Purpose -.41 What you can ..41 What the function looks like ..41 To learn more ..42 Selecting actions in a time range .. 42 Selecting actions based on proposed data .. 42 Remoying one or more filters -.43 Exporting displayed actions .. 43 User monitoring data {Audit} ..43 System monitoring ..45 System monitoring {Monitor..46 Purpose .. 46 What the function looks like ..46 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Define the alerting group or temporarily enablefdisa ble it .. 4? System monitoring data {Monitor} ..48 System component monitoring data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 48 License monitoring data .. 49 Administrator's Guide yer.1.4 RES 9 2613i? - pag. ll}
Page 6 from Hacking Team RCS 9 Administrator’s Guide
lossa ry The terms and their definitions used in this manual are provided below. A Accounting Console section that manages RC8 access. acquisition sequence Group of complex events. actions and acquisition modules that make up the advanced agent con?guration. Administrator The person who enables user access to the system. creates work groups and de?nes operations. targets and the type ofdata to be collected. Agent Software probes installed on devices to monitor. They are designed to collect evidence and communicate it to the Collector. alert rules Rules that create alerts when new evidence is stored or agents communicate back for the ?rst time. Alerting Console section that manages new evidence alerts. alerting group Group ofusers who receive notifications via mail whenever a system alarm is trig- gered {for example. when the database exceeds available free space limits}. Nor- mally this group is not linked to an operation. Analyst Person in charge of analyzing the data collected during operations. Anonymizer {optional} Protects the server against external attacks and permits anonymity during investigations. Transfers agent data to Collectors. Atlminish'ators Guide ver.1.4 SE Fit-1'5 I - peg. iv
lossa ry The terms and their definitions used in this manual are provided below. A Accounting Console section that manages RC8 access. acquisition sequence Group of complex events. actions and acquisition modules that make up the advanced agent con?guration. Administrator The person who enables user access to the system. creates work groups and de?nes operations. targets and the type ofdata to be collected. Agent Software probes installed on devices to monitor. They are designed to collect evidence and communicate it to the Collector. alert rules Rules that create alerts when new evidence is stored or agents communicate back for the ?rst time. Alerting Console section that manages new evidence alerts. alerting group Group ofusers who receive notifications via mail whenever a system alarm is trig- gered {for example. when the database exceeds available free space limits}. Nor- mally this group is not linked to an operation. Analyst Person in charge of analyzing the data collected during operations. Anonymizer {optional} Protects the server against external attacks and permits anonymity during investigations. Transfers agent data to Collectors. Atlminish'ators Guide ver.1.4 SE Fit-1'5 I - peg. iv
Page 7 from Hacking Team RCS 9 Administrator’s Guide
Riff} - Glossary Audit Console section that reports all users' and system actions. Used to monitor abuse of RCS. back end Environment designed to and save collected information. In distributed archi- tecture. it includes Master Node and Shard databases. ERAS {Broadband Remote Access Server} routes traf?c toffrom DSLAM to the ISP network and provides authentication to the ISP subscribers. BSSID {Basic Service Set lDenti?er} Access Point and its client identifier. Collector Receives data sent by agents directly or through the Anonymizer chain. console Computer on which the RCS Console is installed. It directly accesses the RCS Server or Master Node. Dashboard Console section used by the Analyst. Used to have a quick overview of the status of the most important operations. targets and agents. DSLAM {Digital Subscriber Line Access Multiplexer} network device. often located in the tel- ephone exchanges of the telecommunications operators. It connects multiple cus- tomer digital subscriber line interfaces to a high-speed digital communications channel using multiplexing techniques. Adminish'ator Guide ver.1.4 I Riff} Lit-131.2: HT - pa 3.
Riff} - Glossary Audit Console section that reports all users' and system actions. Used to monitor abuse of RCS. back end Environment designed to and save collected information. In distributed archi- tecture. it includes Master Node and Shard databases. ERAS {Broadband Remote Access Server} routes traf?c toffrom DSLAM to the ISP network and provides authentication to the ISP subscribers. BSSID {Basic Service Set lDenti?er} Access Point and its client identifier. Collector Receives data sent by agents directly or through the Anonymizer chain. console Computer on which the RCS Console is installed. It directly accesses the RCS Server or Master Node. Dashboard Console section used by the Analyst. Used to have a quick overview of the status of the most important operations. targets and agents. DSLAM {Digital Subscriber Line Access Multiplexer} network device. often located in the tel- ephone exchanges of the telecommunications operators. It connects multiple cus- tomer digital subscriber line interfaces to a high-speed digital communications channel using multiplexing techniques. Adminish'ator Guide ver.1.4 I Riff} Lit-131.2: HT - pa 3.
Page 8 from Hacking Team RCS 9 Administrator’s Guide
C-ZI - Glossary entity Group ofintelligence information linked to the target and people and places involved in the investigation. ESSID {Extended Service Set lDenti?er} Known as SSID. identi?es the network. evidence Collected data evidence. The format depends on the type of evidence image}. evidence alerts Alerts. usually in the form of emails. sent to when new evidence matches the set rule. factory A template for agent con?guration and compiling. front end Environment designed to communicate with agents to collect information and set their con?gurations. In distributed architecture. it includes the Collector and Network Controller. injection rules Settings that de?ne how to identify HTTP traf?c. what resource should be injected and what method is to be used for the injection. Monitor Console section that monitors components and license status. mlminish'ators Guide SE Fill-1'5 I Ruff}? Eli-1'51: - peg. vi
C-ZI - Glossary entity Group ofintelligence information linked to the target and people and places involved in the investigation. ESSID {Extended Service Set lDenti?er} Known as SSID. identi?es the network. evidence Collected data evidence. The format depends on the type of evidence image}. evidence alerts Alerts. usually in the form of emails. sent to when new evidence matches the set rule. factory A template for agent con?guration and compiling. front end Environment designed to communicate with agents to collect information and set their con?gurations. In distributed architecture. it includes the Collector and Network Controller. injection rules Settings that de?ne how to identify HTTP traf?c. what resource should be injected and what method is to be used for the injection. Monitor Console section that monitors components and license status. mlminish'ators Guide SE Fill-1'5 I Ruff}? Eli-1'51: - peg. vi
Page 9 from Hacking Team RCS 9 Administrator’s Guide
Ruff} C-ZI - Eilossarv Network Controller Component that checks Network Injector and Anonymizer status and sends them new configurations and software updates. Network Injector Hardware component that monitors the target's network traffic and injects an agent into selected Web resources. It comes in two versions. Appliance or Tactical: the former is for deployment at the ISP. the latter for use on the field. Network Injector Appliance Rackable version of the Network Injector. for installation at ISP. See: Tactical Net- work Injector. 0 operation Investigation aimed at one or more targets. whose devices will be recipients for agents. RC3 em ote Control System I the product documented hereto. RC3 Console Software designed to interact with the RCS Server. RC3 3erver One or more computers. based on the installation architecture. were essential RCS components are installed: Shard databases. Network Controllers and Collector. 33H {Secure a network protocol for secure data communication. remote shell serv- ices or command execution. Administratt?n' s-?Eiuide I Fair} Eli-131.2: HT - pa g. vii
Ruff} C-ZI - Eilossarv Network Controller Component that checks Network Injector and Anonymizer status and sends them new configurations and software updates. Network Injector Hardware component that monitors the target's network traffic and injects an agent into selected Web resources. It comes in two versions. Appliance or Tactical: the former is for deployment at the ISP. the latter for use on the field. Network Injector Appliance Rackable version of the Network Injector. for installation at ISP. See: Tactical Net- work Injector. 0 operation Investigation aimed at one or more targets. whose devices will be recipients for agents. RC3 em ote Control System I the product documented hereto. RC3 Console Software designed to interact with the RCS Server. RC3 3erver One or more computers. based on the installation architecture. were essential RCS components are installed: Shard databases. Network Controllers and Collector. 33H {Secure a network protocol for secure data communication. remote shell serv- ices or command execution. Administratt?n' s-?Eiuide I Fair} Eli-131.2: HT - pa g. vii
Page 10 from Hacking Team RCS 9 Administrator’s Guide
G) - Glossary System Console section that manages the system. System administrator The person who installs the servers and consoles. updates software and restores data in case offaults. Tactical Network Injector The portable version ofNetwork Injector. for tactical use. See: Network Injector Appliance. TAP {Test Access Port} a hardware device installed in a network that passively monitors the transmitted data flow. target The physical person under investigation. Technician The person assigned by the Administrator to create and manage agents. UPS {Virtual Private Server} a remote server where the Anonymizer is installed. Com- monly available for rent. WPA {Wi Fi Protected Access} WiFi network protection. WPA 2 {Wi Fi Protected Access} WiFi network protection. miminish'ator Guide ver.1
G) - Glossary System Console section that manages the system. System administrator The person who installs the servers and consoles. updates software and restores data in case offaults. Tactical Network Injector The portable version ofNetwork Injector. for tactical use. See: Network Injector Appliance. TAP {Test Access Port} a hardware device installed in a network that passively monitors the transmitted data flow. target The physical person under investigation. Technician The person assigned by the Administrator to create and manage agents. UPS {Virtual Private Server} a remote server where the Anonymizer is installed. Com- monly available for rent. WPA {Wi Fi Protected Access} WiFi network protection. WPA 2 {Wi Fi Protected Access} WiFi network protection. miminish'ator Guide ver.1
Page 11 from Hacking Team RCS 9 Administrator’s Guide
Guide introduction resentatio Manual goals This manual is a guide for the Administrator on how to use the RC5 Console to: . create users and workgroups . open and close investigations . monitor RC5 users . monitor the system Information on how to consult the manual is provided below. Content This section includes the following topics: Newguidefeatures Supplied documentation Print conceptsfornotes Print conceptsforformat Product and guide addressees Softwareauthoridentification data administrator's Guide ~.rer.1.4 SE P-2C-13 - RES - 2013a! HT S.r.l. - pag. 1
Guide introduction resentatio Manual goals This manual is a guide for the Administrator on how to use the RC5 Console to: . create users and workgroups . open and close investigations . monitor RC5 users . monitor the system Information on how to consult the manual is provided below. Content This section includes the following topics: Newguidefeatures Supplied documentation Print conceptsfornotes Print conceptsforformat Product and guide addressees Softwareauthoridentification data administrator's Guide ~.rer.1.4 SE P-2C-13 - RES - 2013a! HT S.r.l. - pag. 1
Page 12 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - New guide features New guide features List of release notes and updates to this online help. Reiease Code Software Description a'ate version. 30 sep. Administrator's 9 Updated documentation due to improvements to the tember Guide user interface. 2013 1.4 SE P-2013 Improved the contents. 3 Julv 2013 Administrator's 34 No documentation update. Guide 15 March Administrator's 33 Added user authorization management. See 2013 Guide "Priviiege data" on page 25 . 1.3 MAR-2013 15 October Administrator's 32 Added description of wizards in the homepage. See 2012 Guide "Wizards in the homepage" on page 11 1.2 OCT-2012 301mg Administrator's g_1 Close operation and target button. See "Operation 2012 Guide management" on page 31 . 1.1 JUN 2012 Load license button. See "System monitoring (Monitor)" on page 46. 16 April Administrator's 33 First publication 2012 Guide 1.0 APR-2012 Supplied documentation The following manuals are supplied with RCS software: Manuai Addressees Code Distribution Ji'or- mat System Administrator's System System Administrator's Guide administrator Guide 1.4 SEP-2013 Administrator's Guide Administrators Administrator's Guide PDF {this manual} 1.4 Administrator's Guide 1tier.1.?fl RC3 9 2013? - pag. 2
