MICROS e7 Credit Card Security Best Practices

Size: px
Start display at page:

Download "MICROS e7 Credit Card Security Best Practices"

Transcription

1 MICROS e7 Credit Card Security Best Practices General Information About This Document This document is intended to be used as a checklist for purging sensitive credit card data and protecting MICROS e7 system from potential security breeches. Following this checklist, along with proper installation of MICROS e7 Version 2.6 Patch 2 with the Universal Credit Card Driver installed, will ensure your system is secure. Page 1 of 16

2 General Information Warranties Although the best efforts are made to ensure that the information in this manual is complete and correct, MICROS Systems, Inc. makes no warranty of any kind with regard to this material, including but not limited to the implied warranties of marketability and fitness for a particular purpose. Information in this manual is subject to change without notice. No part of this manual may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or information recording and retrieval systems, for any purpose other than for personal use, without the express written permission of MICROS Systems, Inc. MICROS Systems, Inc. shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual. Trademarks Framemaker is a registered trademark of Adobe Corporation. Microsoft and Windows are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are the property of their respective owners. Printing History New editions of this manual incorporate additions and changes to the material since the previous release. Edition Month Year 1 st September 2007 Page 2 of 16

3 Table of Contents Table of Contents Security Checklist Clear Virtual Memory on Shutdown Ensure the Site has a Firewall in Place Upgrade to MICROS e7 Version 2.6 Patch 2 and Configure the Universal Credit Card Driver Wipe all Old Copies of the Database and Database Logs from the System Make a Backup of the Current Database Secure Your Remote Access Software (i.e. PCAnyhwere) Change PC Logins and Passwords for all User to Something Complex Read and Follow all PCI Guidelines Provided in the MICROS e7 Payment Application Best Practices Implementation Guide Ensure wireless network is configured securely Antivirus Software Should be Installed and Kept Up To Date Page 3 of 16

4 Security Checklist 1. Clear Virtual Memory on Shutdown Virtual memory is used by the Windows operating system to optimize the use of RAM and disk memory. It is possible for MICROS e7 data to get written to virtual memory by the operating system in the normal course of swapping data between RAM and virtual memory. The only way to clear the virtual memory is during the boot process. It is important to clear virtual memory whenever a MICROS e7 server is rebooted. A scheduled reboot of the server is also recommended as a means of clearing the virtual memory. Steps to set up clearing virtual memory on shutdown 1. Click Start. 2. Click Microsoft Control Panel. 3. Click Administrative Tools. 4. Click Local Security Policy. 5. Expand the local policies by clicking the Double click on the Clear Virtual Memory Page File When System Shuts Down. 7. Select Enable. 2. Ensure the Site has a Firewall in Place A firewall is a piece of hardware or software which acts as a barrier between the local network and the internet. 1. A properly configured firewall is required for each site using a persistent connection to the Public Internet or any private internal network where there is a potential for unauthorized access to the MICROS Network. 2. MICROS recommends a Hardware Firewall in addition to the Windows firewall. 3. Firewalls can be configured to allow or limit the flow of data between the MICROS e7 network and the public internet. Page 4 of 16

5 4. If the MICROS e7 system has access to the internet, do not install credit card processing if the site does not have a properly configured firewall in place. 5. MICROS does not recommend a specific vendor s firewall be installed. Work with the customers network administrator to setup something that works with their configuration. MICROS does sell a firewall that can be used for MICROS e7 sites. For information on the hardware firewall that MICROS offers refer to PMA Windows XP Pro, and 2003 have a built in software firewall that should be enabled when running a MICROS e7. The firewall should be enabled before installing the MICROS e7 software. 3. Upgrade to MICROS e7 Version 2.6 Patch 2 and Configure the Universal Credit Card Driver 1. Refer to the MICROS e7 Version 2.6 Patch 2 ReadMe First, MD for steps on upgrading your system. This process will upgrade your database automatically. 2. The Universal Credit Card Driver is part of the MICROS e7 installation. If the Universal Credit Card Driver is already configured go to the next section. If not follow steps 3-7 below. 3. Select Add Record to add a record. 4. Open System tab and configure the following fields: Number After the record is added, the next available number is automatically assigned. This number may be changed, if desired. Name Enter a name for this driver (e.g. UCCD). Driver Code Select the type of driver from the drop down menu. For the Universal Credit Card Driver select UCCD. This selection will cause several more fields to appear. Node Enter the hosting node for this driver. This should match the node used to batch credit cards on the Configurator Restaurant Credit Cards form. If the communication mechanism is dial-up (or you are configured for fallback), then this should be the node that has the modem attached. Page 5 of 16

