Administrative Systems
|
|
- Kelly Norman
- 8 years ago
- Views:
Transcription
1 Administrative Systems Administrative Systems PCI Infrastructure Services Reference Compliance with the Payment Card Industry s Data Security Standard (PCI DSS) is critical for all merchants who accept credit cards at Stanford University. Administrative Systems (AS) provides infrastructure technical services for PCI DSS compliance to ensure merchants meet the infrastructure compliance requirements. AS provides centralized services of monitoring, patching, anti-virus and logging for workstations that are installed and maintained in a PCI-dedicated secure environment. At the same time, AS also provides the standard IT desktop services for the dedicated PCI workstations to keep them up and running for payment and business needs. For detailed support and services information, please refer to the following information. Frequently Asked Questions (FAQ) 1. How do I request support for the PCI environment? 2. What are the support hours for the PCI environment? 3. What services are covered by AS? 4. What service is NOT covered by AS? 5. What is the process to obtain remote access to the PCI environment? 6. How do I set up two-step authentication for access to the PCI environment? 7. How do I log in to the secure PCI environment? 8. What is the maintenance schedule for the PCI environment? 1. How do I request support for the PCI environment? Support requests should be submitted through the Stanford Help Request System, HelpSU. Please use these specific links depending on the request type, as they are not available in the main HelpSU form: Request Type Link PCI Desktop PCI Server 2. What are the support hours for the PCI environment? Support requests are handled during normal business hours of 8am-6pm, Monday to Friday. For assistance outside normal business hours or in case of an emergency, support can be obtained by calling on-call support at: , extension 810 Note: Merchants must inform AS at least one week in advance of any critical business periods that require support above and beyond normal business hours. To notify AS, please submit a HelpSU ticket using this link: 3. What services are covered by AS? Build desktop, laptop and server systems using system image specifications agreed to by AS and merchants that are in compliance with PCI DSS standards Help integrate merchant's peripherals, such as printers, scanners, copiers, etc., into the PCI environment Troubleshoot all AS deployed PCI hardware and assist merchants with integrating their software into the AS PCI environment Work with PCI merchant management to help purchase new hardware and software as needed for the PCI environment
2 Work with ITS Networking Team to provide network management and troubleshooting Escalate problems that cannot be resolved by local desktop support staff and/or require additional infrastructure investigation by AS Operations, ITS, or other vendor (e.g., network, storage, etc.) Meet with merchant management once per quarter (or as needed) to discuss support issues and any other relevant matters related to PCI environment support Manage the PCI hardware inventory Manage the PCI firewall Manage the PCI Merchant Active Directory OU Maintain documentation and records of PCI support activities Respond to all client PCI help requests that come in via HelpSU 4. What service is NOT covered by AS? AS does not provide application support for proprietary and merchant specific point of sale (POS) systems, integrated business applications, and financial software that are specific to individual merchants such as: Micros, KABA, ClubProphet, Shift4, Paciolan, InforGenesis and ProfitWatch. For needed application support, individual merchants should maintain proper service and support contracts with respective application providers or vendors. 5. What is the process to obtain remote access to the PCI environment? To obtain remote access, you will need to submit a request for two-step authentication. Please see: How do I set up two-step authentication for access to the PCI environment? 6. How do I set up two-step authentication for access to the PCI environment? The PCI environment requires two-step authentication (also known as 2-factor authentication) to log in. The two-step authentication uses the Duo security application. You should have a smartphone or other mobile device to use the application. AS also recommends setting up a landline in case the mobile device has issues or is lost. Step 1: Request Personal Account Setup Submit a HelpSU request using this link: Include information in the request for both your mobile device and backup office landline. Please provide the following information: Full Name SUNet ID Contact phone number Device Name (cell/work/home/etc) Device Type (Mobile or Landline) For your mobile device, please specify the platform from these choices: Android Windows phone BlackBerry J2ME Symbian ios Windows mobile BlackBerry 10 WebOS Generic Smartphone For your mobile device, please specify one of these four authentication methods: (note: AS recommends method number 1, Duo Push) 1. Duo Push: Duo sends a login request to your phone. You just tap an Approve button to authenticate. 2. Duo Mobile Passcodes: Duo generates a single use passcode that you key in (this is similar to Google Authenticator). 3. SMS Passcodes: Duo sends a passcode via text message. You key in the passcode you receive. 4. Phone Callback: Duo calls your phone. You press any key to authenticate.
