Administrative Systems

Size: px
Start display at page:

Download "Administrative Systems"

Transcription

1 Administrative Systems Administrative Systems PCI Infrastructure Services Reference Compliance with the Payment Card Industry s Data Security Standard (PCI DSS) is critical for all merchants who accept credit cards at Stanford University. Administrative Systems (AS) provides infrastructure technical services for PCI DSS compliance to ensure merchants meet the infrastructure compliance requirements. AS provides centralized services of monitoring, patching, anti-virus and logging for workstations that are installed and maintained in a PCI-dedicated secure environment. At the same time, AS also provides the standard IT desktop services for the dedicated PCI workstations to keep them up and running for payment and business needs. For detailed support and services information, please refer to the following information. Frequently Asked Questions (FAQ) 1. How do I request support for the PCI environment? 2. What are the support hours for the PCI environment? 3. What services are covered by AS? 4. What service is NOT covered by AS? 5. What is the process to obtain remote access to the PCI environment? 6. How do I set up two-step authentication for access to the PCI environment? 7. How do I log in to the secure PCI environment? 8. What is the maintenance schedule for the PCI environment? 1. How do I request support for the PCI environment? Support requests should be submitted through the Stanford Help Request System, HelpSU. Please use these specific links depending on the request type, as they are not available in the main HelpSU form: Request Type Link PCI Desktop PCI Server 2. What are the support hours for the PCI environment? Support requests are handled during normal business hours of 8am-6pm, Monday to Friday. For assistance outside normal business hours or in case of an emergency, support can be obtained by calling on-call support at: , extension 810 Note: Merchants must inform AS at least one week in advance of any critical business periods that require support above and beyond normal business hours. To notify AS, please submit a HelpSU ticket using this link: 3. What services are covered by AS? Build desktop, laptop and server systems using system image specifications agreed to by AS and merchants that are in compliance with PCI DSS standards Help integrate merchant's peripherals, such as printers, scanners, copiers, etc., into the PCI environment Troubleshoot all AS deployed PCI hardware and assist merchants with integrating their software into the AS PCI environment Work with PCI merchant management to help purchase new hardware and software as needed for the PCI environment

2 Work with ITS Networking Team to provide network management and troubleshooting Escalate problems that cannot be resolved by local desktop support staff and/or require additional infrastructure investigation by AS Operations, ITS, or other vendor (e.g., network, storage, etc.) Meet with merchant management once per quarter (or as needed) to discuss support issues and any other relevant matters related to PCI environment support Manage the PCI hardware inventory Manage the PCI firewall Manage the PCI Merchant Active Directory OU Maintain documentation and records of PCI support activities Respond to all client PCI help requests that come in via HelpSU 4. What service is NOT covered by AS? AS does not provide application support for proprietary and merchant specific point of sale (POS) systems, integrated business applications, and financial software that are specific to individual merchants such as: Micros, KABA, ClubProphet, Shift4, Paciolan, InforGenesis and ProfitWatch. For needed application support, individual merchants should maintain proper service and support contracts with respective application providers or vendors. 5. What is the process to obtain remote access to the PCI environment? To obtain remote access, you will need to submit a request for two-step authentication. Please see: How do I set up two-step authentication for access to the PCI environment? 6. How do I set up two-step authentication for access to the PCI environment? The PCI environment requires two-step authentication (also known as 2-factor authentication) to log in. The two-step authentication uses the Duo security application. You should have a smartphone or other mobile device to use the application. AS also recommends setting up a landline in case the mobile device has issues or is lost. Step 1: Request Personal Account Setup Submit a HelpSU request using this link: Include information in the request for both your mobile device and backup office landline. Please provide the following information: Full Name SUNet ID Contact phone number Device Name (cell/work/home/etc) Device Type (Mobile or Landline) For your mobile device, please specify the platform from these choices: Android Windows phone BlackBerry J2ME Symbian ios Windows mobile BlackBerry 10 WebOS Generic Smartphone For your mobile device, please specify one of these four authentication methods: (note: AS recommends method number 1, Duo Push) 1. Duo Push: Duo sends a login request to your phone. You just tap an Approve button to authenticate. 2. Duo Mobile Passcodes: Duo generates a single use passcode that you key in (this is similar to Google Authenticator). 3. SMS Passcodes: Duo sends a passcode via text message. You key in the passcode you receive. 4. Phone Callback: Duo calls your phone. You press any key to authenticate.