6 Device ID Specify the modem to use for authorization requests. Each modem has a 1-digit number associated with it. Select 0 if no device is used. To determine to number to be entered, perform the Show Devices diagnostic using the e7 credit card utilities. For example, the following sample message might display: Device [1]: Boca 28.8 Kbps V.34 MV.34E Device [2]: Standard 1200 bps Modem Device [3]: Standard 2400 bps Modem Select the appropriate device number. Note On a PC, the modem must be configured in the Control Panel before it an be assigned as an authorization device. Suppress Modem Initialization Instructs the driver not to alter the default modem initialization string in the Windows CE registry. Leave this field as zero unless instructed otherwise by MICROS support. Not Used Leave this field as zero. Communications Channel Specifies the type of interface connection used between the merchant and the credit card processor. The options are: 0: Dial-up 1: TCP/IP (not supported) 2: Internet Page 6 of 16

7 Custom Mode Determines when and how the credit card driver will translate the data in order to communicate, or set required specifications for a specific processor. The options are: 0: No changes (default) 1: UK Mode (not yet supported) 2: Kincaid Mode (only applicable with a TCP/IP connection not supported) 3: Fifth Third bank (only application with a TCP/IP connection not supported) Enabled 12-Digit Amount Determines whether the credit card processor can accept an amount up to 12-digits long (excluding the separator). The options are: 0: Off (not allowed) 1: On (allowed) Disable Auth Code Limit Determines whether or not the credit card driver will accept a manually entered authorization code that is longer than 6 digits. The options are: 0: Aborts a batch settlement if the batch file contains a detail record with an authorization code longer than 6 digits. 1: Accepts files for batch settlement that contain oversized authorization codes in detail records. When an oversized auth code is found, the number is truncated to the first six digits before continuing. Enable Card-Level Results Card-level results are enabled by turning on this option. The card level results field is a 2 character field sent by the issuer as part of the authorization response and returned as part of the settlement detail record. Enter one of the following options. 0. Option is disabled. This value is selected by default. 1. Option is enabled. Page 7 of 16

8 Enable POS Data Code Use this field to enable the POS Data Code. This field defaults to 0. The POS Data Code is a fixed 12 character string of data in the authorization message which indicates the condition of the POS Device and transaction at the time of the authorization. Examples of these characteristics are: Swipe or Manual entry; card present or not; print and display capabilities; etc. The POS Data Code string will also be sent as part of the Settlement Detail. Enter one of the following values: 0. Option is disabled. This value is selected by default. 1. Option is enabled. Phone Number Enter the telephone number used for authorizations and settlement. This information is provided by the credit card processor. Consider the following when entering this field: Do not include hyphens Include any necessary long distance access code and area code (e.g ). Include any dialing prefix necessary to get an outside line (e.g ). Backup Phone Number Enter the backup telephone number used for authorizations and settlement (this field is optional). If the system attempts to perform an authorization but cannot gain a connection (e.g. the line is busy) the backup number will be used. This information is provided by the credit card processor. Consider the following when entering this field: Do not include hyphens Include any necessary long distance access code and area code (e.g ). Include any dialing prefix necessary to get an outside line (e.g ). Host IP Address:Port The IP address and port of the primary host connection. This field is only available if TCP/IP is enabled. Page 8 of 16

