USER GUIDE: MaaS360 Services

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "USER GUIDE: MaaS360 Services"

Transcription

1 USER GUIDE: MaaS360 Services

2 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of those agreements. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Fiberlink Corporation. All brands and their products are trademarks or registered trademarks of their respective holders and should be noted as such. Fiberlink Corporation 1787 Sentry Parkway West Blue Bell, PA

3 Table of Contents Introduction... 5 Major Features... 6 Navigation... 6 The Tabs... 7 My Watch List... 7 Managing Policies and Portal Administrators Manage Policies Portal Administrator Management Add User Edit User Delete User Search for Deleted Administrators Reset User Password Reactivate Locked Administrator Accounts MaaS360 Reports Reports Overview Types of Reports Graphs and Charts Tabs Filters Summary-to-Detail Drill-Down Views Printing and Downloading Report Information Navigating to Different Pages Device Summary Report Device List Agent Reports Agent Details Policy Enforcement Reports Policy Enforcement Overview Hardware Inventory Reports Device Summary Tab Hardware Identity Tab Hardware Capacity Tab Operating System Tab Network Information Tab Software Inventory Reports Installed Software Tab Software Details Tab Endpoint Security Reports Endpoint Security Overview Patch Management Reports Patch Management Overview Tab Patch Summary by Device Tab Summary by Patch Tab Patch Details Tab Data Protection Reports Data Protection Overview Summary by Device Tab Encryption Tab

4 End User Instructions for MaaS360 Control Service Starting the Application Minimizing the Application Window Using Online Help Viewing Version and Copyright Information Getting Status Details Main View Status for Individual Applications Overall Status System Tray Icons Compliance Icon Background Update Icon Message History Activity Log Activity Log Codes Uploading the Activity Log Adjusting Preferences Changing the Language for Using Control Service Updates Getting Policy and Software Updates Troubleshooting Troubleshooting Compliance Events

5 Introduction The MaaS360 Services allow Fiberlink customers to see detailed information about their end users computers. Both of the MaaS360 Services shows you information about the hardware and software on your end users computers, and provides the status of the security applications protecting them. After you load the software, it reports in to the MaaS360 Management Center web site where you can see graphs, charts and reports showing how well these computers are protected. It can show you how many of your users have no anti-virus protection, and how many have the software but the definitions are out of date. It can show you which computers are missing critical operating system patches and which drives on each computer are encrypted. You can then take action to enforce compliance to corporate security policies, as necessary. MaaS360 Service reports provide information about the following: Note: Anti-Virus Personal Firewall OS Patches Data Encryption Hardware Inventory Software Inventory The reports you see will depend on the services you have chosen. 5

6 Major Features Navigation The user interface provides easy-to-use navigation with links, menus and tabs, allowing quicker access to the available applications. Links on the My Watch List window take you directly to reports showing potential problems you may want to address immediately. Links on the My Actions and Reports window take you directly to reports you can use to proactively manage your organizations devices. Tabs correspond to a related set of available applications or tasks. The menus show the individual workflows, reports, etc. for the portal user. To access the menus, move your mouse over the tab and the menu will appear. Then click once to access the item. A breadcrumb trail allows you to move backwards through different screens. Links on the right side of the page provide quick access to additional information about the MaaS360 Services, the system requirements, etc. 6

7 The Tabs There are four tabs in the MaaS360 Platform: 1. Home - takes you to the Home screen. 2. Manage allows you to manage your portal administrators, and provides access to the Device Summary Report. Depending on the services you are using, you may also be able to manage your policy from this tab. 3. Reports provides access to the MaaS360 Platform reports. 4. Support displays the Get Help page, which has a variety of resources to help you. My Watch List The My Watch List block appears at the top of the Home page. It shows you critical information about your endpoints and allows you to access the details you need to remediate problems. For example, the MaaS360 Platform will tell you if any of your devices do not have Anti-Virus or Personal Firewall software installed. 7

8 You can click on the Watch List to see a list of those devices. The MaaS360 Platform displays how many devices are in a potentially problematic situation, allowing you to rectify the situation promptly. Watch List items include the following: Devices that do not have Anti-Virus or Personal Firewall software Devices that are not ready for Windows 7 Devices that are missing at least one critical patch Devices with disabled Anti-Virus software Devices with disabled Personal Firewall software Anti-Virus definitions that are older than seven days System drives with less than 10% free space Devices that do not have Encryption software Devices that have 512 MB RAM or less You can click on each Watch List item to see a MaaS360 report that shows you detailed information about that item. In many cases it is a MaaS360 report that is automatically filtered to list the devices that meet the Watch List criteria. For example, if you click on the Watch List item for devices with disabled Anti-Virus software, MaaS360 displays the Anti-Virus Details Report, with the Status filter set to Stopped. 8

9 9

10 Managing Policies and Portal Administrators To make your MaaS360 Services run smoothly, there are a few basic maintenance tasks that a portal administrator will need to do. All of these workflows are accessible from the Manage tab. You must have the MaaS360 Control Service to have the Persistent Policy Enforcement Service. Manage Policies This item appears on the Home page, as well as from the Manage tab. You should set up your policy before installing the MaaS360 service on any of your end users computers. After the software is installed, it will automatically download the latest policy and put it into practice. Policies tell the MaaS360 service which of your applications to monitor, and what actions to take when a computer is out of compliance. To create or change your policy settings, perform the following steps: 1. Click Manage Now, or select Manage Policies from the Manage tab. The Customize Policy page appears. 10