3 Step 2: Duo Application Installation and Activation You will receive 2 messages on your mobile device with instructions for installing and activating the Duo application. The first message contains a link to install the Duo application on your device. If you have already installed Duo, you can skip this step. The second message activates your device and associates it with the Duo account AS created for you in Step 1. The activation link is good for 24 hours and cannot be shared with other people on devices. Once you have completed the installation and activation, your Mobile App should look something like this: 7. How do I log in to the secure PCI environment? The PCI environment requires two-step authentication to log in. The two-step authentication uses the Duo security application. If you do not have this application enabled on your smartphone or other mobile device, see: How do I set up two-step authentication for access to the PCI environment? You connect to the PCI environment via a secure computer known as a bastion host. Step 1: Use Remote Desktop to connect to host computer

4 Open your Remote Desktop Connection program, and enter one of the fully qualified host names: pciinfraprd13.pci.stanford.edu /or/ pciinfraprd14.pci.stanford.edu Select the Connect button. In the Windows Security window, enter: pci\pci.your SUNet ID your PCI password Select the OK button. Acknowledge the policy notice by selecting the OK button.

5 Step 2: Provide your Duo application (two-step) authentication You will see an authenticating message. Open the Duo application on your mobile device. Select the authentication method that was set up for you. In this example, Duo Push. Depending on the authentication method used, complete the next step. In the Duo Push method, the Login Request page will display, and you select the Approve button. This will complete the log in process. Step 3: Use Remote Desktop to connect to your host: Open your Remote Desktop Connection program, and enter the fully qualified host names of your computer (i.e. AS-PCI- SLAC.pci.stanford.edu):

6 In the Windows Security window, enter: pci\pci.your SUNet ID your PCI password Select the OK button. Acknowledge the policy notice by selecting the OK button. 8. What is the maintenance schedule for the PCI environment? The following hours are designated for AS to perform normal, non-emergency system maintenance: Thursdays 4-6 am Saturdays 5-8 am Sundays 5-8 am The PCI environment may not be available during these maintenance windows if work is being performed. Any non-emergency maintenance work that impacts AS PCI merchant services will be communicated at least one week prior to the activity, and will only be scheduled with approval of the merchants. AS will contact merchants as soon as feasible about any emergency unscheduled maintenance or environment outage.

Initial DUO 2 Factor Setup, Install, Login and Verification

Initial DUO 2 Factor Setup, Install, Login and Verification Please read this entire document it contains important instructions that will help you with the setup and maintenance of your DUO account. PLEASE NOTE: Use of a smartphone is the fastest and simplest way

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Cisco AnyConnect VPN for: Windows 8

Cisco AnyConnect VPN for: Windows 8 Cisco AnyConnect VPN for: Windows 8 Introduction The following instructions detail how to set up Cisco VPN for Microsoft Windows using NetID+. You will need to use VPN with NetID+ if you are trying to

More information

Setting Up and Accessing VPN

Setting Up and Accessing VPN Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication

More information

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone

More information

Two-Step Authentication FAQ

Two-Step Authentication FAQ Two-Step Authentication FAQ General Questions Q: Why is Stanford requiring this additional step? A: Hackers, including foreign state-sponsored entities, are attacking university computer systems with ever-increasing

More information

Helpdesk and Technology Support Procedures

Helpdesk and Technology Support Procedures Procedures: Helpdesk and Technology Procedure Date: 10/27/2009 1.0 Purpose The Information Technology Services (ITS) Helpdesk is the single point of contact for technology support for all CCBC students,

More information

New User Enrollment Processes for Online Banking Services

New User Enrollment Processes for Online Banking Services This package contains instructions for setting up your Online Banking Account, estatements, Mobile Banking, Remote Check Deposit, and Text Banking. New User Enrollment Processes for Online Banking Services

More information

DUO SECURITY CISCO VPN USER GUIDE 1/27/2016

DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 CONTENTS Enrolling Your Devices... 2 Install Cisco AnyConnect VPN Client... 6 Connecting to a PC with Microsoft Remote Desktop... 8 Disconnecting the AnyConnect

More information

CENG Information Technology Services University of North Texas

CENG Information Technology Services University of North Texas CENG Information Technology Services University of North Texas for the Information Technology Services as applied To the University of North Texas College of Engineering 1.0 Agreement 1.1 Purpose CENGITS