9 Backup IP Address:Port The IP address and port of the backup host connection. Backup connections are used when the system cannot establish communication via the primary host address. This field is only available if TCP/IP is enabled. Internet Host Header Enter the HTTP host header to be included in every outgoing authorization request. Up to 25 characters is allowed. Internet Target Name Enter the HTTP target name to be included in every outgoing authorization request. Up to 25 characters is allowed. City (Zip) Code Enter the number assigned by the credit card processor to further identify the merchant location within a country. In the USA, insert the 5 or 9 digit Zip code for the merchant location. Outside of the USA, a number will be assigned by the credit card processor. Time Zone A 3-digit number assigned by the credit card processor used to calculate the local time within the VisaNet Authorization System (e.g. Eastern Standard Time). Merchant State The 2-character state/province code assigned by the credit card processor to identify the merchant. The characters entered here must correspond to the state/province that prints on the voucher. Merchant City Enter the name of the city where the merchant is located. 5. Select the Merchant Authorization tab and complete the following fields: MLI Header Enabled Enter 0 if no MLI header will be used. Enter 1 to enable a Merchant Link Inc. (MLI) header for authorization. After enabling the MLI header, enter the 3 character code for authorization in MLI Header Data field. Industry Code Used to identify the type of industry for this merchant. Enter 0 if the merchant business is a restaurant. Enter 1 if the merchant business is a retail establishment. Page 9 of 16

10 Language Code Identifies the language in which authorization messages will be returned for display and/or printing. Select the language code from the following list: 0: English 1: Spanish 2: Portuguese 3: Irish 4: French 5: German 6: Italian Currency Code The 3-digit number assigned by the credit card processor to identify the type of currency used. The code for the US dollar is 840. Country Code The 3-digit number assigned by the credit card processor to identify the country in which the merchant is located. The code for the USA is 840. Acquirer BIN Number The 6-digit Bank Identification Number assigned by the credit card processor. Merchant ID Number The 12-digit number used to identify the merchant. This number is assigned by the credit card processor. Store Number Enter the 4-digit number used to identify the merchant store. This number is assigned by the credit card processor. Terminal Number Enter the 4-digit number used to identify a specific terminal within an establishment. This number is assigned by the credit card processor. Each terminal within the establishment must have a unique number. Merchant Category The 4-digit number used to identify the merchant type. This number is assigned by the credit card processor. Merchant Name Enter the name of the merchant (up to 25 characters). This name must correspond to the name that prints on the credit card voucher. Page 10 of 16

11 MLI Header Data This field is only active if the entry in the MLI Header Enabled field is 1. Enter the 3-character code assigned by ML as a header for authorizations. 6. Select the Merchant Settlement tab and complete the following fields: Append Optional Data Group Determines whether the expiration date and stripe data will be appended to the batch record detail. This option should be disabled when using the Fifth Third Bank Custom Mode. Any settlement records with the optional data appended will be rejected when using the Fifth Third Bank. The options are: 0: Disable the options 1: To append the data Agent Number Enter the 6-digit number that identifies the merchant. This number is assigned by the credit card processor. Chain Number Enter the 6-digit number that identifies the merchant chain. This number is assigned by the credit card processor. Merchant Location No The 5-digit number that provides additional information on the location of the merchant. This number is assigned by the credit card processor. Unless specified otherwise by the merchant s bank or processor, the default for this field should be From the Configurator Restaurant Credit Cards form, choose either a PC or workstation from the Batch credit cards on field to specify the node to batch credit cards. Note This node should be the same as the node hosting UCCD. 7. Save the record. Page 11 of 16

12 4. Wipe all Old Copies of the Database and Database Logs from System This includes all clients on the network. The recommended way to wipe these files is to use an industry standard removal utility such as ERASER ( Simply deleting the files is not sufficient. A hacker could use a variety of tools to recover data where a proper removal utility has not been used to wipe the old databases. Using the Windows delete function simply unlinks the filename from the data, leaving the data intact on the system. Wiping or removing the data will write over the data with garbage data, making the original file unrecoverable. 1. The current database files should not be wiped off the system. These files can be found at the following location: \MICROS\e7\db 2. For removal of files from the system MICROS recommends using a removal utility such as ERASURE ( It is important to find all instances of the db and logs. Search for *gz* and any other naming conventions you may use to archive your databases and logs. This utility may be used to delete any type of file. Any files stored on the system that contain customer data should be wiped from the system. If you are unsure that you have located all possible files, than a reinstallation to a completely blank hard drive is recommended. Page 12 of 16

