MICROS e7 Credit Card Security Best Practices
|
|
- Sharyl Merritt
- 8 years ago
- Views:
Transcription
1 MICROS e7 Credit Card Security Best Practices General Information About This Document This document is intended to be used as a checklist for purging sensitive credit card data and protecting MICROS e7 system from potential security breeches. Following this checklist, along with proper installation of MICROS e7 Version 2.6 Patch 2 with the Universal Credit Card Driver installed, will ensure your system is secure. Page 1 of 16
2 General Information Warranties Although the best efforts are made to ensure that the information in this manual is complete and correct, MICROS Systems, Inc. makes no warranty of any kind with regard to this material, including but not limited to the implied warranties of marketability and fitness for a particular purpose. Information in this manual is subject to change without notice. No part of this manual may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or information recording and retrieval systems, for any purpose other than for personal use, without the express written permission of MICROS Systems, Inc. MICROS Systems, Inc. shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual. Trademarks Framemaker is a registered trademark of Adobe Corporation. Microsoft and Windows are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are the property of their respective owners. Printing History New editions of this manual incorporate additions and changes to the material since the previous release. Edition Month Year 1 st September 2007 Page 2 of 16
3 Table of Contents Table of Contents Security Checklist Clear Virtual Memory on Shutdown Ensure the Site has a Firewall in Place Upgrade to MICROS e7 Version 2.6 Patch 2 and Configure the Universal Credit Card Driver Wipe all Old Copies of the Database and Database Logs from the System Make a Backup of the Current Database Secure Your Remote Access Software (i.e. PCAnyhwere) Change PC Logins and Passwords for all User to Something Complex Read and Follow all PCI Guidelines Provided in the MICROS e7 Payment Application Best Practices Implementation Guide Ensure wireless network is configured securely Antivirus Software Should be Installed and Kept Up To Date Page 3 of 16
4 Security Checklist 1. Clear Virtual Memory on Shutdown Virtual memory is used by the Windows operating system to optimize the use of RAM and disk memory. It is possible for MICROS e7 data to get written to virtual memory by the operating system in the normal course of swapping data between RAM and virtual memory. The only way to clear the virtual memory is during the boot process. It is important to clear virtual memory whenever a MICROS e7 server is rebooted. A scheduled reboot of the server is also recommended as a means of clearing the virtual memory. Steps to set up clearing virtual memory on shutdown 1. Click Start. 2. Click Microsoft Control Panel. 3. Click Administrative Tools. 4. Click Local Security Policy. 5. Expand the local policies by clicking the Double click on the Clear Virtual Memory Page File When System Shuts Down. 7. Select Enable. 2. Ensure the Site has a Firewall in Place A firewall is a piece of hardware or software which acts as a barrier between the local network and the internet. 1. A properly configured firewall is required for each site using a persistent connection to the Public Internet or any private internal network where there is a potential for unauthorized access to the MICROS Network. 2. MICROS recommends a Hardware Firewall in addition to the Windows firewall. 3. Firewalls can be configured to allow or limit the flow of data between the MICROS e7 network and the public internet. Page 4 of 16
5 4. If the MICROS e7 system has access to the internet, do not install credit card processing if the site does not have a properly configured firewall in place. 5. MICROS does not recommend a specific vendor s firewall be installed. Work with the customers network administrator to setup something that works with their configuration. MICROS does sell a firewall that can be used for MICROS e7 sites. For information on the hardware firewall that MICROS offers refer to PMA Windows XP Pro, and 2003 have a built in software firewall that should be enabled when running a MICROS e7. The firewall should be enabled before installing the MICROS e7 software. 3. Upgrade to MICROS e7 Version 2.6 Patch 2 and Configure the Universal Credit Card Driver 1. Refer to the MICROS e7 Version 2.6 Patch 2 ReadMe First, MD for steps on upgrading your system. This process will upgrade your database automatically. 2. The Universal Credit Card Driver is part of the MICROS e7 installation. If the Universal Credit Card Driver is already configured go to the next section. If not follow steps 3-7 below. 3. Select Add Record to add a record. 4. Open System tab and configure the following fields: Number After the record is added, the next available number is automatically assigned. This number may be changed, if desired. Name Enter a name for this driver (e.g. UCCD). Driver Code Select the type of driver from the drop down menu. For the Universal Credit Card Driver select UCCD. This selection will cause several more fields to appear. Node Enter the hosting node for this driver. This should match the node used to batch credit cards on the Configurator Restaurant Credit Cards form. If the communication mechanism is dial-up (or you are configured for fallback), then this should be the node that has the modem attached. Page 5 of 16