11 2. If you want the MaaS360 service to monitor your end users anti-virus applications, click the check box. This will expand the setting so you can select an action to be taken if a device does not have an anti-virus application, does not have it enabled, or if the anti-virus definitions are out of date. You have two choices: a. Log Information and Warn the user this will display a warning icon in the users system tray and log the non-compliance. It will not, however, do anything to restrict the user. b. Disconnect any established VPN connection this will display the warning icon and log the non-compliance. It will also disconnect the device from the VPN. 3. If you want the MaaS360 service to monitor your end users personal firewall applications, click the check box. This will expand the setting so you can select an action to be taken if a device does not have a personal firewall application or does not have it enabled. You have two choices: a. Log Information and Warn the user this will display a warning icon in the users system tray and log the non-compliance. It will not, however, do anything to restrict the user. b. Disconnect any established VPN connection this will display the warning icon and log the non-compliance. It will also disconnect the device from the VPN. 4. If you want the MaaS360 service to monitor your end users encryption applications, click the check box. This will expand the setting so you can select an action to be taken if a device does not have a data encryption application or it is inactive. You have two choices: a. Log Information and Warn the user this will display a warning icon in the users system tray and log the non-compliance. It will not, however, do anything to restrict the user. b. Disconnect any established VPN connection this will display the warning icon and log the non-compliance. It will also disconnect the device from the VPN. 11

12 5. If you want the MaaS360 service to prevent certain types of applications from running on your end users devices, click the check box. This will expand the setting so you can select one or more types of applications to restrict. 6. When you are finished, click Save. The date and time at the top of this page will be updated. Every 15 minutes, the last saved policy (if there is one) is made available to your users, and the version number at the top of this page is incremented. Your end users will receive the updated policy automatically the next time they access the Internet. Portal Administrator Management Portal administrators can create portal administrators and give them the appropriate access. These users do not necessarily have the MaaS360 service software on their own machines. Add User Administrators can create new portal administrators and assign them one or more roles. To add a new portal administrator: 1. Hover over the Manage tab. 2. Select Add User under the Create Portal Administrators heading. 3. Enter the user name in the User Name field. Make sure it has a minimum of six characters. 4. Enter a valid address in the Address field. The password for this person will be automatically generated and sent to this address. 5. Click to select one or more roles to assign to the new user. When you click to select a role, the role description appears in the Role Description field. 6. Click the arrow buttons to move selected options or all options between the fields. 7. Click Add to finalize the changes. 8. A message confirms successful addition of the user and roles. 12

13 Edit User Administrators can view, edit, or delete a portal administrator s role assignments. To edit portal administrator role assignments: 1. Hover over the Manage tab. 2. Select Manage Portal Administrators to view the Search Portal User screen. 3. Enter or select desired search criteria in the User Name box, the Address box and the Role drop-down list, if required. 4. Click Search to view results matching the entered search criteria. 5. Click the Edit icon associated with the user to view the Edit Portal User screen. 6. Click the arrow buttons to move selected roles or all roles between the fields, as necessary. 7. Click Save to save your changes and view the confirmation message. 13

14 Delete User To delete a portal administrator: 1. Hover over the Manage tab. 2. Select Manage Portal Administrators to view the Search User screen. 3. Enter or select desired search criteria in the User Name box, the Address box and the Role drop-down list, if required 4. Click Search to view results matching the entered search criteria. 5. Click the Delete icon to delete the selected portal administrator accounts. A deletion confirmation message displays. Search for Deleted Administrators As part of the User Management Audit feature, the new Search for Deleted Administrators menu item allows you to search and view a list of all deleted portal administrator accounts and the associated audit details. To view deleted administrator accounts: 1. Hover over the Manage tab, and select Search for Deleted Administrators. 14

15 2. Enter or select desired search criteria in the User Name field, the Address box and the Deletion Date boxes, if required. 3. Click Search. Results matching the search criteria display. 4. Click the Audit History icon to view the View Change History screen. 5. If required, click the View Change link to view the View Changes screen. 15

16 Note: The changes highlighted in yellow indicate an updated or modified value, the green text indicates a new value, and text with a red strike-through indicates that the value was deleted. Reset User Password You can also reset a user password. You may choose to reset a password when a user has forgotten his password or if a new portal user has requested you to reset and resend his password. To reset a portal administrator password: 1. Hover over the Manage tab and click Manage Portal Administrators menu to view the Search Portal User screen. 2. Enter or select desired search criteria in the User Name field, the Address field or the Role drop-down list, as necessary. 3. Click Search. Results matching the search criteria display. 4. Click the Reset icon to reset the password. 5. The Reset Password Confirmation message displays. 16

17 6. Click Confirm to reset the selected portal administrator s password. A confirmation message displays. The new password will be sent to the portal administrator s address. Reactivate Locked Administrator Accounts Due to the enhanced security features in the MaaS360 Services, if a user belonging to the MAS authentication domain enters an incorrect password five times consecutively, then the user account will be locked. If a user account is locked, it can be reactivated through the Manage Portal Administrators workflow. To re-activate a locked administrator account: 1. Hover over the Manage tab and click Manage Portal Administrators to view the Search Portal User screen. 2. Enter the desired search criteria. 3. Click Search to view the results matching the entered criteria. 4. Click the Reactivate icon to reactivate the locked user account. The Reset Password Confirmation screen displays. 17