13 5. Make a Backup of the Current Database 1. Go to the MICROS e7 Configurator and select the Functionality drop-down arrow on the top right-hand corner of the screen. 2. Select Backup the Database. The database backup file (backup.001.gz or backup.002.gz) will be stored at the following location: \Micors\e7\dbbackups 3. Make a copy of the backup database and place it in a secure location outside of the MICROS tree. 6. Secure your Remote Access Software (i.e. PCAnyhwere) Remote access software needs to be secured to prevent unauthorized access to the MICROS e7 system. Remote access to the MICROS e7 system should be limited to a select few who are trusted. Every trusted user should use a unique username and password which is maintained and managed by the site. Remote access sessions should be logged and audited. Please see your vendor s documentation for specifics. PCAnywhere documentation can be found at: ftp://ftp.symantec.com/public/english_us_canada/products/pcanywhere/ pcanywhere32/ver10.5/manuals/pca_105_admin.pdf 1. Please be sure that at a minimum the following areas are covered: Configure and limit access to users who have a unique name and password. Change the default ports for communications. Enable logging and auditing in the software. Page 13 of 16

14 7. Change PC Logins and Passwords for all Users to Something Complex PC users should have unique usernames and complex passwords which are rotated on a regular basis. The importance of using and maintaining a secure password scheme is twofold. First it greatly reduces the risk of un-authorized access to the MICROS e7 server. Second it facilitates proper auditing trails required for PCI. 1. Every user who has access to the system should have their own username and password 2. The passwords should be rotated on a regular basis. 3. The passwords should be complex. Use Caps, numbers, and special characters in the password for the most secure passwords The user account should have limited access to the system, only what is necessary to do their job 8. Read and Follow all PCI Guidelines Provided in MICROS e7 Payment Application Best Practices Implementation Guide The MICROS e7 Payment Application Best Practices Implementation Guide can Documentation can be found on the MICROS Customer Services Web site (MICROS Products e7 ) ###verify location. Page 14 of 16

15 9. Ensure wireless network is configured securely Unlike a wired network where a hacker would need physical access to the network to sniff packages, wireless networks broadcast packages over radio waves. If the wireless network is unsecured, anyone within range of the Access Point could intercept a package. Three areas of security need to be addressed in wireless network. First, the Access Point needs to be secured so only a trusted user can administer the Access Point. Second, only known machines should be allowed on the network. Third, all data on the network should be encrypted. 1. Change the Access Point password to be a complex password. The administrator of the Access Point should have a unique name and complex password. 2. Only known machines should be allowed on the network. Limit by MAC address and IP address whenever possible. Do not broadcast the SSID of the access point. 3. Use the strongest encryption available. At a minimum use 128 bit WEP for data encryption. This should be used wherever WPA is not available. WPA should be used on all sites where WPA is available. Some older hardware does not support WPA. 4. Consult your hardware vendor s documentation on how to configure your hardware. Page 15 of 16

16 10. Antivirus Software Should be Installed and Kept Up To Date Current Antivirus software will protect your system from Malware. Malware is software written and deployed with the intent of causing harm to your system. Malware can take several forms. Some Malware is intended to corrupt or destroy data on your system. A second form is used to allow unauthorized use of your system. A third form is to steal information. Antivirus software, when properly deployed, will protect and rid your system of Malware. 1. All MICROS e7 systems should have antivirus software installed, such as Norton Antivirus. Page 16 of 16

MICROS e7 Version 2.7 Patch 1 Upgrade Best Practices

MICROS e7 Version 2.7 Patch 1 Upgrade Best Practices MICROS e7 Version 2.7 Patch 1 Upgrade Best Practices General Information About this Document This document is intended to convey best practice information when upgrading the MICROS e7 application from

More information

Virtual Net Credit Card Driver for 3700 POS Version 4.12

Virtual Net Credit Card Driver for 3700 POS Version 4.12 Restaurant Enterprise Series Virtual Net Credit Card Driver for 3700 POS Version 4.12 August 27, 2012 Copyright 2012 by MICROS Systems, Inc. Columbia, MD USA All Rights Reserved MD0003-092 Declarations