6 Device ID Specify the modem to use for authorization requests. Each modem has a 1-digit number associated with it. Select 0 if no device is used. To determine to number to be entered, perform the Show Devices diagnostic using the e7 credit card utilities. For example, the following sample message might display: Device [1]: Boca 28.8 Kbps V.34 MV.34E Device [2]: Standard 1200 bps Modem Device [3]: Standard 2400 bps Modem Select the appropriate device number. Note On a PC, the modem must be configured in the Control Panel before it an be assigned as an authorization device. Suppress Modem Initialization Instructs the driver not to alter the default modem initialization string in the Windows CE registry. Leave this field as zero unless instructed otherwise by MICROS support. Not Used Leave this field as zero. Communications Channel Specifies the type of interface connection used between the merchant and the credit card processor. The options are: 0: Dial-up 1: TCP/IP (not supported) 2: Internet Page 6 of 16
7 Custom Mode Determines when and how the credit card driver will translate the data in order to communicate, or set required specifications for a specific processor. The options are: 0: No changes (default) 1: UK Mode (not yet supported) 2: Kincaid Mode (only applicable with a TCP/IP connection not supported) 3: Fifth Third bank (only application with a TCP/IP connection not supported) Enabled 12-Digit Amount Determines whether the credit card processor can accept an amount up to 12-digits long (excluding the separator). The options are: 0: Off (not allowed) 1: On (allowed) Disable Auth Code Limit Determines whether or not the credit card driver will accept a manually entered authorization code that is longer than 6 digits. The options are: 0: Aborts a batch settlement if the batch file contains a detail record with an authorization code longer than 6 digits. 1: Accepts files for batch settlement that contain oversized authorization codes in detail records. When an oversized auth code is found, the number is truncated to the first six digits before continuing. Enable Card-Level Results Card-level results are enabled by turning on this option. The card level results field is a 2 character field sent by the issuer as part of the authorization response and returned as part of the settlement detail record. Enter one of the following options. 0. Option is disabled. This value is selected by default. 1. Option is enabled. Page 7 of 16
8 Enable POS Data Code Use this field to enable the POS Data Code. This field defaults to 0. The POS Data Code is a fixed 12 character string of data in the authorization message which indicates the condition of the POS Device and transaction at the time of the authorization. Examples of these characteristics are: Swipe or Manual entry; card present or not; print and display capabilities; etc. The POS Data Code string will also be sent as part of the Settlement Detail. Enter one of the following values: 0. Option is disabled. This value is selected by default. 1. Option is enabled. Phone Number Enter the telephone number used for authorizations and settlement. This information is provided by the credit card processor. Consider the following when entering this field: Do not include hyphens Include any necessary long distance access code and area code (e.g ). Include any dialing prefix necessary to get an outside line (e.g ). Backup Phone Number Enter the backup telephone number used for authorizations and settlement (this field is optional). If the system attempts to perform an authorization but cannot gain a connection (e.g. the line is busy) the backup number will be used. This information is provided by the credit card processor. Consider the following when entering this field: Do not include hyphens Include any necessary long distance access code and area code (e.g ). Include any dialing prefix necessary to get an outside line (e.g ). Host IP Address:Port The IP address and port of the primary host connection. This field is only available if TCP/IP is enabled. Page 8 of 16
9 Backup IP Address:Port The IP address and port of the backup host connection. Backup connections are used when the system cannot establish communication via the primary host address. This field is only available if TCP/IP is enabled. Internet Host Header Enter the HTTP host header to be included in every outgoing authorization request. Up to 25 characters is allowed. Internet Target Name Enter the HTTP target name to be included in every outgoing authorization request. Up to 25 characters is allowed. City (Zip) Code Enter the number assigned by the credit card processor to further identify the merchant location within a country. In the USA, insert the 5 or 9 digit Zip code for the merchant location. Outside of the USA, a number will be assigned by the credit card processor. Time Zone A 3-digit number assigned by the credit card processor used to calculate the local time within the VisaNet Authorization System (e.g. Eastern Standard Time). Merchant State The 2-character state/province code assigned by the credit card processor to identify the merchant. The characters entered here must correspond to the state/province that prints on the voucher. Merchant City Enter the name of the city where the merchant is located. 5. Select the Merchant Authorization tab and complete the following fields: MLI Header Enabled Enter 0 if no MLI header will be used. Enter 1 to enable a Merchant Link Inc. (MLI) header for authorization. After enabling the MLI header, enter the 3 character code for authorization in MLI Header Data field. Industry Code Used to identify the type of industry for this merchant. Enter 0 if the merchant business is a restaurant. Enter 1 if the merchant business is a retail establishment. Page 9 of 16