3 Step 2: Duo Application Installation and Activation You will receive 2 messages on your mobile device with instructions for installing and activating the Duo application. The first message contains a link to install the Duo application on your device. If you have already installed Duo, you can skip this step. The second message activates your device and associates it with the Duo account AS created for you in Step 1. The activation link is good for 24 hours and cannot be shared with other people on devices. Once you have completed the installation and activation, your Mobile App should look something like this: 7. How do I log in to the secure PCI environment? The PCI environment requires two-step authentication to log in. The two-step authentication uses the Duo security application. If you do not have this application enabled on your smartphone or other mobile device, see: How do I set up two-step authentication for access to the PCI environment? You connect to the PCI environment via a secure computer known as a bastion host. Step 1: Use Remote Desktop to connect to host computer
4 Open your Remote Desktop Connection program, and enter one of the fully qualified host names: pciinfraprd13.pci.stanford.edu /or/ pciinfraprd14.pci.stanford.edu Select the Connect button. In the Windows Security window, enter: pci\pci.your SUNet ID your PCI password Select the OK button. Acknowledge the policy notice by selecting the OK button.
5 Step 2: Provide your Duo application (two-step) authentication You will see an authenticating message. Open the Duo application on your mobile device. Select the authentication method that was set up for you. In this example, Duo Push. Depending on the authentication method used, complete the next step. In the Duo Push method, the Login Request page will display, and you select the Approve button. This will complete the log in process. Step 3: Use Remote Desktop to connect to your host: Open your Remote Desktop Connection program, and enter the fully qualified host names of your computer (i.e. AS-PCI- SLAC.pci.stanford.edu):
6 In the Windows Security window, enter: pci\pci.your SUNet ID your PCI password Select the OK button. Acknowledge the policy notice by selecting the OK button. 8. What is the maintenance schedule for the PCI environment? The following hours are designated for AS to perform normal, non-emergency system maintenance: Thursdays 4-6 am Saturdays 5-8 am Sundays 5-8 am The PCI environment may not be available during these maintenance windows if work is being performed. Any non-emergency maintenance work that impacts AS PCI merchant services will be communicated at least one week prior to the activity, and will only be scheduled with approval of the merchants. AS will contact merchants as soon as feasible about any emergency unscheduled maintenance or environment outage.
Initial DUO 2 Factor Setup, Install, Login and Verification
Please read this entire document it contains important instructions that will help you with the setup and maintenance of your DUO account. PLEASE NOTE: Use of a smartphone is the fastest and simplest way
More informationTwo Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
More informationCisco AnyConnect VPN for: Windows 8
Cisco AnyConnect VPN for: Windows 8 Introduction The following instructions detail how to set up Cisco VPN for Microsoft Windows using NetID+. You will need to use VPN with NetID+ if you are trying to
More informationSetting Up and Accessing VPN
Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication
More informationMonthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month
SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone
More informationTwo-Step Authentication FAQ
Two-Step Authentication FAQ General Questions Q: Why is Stanford requiring this additional step? A: Hackers, including foreign state-sponsored entities, are attacking university computer systems with ever-increasing
More informationHelpdesk and Technology Support Procedures
Procedures: Helpdesk and Technology Procedure Date: 10/27/2009 1.0 Purpose The Information Technology Services (ITS) Helpdesk is the single point of contact for technology support for all CCBC students,
More informationNew User Enrollment Processes for Online Banking Services
This package contains instructions for setting up your Online Banking Account, estatements, Mobile Banking, Remote Check Deposit, and Text Banking. New User Enrollment Processes for Online Banking Services
More informationDUO SECURITY CISCO VPN USER GUIDE 1/27/2016
DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 CONTENTS Enrolling Your Devices... 2 Install Cisco AnyConnect VPN Client... 6 Connecting to a PC with Microsoft Remote Desktop... 8 Disconnecting the AnyConnect
More informationCENG Information Technology Services University of North Texas
CENG Information Technology Services University of North Texas for the Information Technology Services as applied To the University of North Texas College of Engineering 1.0 Agreement 1.1 Purpose CENGITS
More informationPrepared by: OIC OF SOUTH FLORIDA. May 2013
OIC OF SOUTH FLORIDA REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by OIC of South Florida for Information Technology Support Services. Interested vendors should
More informationManaged Security Services SLA Document. Response and Resolution Times
Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response
More informationQuick Start Guide. Version R9. English
Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationIntroduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
More informationSymmetry Networks. Corporate Managed Services Schedule
Symmetry Networks Corporate Managed Services Schedule A Managed Services Solution version 1.0 January 2015 This Service Schedule forms part of the Agreement between Us (Symmetry Networks Pty Ltd) and You
More informationManaged Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043
Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office
More informationSecuring your Juniper SSL VPN with two-factor authentication.