More information

General Information. About This Document. MD0003-122 RES PCI Data Standard November 14, 2007 Page 1 of 19

General Information. About This Document. MD0003-122 RES PCI Data Standard November 14, 2007 Page 1 of 19 RES Version 3.2 Service Pack 7 Hotfix 6 with Transaction Vault Electronic Payment Driver Version 4.3 or Higher Payment Application Best Practices Implementation Guide General Information About This Document

More information

TSYS Credit Card Driver for 3700 POS

TSYS Credit Card Driver for 3700 POS Restaurant Enterprise Series TSYS Credit Card Driver for 3700 POS Version 4.14 June 24, 2013 Copyright 2013 by MICROS Systems, Inc. Columbia, MD USA All Rights Reserved Declarations Warranties Although

More information

Transaction Vault Credit Card Driver for 3700 POS

Transaction Vault Credit Card Driver for 3700 POS Restaurant Enterprise Series Transaction Vault Credit Card Driver for 3700 POS April 3, 2013 *******************Important******************* When upgrading the Transaction Vault Credit Card Driver from

More information

Transaction Vault Debit Card Driver for 3700 POS Version 4.13

Transaction Vault Debit Card Driver for 3700 POS Version 4.13 Restaurant Enterprise Series Transaction Vault Debit Card Driver for 3700 POS Version 4.13 January 4, 2013 Copyright 2007-2013 by MICROS Systems, Inc. Columbia, MD USA All Rights Reserved MD0003-118 Declarations

More information

NETePay 5.0. FDMS Nashville. Installation & Configuration Guide. Part Number: 8660.54

NETePay 5.0. FDMS Nashville. Installation & Configuration Guide. Part Number: 8660.54 NETePay 5.0 Installation & Configuration Guide FDMS Nashville Part Number: 8660.54 NETePay Installation & Configuration Guide Copyright 2011 Datacap Systems Inc. All rights reserved. This manual and the

More information

Remote Deposit Terms of Use and Procedures

Remote Deposit Terms of Use and Procedures Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring Enterasys Wireless Access Point 3000 (RBT3K-AG) to Support Avaya IP Office, Avaya IP Wireless Telephones and Avaya Phone Manager

More information

Wireless Client Configuration Guide. for third-party wireless Ethernet adapters

Wireless Client Configuration Guide. for third-party wireless Ethernet adapters Wireless Client Configuration Guide for third-party wireless Ethernet adapters Notice to Users 2002 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated,

More information

Monetra Payment Software

Monetra Payment Software Monetra Payment Software Fast Start: Installation and Configuration Guide Revision: 3.0 Publication date October, 2013 Copyright 2013 Main Street Softworks, Inc. Fast Start: Installation and Configuration

More information

SecureW2 Client for Windows User Guide. Version 3.1

SecureW2 Client for Windows User Guide. Version 3.1 SecureW2 Client for Windows User Guide Version 3.1 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

hp digital home networking wireless USB network adapter hn210w quick start guide

hp digital home networking wireless USB network adapter hn210w quick start guide hp digital home networking wireless USB network adapter hn210w quick start guide Revision #: 15 Page: 1 of 11 Printed: 08/15/01 04:44 PM The Hewlett-Packard Company makes no warranty of any kind with regard

More information

Network Installation Guide. Artisan 810 Series

Network Installation Guide. Artisan 810 Series Network Installation Guide Artisan 810 Series Before You Begin Make sure you installed ink cartridges and loaded paper as described on the Start Here sheet. Then follow the instructions in this guide to

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing for Sage MAS 90 and 200 ERP Credit Card Processing Version 4.30.0.18 and 4.40.0.1 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks

More information

CS WinOMS Practice Management Software Server Migration Help Guide

CS WinOMS Practice Management Software Server Migration Help Guide CS WinOMS Practice Management Software Server Migration Help Guide Checklist Prior to Beginning a Server Migration: A. The CS WinOMS install disk. Install files can be downloaded to server via FTP, contact

More information

Implementation Guide

Implementation Guide Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein

More information

Configuring Keystroke with KeyPay

Configuring Keystroke with KeyPay Configuring Keystroke with KeyPay Please read the PA-DSS Implementation Guide for Keystroke POS from our website before proceeding. It is also installed in the \KEYSTROK\DOC subdirectory on your computer.