RC5 9 - New guide features New guide features List of release notes and updates to this online help. Reiease Code Software Description a'ate version. 30 sep. Administrator's 9 Updated documentation due to improvements to the tember Guide user interface. 2013 1.4 SE P-2013 Improved the contents. 3 Julv 2013 Administrator's 34 No documentation update. Guide 15 March Administrator's 33 Added user authorization management. See 2013 Guide "Priviiege data" on page 25 . 1.3 MAR-2013 15 October Administrator's 32 Added description of wizards in the homepage. See 2012 Guide "Wizards in the homepage" on page 11 1.2 OCT-2012 301mg Administrator's g_1 Close operation and target button. See "Operation 2012 Guide management" on page 31 . 1.1 JUN 2012 Load license button. See "System monitoring (Monitor)" on page 46. 16 April Administrator's 33 First publication 2012 Guide 1.0 APR-2012 Supplied documentation The following manuals are supplied with RCS software: Manuai Addressees Code Distribution Ji'or- mat System Administrator's System System Administrator's Guide administrator Guide 1.4 SEP-2013 Administrator's Guide Administrators Administrator's Guide PDF {this manual} 1.4 Administrator's Guide 1tier.1.?fl RC3 9 2013? - pag. 2
Page 13 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Print concepts for notes Manuai Addressees Code Distribution for- mat Technician's Guide Technicians Technician?s Guide PDF 1.5 SEP-ZGIB Analvst's Guide Anaiyst?s Guide PD 1.4 SEP-2013 Print concepts for notes Notes foreseen in this document are listed below (Microsoft Manual of Style): I WARNING: indicates a riskvr situation which, if not avoided, could cause user injuryr or 4% equipment damages. 1? II CAUTION: indicates a risky situation which, if not avoided, can cause data to be iost. IMPORTANT: offers the indications required to complete the task. While notes can be neglected and do not in?uence task completion, important indications should not be neglected. NOTE: neutral and positive information that emphasize or add information to the main text. Thev provide information that can onlv be applied in special cases. 1 a a Tip: suggestion for the application of techniques and procedures described in the text according to special needs. It may suggest an alternative method and is not essential to text comprehension. l. Service caii: the operation may oniy be compieted with the heip of technif?'i Service- Print concepts for format A key to print concepts is provided below: Exampie Styie Description See "User data? itoiic this indicates a chapter, section, sub-section, paragraph, table or illustration heading in this manual or other publication of reference. indicates text that must be specified by the user according to a certain svntax. In the example is a date and could be ?1402011?. Administrator's Guide ver.1.4 RCSQ 20136:) - pag. 3
RC5 9 - Print concepts for notes Manuai Addressees Code Distribution for- mat Technician's Guide Technicians Technician?s Guide PDF 1.5 SEP-ZGIB Analvst's Guide Anaiyst?s Guide PD 1.4 SEP-2013 Print concepts for notes Notes foreseen in this document are listed below (Microsoft Manual of Style): I WARNING: indicates a riskvr situation which, if not avoided, could cause user injuryr or 4% equipment damages. 1? II CAUTION: indicates a risky situation which, if not avoided, can cause data to be iost. IMPORTANT: offers the indications required to complete the task. While notes can be neglected and do not in?uence task completion, important indications should not be neglected. NOTE: neutral and positive information that emphasize or add information to the main text. Thev provide information that can onlv be applied in special cases. 1 a a Tip: suggestion for the application of techniques and procedures described in the text according to special needs. It may suggest an alternative method and is not essential to text comprehension. l. Service caii: the operation may oniy be compieted with the heip of technif?'i Service- Print concepts for format A key to print concepts is provided below: Exampie Styie Description See "User data? itoiic this indicates a chapter, section, sub-section, paragraph, table or illustration heading in this manual or other publication of reference. indicates text that must be specified by the user according to a certain svntax. In the example is a date and could be ?1402011?. Administrator's Guide ver.1.4 RCSQ 20136:) - pag. 3
Page 14 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Product and guide addressees Exampie Styie Description Select one of indicates the object specified in the text that appears in the adjacent the listed image. servers Click Add. bold indicates text on the operator interface, a graphic element Select the File table, tab) or screen button display). menu, Save data. Press ENTER UPPER indicates the name of keyboard keys. CASE See: Network - suggests you compare the definition of a word in the glossary or Injector content with another word or content. Appliance. Product and guide addressees Following is the list of professionals that interact with RCS. Addressee Activity System Follows the HackingTeam's instructions provided during the Expert administrator contract phase. Installs and updates RCS servers, Network network Injectors and RCS Consoles. Schedules and manages backups. technician Restores backups if servers are replaced. WARNING: the system administrator must have the i required necessary skills. The HackingTeam is not liable for equipment malfunctions or damages clue to unprofessional installation. Administrator Creates authorized accounts and groups. Creates operations and investigation target. I'vlonitors system and license status. manager Technician Creates and sets up agents. Sets Network Injector rules Tapping speciaiist technician Analyst Analyzes and exports evidence. Operative Software author identification data HT S.r.l. via della Moscova, 13 20121 Milano (MI) Italy Administrator's Guide ver.1.4 RC3 9 20133) - pag. 4
RC5 9 - Product and guide addressees Exampie Styie Description Select one of indicates the object specified in the text that appears in the adjacent the listed image. servers Click Add. bold indicates text on the operator interface, a graphic element Select the File table, tab) or screen button display). menu, Save data. Press ENTER UPPER indicates the name of keyboard keys. CASE See: Network - suggests you compare the definition of a word in the glossary or Injector content with another word or content. Appliance. Product and guide addressees Following is the list of professionals that interact with RCS. Addressee Activity System Follows the HackingTeam's instructions provided during the Expert administrator contract phase. Installs and updates RCS servers, Network network Injectors and RCS Consoles. Schedules and manages backups. technician Restores backups if servers are replaced. WARNING: the system administrator must have the i required necessary skills. The HackingTeam is not liable for equipment malfunctions or damages clue to unprofessional installation. Administrator Creates authorized accounts and groups. Creates operations and investigation target. I'vlonitors system and license status. manager Technician Creates and sets up agents. Sets Network Injector rules Tapping speciaiist technician Analyst Analyzes and exports evidence. Operative Software author identification data HT S.r.l. via della Moscova, 13 20121 Milano (MI) Italy Administrator's Guide ver.1.4 RC3 9 20133) - pag. 4
Page 15 from Hacking Team RCS 9 Administrator’s Guide
RC8 9 - Samurare author identi?cation data Tel.: 39 02 29 060 603 Fax: 39 02 63 118 946 e-mail: infa@hackingteam.cam Administrator's Guide uer.1.4 RC9 9 201393 - pag. 5
RC8 9 - Samurare author identi?cation data Tel.: 39 02 29 060 603 Fax: 39 02 63 118 946 e-mail: infa@hackingteam.cam Administrator's Guide uer.1.4 RC9 9 201393 - pag. 5
Page 16 from Hacking Team RCS 9 Administrator’s Guide
RCS (Remote Control System) resentatio Introduction RCS {Remote Control System} is a solution that supports investigations by actively and passively tapping data and information from the devices targeted by the investigations. In fact, RCS anonymously creates, sets and installs software agents that collect data and information, sending the results to the central database to be and saved. Content This section includes the follovving topics: Differences between RCS 3.0 and RC5 15 versions Ir' littlministrator's Guide ver.1.4 - RC5 - 20131? HT S.r.l. - pag. 6
RCS (Remote Control System) resentatio Introduction RCS {Remote Control System} is a solution that supports investigations by actively and passively tapping data and information from the devices targeted by the investigations. In fact, RCS anonymously creates, sets and installs software agents that collect data and information, sending the results to the central database to be and saved. Content This section includes the follovving topics: Differences between RCS 3.0 and RC5 15 versions Ir' littlministrator's Guide ver.1.4 - RC5 - 20131? HT S.r.l. - pag. 6
Page 17 from Hacking Team RCS 9 Administrator’s Guide
RC3 C?i - [Differences between RICE- 8.CI and RICE- 1s versions Differences between RCS 8.0 and RCS 7.6 versions Differences with the RC5 16 version are described below Glossary RC5 v. 7.6 RC5 3.0 and higher Activitv Operation Agent Module Anonvr?nizer chain Anonvr?nizing chain Backdoor Agent Backdoor Class Factorv Collection Node Collector Injection Proxv Appliance Network Injector Appliance Log Repositorv Master Node and additional Shard Mobile Collection Node Collector Anonvmizer Administrator'sGuide ver.1.4 RC3 NEED HT S.r.l. - pag. 7'
RC3 C?i - [Differences between RICE- 8.CI and RICE- 1s versions Differences between RCS 8.0 and RCS 7.6 versions Differences with the RC5 16 version are described below Glossary RC5 v. 7.6 RC5 3.0 and higher Activitv Operation Agent Module Anonvr?nizer chain Anonvr?nizing chain Backdoor Agent Backdoor Class Factorv Collection Node Collector Injection Proxv Appliance Network Injector Appliance Log Repositorv Master Node and additional Shard Mobile Collection Node Collector Anonvmizer Administrator'sGuide ver.1.4 RC3 NEED HT S.r.l. - pag. 7'
Page 18 from Hacking Team RCS 9 Administrator’s Guide
RCS Console for the Administrator resentatio The Administrator?s role The Administrator's role is: . to manage svstem access lav assigning users the various roles foreseen lav the application . to create and close investigations . to define the involved targets . to inform the Technician user of the tvpes of evidence to be tapped . to monitor actions run bv users . to monitor licenses available for RC5 components Functions enabled for the Administrator To complete hisfher activities, the Administrator has access to the follovving functions: . Accounting . Operation . Audit . Monitor Content This section includes the follovving topics: Startingthe RC5 Console 9 Homepage description __10 Wizardsin thehomepage Shared interface elements and actions 12 Administrator?s procedures __1Ei Administrator's Guide ver.1.4 SE Pit-13 - RC5 - lit-131:1 HT - pag. 8
RCS Console for the Administrator resentatio The Administrator?s role The Administrator's role is: . to manage svstem access lav assigning users the various roles foreseen lav the application . to create and close investigations . to define the involved targets . to inform the Technician user of the tvpes of evidence to be tapped . to monitor actions run bv users . to monitor licenses available for RC5 components Functions enabled for the Administrator To complete hisfher activities, the Administrator has access to the follovving functions: . Accounting . Operation . Audit . Monitor Content This section includes the follovving topics: Startingthe RC5 Console 9 Homepage description __10 Wizardsin thehomepage Shared interface elements and actions 12 Administrator?s procedures __1Ei Administrator's Guide ver.1.4 SE Pit-13 - RC5 - lit-131:1 HT - pag. 8
Page 19 from Hacking Team RCS 9 Administrator’s Guide
RCS 9 - Starling the RC5 Console Starting the RC5 Console When started, RCS Console asks you to enter your credentials previously set by the Administrator. What the login page looks like This is what the login page looks like: an: El an Console 9J1 UH:er fit": Area Description 1 Title bar with command buttons: ii Close RCS Console. El Expand window button. El Shrink window button. 2 Login dialog window. Open RC5 Con sole To open RCS Console functions: Step Action 1 In Username and Password, enter the credentials as assigned by the Administrator. 2 In Server, enter the name of the machine or seryer address to connect to. Administrator's Guide yer.1.4 RCSQ 20136:) - pag. 9
RCS 9 - Starling the RC5 Console Starting the RC5 Console When started, RCS Console asks you to enter your credentials previously set by the Administrator. What the login page looks like This is what the login page looks like: an: El an Console 9J1 UH:er fit": Area Description 1 Title bar with command buttons: ii Close RCS Console. El Expand window button. El Shrink window button. 2 Login dialog window. Open RC5 Con sole To open RCS Console functions: Step Action 1 In Username and Password, enter the credentials as assigned by the Administrator. 2 In Server, enter the name of the machine or seryer address to connect to. Administrator's Guide yer.1.4 RCSQ 20136:) - pag. 9
Page 20 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Homepage description Step Action 3 6 Click the homepage appears with the menus enabled according to your account privileges. See "Homepage description?beiow . Homepage description - click? To View the homepage: Introduction The homepage is displayed when the RC5 Console is started, and is the same for all users. Enabled menus depend on the privileges assigned to the account. What it looks like This is what the homepage looks like, with recently opened items saved. For details on shared elements and actions: ?lm tut-1:6: ?crtla'mcr El ?pv.1r'rr< Tolig'h?uro Tinsl'l'ntr: .- 1.. Tl leaml Globu- '1 Recentl'bems IE- a - {3 a :i"ml Iu'mrnur Ii "x .- xx . I ?lti'w- Area Description 1 Title bar with command buttons. 2 RC5 menu with functions enabled for the user. 3 Search box to search operations, targets, agents and entities, by name or description. Administrator's Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 10