More information

Prepared by: OIC OF SOUTH FLORIDA. May 2013

Prepared by: OIC OF SOUTH FLORIDA. May 2013 OIC OF SOUTH FLORIDA REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by OIC of South Florida for Information Technology Support Services. Interested vendors should

More information

Managed Security Services SLA Document. Response and Resolution Times

Managed Security Services SLA Document. Response and Resolution Times Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

Symmetry Networks. Corporate Managed Services Schedule

Symmetry Networks. Corporate Managed Services Schedule Symmetry Networks Corporate Managed Services Schedule A Managed Services Solution version 1.0 January 2015 This Service Schedule forms part of the Agreement between Us (Symmetry Networks Pty Ltd) and You

More information

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office

More information

Securing your Juniper SSL VPN with two-factor authentication.

Securing your Juniper SSL VPN with two-factor authentication. Securing your Juniper SSL VPN with two-factor authentication. Protecting Your VPNs With Two-Factor Authentication Two-factor authentication provides a second layer of security to VPN credentials by requiring

More information

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to:

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to: Create a Virtual Private Network (VPN) Connection 1 Virtual Private Network (VPN) The VPN service provides secure (encrypted) off-campus connection to access University resources. Use VPN to access Oracle

More information

University Systems Desktop Support Service Level Commitment

University Systems Desktop Support Service Level Commitment University Systems Desktop Support Service Level Commitment The Purpose of this Service Level Commitment (SLC) is to formally define the level of service University Systems will provide to UVic faculty,

More information

Internal Medicine Computing Support Services

Internal Medicine Computing Support Services Internal Medicine Computing Support Services Guide to Helpdesk and Computer Related Services for Division Administrators Project Involvement The Division Administrator (DA) is the primary IMCSS contact

More information

REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES

REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES Isothermal Planning & Development Commission (IPDC) REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by the IPDC for Information Technology Support Services. Interested

More information

Service Level Agreement

Service Level Agreement This document outlines the Service Level Agreement (SLA) between University Technology Services (UTS) and our Customers for the delivery of. The purpose of this agreement is threefold: 1. To clearly represent

More information

Technology Solutions For

Technology Solutions For Technology Solutions For THE PLAYBOOK Powered by The Datum Partner Advantage Introduction Over the next few months Datum will be transitioning IT services from your existing vendors. Born from the restaurant

More information

Service Support. First Level Support (Tier I) provides immediate response to emergencies and customer questions. TSD - First Level Support

Service Support. First Level Support (Tier I) provides immediate response to emergencies and customer questions. TSD - First Level Support Service Support 1.1. First Level Support First Level Support (Tier I) provides immediate response to emergencies and customer questions TSD - First Level Support Office: Sub-Division: Extension: E-mail:

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Get what s right for your business. Contact @lliance Technologies.

Get what s right for your business. Contact @lliance Technologies. Provisioning Looking for new technology? You need systems in line with your business goals. You also need those systems to interact seamlessly. We can help you get the right technology to the right place

More information

For FY 2016 the new Desktop Support Program rates will be: Business Class - $481/device Enterprise Class - $721/device

For FY 2016 the new Desktop Support Program rates will be: Business Class - $481/device Enterprise Class - $721/device Division/Department Representative Dear Rep, The Desktop Support Program is announcing changes to our rates for FY 2016. As a Cost Recovery Service we are expected to recover expenses related to the operations

More information

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO)

G-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO) Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PROFESSIONAL STORAGE (PRO) 5NINES 5NINES Data Centre Services Service Offered 5DRIVE PERSONAL CLOUD STORAGE with remote

More information

Upgrading to Duo Authentication VPN A Guide for Users of RAMS Systems

Upgrading to Duo Authentication VPN A Guide for Users of RAMS Systems Upgrading to Duo Authentication VPN A Guide for Users of RAMS Systems Users of the OVPRI RAMS systems who wish to work off campus must utilize the Virtual Private Network (VPN) made available by VCU Technology

More information

Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division

Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division 1/9 1. Executive Summary This Service Level Agreement ( SLA ) is between Computing

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

CCIT Technical Support Policy

CCIT Technical Support Policy Executive Summary In order to ensure that your experience with CCIT is as effective and efficient as possible, CCIT outlines in this policy its technical support process, request submission mechanisms,