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Verizon Remote Access User Guide

Verizon Remote Access User Guide Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks

More information

Please note that in VISA s vernacular this security program for merchants is sometimes called CISP (cardholder information security program).

Please note that in VISA s vernacular this security program for merchants is sometimes called CISP (cardholder information security program). Introduction This document serves as a guide for TCS Retail users who are credit card merchants. It is written to help them become compliant with the PCI (payment card industry) security requirements.

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Installation and Setup Guide

Installation and Setup Guide Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.

More information

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer i-stat TECHNICAL BULLETIN Configuring Wireless Settings in an i-stat 1 Wireless Analyzer Before configuring wireless settings, please enable the wireless functionality by referring to the Technical Bulletin

More information

4cast Server Specification and Installation

4cast Server Specification and Installation 4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Reporting for Contact Center Setup and Operations Guide. BCM Contact Center

Reporting for Contact Center Setup and Operations Guide. BCM Contact Center Reporting for Contact Center Setup and Operations Guide BCM Contact Center Document Number: NN40040-302 Document Status: Standard Document Version: 04.00 Part Code: N0060637 Date: June 2006 Copyright 2005

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

AMS Suite: Machinery Health Manager

AMS Suite: Machinery Health Manager AMS Suite: Machinery Health Manager Version 5.61 Software Installation Guide User Guide MHM-97402, Rev 23 November 2014 Copyright 2014 by Emerson Process Management. All rights reserved. No part of this

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Windows Peer-to-Peer Network Configuration Guide

Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication

More information

Broadband Router ESG-103. User s Guide

Broadband Router ESG-103. User s Guide Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits

More information

Iridium Extreme TM Satellite Phone. Data Services Manual

Iridium Extreme TM Satellite Phone. Data Services Manual Iridium Extreme TM Satellite Phone Data Services Manual Table of Contents 1 OVERVIEW... 1 2 HOW IT WORKS... 1 3 BEFORE INSTALLING... 2 4 USB DRIVER INSTALLATION... 3 5 MODEM INSTALLATION AND CONFIGURATION...

More information

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe

More information

Installation Guide Wireless 4-Port USB Sharing Station. GUWIP204 Part No. M1172-a

Installation Guide Wireless 4-Port USB Sharing Station. GUWIP204 Part No. M1172-a Installation Guide Wireless 4-Port USB Sharing Station 1 GUWIP204 Part No. M1172-a 2011 IOGEAR. All Rights Reserved. PKG-M1172-a IOGEAR, the IOGEAR logo, MiniView, VSE are trademarks or registered trademarks

More information

Configuration. Windows 98 and Me Configuration

Configuration. Windows 98 and Me Configuration Configuration Windows 98 and Me Configuration Installing the TCP/IP Protocol Windows 2000 Configuration Windows XP Configuration Wireless Configuration 128-Bit Encryption Wireless Security in Windows XP

More information

Network Installation Guide. WorkForce 610 Series Artisan 710 Series

Network Installation Guide. WorkForce 610 Series Artisan 710 Series Network Installation Guide WorkForce 610 Series Artisan 710 Series Contents Before You Begin.......................................... 3 Choose Your Connection Type................................ 4 Wireless.............................................

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Symantec Endpoint Encryption Device Control Release Notes

Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control 8.2.0 www.symantec.com About Symantec Endpoint Encryption Device Control Symantec Endpoint Encryption

More information

9700 3.x Security Guide

9700 3.x Security Guide 1Sim 9700 3.x Security Guide In This Document This document describes 9700 s security design, features that monitor actions that employees take on the System, and features that restrict employee access

More information

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Question How do I access the router s web-based setup page? Answer

Question How do I access the router s web-based setup page? Answer http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=3676 Question How do I access the router s web-based setup page? Answer All Linksys routers have a built-in web-based setup

More information

This guide provides all of the information necessary to connect to MoFo resources from outside of the office

This guide provides all of the information necessary to connect to MoFo resources from outside of the office REMOTE ACCESS GUIDE INTRODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office Links to topics in this document Connect remotely from your

More information

How To Run Eve 5 On A Pc Or Mac Or Ipad (For Pc Or Ipa) On A Network (For Mac) On Your Computer Or Ipro (For Ipro) On An Ipro Or Ipo (For Windows)

How To Run Eve 5 On A Pc Or Mac Or Ipad (For Pc Or Ipa) On A Network (For Mac) On Your Computer Or Ipro (For Ipro) On An Ipro Or Ipo (For Windows) EVE5 Hardware and Software Requirements EVE5 is a Client/Server program. i.e. there are 2 components to the program: 1/ The Server: this controls your database and will be installed on one computer only.