RC5 9 - Homepage description Step Action 3 6 Click the homepage appears with the menus enabled according to your account privileges. See "Homepage description?beiow . Homepage description - click? To View the homepage: Introduction The homepage is displayed when the RC5 Console is started, and is the same for all users. Enabled menus depend on the privileges assigned to the account. What it looks like This is what the homepage looks like, with recently opened items saved. For details on shared elements and actions: ?lm tut-1:6: ?crtla'mcr El ?pv.1r'rr< Tolig'h?uro Tinsl'l'ntr: .- 1.. Tl leaml Globu- '1 Recentl'bems IE- a - {3 a :i"ml Iu'mrnur Ii "x .- xx . I ?lti'w- Area Description 1 Title bar with command buttons. 2 RC5 menu with functions enabled for the user. 3 Search box to search operations, targets, agents and entities, by name or description. Administrator's Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 10
Page 21 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Wizards in the homepage Areo Description 4 Links to the last five elements opened (operation in the Operations section, operation in the Intelligence section, target, agent and entity). Wizard buttons. Logged in user with possibility of changing the language and password. Download area with ability to View progress during export or compiling. noun-sin Current date and time with possibility of changing the time zone. Wizards in the homepage - click?? To View the homepage: Introduction For users with certain privileges, RCS Console displays buttons that run wizards. What it looks like This is how the homepage is displayed with enabled wizards: El Timid-nth: Go to '1 Recentl'bems -?a::?1u:l:m:i1:lc:l -- - :3 -- .. ?lti'w- awn-rm it'd-r. ?7 'J13'l: Administrator's Guide 1tier.1.dfl SE P-2013 RC8 9 2013 - pag. 11
RC5 9 - Wizards in the homepage Areo Description 4 Links to the last five elements opened (operation in the Operations section, operation in the Intelligence section, target, agent and entity). Wizard buttons. Logged in user with possibility of changing the language and password. Download area with ability to View progress during export or compiling. noun-sin Current date and time with possibility of changing the time zone. Wizards in the homepage - click?? To View the homepage: Introduction For users with certain privileges, RCS Console displays buttons that run wizards. What it looks like This is how the homepage is displayed with enabled wizards: El Timid-nth: Go to '1 Recentl'bems -?a::?1u:l:m:i1:lc:l -- - :3 -- .. ?lti'w- awn-rm it'd-r. ?7 'J13'l: Administrator's Guide 1tier.1.dfl SE P-2013 RC8 9 2013 - pag. 11
Page 22 from Hacking Team RCS 9 Administrator’s Guide
Button RC5 9 - Shared interface elements and actions Function love-summon WI rl Open the wizard to quickly create an agent. Open the wizard to quickly saye operation and target data. NOTE: the button is only enabled for users with Administrator and Technician privileges. NOTE: the button is only enabled for users with Administrator and System Administrator priyileges. Shared interface elements and actions Each program page uses shared elements and allows similar actions to be run. For easier manual comprehension, elements and actions shared by some functions are described in this chapter. What the RC5 Console looks like This is what a typical RES Console page looks like. A target page is displayed in this example: an El no A .loocurcn: Hal'ch Horn: . null: Erma-.1 b- 13 E: a k; l:lJ a I a [la 1L ElOpersllom l?xlqe?: Lon-rth #311 Administrator's Guide SE P-2013 RC3 9 2013 - pag. 12
Button RC5 9 - Shared interface elements and actions Function love-summon WI rl Open the wizard to quickly create an agent. Open the wizard to quickly saye operation and target data. NOTE: the button is only enabled for users with Administrator and Technician privileges. NOTE: the button is only enabled for users with Administrator and System Administrator priyileges. Shared interface elements and actions Each program page uses shared elements and allows similar actions to be run. For easier manual comprehension, elements and actions shared by some functions are described in this chapter. What the RC5 Console looks like This is what a typical RES Console page looks like. A target page is displayed in this example: an El no A .loocurcn: Hal'ch Horn: . null: Erma-.1 b- 13 E: a k; l:lJ a I a [la 1L ElOpersllom l?xlqe?: Lon-rth #311 Administrator's Guide SE P-2013 RC3 9 2013 - pag. 12
Page 23 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - What the RC5 Console looks like Area Description 1 Title bar with command buttons: *1 Logout from RC5. Page refresh button. El Expand window button. l;l Shrink window button. 2 a Return to homepage button RCS menu with functions enabled for the user. 3 Operation scroll bar. Descriptions are provided below: icon Description Muriel} Ii It Back to higher level. Show the operation page (Operations section). Show the target page. Show the factorv page. Show the agent page. Show the operation page (Intelligence section). Show the entity page. 4 Buttons to displav all elements regardless of their group membership. Descriptions are provided below: icon Description a Show all operations. Show all targets. 5? Show all agents. Show all entities. 5 Window toolbar. Administrator's Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 13
RC5 9 - What the RC5 Console looks like Area Description 1 Title bar with command buttons: *1 Logout from RC5. Page refresh button. El Expand window button. l;l Shrink window button. 2 a Return to homepage button RCS menu with functions enabled for the user. 3 Operation scroll bar. Descriptions are provided below: icon Description Muriel} Ii It Back to higher level. Show the operation page (Operations section). Show the target page. Show the factorv page. Show the agent page. Show the operation page (Intelligence section). Show the entity page. 4 Buttons to displav all elements regardless of their group membership. Descriptions are provided below: icon Description a Show all operations. Show all targets. 5? Show all agents. Show all entities. 5 Window toolbar. Administrator's Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 13
Page 24 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 -Acl]'ons always available on the interface Areo Description 5 Search buttons and box: Object Description {bran?m it Search box. Enter part of the name to display a list of elements that contain the entered letters. Display elements in a table. Display elements as icons. Logged in user with possibility of changing the language and password. 3 Download area with ability to view progress during export or compiling. Files are downloaded to the desktop in RCS Download folder. . top bar: percent generation on server 1: bottom bar: percent download from server to RC5 Console. 9 Current date and time with possibility of changing the time zone. Actions always available on the interface Change interface language or password To change the interface language or password: Step Action 1 Click to display a dialog window with the user's data. 2 Change the language or password and click Save to con?rm and exit. Converting the RC5 Console date-time to the actual time zone To convert all dates-times to the actual time zone: Step Action 1 Click to display a dialog window with the current date-time: UTC time: Greenwich mean time (GMT) Local Time: date-time where the RC5 server is installed Console time: date-time of the console used and which can be converted. 2 Change the time zone and click Save to confirm and exit: all displayed dates-times are converted as requested. Administrator's Guide ver.1.4 SE P-2013 RC8 9 20136:] - pag. 14
RC5 9 -Acl]'ons always available on the interface Areo Description 5 Search buttons and box: Object Description {bran?m it Search box. Enter part of the name to display a list of elements that contain the entered letters. Display elements in a table. Display elements as icons. Logged in user with possibility of changing the language and password. 3 Download area with ability to view progress during export or compiling. Files are downloaded to the desktop in RCS Download folder. . top bar: percent generation on server 1: bottom bar: percent download from server to RC5 Console. 9 Current date and time with possibility of changing the time zone. Actions always available on the interface Change interface language or password To change the interface language or password: Step Action 1 Click to display a dialog window with the user's data. 2 Change the language or password and click Save to con?rm and exit. Converting the RC5 Console date-time to the actual time zone To convert all dates-times to the actual time zone: Step Action 1 Click to display a dialog window with the current date-time: UTC time: Greenwich mean time (GMT) Local Time: date-time where the RC5 server is installed Console time: date-time of the console used and which can be converted. 2 Change the time zone and click Save to confirm and exit: all displayed dates-times are converted as requested. Administrator's Guide ver.1.4 SE P-2013 RC8 9 20136:] - pag. 14
Page 25 from Hacking Team RCS 9 Administrator’s Guide
Table actions RC5 9 -Table actions The RC5 Console displays various data in tables. Tables let you: 0 sort data by column in increasingldecreasing order 0 filter data by column Action Description Sort by column Filter a text Filter based on an option Click on the column heading to sort that column in increasing or decreasing order. Event ?LPath ?in. Sword?sh Sword?sh EVIDENCE Enter part of the text you are searching for: only elements that contain the entered text appear. 71 Info The example shows elements with descriptions like: "myboss" "bossanoya" Select an option: the elements that match the selected option appear. El Acquired Last 24 Hours I Last Week I From iTo 2 Administrator's Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 15
Table actions RC5 9 -Table actions The RC5 Console displays various data in tables. Tables let you: 0 sort data by column in increasingldecreasing order 0 filter data by column Action Description Sort by column Filter a text Filter based on an option Click on the column heading to sort that column in increasing or decreasing order. Event ?LPath ?in. Sword?sh Sword?sh EVIDENCE Enter part of the text you are searching for: only elements that contain the entered text appear. 71 Info The example shows elements with descriptions like: "myboss" "bossanoya" Select an option: the elements that match the selected option appear. El Acquired Last 24 Hours I Last Week I From iTo 2 Administrator's Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 15
Page 26 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Administrator's procedures Action Description Filter based on several Select one or more options: the elements that match all selected options options appear. Elm?: I Untagged I Law I I II Hinh a Critioal Change the column Select the edge of the column and drag it. size Administrator's procedures Introduction Procedures typically perform ed by the Administrator are indicated below with references to their pertinent chapters. Procedures Preparing the RC5 for use by other users Following are the procedures typically performed to prepare RCS for use by others: Step Ac tion 1 In the Accounting section, Users set the people who will have access to RC5. See "User management" on page 20 2 In the Accounting section, Groups create the user group (usually composed of system administrators and not linked to any operation) that will receive the system alarm e-mail notifications See "Group management" on page 26 3 In the Monitor section, select the group that will receive the system alarm e-mail notifications. See "System monitoring (Monitor)? on page 46 Opening an investigation Procedures typically performed to open an investigation are indicated below: Administrator's Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 16
RC5 9 - Administrator's procedures Action Description Filter based on several Select one or more options: the elements that match all selected options options appear. Elm?: I Untagged I Law I I II Hinh a Critioal Change the column Select the edge of the column and drag it. size Administrator's procedures Introduction Procedures typically perform ed by the Administrator are indicated below with references to their pertinent chapters. Procedures Preparing the RC5 for use by other users Following are the procedures typically performed to prepare RCS for use by others: Step Ac tion 1 In the Accounting section, Users set the people who will have access to RC5. See "User management" on page 20 2 In the Accounting section, Groups create the user group (usually composed of system administrators and not linked to any operation) that will receive the system alarm e-mail notifications See "Group management" on page 26 3 In the Monitor section, select the group that will receive the system alarm e-mail notifications. See "System monitoring (Monitor)? on page 46 Opening an investigation Procedures typically performed to open an investigation are indicated below: Administrator's Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 16
Page 27 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Cloa'ng an investigation Step Action 1 In the Accounting section, Users set the people who will belong to the investigation team and their roles. See "User management" on page 20 In the Accounting section, Groups set the team enabled to view investigation data and receive svstem alarms. See "Group management" on page 26 In the Operations section, open the investigation and link one or more groups. See "Operation management? on page 31 and "Operation page" on page 35 Inform the RC5 Technician of the 0f EVldenCE To be In the Audit section, monitor svstem access by the team and check their actions. See "User monitoring {Audit}" on page 41 Closing an investigation The typical procedure performed to close an investigation is indicated below: Step Action 1 In the Operations section, close the investigation. See "Operation management" If necessarv, ask the System administrator to save evidence in a Backup file. Monitoring the svstem The typical procedures performed to monitor RC5 use are indicated below: Step Action 1 In the Monitor section, monitor svstem messages and licenses used. See "System monitoring (Monitor}" on page 46 In the Audit section, monitor actions performed bv Technicians, and other Administrators. See "User monitoring (Audit}" on page 41 Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 17