10 Language Code Identifies the language in which authorization messages will be returned for display and/or printing. Select the language code from the following list: 0: English 1: Spanish 2: Portuguese 3: Irish 4: French 5: German 6: Italian Currency Code The 3-digit number assigned by the credit card processor to identify the type of currency used. The code for the US dollar is 840. Country Code The 3-digit number assigned by the credit card processor to identify the country in which the merchant is located. The code for the USA is 840. Acquirer BIN Number The 6-digit Bank Identification Number assigned by the credit card processor. Merchant ID Number The 12-digit number used to identify the merchant. This number is assigned by the credit card processor. Store Number Enter the 4-digit number used to identify the merchant store. This number is assigned by the credit card processor. Terminal Number Enter the 4-digit number used to identify a specific terminal within an establishment. This number is assigned by the credit card processor. Each terminal within the establishment must have a unique number. Merchant Category The 4-digit number used to identify the merchant type. This number is assigned by the credit card processor. Merchant Name Enter the name of the merchant (up to 25 characters). This name must correspond to the name that prints on the credit card voucher. Page 10 of 16
11 MLI Header Data This field is only active if the entry in the MLI Header Enabled field is 1. Enter the 3-character code assigned by ML as a header for authorizations. 6. Select the Merchant Settlement tab and complete the following fields: Append Optional Data Group Determines whether the expiration date and stripe data will be appended to the batch record detail. This option should be disabled when using the Fifth Third Bank Custom Mode. Any settlement records with the optional data appended will be rejected when using the Fifth Third Bank. The options are: 0: Disable the options 1: To append the data Agent Number Enter the 6-digit number that identifies the merchant. This number is assigned by the credit card processor. Chain Number Enter the 6-digit number that identifies the merchant chain. This number is assigned by the credit card processor. Merchant Location No The 5-digit number that provides additional information on the location of the merchant. This number is assigned by the credit card processor. Unless specified otherwise by the merchant s bank or processor, the default for this field should be From the Configurator Restaurant Credit Cards form, choose either a PC or workstation from the Batch credit cards on field to specify the node to batch credit cards. Note This node should be the same as the node hosting UCCD. 7. Save the record. Page 11 of 16
12 4. Wipe all Old Copies of the Database and Database Logs from System This includes all clients on the network. The recommended way to wipe these files is to use an industry standard removal utility such as ERASER ( Simply deleting the files is not sufficient. A hacker could use a variety of tools to recover data where a proper removal utility has not been used to wipe the old databases. Using the Windows delete function simply unlinks the filename from the data, leaving the data intact on the system. Wiping or removing the data will write over the data with garbage data, making the original file unrecoverable. 1. The current database files should not be wiped off the system. These files can be found at the following location: \MICROS\e7\db 2. For removal of files from the system MICROS recommends using a removal utility such as ERASURE ( It is important to find all instances of the db and logs. Search for *gz* and any other naming conventions you may use to archive your databases and logs. This utility may be used to delete any type of file. Any files stored on the system that contain customer data should be wiped from the system. If you are unsure that you have located all possible files, than a reinstallation to a completely blank hard drive is recommended. Page 12 of 16
13 5. Make a Backup of the Current Database 1. Go to the MICROS e7 Configurator and select the Functionality drop-down arrow on the top right-hand corner of the screen. 2. Select Backup the Database. The database backup file (backup.001.gz or backup.002.gz) will be stored at the following location: \Micors\e7\dbbackups 3. Make a copy of the backup database and place it in a secure location outside of the MICROS tree. 6. Secure your Remote Access Software (i.e. PCAnyhwere) Remote access software needs to be secured to prevent unauthorized access to the MICROS e7 system. Remote access to the MICROS e7 system should be limited to a select few who are trusted. Every trusted user should use a unique username and password which is maintained and managed by the site. Remote access sessions should be logged and audited. Please see your vendor s documentation for specifics. PCAnywhere documentation can be found at: ftp://ftp.symantec.com/public/english_us_canada/products/pcanywhere/ pcanywhere32/ver10.5/manuals/pca_105_admin.pdf 1. Please be sure that at a minimum the following areas are covered: Configure and limit access to users who have a unique name and password. Change the default ports for communications. Enable logging and auditing in the software. Page 13 of 16