More information

General Service Level Agreement

General Service Level Agreement General Service Level Agreement Pricing We offer an unlimited Break / Fix for each device. Cost is below. Server Management = $199 / month per server Network Management = $199 / month per company Desktop

More information

When Your Networkʼs Down, Call Crown

When Your Networkʼs Down, Call Crown When Your Networkʼs Down, Call Crown 521 W. Broad Avenue Albany, GA 31701 Phone: 229.317.7940 Fax: 229.317.7941 HelpDesk@CrownNetworking.com MANAGED SERVICES & FLAT RATE I.T. SUPPORT Our Managed Services,

More information

Allianz Global Investors Remote Access Guide

Allianz Global Investors Remote Access Guide Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 34 pages Please contact the Service Desk at Table of Contents 1. Introduction to the Remote Access Page

More information

CSG Windows Support Policy

CSG Windows Support Policy CSG Windows Support Policy This document describes the policies for service and support of computers running Microsoft Windows used by faculty and staff in the departments of Computer Science, Mathematics

More information

GLOBAL EXPRESS PAYMENT CENTER

GLOBAL EXPRESS PAYMENT CENTER GLOBAL EXPRESS PAYMENT CENTER USER GUIDE V1.4 EFFECTIVE 05/14/15 TABLE OF CONTENTS 03 Get Started Set Up Terminal Required Step by Admin Set Up Users Required Step by Admin Set Up Receipt Explore Dashboard

More information

Indiana Office of Technology (IOT) Delivery Services Enterprise Service Level Agreement (Version 7.0)

Indiana Office of Technology (IOT) Delivery Services Enterprise Service Level Agreement (Version 7.0) Indiana Office of Technology (IOT) Delivery Services Enterprise Service Level Agreement (Version 7.0) Prepared by: State of Indiana Indiana Office of Technology Delivery Services Prepared for: State of

More information

Multi-Factor Authentication FAQs

Multi-Factor Authentication FAQs General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to

More information

How To Protect Your Data From Being Stolen

How To Protect Your Data From Being Stolen DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

MDM User Guide June 2012

MDM User Guide June 2012 June 2012 Sy mantec Corporation, 2012 Page 1 Purpose of Document This document provides a guide for users of App Center to set up and use Mobile Device Management (MDM) capabilities. MDM allows the App

More information

Web Services and Systems-Planning Procedures

Web Services and Systems-Planning Procedures Web Services and Systems-Planning Procedures Contents INTRODUCTION... 3 OVERVIEW - CURRENT TECHNOLOGY BEING USED AT JACKSONVILLE UNIVERSITY... 4 HELP DESK WORK ORDER SYSTEM - FOOTPRINTS... 6 What needs

More information

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication

More information

Remote Access End User Reference Guide for Access to SJLinked Version 1.0 3/11/2014

Remote Access End User Reference Guide for Access to SJLinked Version 1.0 3/11/2014 Remote Access End User Reference Guide for Access to SJLinked Version 1.0 3/11/2014 Contents Introduction... 2 Installing Citrix Receiver for Windows... 3 Before You Begin... 3 System Requirements... 3

More information

Welcome to Remote Access Services (RAS)

Welcome to Remote Access Services (RAS) Welcome to Remote Access Services (RAS) Our goal is to provide you with seamless access to the TD network, including the TD intranet site, your applications and files, and other important work resources

More information

MSP Center Plus Features Checklist

MSP Center Plus Features Checklist Features Checklist Your evaluation is not complete until you check out top vendors and the price. Here is a list prepared based customer queries. Features General Easy web interface with admin, technician,

More information

Install and End User Reference Guide for Direct Access to Citrix Applications

Install and End User Reference Guide for Direct Access to Citrix Applications Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a

More information

Remote Access End User Reference Guide for F5 Edge VPN Client Access

Remote Access End User Reference Guide for F5 Edge VPN Client Access Remote Access End User Reference Guide for F5 Edge VPN Client Access Version 2.1 3/2/2015 This remote access end user reference guide provides an overview of how to download and install the F5 Edge VPN

More information

Support Procedures Last Updated: May 7, 2008

Support Procedures Last Updated: May 7, 2008 Support Procedures Last Updated: May 7, 2008 Table of Contents Support Scope... 1 Support Levels... 2 Web Support vs. Phone Support... 4 Entering a Ticket... 4 How to get support... 5 Requests & Minor

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Information Technology Services. HelpDesk. Service Level Agreement (SLA) Effective November 13, 2012