RC5 9 - Cloa'ng an investigation Step Action 1 In the Accounting section, Users set the people who will belong to the investigation team and their roles. See "User management" on page 20 In the Accounting section, Groups set the team enabled to view investigation data and receive svstem alarms. See "Group management" on page 26 In the Operations section, open the investigation and link one or more groups. See "Operation management? on page 31 and "Operation page" on page 35 Inform the RC5 Technician of the 0f EVldenCE To be In the Audit section, monitor svstem access by the team and check their actions. See "User monitoring {Audit}" on page 41 Closing an investigation The typical procedure performed to close an investigation is indicated below: Step Action 1 In the Operations section, close the investigation. See "Operation management" If necessarv, ask the System administrator to save evidence in a Backup file. Monitoring the svstem The typical procedures performed to monitor RC5 use are indicated below: Step Action 1 In the Monitor section, monitor svstem messages and licenses used. See "System monitoring (Monitor}" on page 46 In the Audit section, monitor actions performed bv Technicians, and other Administrators. See "User monitoring (Audit}" on page 41 Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 17
Page 28 from Hacking Team RCS 9 Administrator’s Guide
Managing RCS login resentatio Introduction Managing users and groups is essential to guarantee data confidentialityr and security. Content This section includes the following topics: What you should know about users and groups ._19 Usermanagement Userdata Privilege data ._25 Group management 25 administratorsGuide uer.1.4 - - 2CI13EI HT 3.r.l. - pag. 18
Managing RCS login resentatio Introduction Managing users and groups is essential to guarantee data confidentialityr and security. Content This section includes the following topics: What you should know about users and groups ._19 Usermanagement Userdata Privilege data ._25 Group management 25 administratorsGuide uer.1.4 - - 2CI13EI HT 3.r.l. - pag. 18
Page 29 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Whatyou should know about users and groups What you should know about users and groups Introduction To guarantee maximum data con?dentiality and security, RC5 provides the Administrator the opportunity of assigning login privileges to each user and grouping users in workgroups for specific operations. The structure adapts to both situations were tasks are ented and situations where all tasks are performed by a few people. By managing users, the Administrator can also quickly disconnect a suspected user and temporarily disable hisfher RCS login. Login privileges RC5 was designed to guarantee maximum server and collected data security. To achieve this goal, four distinct roles were defined that usually refer to the professionals who can login to the system: It all! System administrator: exclusively in charge of hardware and software installation and backups . ?k Administrator: in charge of all system login, investigations and investigation goals in 6" Technician: in charge of setting up and installing tapping agents . Analyst: in charge of data analysis r: Tip: several roles can be assigned to the same user, for exam pl e, an Administrator can also have Technician privileges. Functions enabled by single role Following is the list of RCS functions reserved to users in a specific role: Role Enabled functions System SYSTEW administrator 4. Monitor Administrator Uperati on 1: Audit Monitor Technician operation a! System Analyst II Operation 1: Intelligence Dashboard Alerting Administrator's Guide ver.1.4 SE P-2013 RC8 9 20136:] - pag. 19
RC5 9 - Whatyou should know about users and groups What you should know about users and groups Introduction To guarantee maximum data con?dentiality and security, RC5 provides the Administrator the opportunity of assigning login privileges to each user and grouping users in workgroups for specific operations. The structure adapts to both situations were tasks are ented and situations where all tasks are performed by a few people. By managing users, the Administrator can also quickly disconnect a suspected user and temporarily disable hisfher RCS login. Login privileges RC5 was designed to guarantee maximum server and collected data security. To achieve this goal, four distinct roles were defined that usually refer to the professionals who can login to the system: It all! System administrator: exclusively in charge of hardware and software installation and backups . ?k Administrator: in charge of all system login, investigations and investigation goals in 6" Technician: in charge of setting up and installing tapping agents . Analyst: in charge of data analysis r: Tip: several roles can be assigned to the same user, for exam pl e, an Administrator can also have Technician privileges. Functions enabled by single role Following is the list of RCS functions reserved to users in a specific role: Role Enabled functions System SYSTEW administrator 4. Monitor Administrator Uperati on 1: Audit Monitor Technician operation a! System Analyst II Operation 1: Intelligence Dashboard Alerting Administrator's Guide ver.1.4 SE P-2013 RC8 9 20136:] - pag. 19
Page 30 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - User groups per opera?on User groups per operation Groups allow users to be grouped to assign them specific operations. This way, several operations can be managed simultaneously, guaranteeing maximum data confidentiality amongst vvorkgroups. See "Operation management" on page 31 IMPORTANT: operation assignments to a workgroup will be effective the next time the user in that group logs in. User groups for system alarm alerts A group of users exclusively intended to receive an e-mail in the event of system alarm can be created. This way, fast System administrator intervention can be guaranteed in the event of serious faults. See "System monitoring {Monitor}" on page 46 User management To manage I Accounting section, Users Purpose This function lets you: . register a user and allow himfher access to certain RES functions. Once registered, the user can login and view functions based on assigned roles . temporarily disable user login, for example, in the event of prolonged absence .- immediately disconnect the user from RES, for exam pl e, in the event of alleged illegal access to RES . monitor the date-time and IP address of the user's last connection to RC5 and other per- tinent data E. Tip: to block a user and prevent any access to RES, we suggest you immediately disconnect H?r? himfher (if connected) and disable himfher. NOTE: the function is only enabled if the user has User and group management authorization. Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - peg. 20
RC5 9 - User groups per opera?on User groups per operation Groups allow users to be grouped to assign them specific operations. This way, several operations can be managed simultaneously, guaranteeing maximum data confidentiality amongst vvorkgroups. See "Operation management" on page 31 IMPORTANT: operation assignments to a workgroup will be effective the next time the user in that group logs in. User groups for system alarm alerts A group of users exclusively intended to receive an e-mail in the event of system alarm can be created. This way, fast System administrator intervention can be guaranteed in the event of serious faults. See "System monitoring {Monitor}" on page 46 User management To manage I Accounting section, Users Purpose This function lets you: . register a user and allow himfher access to certain RES functions. Once registered, the user can login and view functions based on assigned roles . temporarily disable user login, for example, in the event of prolonged absence .- immediately disconnect the user from RES, for exam pl e, in the event of alleged illegal access to RES . monitor the date-time and IP address of the user's last connection to RC5 and other per- tinent data E. Tip: to block a user and prevent any access to RES, we suggest you immediately disconnect H?r? himfher (if connected) and disable himfher. NOTE: the function is only enabled if the user has User and group management authorization. Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - peg. 20
Page 31 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Next steps Next steps Several users can be linked to a workgroup, to assign them specific operations or send system alarms. See "Group management" on page 26 . What the function looks like This is what the page looks like: ITI a; memoir,? Accounting (Jamar-1n: dr um. owl:~ 51- El 51 heal-.m- .01 .Etr ?321:er Dim-rum .Etr nudilm 1P5: 2'36 W?rrm ?ailinl Hill I I'lt U412 14.11% m, hi m_ Mint-5': - Eric-Ir: L'HI-Iluular z. u: .z mm 2 4st" Area Description 1 RES menu. 2 Accounting menu. Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 21
RC5 9 - Next steps Next steps Several users can be linked to a workgroup, to assign them specific operations or send system alarms. See "Group management" on page 26 . What the function looks like This is what the page looks like: ITI a; memoir,? Accounting (Jamar-1n: dr um. owl:~ 51- El 51 heal-.m- .01 .Etr ?321:er Dim-rum .Etr nudilm 1P5: 2'36 W?rrm ?ailinl Hill I I'lt U412 14.11% m, hi m_ Mint-5': - Eric-Ir: L'HI-Iluular z. u: .z mm 2 4st" Area Description 1 RES menu. 2 Accounting menu. Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 21
Page 32 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 -To learn more Area Description 3 Window toolbar. Descriptions are provided below: icon Description . Add a user l+ EdIt the selected user. Delete the selected user. ?il Disconnect the selected user. 4 Main work area with list of registered users: .9 Registered user currently logged into RC5. Registered user but not currently logged into RC5. - Registered user but not enabled to login. The user cannot have access to RC5. 5 Selected user data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 12 . For a description of the data in this window see "User data? on page 24 . For more information on users and groups see "What you should know about users and groups on page 1:9 . Registering and enabling a user for RC5 To register a new user: Step Action 1 Click New user: data entry fields appear. Administrator's Guide yer.1.4 5E P-2013 RC5 9 2013 - pag. 22
RC5 9 -To learn more Area Description 3 Window toolbar. Descriptions are provided below: icon Description . Add a user l+ EdIt the selected user. Delete the selected user. ?il Disconnect the selected user. 4 Main work area with list of registered users: .9 Registered user currently logged into RC5. Registered user but not currently logged into RC5. - Registered user but not enabled to login. The user cannot have access to RC5. 5 Selected user data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 12 . For a description of the data in this window see "User data? on page 24 . For more information on users and groups see "What you should know about users and groups on page 1:9 . Registering and enabling a user for RC5 To register a new user: Step Action 1 Click New user: data entry fields appear. Administrator's Guide yer.1.4 5E P-2013 RC5 9 2013 - pag. 22
Page 33 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Enablinngisabling a user Step Action 2 Enter the required data and make sure the Enabled box is selected if you want the user to login to RCS. Click Saye: the new user with the a icon appears in the main work area. Enablinngisabling a user To enable or disable a user to login to RC5: Step Action 1 Double-click a user: hisfher data appear. 2 Click Enabled to enable or disable. 3 Click Save: the new user appears in the main work area with icon (enabled) or 0 (disabled). IMPORTANT: if the user is logged in, sheihe will continue to work but the next login will be denied. To immediately disconnect a user see "immediately disconnecting user" below . Immediately disconnecting a user To immediately disconnect a logged in user: Step Action 1 8 Click on a user and click Disconnect user:the user appears with icon. in the main work area. if the user is logged in, sheihe will immediately be disconnected. The next login will be permitted unless the user is disabled. To disable the user see "Enabling/Disabling user" oboue . Editing user data To edit user data: Administrator's Guide 1yer.1.4 SE P-2013 RC8 9 2013 - pag. 23
RC5 9 - Enablinngisabling a user Step Action 2 Enter the required data and make sure the Enabled box is selected if you want the user to login to RCS. Click Saye: the new user with the a icon appears in the main work area. Enablinngisabling a user To enable or disable a user to login to RC5: Step Action 1 Double-click a user: hisfher data appear. 2 Click Enabled to enable or disable. 3 Click Save: the new user appears in the main work area with icon (enabled) or 0 (disabled). IMPORTANT: if the user is logged in, sheihe will continue to work but the next login will be denied. To immediately disconnect a user see "immediately disconnecting user" below . Immediately disconnecting a user To immediately disconnect a logged in user: Step Action 1 8 Click on a user and click Disconnect user:the user appears with icon. in the main work area. if the user is logged in, sheihe will immediately be disconnected. The next login will be permitted unless the user is disabled. To disable the user see "Enabling/Disabling user" oboue . Editing user data To edit user data: Administrator's Guide 1yer.1.4 SE P-2013 RC8 9 2013 - pag. 23