14 7. Change PC Logins and Passwords for all Users to Something Complex PC users should have unique usernames and complex passwords which are rotated on a regular basis. The importance of using and maintaining a secure password scheme is twofold. First it greatly reduces the risk of un-authorized access to the MICROS e7 server. Second it facilitates proper auditing trails required for PCI. 1. Every user who has access to the system should have their own username and password 2. The passwords should be rotated on a regular basis. 3. The passwords should be complex. Use Caps, numbers, and special characters in the password for the most secure passwords The user account should have limited access to the system, only what is necessary to do their job 8. Read and Follow all PCI Guidelines Provided in MICROS e7 Payment Application Best Practices Implementation Guide The MICROS e7 Payment Application Best Practices Implementation Guide can Documentation can be found on the MICROS Customer Services Web site (MICROS Products e7 ) ###verify location. Page 14 of 16
15 9. Ensure wireless network is configured securely Unlike a wired network where a hacker would need physical access to the network to sniff packages, wireless networks broadcast packages over radio waves. If the wireless network is unsecured, anyone within range of the Access Point could intercept a package. Three areas of security need to be addressed in wireless network. First, the Access Point needs to be secured so only a trusted user can administer the Access Point. Second, only known machines should be allowed on the network. Third, all data on the network should be encrypted. 1. Change the Access Point password to be a complex password. The administrator of the Access Point should have a unique name and complex password. 2. Only known machines should be allowed on the network. Limit by MAC address and IP address whenever possible. Do not broadcast the SSID of the access point. 3. Use the strongest encryption available. At a minimum use 128 bit WEP for data encryption. This should be used wherever WPA is not available. WPA should be used on all sites where WPA is available. Some older hardware does not support WPA. 4. Consult your hardware vendor s documentation on how to configure your hardware. Page 15 of 16
16 10. Antivirus Software Should be Installed and Kept Up To Date Current Antivirus software will protect your system from Malware. Malware is software written and deployed with the intent of causing harm to your system. Malware can take several forms. Some Malware is intended to corrupt or destroy data on your system. A second form is used to allow unauthorized use of your system. A third form is to steal information. Antivirus software, when properly deployed, will protect and rid your system of Malware. 1. All MICROS e7 systems should have antivirus software installed, such as Norton Antivirus. Page 16 of 16
MICROS e7 Version 2.7 Patch 1 Upgrade Best Practices
MICROS e7 Version 2.7 Patch 1 Upgrade Best Practices General Information About this Document This document is intended to convey best practice information when upgrading the MICROS e7 application from
More informationVirtual Net Credit Card Driver for 3700 POS Version 4.12
Restaurant Enterprise Series Virtual Net Credit Card Driver for 3700 POS Version 4.12 August 27, 2012 Copyright 2012 by MICROS Systems, Inc. Columbia, MD USA All Rights Reserved MD0003-092 Declarations
More informationGeneral Information. About This Document. MD0003-122 RES PCI Data Standard November 14, 2007 Page 1 of 19
RES Version 3.2 Service Pack 7 Hotfix 6 with Transaction Vault Electronic Payment Driver Version 4.3 or Higher Payment Application Best Practices Implementation Guide General Information About This Document
More informationTSYS Credit Card Driver for 3700 POS
Restaurant Enterprise Series TSYS Credit Card Driver for 3700 POS Version 4.14 June 24, 2013 Copyright 2013 by MICROS Systems, Inc. Columbia, MD USA All Rights Reserved Declarations Warranties Although
More informationTransaction Vault Credit Card Driver for 3700 POS
Restaurant Enterprise Series Transaction Vault Credit Card Driver for 3700 POS April 3, 2013 *******************Important******************* When upgrading the Transaction Vault Credit Card Driver from
More informationTransaction Vault Debit Card Driver for 3700 POS Version 4.13
Restaurant Enterprise Series Transaction Vault Debit Card Driver for 3700 POS Version 4.13 January 4, 2013 Copyright 2007-2013 by MICROS Systems, Inc. Columbia, MD USA All Rights Reserved MD0003-118 Declarations
More informationNETePay 5.0. FDMS Nashville. Installation & Configuration Guide. Part Number: 8660.54
NETePay 5.0 Installation & Configuration Guide FDMS Nashville Part Number: 8660.54 NETePay Installation & Configuration Guide Copyright 2011 Datacap Systems Inc. All rights reserved. This manual and the
More informationRemote Deposit Terms of Use and Procedures
Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update
More informationReliance Bank Fraud Prevention Best Practices
Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.