Securing your Juniper SSL VPN with two-factor authentication. Protecting Your VPNs With Two-Factor Authentication Two-factor authentication provides a second layer of security to VPN credentials by requiring
More informationThe University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to:
Create a Virtual Private Network (VPN) Connection 1 Virtual Private Network (VPN) The VPN service provides secure (encrypted) off-campus connection to access University resources. Use VPN to access Oracle
More informationUniversity Systems Desktop Support Service Level Commitment
University Systems Desktop Support Service Level Commitment The Purpose of this Service Level Commitment (SLC) is to formally define the level of service University Systems will provide to UVic faculty,
More informationInternal Medicine Computing Support Services
Internal Medicine Computing Support Services Guide to Helpdesk and Computer Related Services for Division Administrators Project Involvement The Division Administrator (DA) is the primary IMCSS contact
More informationREQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES
Isothermal Planning & Development Commission (IPDC) REQUEST FOR PROPOSAL-INFORMATION TECHNOLOGY SUPPORT SERVICES Proposals will be received by the IPDC for Information Technology Support Services. Interested
More informationService Level Agreement
This document outlines the Service Level Agreement (SLA) between University Technology Services (UTS) and our Customers for the delivery of. The purpose of this agreement is threefold: 1. To clearly represent
More informationTechnology Solutions For
Technology Solutions For THE PLAYBOOK Powered by The Datum Partner Advantage Introduction Over the next few months Datum will be transitioning IT services from your existing vendors. Born from the restaurant
More informationService Support. First Level Support (Tier I) provides immediate response to emergencies and customer questions. TSD - First Level Support
Service Support 1.1. First Level Support First Level Support (Tier I) provides immediate response to emergencies and customer questions TSD - First Level Support Office: Sub-Division: Extension: E-mail:
More informationClient Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
More informationGet what s right for your business. Contact @lliance Technologies.
Provisioning Looking for new technology? You need systems in line with your business goals. You also need those systems to interact seamlessly. We can help you get the right technology to the right place
More informationFor FY 2016 the new Desktop Support Program rates will be: Business Class - $481/device Enterprise Class - $721/device
Division/Department Representative Dear Rep, The Desktop Support Program is announcing changes to our rates for FY 2016. As a Cost Recovery Service we are expected to recover expenses related to the operations
More informationG-CLOUD FRAMEWORK RM1557-vi 5DRIVE PROFESSIONAL STORAGE (PRO)
Commercial in Confidence 1 G-CLOUD FRAMEWORK RM1557-vi SERVICE DEFINITION 5DRIVE PROFESSIONAL STORAGE (PRO) 5NINES 5NINES Data Centre Services Service Offered 5DRIVE PERSONAL CLOUD STORAGE with remote
More informationUpgrading to Duo Authentication VPN A Guide for Users of RAMS Systems
Upgrading to Duo Authentication VPN A Guide for Users of RAMS Systems Users of the OVPRI RAMS systems who wish to work off campus must utilize the Virtual Private Network (VPN) made available by VCU Technology
More informationService Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division
Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division 1/9 1. Executive Summary This Service Level Agreement ( SLA ) is between Computing
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationMobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
More informationCCIT Technical Support Policy
Executive Summary In order to ensure that your experience with CCIT is as effective and efficient as possible, CCIT outlines in this policy its technical support process, request submission mechanisms,
More informationGeneral Service Level Agreement
General Service Level Agreement Pricing We offer an unlimited Break / Fix for each device. Cost is below. Server Management = $199 / month per server Network Management = $199 / month per company Desktop
More informationWhen Your Networkʼs Down, Call Crown
When Your Networkʼs Down, Call Crown 521 W. Broad Avenue Albany, GA 31701 Phone: 229.317.7940 Fax: 229.317.7941 HelpDesk@CrownNetworking.com MANAGED SERVICES & FLAT RATE I.T. SUPPORT Our Managed Services,
More informationAllianz Global Investors Remote Access Guide
Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 34 pages Please contact the Service Desk at Table of Contents 1. Introduction to the Remote Access Page
More informationCSG Windows Support Policy
CSG Windows Support Policy This document describes the policies for service and support of computers running Microsoft Windows used by faculty and staff in the departments of Computer Science, Mathematics
More informationGLOBAL EXPRESS PAYMENT CENTER
GLOBAL EXPRESS PAYMENT CENTER USER GUIDE V1.4 EFFECTIVE 05/14/15 TABLE OF CONTENTS 03 Get Started Set Up Terminal Required Step by Admin Set Up Users Required Step by Admin Set Up Receipt Explore Dashboard
More informationIndiana Office of Technology (IOT) Delivery Services Enterprise Service Level Agreement (Version 7.0)
Indiana Office of Technology (IOT) Delivery Services Enterprise Service Level Agreement (Version 7.0) Prepared by: State of Indiana Indiana Office of Technology Delivery Services Prepared for: State of
More informationMulti-Factor Authentication FAQs
General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your
More informationGuide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
More informationHow To Protect Your Data From Being Stolen
DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationMDM User Guide June 2012
June 2012 Sy mantec Corporation, 2012 Page 1 Purpose of Document This document provides a guide for users of App Center to set up and use Mobile Device Management (MDM) capabilities. MDM allows the App
More informationWeb Services and Systems-Planning Procedures
Web Services and Systems-Planning Procedures Contents INTRODUCTION... 3 OVERVIEW - CURRENT TECHNOLOGY BEING USED AT JACKSONVILLE UNIVERSITY... 4 HELP DESK WORK ORDER SYSTEM - FOOTPRINTS... 6 What needs
More informationTwo-Factor Authentication (2FA) Registration Instructions Symantec VIP Access
Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication
More informationRemote Access End User Reference Guide for Access to SJLinked Version 1.0 3/11/2014
Remote Access End User Reference Guide for Access to SJLinked Version 1.0 3/11/2014 Contents Introduction... 2 Installing Citrix Receiver for Windows... 3 Before You Begin... 3 System Requirements... 3
More informationWelcome to Remote Access Services (RAS)
Welcome to Remote Access Services (RAS) Our goal is to provide you with seamless access to the TD network, including the TD intranet site, your applications and files, and other important work resources
More informationMSP Center Plus Features Checklist
Features Checklist Your evaluation is not complete until you check out top vendors and the price. Here is a list prepared based customer queries. Features General Easy web interface with admin, technician,
More informationInstall and End User Reference Guide for Direct Access to Citrix Applications
Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a
More informationRemote Access End User Reference Guide for F5 Edge VPN Client Access
Remote Access End User Reference Guide for F5 Edge VPN Client Access Version 2.1 3/2/2015 This remote access end user reference guide provides an overview of how to download and install the F5 Edge VPN
More informationSupport Procedures Last Updated: May 7, 2008
Support Procedures Last Updated: May 7, 2008 Table of Contents Support Scope... 1 Support Levels... 2 Web Support vs. Phone Support... 4 Entering a Ticket... 4 How to get support... 5 Requests & Minor
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationInformation Technology Services. HelpDesk. Service Level Agreement (SLA) Effective November 13, 2012
Information Technology Services HelpDesk Service Level Agreement (SLA) Effective November 13, 2012 Holy Family University IT Service Level Agreement Page 1 Holy Family University Information Technology
More informationCSU, Chico Credit Card PCI-DSS Risk Assessment
CSU, Chico Credit Card PCI-DSS Risk Assessment Division/ Department Name: Merchant ID Financial Account Location (University, Auxiliary Organization) Business unit functional contact: : Title: Telephone:
More informationRemote Desktop Solution, (RDS), replacing CITRIX Home Access
Remote Desktop Solution, (RDS), replacing CITRIX Home Access RDS Applications on a Computer Overview RDS has replaced citrix for remote access at home for College staff and pupils. This does not replace
More informationResearch Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
More informationCLEAR Faculty Help Desk Service Level Agreement (SLA) - Last updated 03/19/2013
CLEAR Faculty Help Desk Service Level Agreement (SLA) - Last updated 03/19/2013 Table of Contents Purpose.A Scope of Support...B Ways to Request Support.C Requests Pending User Response..D Service Escalations..