Page 34 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - User data Step Ao tion 1 Double-click a user: hisfher data appear. 2 Edit data and click Save: data is considered from the next login or next alert messages. User data Selected user data is described below: Doto Description Enabled Select to enable user login to RC5. Do not select to leave the user registered but denv login to RC5. Name Name used to login to RC5. Description User's description Contact user's e-m ail. llvi PD RTANT: if the user has Analvst privileges, evidence alerts will be sent to this address. The e-mail cannot be changed by the user. Password User's password. The user can change it later from the status bar. Rules Privileges assigned to the user: uh 5vstem administrator 'k Administrator "Technician Analvst For a detailed description of privileges see "Priviiege data" on next page Advanced Opens the window to assign authorizations for each privilege. permissions Language Console Timezone Groups For a detailed description of authoritationssee "Privilege data" on next page RC5 Console interface language. The user can change it later from the status bar. Time zone used by the RC5 Console to displav time. User's groups. The user can onlv see the operations assigned to the group. Administrator's Guide ver.1.4 5E P-2013 RC5 9 2013 - pag. 24
RC5 9 - User data Step Ao tion 1 Double-click a user: hisfher data appear. 2 Edit data and click Save: data is considered from the next login or next alert messages. User data Selected user data is described below: Doto Description Enabled Select to enable user login to RC5. Do not select to leave the user registered but denv login to RC5. Name Name used to login to RC5. Description User's description Contact user's e-m ail. llvi PD RTANT: if the user has Analvst privileges, evidence alerts will be sent to this address. The e-mail cannot be changed by the user. Password User's password. The user can change it later from the status bar. Rules Privileges assigned to the user: uh 5vstem administrator 'k Administrator "Technician Analvst For a detailed description of privileges see "Priviiege data" on next page Advanced Opens the window to assign authorizations for each privilege. permissions Language Console Timezone Groups For a detailed description of authoritationssee "Privilege data" on next page RC5 Console interface language. The user can change it later from the status bar. Time zone used by the RC5 Console to displav time. User's groups. The user can onlv see the operations assigned to the group. Administrator's Guide ver.1.4 5E P-2013 RC5 9 2013 - pag. 24
Page 35 from Hacking Team RCS 9 Administrator’s Guide
RC3 9 - Privilege data Privilege data Administrator authorizations Following is a description of the authorizations assigned to Administrators: Data Description User and group Enables the Accounting section. mana ement -- - . . . . 0 NOTE: users with this authorization can naturally change their own and others' authorizations. Operations Enables Operations management. management Target Enables target management. management system auditing Enables the Audit section. License mnd_ Allows the license to be updated. i?cation System administrator authorizations Following is a description of the authorizations assigned to System Administrators: Data Description Frontend management Enables the System, Frontend section. Backend management Enables the System, Backend section. System Backup 8: Restore Enables the System, Backup section. Injector management Enables the System, Network Injector section. connectors management Enables the Connectors section. Technician authorizations Following is a description of the authorizations assigned to Technicians: Data Description Factory creation Allows factories to be created and set. Installation yector creation Allows installation vectors to be compiled. Agent con?guration Allows agent configurations to be edited. Command execution on Allows commands to be run on agents. agents Administrator's Guide SE P-2013 RC8 9 2013 - pag. 25
RC3 9 - Privilege data Privilege data Administrator authorizations Following is a description of the authorizations assigned to Administrators: Data Description User and group Enables the Accounting section. mana ement -- - . . . . 0 NOTE: users with this authorization can naturally change their own and others' authorizations. Operations Enables Operations management. management Target Enables target management. management system auditing Enables the Audit section. License mnd_ Allows the license to be updated. i?cation System administrator authorizations Following is a description of the authorizations assigned to System Administrators: Data Description Frontend management Enables the System, Frontend section. Backend management Enables the System, Backend section. System Backup 8: Restore Enables the System, Backup section. Injector management Enables the System, Network Injector section. connectors management Enables the Connectors section. Technician authorizations Following is a description of the authorizations assigned to Technicians: Data Description Factory creation Allows factories to be created and set. Installation yector creation Allows installation vectors to be compiled. Agent con?guration Allows agent configurations to be edited. Command execution on Allows commands to be run on agents. agents Administrator's Guide SE P-2013 RC8 9 2013 - pag. 25
Page 36 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Analyst authorizations Data Description Upload files to agent Import evidence Injector rules management Allows files to be sent to agent. Allows evidence to be imported. Allows rules to be added for Network Injectors. Analyst authorizations Following is a description of the authorizations assigned to Data Description Alerts creation File system browsing Allows alert rules to be created. Allows the agent's file system to be browsed. agents Evidence editing Evidence deletion Evidence export Entity management Allows priorities to be assigned to evidence and notes added. Allows evidence to be deleted. NOTE: this authorization is never enabled by default since it requires a user license. Allows evidence to be exported Allows intelligence entities to be managed. Group management To :11 onoge on groups: Accounting section, Groups Purpose This function lets you: organize users in work groups to assign specific operations create an alerting group to receive system alarm e-m ails Tip: to more simply and quickly group and manage users intended to receive RC5 alarms, create an "alerting" group without linking it to an operation but containing all the users to be alerted in the event of alarm.$ee "User management" on page 20 NOTE: the function is only enabled if the user has User and group management authorization. Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 26
RC5 9 - Analyst authorizations Data Description Upload files to agent Import evidence Injector rules management Allows files to be sent to agent. Allows evidence to be imported. Allows rules to be added for Network Injectors. Analyst authorizations Following is a description of the authorizations assigned to Data Description Alerts creation File system browsing Allows alert rules to be created. Allows the agent's file system to be browsed. agents Evidence editing Evidence deletion Evidence export Entity management Allows priorities to be assigned to evidence and notes added. Allows evidence to be deleted. NOTE: this authorization is never enabled by default since it requires a user license. Allows evidence to be exported Allows intelligence entities to be managed. Group management To :11 onoge on groups: Accounting section, Groups Purpose This function lets you: organize users in work groups to assign specific operations create an alerting group to receive system alarm e-m ails Tip: to more simply and quickly group and manage users intended to receive RC5 alarms, create an "alerting" group without linking it to an operation but containing all the users to be alerted in the event of alarm.$ee "User management" on page 20 NOTE: the function is only enabled if the user has User and group management authorization. Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 26
Page 37 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - What the function looks like the function looks like This is what the page looks like: 'd ITI uL- ?stuuntinn IJ'h'dl-J'n Gloups I. IE I- 51 IL'aml: I. u. in El Il-rl: d-l .1 I Ila-u I asl-n Area Description 1 RC5 menu. 2 Accounting menu. 3 Window toolbar. Descriptions are provided below: icon Description .1 Add a group. Iii-I- Edit the selected group. Delete the selected group. 4 Group list. 5 Users and operation assigned to the selected group. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions? on page 12 . Administrator's Guide SE P-2013 RC8 9 2013 - pag. 27
RC5 9 - What the function looks like the function looks like This is what the page looks like: 'd ITI uL- ?stuuntinn IJ'h'dl-J'n Gloups I. IE I- 51 IL'aml: I. u. in El Il-rl: d-l .1 I Ila-u I asl-n Area Description 1 RC5 menu. 2 Accounting menu. 3 Window toolbar. Descriptions are provided below: icon Description .1 Add a group. Iii-I- Edit the selected group. Delete the selected group. 4 Group list. 5 Users and operation assigned to the selected group. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions? on page 12 . Administrator's Guide SE P-2013 RC8 9 2013 - pag. 27
Page 38 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Creating a group and linking users and operations For more information on groups and users see "What you should know about users and groups". Creating a group and linking users and operations To create a new group: Step Ar: Hon 1 Click New group: enter a name to be assigned to the group. 2 Enter the required data and click Save: the new group is displayed in the main work area. In the Users in this Group table, click ES to add users to the group. In the Operations in this Group table, click to add operations to the group: the next time group users login, they will see the added operation. IMPORTANT: if an operation is linked to a user who is logged in, the user will onlvr be able to view the operation the next time shefhe logs in. Editing group data and removing users and operations To edit group data: Step Ar: Hon 1 Double-click a group. 2 Edit the name and click Save. In the Users in this Group table, click l:l to remove users from the group. In the Operations in this Group table, click l:l to remove operations from the group: the next time group users login, the; will no longer see the operations in the list. IMPORTANT: if an operation is removed from a user who is r:urrentli,lr logged in, the user will no longer view the operation the next time shefhe logs in. Administrator's Guide SE P-2013 RC5 9 2013 - pag. 28
RC5 9 - Creating a group and linking users and operations For more information on groups and users see "What you should know about users and groups". Creating a group and linking users and operations To create a new group: Step Ar: Hon 1 Click New group: enter a name to be assigned to the group. 2 Enter the required data and click Save: the new group is displayed in the main work area. In the Users in this Group table, click ES to add users to the group. In the Operations in this Group table, click to add operations to the group: the next time group users login, they will see the added operation. IMPORTANT: if an operation is linked to a user who is logged in, the user will onlvr be able to view the operation the next time shefhe logs in. Editing group data and removing users and operations To edit group data: Step Ar: Hon 1 Double-click a group. 2 Edit the name and click Save. In the Users in this Group table, click l:l to remove users from the group. In the Operations in this Group table, click l:l to remove operations from the group: the next time group users login, the; will no longer see the operations in the list. IMPORTANT: if an operation is removed from a user who is r:urrentli,lr logged in, the user will no longer view the operation the next time shefhe logs in. Administrator's Guide SE P-2013 RC5 9 2013 - pag. 28
Page 39 from Hacking Team RCS 9 Administrator’s Guide
Operation and target Presentation Introduction Managing operations sets the targets to be tapped. Content This section includes the following topics: What you should know about operations .30 What you should knowabouttargets Operation management Operation data .35 Operation page 35 Operation pagedata 33 administratorsGuide uer.1.4 - RES 9 - 2CI13EI HT Srl. - pag. 29
Operation and target Presentation Introduction Managing operations sets the targets to be tapped. Content This section includes the following topics: What you should know about operations .30 What you should knowabouttargets Operation management Operation data .35 Operation page 35 Operation pagedata 33 administratorsGuide uer.1.4 - RES 9 - 2CI13EI HT Srl. - pag. 29
Page 40 from Hacking Team RCS 9 Administrator’s Guide
RC3 9 - Whatyou would know about operations What you should know about operations What is an operation An operation is an investigation to be conducted. An operation contains one or more targets meaning the physical individuals to be tapped. The Technician assigns one or more agents, desktop or mobiie, to the target. Thus the agent can be installed on a computer or mobile phone. Assigning the operation to a user group To guarantee maxim um data con?dentiality, we recommend you only link an operation to the RC5 users assigned to the investigation. Users not linked to the operation will not see any operation data or collected evidence. For this reason, the person who creates the operation must be part of at least one of the groups linked to the operation when created. What happens when a new operation is created When an operation is created it is already declared open thus operation targets can be created and the Technician can generate and install agents. When the operation is open, agents begin to collect data and send it to RC5. What happens when an operation is closed The operation must be closed when the investigation is closed, and it is certain that all agents have already transmitted all the collected evidence to the Backend. Closing the operation automatically closes the targets and agents. When an agent is closed, uninstallation occurs at the first leaving the device clean. A closed operation cannot be re-opened. Only the operation data and collected evidence are left in the database. CAUTION: for infrequent Ji'or example, every four days, wait Jliar the iast I: piannealr before ciosing the operation. What you should know about targets What is a target A target is the physical person to be investigated. The Technician assigns one or more agents, desktop or mobile, to the target. Thus the agent can be installed on a computer or mobile phone. Administrator tasks The Administrator manages targets on the general organizational level; the Technician sets and works on targets according to the Administrator's instructions. The Administrator is in charge of: Administrator's Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 30