18 5. Click Confirm to reactivate the locked user account. The Password Reset screen displays a confirmation message. The user account is reactivated and a new system-generated password is sent to the user s address. 18

19 MaaS360 Reports Reports Overview The report generation features allow you to use enhanced reporting functions (such as the tabular presentation of reports) to group associated graphs and reports, and it provides easy navigation between the reports. The enhanced reporting solution also includes filters, which help you generate a variety of real-time reports or narrow down report details based on your filter criteria. The graphs and charts provide an enhanced representation of the data in summary and detailed reports. The Print and Download links allow you to print and download the displayed tables to a variety of file formats. Types of Reports The MaaS360 Management Center provides the following types of reports: 1. Device Summary 2. Agent Details 3. Policy Enforcement 4. Endpoint Security Overview a. Anti-Virus b. Personal Firewall 5. Data Protection Overview a. Encryption 6. Hardware Inventory 7. Software Inventory 8. Hardware Inventory for BlackBerry Handhelds 9. Software Inventory for BlackBerry Handhelds 10. Patch Management 11. VPN Note: 12. Any Connection Reporting Not all reports are available for all services. If you have any questions access our Support page. Graphs and Charts Most of the data is presented in charts and graphs, and you can click on one bar or pie section to see details about that piece of data. You can also hover your mouse over a bar or pie section to see the number being represented graphically. 19

20 To view report graphs, you must have installed the Flash plug-in with your browser. You can get the Flash plug-in at Tabs Additional tabs further organize the data, helping you to understand it more easily. Most of the reports have a summary tab, and additional facts appear on subsequent tabs. For example, when you first access Hardware Inventory from the Reports tab, you see data on the Device Summary tab. If you click each of the subsequent tabs (Hardware Identity, Hardware Capacity, Operating System and Network Information), the data is presented with a different focus and in greater detail. Filters Filters allow you to change what you see in the reports based on specific selection criteria. Select the options you want from the drop-down lists and click Apply Filters. If you want to return to the default values for all the selection criteria, click Clear Filters. 20

21 In some cases the filter options you choose affect the other tabs for that report. If you find unexpected results on a report, try clearing the filters. Saving a Filter You can also save filters so you can use them again later. To save a filter, perform the following steps: 1. Set the desired filters by selecting options from the pull-down menus, and then click Apply Filters. 21

22 2. Click Filter Options to see the choices on the pull-down menus. 3. Click Save Current Filters and then click For Me. 4. A pop-up box allows you to enter a name for the filter and set it as the default for the page. 5. Make your changes and click OK to save the filter. 22

23 Using a Saved Filter To use a filter you had previously saved, perform the following steps: 1. Click Filter Options to see the different choices. 2. Hover your cursor over the Apply Saved Filters option to display all your saved filters, and select the filter you want to use. Summary-to-Detail Drill-Down Views You can click on a bar or pie chart section to see the details that pertain to that item. For example, if you are looking at the Operating System Summary chart, you can click on the Microsoft Windows XP, SP2 pie section: 23

24 You will automatically see the Operating System tab, with the appropriate filter options (Microsoft Windows XP for the Operating System and XP for the Service Pack). Printing and Downloading Report Information Each report has two links at the bottom, Print and Download. When you click Print, a menu appears giving you the option to export the report in either HTML or PDF format so it can be printed. When you click Download, a menu appears giving you the option to download the chart, graph or report as an Excel, PowerPoint, Excel 2000 or CSV file. Navigating to Different Pages To help you see the data in long reports, MaaS360 provides buttons at the bottoms of the pages. 24

25 Button Description Go to the first page of records. Go to the previous page. Go to the next page. Display all pages, showing all the records. Device Summary Report This report provides detailed information about your end users computers. The data is refreshed throughout the day. Device List This overview shows all the computers in the trial, and when they contacted the Fiberlink servers. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 25

26 Computer Name OS Username OS User Domain Operating System First Reported (GMT) Last Reported (GMT) Troubleshooting Support Name of the machine on which the service is installed. Username used to log in to the machine. Domain used by the service. Operating system used by the computer. Date and time the computer first contacted the Fiberlink servers. Date and time the computer most recently contacted the Fiberlink servers. Link to a report about the computer s interactions with the Fiberlink servers. Click on the Computer Name link to see detailed information about that computer. Hardware Report This tab contains the Hardware Report, which provides visibility into the specified computer. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. 26

27 System Manufacturer System Model BIOS Serial Number Mother Board Serial Number Computer Name MaaS360 Hardware ID Processor Architecture Processor Speed Total Physical Memory (in MB) Page File (in MB) Name of the computer s manufacturer. Computer s model number. Unique identifier for the basic input/output system boot firmware. Unique identifier for the computer s mother board. Name of the device on which the software is installed. Unique identifier of the computer, as detected by the software. Type of processor architecture in use on the computer. Computer s processor speed, in GHz. Amount of memory on the computer. Size of the computer s page file. This report also lists the following for each drive on the computer: Drive type Total space (in GB) on the drive Free space (in GB) on the drive If the drive is a system drive Operating System Report This report provides detailed information about the computer s operating system. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. 27