More informationBusiness ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
More informationVERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
More informationMN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Enterasys Wireless Access Point 3000 (RBT3K-AG) to Support Avaya IP Office, Avaya IP Wireless Telephones and Avaya Phone Manager
More informationWireless Client Configuration Guide. for third-party wireless Ethernet adapters
Wireless Client Configuration Guide for third-party wireless Ethernet adapters Notice to Users 2002 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated,
More informationMonetra Payment Software
Monetra Payment Software Fast Start: Installation and Configuration Guide Revision: 3.0 Publication date October, 2013 Copyright 2013 Main Street Softworks, Inc. Fast Start: Installation and Configuration
More informationSecureW2 Client for Windows User Guide. Version 3.1
SecureW2 Client for Windows User Guide Version 3.1 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright
More informationBusiness Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
More informationhp digital home networking wireless USB network adapter hn210w quick start guide
hp digital home networking wireless USB network adapter hn210w quick start guide Revision #: 15 Page: 1 of 11 Printed: 08/15/01 04:44 PM The Hewlett-Packard Company makes no warranty of any kind with regard
More informationNetwork Installation Guide. Artisan 810 Series
Network Installation Guide Artisan 810 Series Before You Begin Make sure you installed ink cartridges and loaded paper as described on the Start Here sheet. Then follow the instructions in this guide to
More informationVERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
More informationHP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
More informationPA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing
for Sage MAS 90 and 200 ERP Credit Card Processing Version 4.30.0.18 and 4.40.0.1 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks
More informationCS WinOMS Practice Management Software Server Migration Help Guide
CS WinOMS Practice Management Software Server Migration Help Guide Checklist Prior to Beginning a Server Migration: A. The CS WinOMS install disk. Install files can be downloaded to server via FTP, contact
More informationImplementation Guide
Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein
More informationConfiguring Keystroke with KeyPay
Configuring Keystroke with KeyPay Please read the PA-DSS Implementation Guide for Keystroke POS from our website before proceeding. It is also installed in the \KEYSTROK\DOC subdirectory on your computer.
More informationOmniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
More informationHP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
More informationVerizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
More informationPlease note that in VISA s vernacular this security program for merchants is sometimes called CISP (cardholder information security program).
Introduction This document serves as a guide for TCS Retail users who are credit card merchants. It is written to help them become compliant with the PCI (payment card industry) security requirements.
More informationBackup Exec 15. Quick Installation Guide
Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark
More informationInstallation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
More informationTECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer
i-stat TECHNICAL BULLETIN Configuring Wireless Settings in an i-stat 1 Wireless Analyzer Before configuring wireless settings, please enable the wireless functionality by referring to the Technical Bulletin
More information4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
More informationformerly Help Desk Authority 9.1.3 Upgrade Guide
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationLegal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationReporting for Contact Center Setup and Operations Guide. BCM Contact Center
Reporting for Contact Center Setup and Operations Guide BCM Contact Center Document Number: NN40040-302 Document Status: Standard Document Version: 04.00 Part Code: N0060637 Date: June 2006 Copyright 2005
More informationContents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
More informationNational Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States
More informationCatapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
More informationAMS Suite: Machinery Health Manager
AMS Suite: Machinery Health Manager Version 5.61 Software Installation Guide User Guide MHM-97402, Rev 23 November 2014 Copyright 2014 by Emerson Process Management. All rights reserved. No part of this
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationWindows Peer-to-Peer Network Configuration Guide
Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication
More informationBroadband Router ESG-103. User s Guide
Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits
More informationIridium Extreme TM Satellite Phone. Data Services Manual
Iridium Extreme TM Satellite Phone Data Services Manual Table of Contents 1 OVERVIEW... 1 2 HOW IT WORKS... 1 3 BEFORE INSTALLING... 2 4 USB DRIVER INSTALLATION... 3 5 MODEM INSTALLATION AND CONFIGURATION...