RC3 9 - Whatyou would know about operations What you should know about operations What is an operation An operation is an investigation to be conducted. An operation contains one or more targets meaning the physical individuals to be tapped. The Technician assigns one or more agents, desktop or mobiie, to the target. Thus the agent can be installed on a computer or mobile phone. Assigning the operation to a user group To guarantee maxim um data con?dentiality, we recommend you only link an operation to the RC5 users assigned to the investigation. Users not linked to the operation will not see any operation data or collected evidence. For this reason, the person who creates the operation must be part of at least one of the groups linked to the operation when created. What happens when a new operation is created When an operation is created it is already declared open thus operation targets can be created and the Technician can generate and install agents. When the operation is open, agents begin to collect data and send it to RC5. What happens when an operation is closed The operation must be closed when the investigation is closed, and it is certain that all agents have already transmitted all the collected evidence to the Backend. Closing the operation automatically closes the targets and agents. When an agent is closed, uninstallation occurs at the first leaving the device clean. A closed operation cannot be re-opened. Only the operation data and collected evidence are left in the database. CAUTION: for infrequent Ji'or example, every four days, wait Jliar the iast I: piannealr before ciosing the operation. What you should know about targets What is a target A target is the physical person to be investigated. The Technician assigns one or more agents, desktop or mobile, to the target. Thus the agent can be installed on a computer or mobile phone. Administrator tasks The Administrator manages targets on the general organizational level; the Technician sets and works on targets according to the Administrator's instructions. The Administrator is in charge of: Administrator's Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 30
Page 41 from Hacking Team RCS 9 Administrator’s Guide
RC3 9 - What happenswhen a targetis created . creating a new target within an operation instruct the Technician on activation schedules and the types of evidence to be collected through a certain target's agents, based on the instructions received from legal authorities monitoring correct instruction application through Audits . closing a target What happens when a target is created When a target is created it is already declared open and thus the Technician can be asked to generate and install agents. What happens when a target is closed A target can be closed, for example, when closing investigations for that target. Closing a target automatically closes its agents. When an agent is closed, uninstallation occurs at the ?rst leaving the device clean. A closed target cannot be re-opened. Only the target data and those sent by agents are left in the database. I when a target is closed, all linked agents are automatically uninstalled. Only . close a target when certain to have all the required data. Jl?or infrequent Jfor example, every Jll'our days, wait Jll'or the last . planned before closing the target. t: Tip: only close the target when you are sure that agents have downloaded all the required information. Opening and closing an operation When an operation is closed, all of its targets are irreversibly closed and all their agents are uninstalled. See "What you should know about operations? on previous page . Operation management To manage a Dpe rations section operations: Purpose This function lets you: i create a new operation 0 assign the operation to a user group Administrator's Guide ver.1.4 SE P-2013 RC5 9 2013 - pag. 31
RC3 9 - What happenswhen a targetis created . creating a new target within an operation instruct the Technician on activation schedules and the types of evidence to be collected through a certain target's agents, based on the instructions received from legal authorities monitoring correct instruction application through Audits . closing a target What happens when a target is created When a target is created it is already declared open and thus the Technician can be asked to generate and install agents. What happens when a target is closed A target can be closed, for example, when closing investigations for that target. Closing a target automatically closes its agents. When an agent is closed, uninstallation occurs at the ?rst leaving the device clean. A closed target cannot be re-opened. Only the target data and those sent by agents are left in the database. I when a target is closed, all linked agents are automatically uninstalled. Only . close a target when certain to have all the required data. Jl?or infrequent Jfor example, every Jll'our days, wait Jll'or the last . planned before closing the target. t: Tip: only close the target when you are sure that agents have downloaded all the required information. Opening and closing an operation When an operation is closed, all of its targets are irreversibly closed and all their agents are uninstalled. See "What you should know about operations? on previous page . Operation management To manage a Dpe rations section operations: Purpose This function lets you: i create a new operation 0 assign the operation to a user group Administrator's Guide ver.1.4 SE P-2013 RC5 9 2013 - pag. 31
Page 42 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Next steps NOTE: the function is only enabled if the user has Operation management authorization. Next steps One or more targets must be linked to the operation. See "Operation page" on page 35 . What the function looks like This is what the page looks like: .- ?p-o-eruls :5 I: i m. 3:21: :n HI: Dcl:: an: like :1 a. :mx?k'n: Emma Area Description 1 RES menu. 2 Scroll bar. ?9 Mn El Mam-J Hw? Fr ll Ifl??' .'r'1'rr a HIEEI 3 I Lu. THEIR. run-m1 UM lmku'lx Four. Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 32
RC5 9 - Next steps NOTE: the function is only enabled if the user has Operation management authorization. Next steps One or more targets must be linked to the operation. See "Operation page" on page 35 . What the function looks like This is what the page looks like: .- ?p-o-eruls :5 I: i m. 3:21: :n HI: Dcl:: an: like :1 a. :mx?k'n: Emma Area Description 1 RES menu. 2 Scroll bar. ?9 Mn El Mam-J Hw? Fr ll Ifl??' .'r'1'rr a HIEEI 3 I Lu. THEIR. run-m1 UM lmku'lx Four. Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 32
Page 43 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 -To learn more Area Description 3 Window toolbar. Descriptions are provided below: icon Description Add an operation. EdIt the selected operatl on. Delete the selected operation. Close the operation. 4 List of created operations: Open operation. If targets were set and agents correctlv installed, collected evidence is received. a Closed operation. All targets are closed and agents uninstalled. All its targets and evidence can still be viewed. 5 Selected operation data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 12 . For a description of the data in this window see "Operation data? on page 35 . For more information on operations see "What you should know about operations" on page 30. Creating an operation To create a new operation: Step Action 1 Click New Operation: data entry fields appear. Administrator's Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 33
RC5 9 -To learn more Area Description 3 Window toolbar. Descriptions are provided below: icon Description Add an operation. EdIt the selected operatl on. Delete the selected operation. Close the operation. 4 List of created operations: Open operation. If targets were set and agents correctlv installed, collected evidence is received. a Closed operation. All targets are closed and agents uninstalled. All its targets and evidence can still be viewed. 5 Selected operation data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 12 . For a description of the data in this window see "Operation data? on page 35 . For more information on operations see "What you should know about operations" on page 30. Creating an operation To create a new operation: Step Action 1 Click New Operation: data entry fields appear. Administrator's Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 33
Page 44 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Editing operation data Step Action 2 Select the group (or groups) to be assigned to the operation. NOTE: the user who is creating the operation must belong to at least one of the linked groups. 3 Enter the required data and click Save: the new operation appears in the main work area in Open status. Editing operation data To edit operation data: Step Action 1 Select an operation and click Edit: its data appears. 2 Edit data and click Save. Closing an operation To close an operation and begin uninstalling agents on all targets: Step Action 1 Select an operation and click Close. 2 Confirm close: all targets are closed and agent uninstall is requested. Data is left available on the database. I marrow: ciosing on operation is irreversibie see "What you shouid know about operations on page 30 Deleting an operation To delete an operation: Step Action 1 Select an operation and click Delete. Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 34
RC5 9 - Editing operation data Step Action 2 Select the group (or groups) to be assigned to the operation. NOTE: the user who is creating the operation must belong to at least one of the linked groups. 3 Enter the required data and click Save: the new operation appears in the main work area in Open status. Editing operation data To edit operation data: Step Action 1 Select an operation and click Edit: its data appears. 2 Edit data and click Save. Closing an operation To close an operation and begin uninstalling agents on all targets: Step Action 1 Select an operation and click Close. 2 Confirm close: all targets are closed and agent uninstall is requested. Data is left available on the database. I marrow: ciosing on operation is irreversibie see "What you shouid know about operations on page 30 Deleting an operation To delete an operation: Step Action 1 Select an operation and click Delete. Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 34
Page 45 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Operation data Step Action 2 Confirm the action by clicking OK: operation data, targets, agents and all evidence is deleted from databases. I a'eieting an action is irreversibie and data iinkea' to that operation is iost. Operation data Selected operation data is described below: Data Description Name Operation name. Description User's description Contact Descriptive field used to define, for example, the name of a contact person (Judge, Attornev, etc.]. Status Operation status and close command: OPEN: the operation is open. If targets were set and agents correctlv installed, the RC5 receives the collected evidence. CLOSED: the operation is closed and can not be re-opened. Agents no longer send data but evidence already received can still be viewed. I CAUTION: closing an operation is irreversible.$ee "What you shoaid know . about operations" on page 30 Groups Groups that can see the operation. See "Group management" on page 26 Operation page To View on operation: a Purpose Operation section, double-click an operation This function lets you: 1- create one or more targets to be monitored during an operation . manage target activationfdeactivation. 1lilihat the function looks like This is what the page looks like: Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 35
RC5 9 - Operation data Step Action 2 Confirm the action by clicking OK: operation data, targets, agents and all evidence is deleted from databases. I a'eieting an action is irreversibie and data iinkea' to that operation is iost. Operation data Selected operation data is described below: Data Description Name Operation name. Description User's description Contact Descriptive field used to define, for example, the name of a contact person (Judge, Attornev, etc.]. Status Operation status and close command: OPEN: the operation is open. If targets were set and agents correctlv installed, the RC5 receives the collected evidence. CLOSED: the operation is closed and can not be re-opened. Agents no longer send data but evidence already received can still be viewed. I CAUTION: closing an operation is irreversible.$ee "What you shoaid know . about operations" on page 30 Groups Groups that can see the operation. See "Group management" on page 26 Operation page To View on operation: a Purpose Operation section, double-click an operation This function lets you: 1- create one or more targets to be monitored during an operation . manage target activationfdeactivation. 1lilihat the function looks like This is what the page looks like: Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 35
Page 46 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - What the function looks like Elna-mun: l?jclaz'm doc-In a l- ?9mm ?an hi am a El . .-- -.-.-.- ?we :npmv-y l: {9 I'm. In". -Iu i . un 'Iw mr Area Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: Icon Function Add a target. NOTE: the function is only enabled if the user has Target management authorization. EdIt the selected target. Delete the selected target. Close the target. Move the target to another operation. 4 Target list: 0 Open target Closed target Administrator's Guide 1?serif-1 SE P-2013 RC8 9 2013 - pag. 36