28 You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. Operating System Version Service Pack OS Language Installed Language Packs Logged On User User Privileges NetworkProvider HW Order NetworkProvider Order This report also lists: Operating system in use on the computer. Version number of the operating system. Service pack version information. Language in which the operating system displays information to the user. All the available language packs that were installed. Username that was used to log in to the computer. Access granted to that username. Ordered list of protocols for hardware, with the highest priority first. Ordered list of protocols, with the highest priority first. All the components of the operating system and displays the version of each component Missing patches for Microsoft Windows, including their importance and Bulletin ID Network Report This report shows you important information about your network settings and your network adapters. 28

29 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. Automatically Detect Proxy Settings Use Automatic Configuration Script Manually Configure a Static Proxy Server System Dialup Use Lan Settings User Dialup Use Lan Settings Specifies if the computer has been set up to automatically detect proxy settings. Specifies if the computer has been set up to use an automatic configuration script. Specifies if the computer has been set up to manually configure a static proxy server. Indicates if the computer will use Lan settings for system dialup. Indicates if the computer will use Lan settings for user dialup. The report also shows the following information about your network adapters: Name Adapter ID Type DHCP Enabled IP Address Gateway DNS Servers Name of the network adapter. Unique identifier of that adapter. Type of network adapter. Indicates if it can be used with Dynamic Host Configuration Protocol. IP address of the network adaptor. Address of the gateway the computer uses. Addresses of the Domain Name System servers used by the computer. 29

30 All Applications Report This report shows you important information about the applications installed on the computer. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. Name Version Name of the application detected by the MaaS360 Service. Version of that application. Security Applications Report This report shows you important information about your network settings and your network adapters. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. 30

31 It provides the following information about the computer s firewalls: Name Vendor Version Status Fiberlink Supported Name of the firewall application detected by the MaaS360 Service. Company that created the firewall application. Version of the application. Indicates if the application is active or not. Indicates if Fiberlink supports this application. The report also shows the following information about your anti-virus applications: Name Vendor Version Status Fiberlink Supported Virus Def Version Virus Def Date Virus Def Server Name of the anti-virus application detected by the MaaS360 Service. Company that created the anti-virus application. Version of the application. Indicates if the application is active or not. Indicates if Fiberlink supports this application. Version number of the latest anti-virus definition. Date of the latest anti-virus definition. Server from which the computer downloaded the latest anti-virus definition. It provides the following information about the computer s anti-spyware applications: Name Vendor Version Status Fiberlink Supported Virus Def Version Virus Def Date Virus Def Server Name of the anti-spyware application detected by the MaaS360 Service. Company that created the anti-spyware application. Version of the application. Indicates if the application is active or not. Indicates if Fiberlink supports this application. Version number of the latest anti-spyware definition. Date of the latest anti-spyware definition. Server from which the computer downloaded the latest anti-spyware definition. 31

32 The report also shows the following information about your VPN: Name Vendor Version Binary Path Description Fiberlink Supported Name of the application detected by the MaaS360 Service. Company that created the application. Version of the application. Location of the binary used by the VPN. Description of the application. Indicates if Fiberlink supports this application. Connection Manager(s) Report This report shows you important information about the applications installed on the computer. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. Name Version Description Binary Path Name of the multi-transport connection manager detected by the MaaS360 Service. Version of the connection manager software. Description of the connection manager. Location of the binary used by the VPN. It also shows the following information about your Wi-Fi Connection Manager: 32

33 Name Version Description Binary Path Name of the Wi-Fi connection manager detected by the MaaS360 Service. Version of the Wi-Fi connection manager software. Description of the connection manager. Location of the binary used by the VPN. Agent Reports These reports are designed to help you understand which products each user has. Agent Details The reports appear on the following tabs: Agent Details Agent Policy Details Agent Details Tab This tab contains the Agent Details Report. The tab has the following filters: Computer Name OS Username Agent Username Domain (Windows only) Operating System Product(s) EEA Installed Installed Date Fiberlink Software Last Reported Agent Details This report shows detailed information about the computers in your organization and the Fiberlink software installed on those computers. To access this report: 1. Hover your cursor over the Reports tab. 2. Click Agent Details under the Agent Reports heading. 33

34 Computer Name OS Username Agent Username Domain (Windows only) Operating System Product(s) EEA Installed Installed Date Fiberlink Software Last Reported Name of the device on which the service is installed. Username used to log into the computer. Username used to log into the service. Windows domain into which the user logged in. Device s operating system. Name and version of the MaaS360 Service running on the computer. Specifies if the Extend360 Enforcement Agent (EEA) is installed on the computer. Date that the MaaS360 Service was installed on the computer. Date that the software last contacted the Fiberlink servers. Agent Policy Details Tab This tab contains the Agent Policy Details Report. The tab has the following filters: Computer Name OS Username Agent Username Fiberlink Software Last Reported Operating System Product(s) EEA Installed Policy Set Agent Policy Details This report shows detailed information about the policies in force on the computers in your organization. To access this report: 1. Hover your cursor over the Reports tab. 2. Click Agent Details under the Agent Reports heading. 3. Click the Agent Policy Details tab. 34