More informationCentran Version 4 Getting Started Guide KABA MAS. Table Of Contents
Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe
More informationInstallation Guide Wireless 4-Port USB Sharing Station. GUWIP204 Part No. M1172-a
Installation Guide Wireless 4-Port USB Sharing Station 1 GUWIP204 Part No. M1172-a 2011 IOGEAR. All Rights Reserved. PKG-M1172-a IOGEAR, the IOGEAR logo, MiniView, VSE are trademarks or registered trademarks
More informationConfiguration. Windows 98 and Me Configuration
Configuration Windows 98 and Me Configuration Installing the TCP/IP Protocol Windows 2000 Configuration Windows XP Configuration Wireless Configuration 128-Bit Encryption Wireless Security in Windows XP
More informationNetwork Installation Guide. WorkForce 610 Series Artisan 710 Series
Network Installation Guide WorkForce 610 Series Artisan 710 Series Contents Before You Begin.......................................... 3 Choose Your Connection Type................................ 4 Wireless.............................................
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationSymantec Endpoint Encryption Device Control Release Notes
Symantec Endpoint Encryption Device Control Release Notes Symantec Endpoint Encryption Device Control 8.2.0 www.symantec.com About Symantec Endpoint Encryption Device Control Symantec Endpoint Encryption
More information9700 3.x Security Guide
1Sim 9700 3.x Security Guide In This Document This document describes 9700 s security design, features that monitor actions that employees take on the System, and features that restrict employee access
More informationTop Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationQuestion How do I access the router s web-based setup page? Answer
http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=3676 Question How do I access the router s web-based setup page? Answer All Linksys routers have a built-in web-based setup
More informationThis guide provides all of the information necessary to connect to MoFo resources from outside of the office
REMOTE ACCESS GUIDE INTRODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office Links to topics in this document Connect remotely from your
More informationHow To Run Eve 5 On A Pc Or Mac Or Ipad (For Pc Or Ipa) On A Network (For Mac) On Your Computer Or Ipro (For Ipro) On An Ipro Or Ipo (For Windows)
EVE5 Hardware and Software Requirements EVE5 is a Client/Server program. i.e. there are 2 components to the program: 1/ The Server: this controls your database and will be installed on one computer only.
More informationWireless Networking Best Practices Version 2.0
Wireless Networking Best Practices Version 2.0 About This Document This document is meant to serve as a guide for implementing MICROS wireless Hardware following Payment Application Data Security Standards
More informationPreparing the Computers for TCP/IP Networking
Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or
More informationPCCharge can connect to LYNK via a dial-up modem connection, an ISDN connection, or a TCP/IP (Internet) connection.
RBS Lynk Systems, Inc. (LYNK) LYNK Notes LYNK accounts are terminal based. LYNK will provide you with a 12-digit Merchant Number. Use this as your Credit Card Company Number when setting up your account
More informationHow To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
More informationLockView 4.3.1 CompX Database & Network Configuration & Installation Manual
LockView 4.3.1 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements...
More information5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager
5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...