RC5 9 - What the function looks like Elna-mun: l?jclaz'm doc-In a l- ?9mm ?an hi am a El . .-- -.-.-.- ?we :npmv-y l: {9 I'm. In". -Iu i . un 'Iw mr Area Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: Icon Function Add a target. NOTE: the function is only enabled if the user has Target management authorization. EdIt the selected target. Delete the selected target. Close the target. Move the target to another operation. 4 Target list: 0 Open target Closed target Administrator's Guide 1?serif-1 SE P-2013 RC8 9 2013 - pag. 36
Page 47 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - To learn more Area Description 5 Selected target data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 12 . For more information on operations see "What you should lmow about operations" on page 30. For a description of the data in this window see "Operation page data" on next page . Creating a target To create a new target: Step Action 1 Click New Target: data entry fields appear. 2 Enter the required data and click Save: the new target appears in the main work area in Open status, meaning it is readyr to be used by a Technician. Closing a target To close a target and begin uninstalling its agents: Step Action 1 Select a target and click Close. 2 Confirm close: the target is closed and agent uninstallation is autom launched. Data is left available on the database. I CAUTION: closing a target is irreversibie see What you should lrnow about targets" on page 30 Editing target data To edit target data: Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 37
RC5 9 - To learn more Area Description 5 Selected target data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 12 . For more information on operations see "What you should lmow about operations" on page 30. For a description of the data in this window see "Operation page data" on next page . Creating a target To create a new target: Step Action 1 Click New Target: data entry fields appear. 2 Enter the required data and click Save: the new target appears in the main work area in Open status, meaning it is readyr to be used by a Technician. Closing a target To close a target and begin uninstalling its agents: Step Action 1 Select a target and click Close. 2 Confirm close: the target is closed and agent uninstallation is autom launched. Data is left available on the database. I CAUTION: closing a target is irreversibie see What you should lrnow about targets" on page 30 Editing target data To edit target data: Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 37
Page 48 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - Deleting a target Step Action 1 Select a target and click Edit: its data appears. 2 Edit data and click Save. Deleting a target To delete a target: Step Action 1 Select a target and click Delete. 2 Confirm the action by clicking OK: target data, its agents and all evidence is deleted from databases. CAUTION: deieting or target is irreversibie and data iinked to that target be iost. Operation page data Selected target data is described below: Date Description Name Target name. Description User's description status Defines the target's status: 6 Open. If the Technician correctlv installs agents, RCS receives the collected evidence. 6} Closed, it can no longer be opened. Administrator's Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 38
RC5 9 - Deleting a target Step Action 1 Select a target and click Edit: its data appears. 2 Edit data and click Save. Deleting a target To delete a target: Step Action 1 Select a target and click Delete. 2 Confirm the action by clicking OK: target data, its agents and all evidence is deleted from databases. CAUTION: deieting or target is irreversibie and data iinked to that target be iost. Operation page data Selected target data is described below: Date Description Name Target name. Description User's description status Defines the target's status: 6 Open. If the Technician correctlv installs agents, RCS receives the collected evidence. 6} Closed, it can no longer be opened. Administrator's Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 38
Page 49 from Hacking Team RCS 9 Administrator’s Guide
Monitoring users resentatio Introduction Monitoring RC5 users guarantees correct investigations and the observance of rules and indications issued bv anv authoritv that requested the investigations. Content This section includes the following topics: What you should know about user monitoring {Audit} User monitoring {Audit} _.41 Usermonitoring data{Audit] administratorsGuide ver.1.4 - RES 9 - 2013ng HT S.r.l. - peg. 39
Monitoring users resentatio Introduction Monitoring RC5 users guarantees correct investigations and the observance of rules and indications issued bv anv authoritv that requested the investigations. Content This section includes the following topics: What you should know about user monitoring {Audit} User monitoring {Audit} _.41 Usermonitoring data{Audit] administratorsGuide ver.1.4 - RES 9 - 2013ng HT S.r.l. - peg. 39
Page 50 from Hacking Team RCS 9 Administrator’s Guide
RC3 9 - What you should know about user monitoring [Audit] What you should know about user monitoring (Audit) What is user monitoring The Audit is a list of actions taken by all Administrator, Technician and Analyst users in RC5. Its purpose is to guarantee correct investigations and the observance of rules and indications issued by any authority that requested the investigations. This way, the Administrator can monitor system access by enabled users and trace special actions over time such as, for example, target creation. How signaled actions are read The Audit records all actions run on the system by each single user in a table. Four pieces of information are always included in each action: action date-time, 1- user that perform ed the action, . action type, description of the action The other ?elds are only populated according to the type of action. For example, if a user logs into the system, the Audit records the user's name in Actor and the "login" action type in Action. If a Technician creates agents, an action appears in the list for each agent with the name of the user, the "target.create" type of action, the operation name, target name and agent's name. NOTE: audit records are not localized and only available in English. Selecting specific actions using filters The function normally displays actions performed in the last 24 hours. The filter on the Date column is thus the onlyfilter that is always set by default but can be changed as needed. For this reason, the corresponding combo box is always selected. A ?lter can be set for all other columns to refine the search. If the combo box next to the heading is selected, the filter on that column is active. Each heading thus allows you to select which data should be displayed. Only the Description column lets you enter part of the text to be searched, for example, if "log" is entered, all actions whose descriptions contain the text "log" will be displayed. For example: "User logged in" "Log file created" Exportable data RC5 lets you export recorded actions for Administrators, Technicians and The ?le will be downloaded to the RC5 Download folder on the desktop. Administrator's Guide ver.1.4 SE P-2013 RC5 9 2013 - pag. 40
RC3 9 - What you should know about user monitoring [Audit] What you should know about user monitoring (Audit) What is user monitoring The Audit is a list of actions taken by all Administrator, Technician and Analyst users in RC5. Its purpose is to guarantee correct investigations and the observance of rules and indications issued by any authority that requested the investigations. This way, the Administrator can monitor system access by enabled users and trace special actions over time such as, for example, target creation. How signaled actions are read The Audit records all actions run on the system by each single user in a table. Four pieces of information are always included in each action: action date-time, 1- user that perform ed the action, . action type, description of the action The other ?elds are only populated according to the type of action. For example, if a user logs into the system, the Audit records the user's name in Actor and the "login" action type in Action. If a Technician creates agents, an action appears in the list for each agent with the name of the user, the "target.create" type of action, the operation name, target name and agent's name. NOTE: audit records are not localized and only available in English. Selecting specific actions using filters The function normally displays actions performed in the last 24 hours. The filter on the Date column is thus the onlyfilter that is always set by default but can be changed as needed. For this reason, the corresponding combo box is always selected. A ?lter can be set for all other columns to refine the search. If the combo box next to the heading is selected, the filter on that column is active. Each heading thus allows you to select which data should be displayed. Only the Description column lets you enter part of the text to be searched, for example, if "log" is entered, all actions whose descriptions contain the text "log" will be displayed. For example: "User logged in" "Log file created" Exportable data RC5 lets you export recorded actions for Administrators, Technicians and The ?le will be downloaded to the RC5 Download folder on the desktop. Administrator's Guide ver.1.4 SE P-2013 RC5 9 2013 - pag. 40
Page 51 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - User monitoring [Audit] User monitoring (Audit) To monitor users: an Audit section Purpose This function lets you monitor Administrator, Technician and Analyst actions in RC5. For exam pl e, you can monitor correct operation progress, target actiyationldeactiyation schedules and the Technician's correct application of the types of agents authorized for a speci?c operation. What you can do You can select only the actions run in a certain period and apply filters to search, for example, for detailed information on specific operations or users. In the event of need, actions can always be exported in CSV form at files. IMPORTANT: if the page is kept open, it must be refreshed to 1ri'iew the most recent actions. See "Homepage description" on page 10 NOTE: the function is only enabled if the user has System auditing authorization. What the function looks like This is what the page looks like: '1 icamcol?'?tom' 1.- :o'at an: .'Luollt .'r'Ofll: Eh Funu'u: Emu. mu- l_ mu hula: IU uw: cam U?llul ML 2'3'2'35'32'3'9"? :Zl'l'war-r f?n' sci-:cm-a-a-c- U: '5 :lu pun"301' lil a; 5 Administrator's Guide 1tier.1.dfl SE P-2013 RC3 9 2013 - pag. 41
RC5 9 - User monitoring [Audit] User monitoring (Audit) To monitor users: an Audit section Purpose This function lets you monitor Administrator, Technician and Analyst actions in RC5. For exam pl e, you can monitor correct operation progress, target actiyationldeactiyation schedules and the Technician's correct application of the types of agents authorized for a speci?c operation. What you can do You can select only the actions run in a certain period and apply filters to search, for example, for detailed information on specific operations or users. In the event of need, actions can always be exported in CSV form at files. IMPORTANT: if the page is kept open, it must be refreshed to 1ri'iew the most recent actions. See "Homepage description" on page 10 NOTE: the function is only enabled if the user has System auditing authorization. What the function looks like This is what the page looks like: '1 icamcol?'?tom' 1.- :o'at an: .'Luollt .'r'Ofll: Eh Funu'u: Emu. mu- l_ mu hula: IU uw: cam U?llul ML 2'3'2'35'32'3'9"? :Zl'l'war-r f?n' sci-:cm-a-a-c- U: '5 :lu pun"301' lil a; 5 Administrator's Guide 1tier.1.dfl SE P-2013 RC3 9 2013 - pag. 41
Page 52 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 -To learn more Area Description 1 RC5 menu. 2 Window toolbar. Descriptions are provided below: icon Description Export displayed actions to a CSV format file (can be imported in Excel). ?g Rem are all filters applied to table data. 3 List of actions run by RCS users. 4 RC5 status bar. To learn more For interface element descriptions See "Shared interface eiements and actions" on page 12 . For a description of the data in this window see "User monitoring data (Audit}" For more information on the audit see "What you shouid know about user monitoring (.4 uait)" on page 40 . Selecting actions in a time range To only View actions in a certain time range: Step Action 1 Click on the Date column heading. 2 Click on the required time range. NOTE: the date filter is always on, set on actions in the last 24 hours. Only the criteria can be changed. Selecting actions based on proposed data To increase result accuracy: Administrator's Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 42
RC5 9 -To learn more Area Description 1 RC5 menu. 2 Window toolbar. Descriptions are provided below: icon Description Export displayed actions to a CSV format file (can be imported in Excel). ?g Rem are all filters applied to table data. 3 List of actions run by RCS users. 4 RC5 status bar. To learn more For interface element descriptions See "Shared interface eiements and actions" on page 12 . For a description of the data in this window see "User monitoring data (Audit}" For more information on the audit see "What you shouid know about user monitoring (.4 uait)" on page 40 . Selecting actions in a time range To only View actions in a certain time range: Step Action 1 Click on the Date column heading. 2 Click on the required time range. NOTE: the date filter is always on, set on actions in the last 24 hours. Only the criteria can be changed. Selecting actions based on proposed data To increase result accuracy: Administrator's Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 42
Page 53 from Hacking Team RCS 9 Administrator’s Guide