35 Computer Name OS Username Agent Username Operating System Product(s) EEA Installed Policy Set UI Configuration Policy (Version) Connectivity Policy (Version) Security Policy (Version) Software Administration Policy (Version) Fiberlink Software Last Reported Name of the device on which the service is installed. Username used to log into the computer. Username used to log into the service. Device s operating system. Name and version of the MaaS360 Service running on the computer. Specifies if the Extend360 Enforcement Agent (EEA) is installed on the computer. Name of the policy set in force on the device Name and version of the UI Configuration Policy in force on the device. Name and version of the Connectivity Policy in force on the device. Name and version of the Security Policy in force on the device. Name and version of the Software Administration Policy in force on the device. Last date that the computer contacted the Fiberlink servers. Policy Enforcement Reports Policy Enforcement reports show which applications MaaS360 is monitoring for compliance with your company s policies. These reports also show what, if anything, they will do when computers are out of compliance. Policy Enforcement Overview This reporting module shows policy enforcement and compliance events that were reported on security logs sent by the MaaS360 service. Policy Enforcement Summary Tab This tab contains reports that provide an overview of the out-of-compliance events logged by the MaaS360 service. 35

36 This tab contains the following filter: Event Period Out-of-Compliance Events by Application This report breaks down the out-of-compliance events by different applications: Anti Virus, Firewall, Data Encryption, etc. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. Out-of- Compliance Events Application Number of times the computer has gone out of compliance during the timeframe specified in the Event Period filter. Type of software that has gone out of compliance (e.g., Anti-Virus or Firewall). Out-of-Compliance Events by Cause This report shows which applications have the greatest number of out-of-compliance events by cause for the timeframe specified in the Event Period filter. You can hover the cursor over each bar to see the actual number of events. This report shows how many software applications are not running properly (e.g., an Anti-Virus application with outdated virus definitions), which are disabled, and which were never properly installed to begin with. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 36

37 X axis Application Type of security software (e.g., Anti-Virus or Firewall) that the MaaS360 services are monitoring. Y axis Number of out-ofcompliance events Number of out-of-compliance events for the different reasons. Out-of Compliance Enforcement Actions This report specifies which actions the MaaS360 service took when it found an outof-compliance event. You defined these actions when you set up the policy in the Manage Policies section. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 37

38 Out-of- Compliance Enforcement Actions The actions performed when the MaaS360 Control Service discovered that an application was out of compliance, based on your policy settings. Out-of-Compliance Events (Last 7 Days) This report specifies the number of compliance events for the last seven days. The value in the Event Period filter does not affect this report. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. X axis Date Date of the last seven days. Y axis Number of out-ofcompliance Number of out-of-compliance events. events Devices Out-of-Compliance (Top 10) This report lists the 10 computers that have the most out-of-compliance events by computer name. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 38

39 X axis Events Number of out-of-compliance events during the timeframe specified by the Event Period filter. Y axis Computer Name Machine names of the 10 computers with the most outof-compliance events. Devices by Out-of-Compliance Events This report shows how many computers have had a certain number of out-ofcompliance events. The number of events are organized into ranges: 1 to 3 events, 4 to 10 events, greater than 10 events. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 39

40 Devices Events Number of devices that have gone out of compliance. Number of times the devices have gone out of compliance, organized into ranges. Out-of-Compliance Events Tab This tab contains one report, the Out-of-Compliance Events report. It contains the following filters: Event Period Computer Name OS Username Domain (for Windows only) Agent Username Application Type Application Name Out-of-Compliance Cause Out-of-Compliance Events Report This report lists the out-of-compliance events that took place within the timeframe specified in the Event Period filter. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 3. Click the Policy Details tab. Event Time Computer Name OS OS Username Domain (for Windows only) Agent Username Application Date and time that the computer went out of compliance. Name of the machine on which the application is installed. Operating system installed on the machine. Username used to log in to the machine. Windows domain on which the user has logged in. Username used to log in. Third party application that was out of compliance. 40

41 Name Out-of- Compliance Cause Reason the application was out of compliance. Enforcement Actions Tab This tab shows one report, the Out-of-Compliance Enforcement Actions report. It contains the following filters: Event Period Computer Name OS Username Domain (for Windows only) Agent Username Application Name Enforcement Action Out-of Compliance Enforcement Actions Report This report lists the out-of-compliance events, and displays how the MaaS360 service responded to the event. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 3. Click the Enforcement Actions tab. Event Time Computer Name OS OS Username Domain (for Windows only) Agent Username Application Name Enforcement Action Description Date and time that the computer went out of compliance. Name of the machine on which the software is installed. Operating system installed on the machine. Username used to log in to the machine. Windows domain on which the user has logged in. Username used to log in. Name of the third party software that went out of compliance. Action taken by the MaaS360 service because the watched application fell out of compliance. Additional information about the Enforcement Action. 41

42 Compliance Details Tab This tab displays information about out-of-compliance events and enforcement actions together. It contains the following filters: Event Period Computer Name OS Username Domain (for Windows only) Agent Username Application Name Event Type Out-of-Compliance Events and Enforcement Actions Report This report combines information about out-of-compliance events and enforcement actions so you can clearly see how the MaaS360 software is finding the events and acting on them (based on what is defined in your policy). 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 3. Click the Compliance Details tab. Event Time Computer Name OS OS Username Domain (for Windows only) Agent Username Event Type Application Name Date and time that the computer went out of compliance. Name of the machine on which the MaaS360 software is installed. Operating system installed on the machine. Username used to log in to the machine. Windows domain on which the user has logged in. Username used to log in. Specifies if the event was an Out-of-Compliance Event, a Remediation Action, or an Enforcement Action. Out-of-Compliance Event no action is taken by Extend360 Enforcement Action Extend360 will restrict access (e.g., terminate a VPN connection) Remediation Action the MaaS360 service will help the computer become compliant (e.g., provide a link to updated Anti-Virus definitions) Name of the third party software that went out of compliance. 42