More information

Wireless Networking Best Practices Version 2.0

Wireless Networking Best Practices Version 2.0 Wireless Networking Best Practices Version 2.0 About This Document This document is meant to serve as a guide for implementing MICROS wireless Hardware following Payment Application Data Security Standards

More information

Preparing the Computers for TCP/IP Networking

Preparing the Computers for TCP/IP Networking Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or

More information

PCCharge can connect to LYNK via a dial-up modem connection, an ISDN connection, or a TCP/IP (Internet) connection.

PCCharge can connect to LYNK via a dial-up modem connection, an ISDN connection, or a TCP/IP (Internet) connection. RBS Lynk Systems, Inc. (LYNK) LYNK Notes LYNK accounts are terminal based. LYNK will provide you with a 12-digit Merchant Number. Use this as your Credit Card Company Number when setting up your account

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

LockView 4.3.1 CompX Database & Network Configuration & Installation Manual

LockView 4.3.1 CompX Database & Network Configuration & Installation Manual LockView 4.3.1 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements...

More information

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager 5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...

More information

Topaz Installation Sheet

Topaz Installation Sheet Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright

More information

Point of Sale 2015 Enterprise. Installation Guide

Point of Sale 2015 Enterprise. Installation Guide Point of Sale 2015 Enterprise Installation Guide Contents About this guide 3 System Requirements - Microsoft SQL Server 2008 R2 Express 3 System Requirements - POS Enterprise 2015 (Administrator) 3 System

More information

Soft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc. http://www.4sightfax.com/

Soft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc. http://www.4sightfax.com/ 4-Sight FAX 7.5 Getting Started Soft Solutions, Inc. http://www.4sightfax.com/ Introduction Thank you for your interest in 4-Sight FAX version 7.5. This guide documents the general configuration for using

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Installation & Upgrade Guide. Hand-Held Configuration Devices Mobility DHH820-DMS. Mobility DHH820-DMS Device Management System Software

Installation & Upgrade Guide. Hand-Held Configuration Devices Mobility DHH820-DMS. Mobility DHH820-DMS Device Management System Software Installation & Upgrade Guide Hand-Held Configuration Devices Mobility DHH820-DMS Mobility DHH820-DMS Device Management System Software WARNING notices as used in this manual apply to hazards or unsafe

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

LockView 4.2 CompX Database & Network Configuration & Installation Manual

LockView 4.2 CompX Database & Network Configuration & Installation Manual LockView 4.2 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements... 5

More information

Allworx OfficeSafe Operations Guide Release 6.0

Allworx OfficeSafe Operations Guide Release 6.0 Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

Lucas POS V4 for Windows

Lucas POS V4 for Windows Lucas POS V4 for Windows Version 4.02 Secure Implementation Guide Document Revision: 4 Lucas Systems provides this publication as is without warranty of any kind, either expressed or implied. This publication

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

QAD Enterprise Applications. Training Guide Demand Management 6.1 Technical Training

QAD Enterprise Applications. Training Guide Demand Management 6.1 Technical Training QAD Enterprise Applications Training Guide Demand Management 6.1 Technical Training 70-3248-6.1 QAD Enterprise Applications February 2012 This document contains proprietary information that is protected

More information

Imaging License Server User Guide

Imaging License Server User Guide IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Getting Started with IntelleView POS Administrator Software

Getting Started with IntelleView POS Administrator Software Getting Started with IntelleView POS Administrator Software Administrator s Guide for Software Version 1.2 About this Guide This administrator s guide explains how to start using your IntelleView POS (IntelleView)