Information Technology Services. HelpDesk. Service Level Agreement (SLA) Effective November 13, 2012 Information Technology Services HelpDesk Service Level Agreement (SLA) Effective November 13, 2012 Holy Family University IT Service Level Agreement Page 1 Holy Family University Information Technology

More information

CSU, Chico Credit Card PCI-DSS Risk Assessment

CSU, Chico Credit Card PCI-DSS Risk Assessment CSU, Chico Credit Card PCI-DSS Risk Assessment Division/ Department Name: Merchant ID Financial Account Location (University, Auxiliary Organization) Business unit functional contact: : Title: Telephone:

More information

Remote Desktop Solution, (RDS), replacing CITRIX Home Access

Remote Desktop Solution, (RDS), replacing CITRIX Home Access Remote Desktop Solution, (RDS), replacing CITRIX Home Access RDS Applications on a Computer Overview RDS has replaced citrix for remote access at home for College staff and pupils. This does not replace

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

CLEAR Faculty Help Desk Service Level Agreement (SLA) - Last updated 03/19/2013

CLEAR Faculty Help Desk Service Level Agreement (SLA) - Last updated 03/19/2013 CLEAR Faculty Help Desk Service Level Agreement (SLA) - Last updated 03/19/2013 Table of Contents Purpose.A Scope of Support...B Ways to Request Support.C Requests Pending User Response..D Service Escalations..

More information

Web based training for field technicians can be arranged by calling 888-577-4919 These Documents are required for a successful install:

Web based training for field technicians can be arranged by calling 888-577-4919 These Documents are required for a successful install: Software V NO. 1.7 Date 9/06 ROI Configuration Guide Before you begin: Note: It is important before beginning to review all installation documentation and to complete the ROI Network checklist for the

More information

This guide provides all of the information necessary to connect to MoFo resources from outside of the office

This guide provides all of the information necessary to connect to MoFo resources from outside of the office REMOTE ACCESS GUIDE INTRODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office Links to topics in this document Connect remotely from your

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Discovering Computers

Discovering Computers Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 9 Operating Systems Objectives Overview Define an operating system Describe the start-up process and shutdown

More information

Two Factor Authentication - USER GUIDE

Two Factor Authentication - USER GUIDE Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.

More information

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools I hope you remember Meraki, a company involved in making sensors and which was sold to IBM few years

More information

Windows 7 Hula POS Server Installation Guide

Windows 7 Hula POS Server Installation Guide Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3

More information

ManageEngine Desktop Central. Mobile Device Management User Guide

ManageEngine Desktop Central. Mobile Device Management User Guide ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...

More information

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th

More information

DESKTOP SUPPORT SERVICE LEVEL AGREEMENT

DESKTOP SUPPORT SERVICE LEVEL AGREEMENT DESKTOP SUPPORT SERVICE LEVEL AGREEMENT Pace University and Client Support Offices Summary This document covers the desktop support services offered from the Client Support Office for Pace University members.

More information

Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute

Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Management Service Level Management deals with how user service requirements are understood and managed.

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

How To Use The Pace Help Desk

How To Use The Pace Help Desk ITS HELP DESK SUPPORT Pace University and ITS Help Desk Summary This document covers the help desk support services offered from the ITS Help Desk for Pace University members. User Services ITS Help Desk

More information

How To Use A Citrix Netscaler Thin Client V1.09.10.1 (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn

How To Use A Citrix Netscaler Thin Client V1.09.10.1 (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn Our Mission Statement To ensure that we are providing quality and efficient services and solutions that are consistent with the strategic goals of the Area, and that are closely aligned with the State's

More information

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following

More information

AllianceIT Managed Services

AllianceIT Managed Services AllianceIT Managed Services confidence predictability productivity focus Uncertainty is a business killer. To be successful, companies have to know that their critical IT systems will be available on demand

More information

Note: Support: Never use your TruMobi email application for personal use.

Note: Support: Never use your TruMobi email application for personal use. BYOD - Setting up Email Access on your ios mobile device This document provides step-by-step instructions for setting up corporate account on your ios mobile device. Note: The TruMobi email application

More information

How To Manage Your Information Systems At Aerosoft.Com

How To Manage Your Information Systems At Aerosoft.Com Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented

More information

What is Two-Factor Authentication?