43 Enforcement Action Description Specifies the action taken by the MaaS360 service because the watched application fell out of compliance. Additional information about the Enforcement Action. Hardware Inventory Reports Hardware Inventory reports display information about the hardware deployed in your organization. Device Summary Tab This tab contains graphs and charts which provide you with an overview of your users hardware. This tab does not have any filters. Device Summary by Manufacturer (Top 10) This report shows how many devices are provided by each of the top manufacturers (up to 10). 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. X axis Manufacturers Names of the device manufacturers. Y axis Number of devices Number of computers provided by each manufacturer. Free Space on System Drive This report shows how much free space is available on users hard drives. The users are grouped into ranges based on the amount of free space they have. 43

44 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. Amount of free space Number of devices Percentage of the system drive that is available. Number of users that have a certain percentage of free space, grouped by range. Physical Memory Installed This report shows how much physical memory has been installed on the users hard drives. The users are grouped into ranges based on the amount of memory installed. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 44

45 X axis Number of devices Number of computers in each range. Y axis Physical memory Amount of memory installed, grouped into ranges. Operating System Summary This report shows how many computers are using each of the different operating systems. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 45

46 Operating Systems Computers Different operating systems your organization is using. Number of computers that have each operating system. Hardware Identity Tab This tab contains the Hardware Identity Report. It has the following filters: Computer Name OS Username Last Reported Manufacturer Model Computer Model ID Device Type BIOS Serial Number Motherboard Serial Number Processor Physical Memory Installed Total Hard Drive(s) Space (GB) Hardware Identity Report This report provides detailed information about the users hardware. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Hardware Identity tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 3. Click the Hardware Identity tab. 46

47 Computer Name OS Username Manufacturer Model Computer Model ID Device Type BIOS Serial Number Motherboard Serial Number Processor Physical Memory Installed Total Hard Drive(s) Space (GB) Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Company that made the computer. Model of the computer. Model ID of the computer. Specifies if the computer is a laptop or a desktop. Serial number of the basic input/output system boot firmware. Serial number of the computer s motherboard. Computer s processor. Amount of physical memory the computer has. Amount of hard drive space the computer has. Date that the device last contacted the Fiberlink servers. Hardware Capacity Tab This tab contains the Hardware Capacity Report. It has the following filters: Computer Name OS Username Last Reported Total Hard Drive(s) Space (GB) Free Hard Drive Space(s) Space (GB) Total Space on System Drive (GB) Free Space on System Drive (GB) Free Space on System Drive (%) Hardware Capacity Report This report provides detailed information about the space on devices drives. 47

48 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Hardware Capacity tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 3. Click the Hardware Capacity tab. Computer Name OS Username Total Hard Drive(s) Space (GB) Free Hard Drive(s) Space (GB) Total Space on System Drive (GB) Free Space on System Drive (GB) Free Space on System Drive (%) Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Total amount of space on the machine s hard drive. Amount of free hard drive on the machine s hard drive. Total amount of space on the machine s system drive. Amount of free space on the machine s system drive. Percentage of free space on the machine s system drive. Date that the device last contacted the Fiberlink servers. Operating System Tab This tab contains the Operating System Details Report. It has the following filters: Computer Name OS Username Last Reported Operating System Architecture Service Pack Version 48

49 Default OS Language Operating System Details Report This report provides detailed information about the users operating systems. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Operating System tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 3. Click the Operating System tab. Computer Name OS Username Operating System Architecture Service Pack Version Default OS Language Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Operating system on the computer. Specific architecture of the operating system. Latest service pack installed on the computer. Operating system s version. Default operating system language. Date that the device last contacted the Fiberlink servers. Network Information Tab This tab contains the Network Information Details Report. It has the following filters: Computer Name OS Username Domain (Windows only) Last Reported Network Adapter(s) IP Address (Last Reported) MAC Address Network Information Details Report This report provides detailed information about the users networks. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. 49

50 2. Click the Network Information tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 3. Click the Network Information tab. Computer Name OS Username Domain (Windows only) Network Adapter(s) IP Address MAC Address Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Computer s domain. This is only available for computers running Windows. Network adapters used by the computer. IP address for the computer. Unique identifier assigned to a network adapter. Date that the device last contacted the Fiberlink servers. Software Inventory Reports Software Inventory reports are designed to help you manage the software installed on your users computers. Installed Software Tab This tab contains the Installed Software Report. It has one filter, Application Name. Installed Software Report This report lists the applications installed on your users computers, the version numbers and the number of computers that have them. 1. Click the Software Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Software tab. You can also: 1. Hover your cursor over the Reports tab. 50

51 2. Click Software Inventory Overview under the Inventory Management Reports heading. 3. Click the Software tab. Application Name Major Versions Install Count Name of the software application. Version number installed on the computers. Number of computers using the specified version of the application. Software Details Tab This tab contains the Software Details Report. It has the following filters: Computer Name OS Username Last Reported Application Vendor Application Name Major Version Installed Date Software Details Report This report provides detailed information about the applications installed on your users computers. 1. Click the Software Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Software Details tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Software Inventory Overview under the Inventory Management Reports heading. 3. Click the Software Details tab. 51