More information

NCD ThinPATH Load Balancing Startup Guide

NCD ThinPATH Load Balancing Startup Guide NCD ThinPATH Load Balancing Startup Guide Copyright Copyright 1999 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network Computing

More information

Imaging Computing Server User Guide

Imaging Computing Server User Guide Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E cellularimaging@perkinelmer.com

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

Remote Management System

Remote Management System RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED

More information

Keeper Care System Data Manager Version 1.0

Keeper Care System Data Manager Version 1.0 Automated Inventory Solutions, Inc. User Manual Keeper Care System Data Manager Version 1.0 Automated Inventory Solutions Phone: (304)725-4801 Fax: (304)725-6983 www.aisvendors.com Email: support@aisvendors.com

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

Metasys System Direct Connection and Dial-Up Connection Application Note

Metasys System Direct Connection and Dial-Up Connection Application Note Metasys System Direct Connection and Dial-Up Connection Application Note Code No. LIT-1201639 Software Release 5.1 Issued August 27, 2013 Supersedes October 4 2010 Refer to the QuickLIT website for the

More information

Thor VM1. Quick Start Guide. Vehicle-Mount Computer. with Microsoft Windows Embedded CE 6 or Windows Embedded Standard 2009 Operating System

Thor VM1. Quick Start Guide. Vehicle-Mount Computer. with Microsoft Windows Embedded CE 6 or Windows Embedded Standard 2009 Operating System Thor VM1 Vehicle-Mount Computer with Microsoft Windows Embedded CE 6 or Windows Embedded Standard 2009 Operating System Quick Start Guide VM1-QS Rev A 4/12 Setting up the Thor VM1 Please have the following

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

WHITE PAPER. HP Guide to System Recovery and Restore

WHITE PAPER. HP Guide to System Recovery and Restore WHITE PAPER January 2003 Prepared By PSG Product Software Engineering Hewlett-Packard Company CONTENTS Purpose3 Using Safe Mode To Diagnose And Correct Problems 4 Using the Recovery Console To Repair Damaged

More information

Monitor Print Popup for Mac. Product Manual. www.monitorbm.com

Monitor Print Popup for Mac. Product Manual. www.monitorbm.com Monitor Print Popup for Mac Product Manual www.monitorbm.com Monitor Print Popup for Mac Product Manual Copyright 2013 Monitor Business Machines Ltd The software contains proprietary information of Monitor

More information

Configuring Your Network s Security

Configuring Your Network s Security Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible

More information

MX7 Tecton. Quick Start Guide. Hand-Held Computer. With Microsoft Windows Embedded CE 6 or Windows Mobile 6.5 Operating System. TECTON-QS Rev A 4/12

MX7 Tecton. Quick Start Guide. Hand-Held Computer. With Microsoft Windows Embedded CE 6 or Windows Mobile 6.5 Operating System. TECTON-QS Rev A 4/12 MX7 Tecton Hand-Held Computer With Microsoft Windows Embedded CE 6 or Windows Mobile 6.5 Operating System Quick Start Guide TECTON-QS Rev A 4/12 Setting up the MX7 Tecton Please have the following Information

More information

Payment Card Industry Self-Assessment Questionnaire

Payment Card Industry Self-Assessment Questionnaire How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.

More information

How To Protect Your Data From Being Stolen

How To Protect Your Data From Being Stolen DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS

More information

Hardware/Software Specifications for Self-Hosted Systems (Multi-Server)

Hardware/Software Specifications for Self-Hosted Systems (Multi-Server) Hardware/Software Specifications for Self-Hosted Systems (Multi-Server) EBIX, INC. 1 Ebix Way, Johns Creek, GA 30097 Rev. 07/2015 2015 Ebix, Inc. and its subsidiaries. All Rights Reserved. This software

More information

Chapter 3 Safeguarding Your Network

Chapter 3 Safeguarding Your Network Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate

More information

Congratulations on your HomePortal purchase. To install your HomePortal and configure your home network, follow these steps.

Congratulations on your HomePortal purchase. To install your HomePortal and configure your home network, follow these steps. Notice to Users 2003 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior written approval. 2WIRE PROVIDES

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information