What is Two-Factor Authentication? What is Two-Factor Authentication? Two-factor authentication adds a second layer of security to your online accounts. Verifying your identity using a second factor (like your phone or other mobile device)

More information

SysAid MDM User Guide for Android

SysAid MDM User Guide for Android SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Remote Access End User Reference Guide for SHC Portal Access

Remote Access End User Reference Guide for SHC Portal Access Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required

More information

INFORMATION TECHNOLOGY TECHNICIAN I INFORMATION TECHNOLOGY TECHNICIAN II

INFORMATION TECHNOLOGY TECHNICIAN I INFORMATION TECHNOLOGY TECHNICIAN II CITY OF ROSEVILLE INFORMATION TECHNOLOGY TECHNICIAN I INFORMATION TECHNOLOGY TECHNICIAN II DEFINITION To perform responsible technical duties related to computer hardware and software customer support;

More information

IT Information Packet

IT Information Packet IT Information Packet Welcome to the University of Mount Olive! Beginning college is an exciting time where you will be experiencing many new things in a short amount of time. We understand that technology

More information

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required

More information

McDonough School of Business: MSBTC SLA 2014

McDonough School of Business: MSBTC SLA 2014 McDonough School of Business: MSBTC SLA 2014 Contents Service Level Agreement... 4 Contacting a Technician... 4 MSBTC Hours of Operation... 5 Trouble Call Problem Priority... 5 Priority 1... 5 Priority

More information

Instructions for installing Citrix Receiver

Instructions for installing Citrix Receiver Instructions for installing Citrix Receiver Remote Access End User Reference Guide for Access to SJLinked Version 1.0 4/21/2014 Contents Introduction... 2 Installing Citrix Receiver for Windows... 3 Before

More information

Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2

Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2 Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2 Created: May 22, 2008 Updated: April 23, 2009 The RSA Web Express web express web site automates functions required to deploy hardware

More information

Migrating helpdesk to a new server

Migrating helpdesk to a new server Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2

More information

Mary Immaculate. ICT Services. ICT Helpdesk. User Guide

Mary Immaculate. ICT Services. ICT Helpdesk. User Guide Mary Immaculate ICT Services ICT Helpdesk User Guide Table of Contents 1. Introduction 3 2. How To Log A Call With The ICT Helpdesk 3 2.1 Email 3 2.2 Phone 3 2.3 Voicemail 3 2.4 Web Self Service Option

More information

Office of Information Technology Addendum to Managed Workstation Service Level Agreement

Office of Information Technology Addendum to Managed Workstation Service Level Agreement Office of Information Technology Addendum to Managed Workstation Service Level Agreement This Addendum further defines and explains the Basic Support, Extended Support and Premium Support Level Services

More information

1-888-440-3311 P.O. Box 1937, Hughesville, MD 20637. www.smeco.coop

1-888-440-3311 P.O. Box 1937, Hughesville, MD 20637. www.smeco.coop 1-888-440-3311 P.O. Box 1937, Hughesville, MD 20637 People. Power. Progress. www.smeco.coop SMECO Supplier Diversity- IT Opportunity Announcement Anticipated Award Date: Q1 2016 Place of Performance: Hughesville,

More information

Ohio University Office of Information Technology

Ohio University Office of Information Technology Standard Desktop Support General Overview Standard Desktop Support service level of the Office of Information Technology (OIT) is comprised of: The Standard Desktop Support (SDS) Service The general levels

More information

Configure AirWatch for Your Mobile Device

Configure AirWatch for Your Mobile Device Configure AirWatch for Your Mobile Device These instructions created using an Android Smartphone AirWatch Mobile Device Management (MDM) Agent is an app that provides faculty and staff secure access to

More information

These Frequently Asked Questions include information about both the Remote Identity Proofing (RIDP) and

These Frequently Asked Questions include information about both the Remote Identity Proofing (RIDP) and Questions and Answers about Remote Identity Proofing and Multi- Factor Authentication About the Frequently Asked Questions These Frequently Asked Questions include information about both the Remote Identity

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007

Fully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007 Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232

More information

Booth Gmail Configuration

Booth Gmail Configuration Student email is accessed via a Booth branded Gmail service. Student mailboxes will be accessed via Gmail. Configure Gmail Settings Before you connect Gmail to send and receive Booth Gmail on your mobile

More information

Instructions for Using Secure Email. (SMail) via Outlook Web Access. with an RSA Token

Instructions for Using Secure Email. (SMail) via Outlook Web Access. with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy Requirements

More information