52 Computer Name OS Username Application Vendor Application Name Major Version Full Version Installed Date Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Company that provides the application. Name of the software application. Major version number of the application. Unabridged version information. Date the application was installed. Date the data leak prevention application last contacted the Fiberlink servers. Endpoint Security Reports Endpoint security reports focus on specific security applications that the MaaS360 Services monitor. Endpoint Security Overview The Endpoint Security Reports appear on a series of tabs, and describe the anti-virus and personal firewall applications on your end users computers. The reports also provide visibility into the critical OS patches that should be installed. Endpoint Security Summary Tab This tab contains reports about the types of security applications that are installed or are being installed on your users computers. This tab does not have any filters. Installed Endpoint Security Applications Report This report shows how many of the different security applications are currently installed on your users computers. 1. Click the Endpoint Security Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Report tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. 52

53 X axis Application Different endpoint security applications that your company has put on end users computers and that the MaaS360 Services are set up to monitor. Y axis Computers Number of computers using each application. Devices by Anti-Virus Definition Age Report This report shows how many computers have anti-virus definitions that are a number of days old. The days are grouped into ranges to make the report easier to use. For example, you can easily tell how many of your users computers have anti-virus definitions that are older than 30 days, and what part of the total population they comprise. 1. Click the Endpoint Security Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Report tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. 53

USER GUIDE: MaaS360 Financial IT Reg Enforcement Service

USER GUIDE: MaaS360 Financial IT Reg Enforcement Service USER GUIDE: MaaS360 Financial IT Reg Enforcement Service 3.2011 Copyright 2011 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

MaaS360 Quick Start Guide

MaaS360 Quick Start Guide MaaS360 Quick Start Guide MaaS360 provides you with an easy-to-use interface for managing personally and corporately owned mobile devices. There are a few steps you must follow as part of set up and device

More information

Compliance Rule Sets in MaaS360

Compliance Rule Sets in MaaS360 Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in

More information

IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide

IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide Version 2.3.0 Copyright 2015 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

MaaS360 On-Premises Cloud Extender

MaaS360 On-Premises Cloud Extender MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Using the Apple Configurator and MaaS3360

Using the Apple Configurator and MaaS3360 Using the Apple Configurator and MaaS3360 Overview Apple Configurator Utility (ACU) is a free Apple tool that enables a Mac to configure up to 30 ios devices simultaneously via a USB. There are two modes

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Verizon Remote Access User Guide

Verizon Remote Access User Guide Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks

More information

Accessing TP SSL VPN

Accessing TP SSL VPN Accessing TP SSL VPN This guide describes the steps to install, connect and disconnect the SSL VPN for remote access to TP intranet systems using personal notebooks. A. Installing the SSL VPN client Junos

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry) Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry) June 2011 Copyright 2011 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

System Area Manager. Remote Management

System Area Manager. Remote Management System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for

More information

User Guide. version 1.2

User Guide. version 1.2 Network Discovery User Guide version 1.2 February 15, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Software Version 5.1 November, 2014. Xerox Device Agent User Guide

Software Version 5.1 November, 2014. Xerox Device Agent User Guide Software Version 5.1 November, 2014 Xerox Device Agent User Guide 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Using the MaaS360 Corporate App Catalog for ios

Using the MaaS360 Corporate App Catalog for ios Using the MaaS360 Corporate App Catalog for ios Overview MaaS360 simplifies enterprise mobile application management by providing an easy-to-use enterprise app catalog, which allows management of apps

More information

Endpoint Security VPN for Windows 32-bit/64-bit

Endpoint Security VPN for Windows 32-bit/64-bit Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

SonicWALL SSL VPN 3.5: Virtual Assist

SonicWALL SSL VPN 3.5: Virtual Assist SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following

More information

MaaS360 Secure Productivity Suite (SPS): Secure Container User Guide

MaaS360 Secure Productivity Suite (SPS): Secure Container User Guide MaaS360 Secure Productivity Suite (SPS): Secure Container User Guide Overview MaaS360 keeps your corporate apps, documents, emails, and contacts, etc., separate from your personal content. Corporate content

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Seagate Dashboard User Guide

Seagate Dashboard User Guide Seagate Dashboard User Guide Seagate Dashboard User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

X Series Application Note 43:

X Series Application Note 43: X Series Application Note 43: Using the Remote Viewing & Web Pages of the X - Series & GR Series Recorders The Remote Viewing function of the X-Series and GR Series Recorders provide the user with the

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Remark FTP Utility. For Remark Office OMR. User s Guide

Remark FTP Utility. For Remark Office OMR. User s Guide Remark FTP Utility For Remark Office OMR User s Guide Remark Products Group 301 Lindenwood Drive, Suite 100 Malvern, PA 19355-1772 USA www.gravic.com Disclaimer The information contained in this document

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

2013 ACT Special Study Learn to Administer the ACT Aspire Online Test

2013 ACT Special Study Learn to Administer the ACT Aspire Online Test 2013 ACT Special Study Learn to Administer the ACT Aspire Online Test Page 1 of 16 Learn to Administer the ACT Aspire Online Test If you are a Test Supervisor, you will be able to do everything listed

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Dashboard Admin Guide

Dashboard Admin Guide MadCap Software Dashboard Admin Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

SQL Server 2008 R2 Express Installation for Windows 7 Professional, Vista Business Edition and XP Professional.