RC3 9 - Removing one or more ?lters Step Action 1 Click on one or more column headings: a search ?eld appears where you can enter data. 2 Enter the word to be searched and press Enter. Information in the column will be filtered and ordered according to the entered search word. Removing one or more filters To remove a filter and display all data: if you wont to a single ?lter unselect the combo box in the column heading. all filters simultaneously 5 le NDTE: the date filter is always on, set on actions in the last 24 hours. Only the time criteria can be changed. Exporting displayed actions To export displayed actions: Step Action 1 Click Export: data entry fields appear. 2 Enter the name of the file to be exported and click OK a progress bar indicates operation progress. To check progress, click on the bar. User monitoring data (Audit) Audit table columns are described below: Column Description Date Action date-time. Actor Name of the logged in user that caused the action. Action Type of action run by the logged in user. The action is displayed as individual. action. For example "user.update" means that a user was updated. This makes selecting the same types of actions easier. Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 43
RC3 9 - Removing one or more ?lters Step Action 1 Click on one or more column headings: a search ?eld appears where you can enter data. 2 Enter the word to be searched and press Enter. Information in the column will be filtered and ordered according to the entered search word. Removing one or more filters To remove a filter and display all data: if you wont to a single ?lter unselect the combo box in the column heading. all filters simultaneously 5 le NDTE: the date filter is always on, set on actions in the last 24 hours. Only the time criteria can be changed. Exporting displayed actions To export displayed actions: Step Action 1 Click Export: data entry fields appear. 2 Enter the name of the file to be exported and click OK a progress bar indicates operation progress. To check progress, click on the bar. User monitoring data (Audit) Audit table columns are described below: Column Description Date Action date-time. Actor Name of the logged in user that caused the action. Action Type of action run by the logged in user. The action is displayed as individual. action. For example "user.update" means that a user was updated. This makes selecting the same types of actions easier. Administrator's Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 43
Page 54 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - User monitoring data [Audit] Column Description User User concerned by the action, for example, created by an Administrator. It should not be confused with the name in Actor which is the user who caused the action. Group Group concerned by the action, for example, the group linked to an operation. Operation Operation concerned by the action, for example, the operation closed by an Administrator. Target Target concerned by the action, for example, the target closed by an Administrator. Agent Agent concerned by the action, for example, agent created by a Technician. Description Brief description of the action. NOTE: all actions are displa?fEd in EngliSh' Administrator's Guide SE P-2013 RC3 9 2013 - pag. 44
RC5 9 - User monitoring data [Audit] Column Description User User concerned by the action, for example, created by an Administrator. It should not be confused with the name in Actor which is the user who caused the action. Group Group concerned by the action, for example, the group linked to an operation. Operation Operation concerned by the action, for example, the operation closed by an Administrator. Target Target concerned by the action, for example, the target closed by an Administrator. Agent Agent concerned by the action, for example, agent created by a Technician. Description Brief description of the action. NOTE: all actions are displa?fEd in EngliSh' Administrator's Guide SE P-2013 RC3 9 2013 - pag. 44
Page 55 from Hacking Team RCS 9 Administrator’s Guide
System monitoring resentatio Introduction System monitoring guarantees constant control of component status and license usage. Content This section includes the following topics: System monitoring {Monitor} _.45 System monitoring datalMonitor] administratorsGuide uer.1.4 - RES 9 - 201MB HT S.r.l. - pag. 45
System monitoring resentatio Introduction System monitoring guarantees constant control of component status and license usage. Content This section includes the following topics: System monitoring {Monitor} _.45 System monitoring datalMonitor] administratorsGuide uer.1.4 - RES 9 - 201MB HT S.r.l. - pag. 45
Page 56 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - System monitoring [Monitor] System monitoring (Monitor) To 111 onitor the system: - Monitor section Purpose This function lets you: a monitor system status in both hardware and software terms a monitor license used compared to those purchased 0 define the alerting group and alert e-mail addressee in the eyent of system alarms Service caii: Contact your HackingTeam Account Manager if additionai iicenses are . required. What the function looks like This is what the page looks like: rm 03D run an mu.? w-wn H110 w? Imam a El . Eu?ru-u-I. Jain: an: 1.3..- Hm u rue I :wwt mm 1.1- mman: I'9.3Lumrm bpr- a l' Ics - - IkmL-u-chm 4.41 um. q- onu- ulnum .- '3 I. WW w- El Area Description 1 RC5 menu. Monitor indicates the current number of system alarms triggered. Administrator's Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 46
RC5 9 - System monitoring [Monitor] System monitoring (Monitor) To 111 onitor the system: - Monitor section Purpose This function lets you: a monitor system status in both hardware and software terms a monitor license used compared to those purchased 0 define the alerting group and alert e-mail addressee in the eyent of system alarms Service caii: Contact your HackingTeam Account Manager if additionai iicenses are . required. What the function looks like This is what the page looks like: rm 03D run an mu.? w-wn H110 w? Imam a El . Eu?ru-u-I. Jain: an: 1.3..- Hm u rue I :wwt mm 1.1- mman: I'9.3Lumrm bpr- a l' Ics - - IkmL-u-chm 4.41 um. q- onu- ulnum .- '3 I. WW w- El Area Description 1 RC5 menu. Monitor indicates the current number of system alarms triggered. Administrator's Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 46
Page 57 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 -To learn more Area Description 2 Window toolbar. Descriptions are provided below: icon Description De?nes the alerting group. 5 NOTE: the function is only enabled if the user has User and group management authorization. (p Loads a new license file. NOTE: the function is only enabled if the user has License modi?cation authorization. 3 List of RCS components and their status: 0 Alarm (generates an e-m ail sent to the alerting group) . . Component running 4 License status. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 12 . For a description of the data in this window see "System monitoring data (Monitor)? on next page Define the alerting group or temporarilyr enablep'disable it To select the alerting group: Step Ac tion 1 Click Set System Alert. Administrator's Guide SE P-2013 RC8 9 2013 - pag. 4?
RC5 9 -To learn more Area Description 2 Window toolbar. Descriptions are provided below: icon Description De?nes the alerting group. 5 NOTE: the function is only enabled if the user has User and group management authorization. (p Loads a new license file. NOTE: the function is only enabled if the user has License modi?cation authorization. 3 List of RCS components and their status: 0 Alarm (generates an e-m ail sent to the alerting group) . . Component running 4 License status. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 12 . For a description of the data in this window see "System monitoring data (Monitor)? on next page Define the alerting group or temporarilyr enablep'disable it To select the alerting group: Step Ac tion 1 Click Set System Alert. Administrator's Guide SE P-2013 RC8 9 2013 - pag. 4?
Page 58 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - System monitoring data [Monitor] Step Action 2 0 To turn off e-m ail noti?cations, select None . 0i" 0 To turn on group e-mail notifications, select Select a group to be alerted Via email and the alerting group from the drop down menu. Each time a system alarm is triggered, the selected group will receive an e-mail with its descrip- tion. 3 Click 53%. Tip: to more simply and quickly group and manage users intended to receive RCS alarms, create an "alerting" group without linking it to an operation but containing all the users to be alerted in the event of alarm.$ee ?User management" on page 20 System monitoring data (Monitor) System component monitoring data System monitoring data is described below: Doro Description Type Monitored component type and name: Name Network Controller 1" Anonymizer I- Database "Hr Collector Address Component's IP address. Last mm Last date-tim e. tact Administrator's Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 48
RC5 9 - System monitoring data [Monitor] Step Action 2 0 To turn off e-m ail noti?cations, select None . 0i" 0 To turn on group e-mail notifications, select Select a group to be alerted Via email and the alerting group from the drop down menu. Each time a system alarm is triggered, the selected group will receive an e-mail with its descrip- tion. 3 Click 53%. Tip: to more simply and quickly group and manage users intended to receive RCS alarms, create an "alerting" group without linking it to an operation but containing all the users to be alerted in the event of alarm.$ee ?User management" on page 20 System monitoring data (Monitor) System component monitoring data System monitoring data is described below: Doro Description Type Monitored component type and name: Name Network Controller 1" Anonymizer I- Database "Hr Collector Address Component's IP address. Last mm Last date-tim e. tact Administrator's Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 48
Page 59 from Hacking Team RCS 9 Administrator’s Guide
RC5 9 - License monitoring data Data Description status Component status at last 0 Alarm: the component is not running, contact the alerting group for immediate seryice. Warning: the component signals a risky situation, contact the system administrator for necessary checks. Component running. CPU 91?: CPU use by the single process. CPU 9f: CPU use by seryer. Total Disk Free 94?: free disk space. License monitoring data License monitoring data is described below: For restricted licenses, the format is "xly" where is the amount of licenses currently used by the system and the maximum amount of licenses. if all the licenses are in use, any new agents will be put in queue until a license ls freed or new ones purchased. Data Description License type Users Agents Desktop Mobile Distributed seryer Collectors Type of license currently in use for agents. reusable: an agent's license can be reused after it is uninstalled. oneshot: an agent's license is only yalid for one installation. NOTE: the license can only be updated if the user has License modification authorization. Amount of users currently used by the system and maximum admitted quantity. Amount of agents currently used by the system and maximum admitted quantity. Amount of desktop and mobile agents currently used by the system and maximum admitted quantities respectiyely. Amount of database currently used by the system and maximum admitted quantity. Amount of Collectors currently used by the system and maximum admitted quantity. Administrator's Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 49
RC5 9 - License monitoring data Data Description status Component status at last 0 Alarm: the component is not running, contact the alerting group for immediate seryice. Warning: the component signals a risky situation, contact the system administrator for necessary checks. Component running. CPU 91?: CPU use by the single process. CPU 9f: CPU use by seryer. Total Disk Free 94?: free disk space. License monitoring data License monitoring data is described below: For restricted licenses, the format is "xly" where is the amount of licenses currently used by the system and the maximum amount of licenses. if all the licenses are in use, any new agents will be put in queue until a license ls freed or new ones purchased. Data Description License type Users Agents Desktop Mobile Distributed seryer Collectors Type of license currently in use for agents. reusable: an agent's license can be reused after it is uninstalled. oneshot: an agent's license is only yalid for one installation. NOTE: the license can only be updated if the user has License modification authorization. Amount of users currently used by the system and maximum admitted quantity. Amount of agents currently used by the system and maximum admitted quantity. Amount of desktop and mobile agents currently used by the system and maximum admitted quantities respectiyely. Amount of database currently used by the system and maximum admitted quantity. Amount of Collectors currently used by the system and maximum admitted quantity. Administrator's Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 49
Page 60 from Hacking Team RCS 9 Administrator’s Guide
RC8 9 - Lieenee menitoring data Data Description Ananvmizers Ameth ef Aneuymizers currently used by the system and maximum admitted qua ntity. administrator's Guide uer.1.4 23E P-ECI13 RC5 5-1 201333 -pag. 50
RC8 9 - Lieenee menitoring data Data Description Ananvmizers Ameth ef Aneuymizers currently used by the system and maximum admitted qua ntity. administrator's Guide uer.1.4 23E P-ECI13 RC5 5-1 201333 -pag. 50
Page 61 from Hacking Team RCS 9 Administrator’s Guide
]Hacki?gTeam[ HT 5.r.l. via della Moscova, 13 RES 9 Administrator's Guide 20121 Milano (M Administrator's Guide 1.4 SEP-2013 Italy COPYRIGHT 2013 tel.: 39 02 29 060 603 info@hackingteam.com fax:+ 39 02 63 113 946
]Hacki?gTeam[ HT 5.r.l. via della Moscova, 13 RES 9 Administrator's Guide 20121 Milano (M Administrator's Guide 1.4 SEP-2013 Italy COPYRIGHT 2013 tel.: 39 02 29 060 603 info@hackingteam.com fax:+ 39 02 63 113 946