More informationTopaz Installation Sheet
Topaz Installation Sheet P/N 460924001E ISS 08FEB12 Content Introduction... 3 Recommended minimum requirements... 3 Setup for Internet Explorer:... 4 Topaz installation... 10 Technical support... 14 Copyright
More informationPoint of Sale 2015 Enterprise. Installation Guide
Point of Sale 2015 Enterprise Installation Guide Contents About this guide 3 System Requirements - Microsoft SQL Server 2008 R2 Express 3 System Requirements - POS Enterprise 2015 (Administrator) 3 System
More informationSoft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc. http://www.4sightfax.com/
4-Sight FAX 7.5 Getting Started Soft Solutions, Inc. http://www.4sightfax.com/ Introduction Thank you for your interest in 4-Sight FAX version 7.5. This guide documents the general configuration for using
More informationSymantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
More informationInstallation & Upgrade Guide. Hand-Held Configuration Devices Mobility DHH820-DMS. Mobility DHH820-DMS Device Management System Software
Installation & Upgrade Guide Hand-Held Configuration Devices Mobility DHH820-DMS Mobility DHH820-DMS Device Management System Software WARNING notices as used in this manual apply to hazards or unsafe
More informationTANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
More informationWeb Remote Access. User Guide
Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior
More informationenicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
More informationLockView 4.2 CompX Database & Network Configuration & Installation Manual
LockView 4.2 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements... 5
More informationAllworx OfficeSafe Operations Guide Release 6.0
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
More informationLucas POS V4 for Windows
Lucas POS V4 for Windows Version 4.02 Secure Implementation Guide Document Revision: 4 Lucas Systems provides this publication as is without warranty of any kind, either expressed or implied. This publication
More informationSymantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
More informationQAD Enterprise Applications. Training Guide Demand Management 6.1 Technical Training
QAD Enterprise Applications Training Guide Demand Management 6.1 Technical Training 70-3248-6.1 QAD Enterprise Applications February 2012 This document contains proprietary information that is protected
More informationImaging License Server User Guide
IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationGetting Started with IntelleView POS Administrator Software
Getting Started with IntelleView POS Administrator Software Administrator s Guide for Software Version 1.2 About this Guide This administrator s guide explains how to start using your IntelleView POS (IntelleView)
More informationNCD ThinPATH Load Balancing Startup Guide
NCD ThinPATH Load Balancing Startup Guide Copyright Copyright 1999 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network Computing
More informationImaging Computing Server User Guide
Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E cellularimaging@perkinelmer.com
More informationVirtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
More informationNetwork FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
More informationRemote Management System
RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED
More informationKeeper Care System Data Manager Version 1.0
Automated Inventory Solutions, Inc. User Manual Keeper Care System Data Manager Version 1.0 Automated Inventory Solutions Phone: (304)725-4801 Fax: (304)725-6983 www.aisvendors.com Email: support@aisvendors.com
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
More informationOnline Banking Fraud Prevention Recommendations and Best Practices
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know
More informationMetasys System Direct Connection and Dial-Up Connection Application Note
Metasys System Direct Connection and Dial-Up Connection Application Note Code No. LIT-1201639 Software Release 5.1 Issued August 27, 2013 Supersedes October 4 2010 Refer to the QuickLIT website for the
More informationThor VM1. Quick Start Guide. Vehicle-Mount Computer. with Microsoft Windows Embedded CE 6 or Windows Embedded Standard 2009 Operating System
Thor VM1 Vehicle-Mount Computer with Microsoft Windows Embedded CE 6 or Windows Embedded Standard 2009 Operating System Quick Start Guide VM1-QS Rev A 4/12 Setting up the Thor VM1 Please have the following
More informationSymantec Backup Exec 2010 R2. Quick Installation Guide
Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationWHITE PAPER. HP Guide to System Recovery and Restore
WHITE PAPER January 2003 Prepared By PSG Product Software Engineering Hewlett-Packard Company CONTENTS Purpose3 Using Safe Mode To Diagnose And Correct Problems 4 Using the Recovery Console To Repair Damaged
More informationMonitor Print Popup for Mac. Product Manual. www.monitorbm.com
Monitor Print Popup for Mac Product Manual www.monitorbm.com Monitor Print Popup for Mac Product Manual Copyright 2013 Monitor Business Machines Ltd The software contains proprietary information of Monitor
More informationConfiguring Your Network s Security
Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible
More informationMX7 Tecton. Quick Start Guide. Hand-Held Computer. With Microsoft Windows Embedded CE 6 or Windows Mobile 6.5 Operating System. TECTON-QS Rev A 4/12
MX7 Tecton Hand-Held Computer With Microsoft Windows Embedded CE 6 or Windows Mobile 6.5 Operating System Quick Start Guide TECTON-QS Rev A 4/12 Setting up the MX7 Tecton Please have the following Information
More informationPayment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
More informationHow To Protect Your Data From Being Stolen
DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS
More informationHardware/Software Specifications for Self-Hosted Systems (Multi-Server)
Hardware/Software Specifications for Self-Hosted Systems (Multi-Server) EBIX, INC. 1 Ebix Way, Johns Creek, GA 30097 Rev. 07/2015 2015 Ebix, Inc. and its subsidiaries. All Rights Reserved. This software
More informationChapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
More informationCongratulations on your HomePortal purchase. To install your HomePortal and configure your home network, follow these steps.
Notice to Users 2003 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior written approval. 2WIRE PROVIDES
More informationQuick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
More information