SQL Server 2008 R2 Express Installation for Windows 7 Professional, Vista Business Edition and XP Professional. SQL Server 2008 R2 Express Installation for Windows 7 Professional, Vista Business Edition and XP Professional. 33-40006-001 REV: B PCSC 3541 Challenger Street Torrance, CA 90503 Phone: (310) 303-3600

More information

Enroll a Windows Phone 8 Device

Enroll a Windows Phone 8 Device Enroll a Windows Phone 8 Device Download Process Enrolling your Windows 8 device is a quick and easy process that takes around 2 minutes to complete. Your IT administrator will send you a MaaS360 enrollment

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Imaging Computing Server User Guide

Imaging Computing Server User Guide Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E cellularimaging@perkinelmer.com

More information

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer i-stat TECHNICAL BULLETIN Configuring Wireless Settings in an i-stat 1 Wireless Analyzer Before configuring wireless settings, please enable the wireless functionality by referring to the Technical Bulletin

More information

LockView 4.3.1 CompX Database & Network Configuration & Installation Manual

LockView 4.3.1 CompX Database & Network Configuration & Installation Manual LockView 4.3.1 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements...

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Moxa Device Manager 2.0 User s Guide

Moxa Device Manager 2.0 User s Guide First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008

PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008 PLATO Learning Environment System and Configuration Requirements Version 1.1 (for use with Academic Systems Algebra only) for workstations April 14, 2008 Windows 2000 Professional with SP4 Windows XP Professional

More information

Resource Online User Guide JUNE 2013

Resource Online User Guide JUNE 2013 Resource Online User Guide JUNE 2013 CHASE PAYMENTECH SOLUTIONS MAKES NO WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Avigilon Control Center Server User Guide

Avigilon Control Center Server User Guide Avigilon Control Center Server User Guide Version 4.10 PDF-SERVER-D-Rev1 Copyright 2011 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,

More information

Senior Systems Cloud Services

Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

If you have questions or find errors in the guide, please, contact us under the following e-mail address:

If you have questions or find errors in the guide, please, contact us under the following e-mail address: 1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration

More information

Software Version 5.2 June 2015. Xerox Device Agent User Guide

Software Version 5.2 June 2015. Xerox Device Agent User Guide Software Version 5.2 June 2015 Xerox Device Agent User Guide 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design and Phaser are trademarks of Xerox Corporation in the United States and/or

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Device LinkUP + Desktop LP Guide RDP

Device LinkUP + Desktop LP Guide RDP Device LinkUP + Desktop LP Guide RDP Version 2.1 January 2016 Copyright 2015 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08 Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL Installation and System Administrator's Guide 4MASIN450-08 2011 Sage Software, Inc. All rights reserved. Sage, the Sage logos and the Sage product

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

VMware vcenter Support Assistant 5.1.1

VMware vcenter Support Assistant 5.1.1 VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

LockView 4.2 CompX Database & Network Configuration & Installation Manual

LockView 4.2 CompX Database & Network Configuration & Installation Manual LockView 4.2 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements... 5

More information

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips dc07cc0432 October 19, 2007 This document applies to these Xerox products: X WC 7328/7335/7345 for the user Xerox Network Scanning TWAIN Configuration for the

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Standard Client Configuration Requirements

Standard Client Configuration Requirements Test Developer s Studio (TDS) Standard Client Configuration Requirements Information Technologies (IT) Content Applications Development Group (CADG) Version 1.0 February 20, 2008 Copyright 2008 by NCS

More information

Learn More Cloud Extender Requirements Cheat Sheet

Learn More Cloud Extender Requirements Cheat Sheet Learn More Cloud Extender Requirements Cheat Sheet Overview This document defines all requirements to ensure a successful installation of the MaaS360 Cloud Extender to enable use of ActiveSync Manager

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

How to install/upgrade the LANDesk virtual Cloud service appliance (CSA)

How to install/upgrade the LANDesk virtual Cloud service appliance (CSA) How to install/upgrade the LANDesk virtual Cloud service appliance (CSA) The upgrade process for the virtual Cloud Services Appliance is a side- by- side install. This document will walk you through backing

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

VPOP3 Your email post office Getting Started Guide

VPOP3 Your email post office Getting Started Guide VPOP3 Your email post office Getting Started Guide VPOP3 Getting Started Guide, version 2.1 1 Copyright Statement This manual is proprietary information of Paul Smith Computer Services and is not to be

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

Dial-up Installation for CWOPA Users (Windows Operating System)

Dial-up Installation for CWOPA Users (Windows Operating System) Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

MaaS360 Mobile Service

MaaS360 Mobile Service Services > Overview MaaS360 Mobile Service Go Mobile! Everything for mobile work - visibility, control, easy mobile connectivity, management tools and security - all in one economical, hosted solution.

More information

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005 Vantage RADIUS 50 Quick Start Guide Version 1.0 3/2005 1 Introducing Vantage RADIUS 50 The Vantage RADIUS (Remote Authentication Dial-In User Service) 50 (referred to in this guide as Vantage RADIUS)

More information

Server Installation, Administration and Integration Guide

Server Installation, Administration and Integration Guide Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information