More informationWeb based training for field technicians can be arranged by calling 888-577-4919 These Documents are required for a successful install:
Software V NO. 1.7 Date 9/06 ROI Configuration Guide Before you begin: Note: It is important before beginning to review all installation documentation and to complete the ROI Network checklist for the
More informationThis guide provides all of the information necessary to connect to MoFo resources from outside of the office
REMOTE ACCESS GUIDE INTRODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office Links to topics in this document Connect remotely from your
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationDiscovering Computers
Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 9 Operating Systems Objectives Overview Define an operating system Describe the start-up process and shutdown
More informationTwo Factor Authentication - USER GUIDE
Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.
More informationA Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools
A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools I hope you remember Meraki, a company involved in making sensors and which was sold to IBM few years
More informationWindows 7 Hula POS Server Installation Guide
Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3
More informationManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
More informationBlackBerry Universal Device Service. Demo Access. AUTHOR: System4u
Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th
More informationDESKTOP SUPPORT SERVICE LEVEL AGREEMENT
DESKTOP SUPPORT SERVICE LEVEL AGREEMENT Pace University and Client Support Offices Summary This document covers the desktop support services offered from the Client Support Office for Pace University members.
More informationService Level Agreement and Management By: Harris Kern s Enterprise Computing Institute
Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Management Service Level Management deals with how user service requirements are understood and managed.
More informationTechnology Services Group Procedures. IH Anywhere guide. 0 P a g e
VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple
More informationCustomized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
More informationHow To Use The Pace Help Desk
ITS HELP DESK SUPPORT Pace University and ITS Help Desk Summary This document covers the help desk support services offered from the ITS Help Desk for Pace University members. User Services ITS Help Desk
More informationHow To Use A Citrix Netscaler Thin Client V1.09.10.1 (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn
Our Mission Statement To ensure that we are providing quality and efficient services and solutions that are consistent with the strategic goals of the Area, and that are closely aligned with the State's
More informationNetwork Computing Architects Inc. (NCA) Network Operations Center (NOC) Services
Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following
More informationAllianceIT Managed Services
AllianceIT Managed Services confidence predictability productivity focus Uncertainty is a business killer. To be successful, companies have to know that their critical IT systems will be available on demand
More informationNote: Support: Never use your TruMobi email application for personal use.
BYOD - Setting up Email Access on your ios mobile device This document provides step-by-step instructions for setting up corporate account on your ios mobile device. Note: The TruMobi email application
More informationHow To Manage Your Information Systems At Aerosoft.Com
Your information systems are at the heart of your businesses daily operation. System down time costs businesses a significant amount of money each year. Most problems that cause down time can be prevented
More informationWhat is Two-Factor Authentication?
What is Two-Factor Authentication? Two-factor authentication adds a second layer of security to your online accounts. Verifying your identity using a second factor (like your phone or other mobile device)
More informationSysAid MDM User Guide for Android
SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction
More informationGadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile
More informationRemote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
More informationINFORMATION TECHNOLOGY TECHNICIAN I INFORMATION TECHNOLOGY TECHNICIAN II
CITY OF ROSEVILLE INFORMATION TECHNOLOGY TECHNICIAN I INFORMATION TECHNOLOGY TECHNICIAN II DEFINITION To perform responsible technical duties related to computer hardware and software customer support;
More informationIT Information Packet
IT Information Packet Welcome to the University of Mount Olive! Beginning college is an exciting time where you will be experiencing many new things in a short amount of time. We understand that technology
More informationSHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
More informationMcDonough School of Business: MSBTC SLA 2014
McDonough School of Business: MSBTC SLA 2014 Contents Service Level Agreement... 4 Contacting a Technician... 4 MSBTC Hours of Operation... 5 Trouble Call Problem Priority... 5 Priority 1... 5 Priority
More informationInstructions for installing Citrix Receiver
Instructions for installing Citrix Receiver Remote Access End User Reference Guide for Access to SJLinked Version 1.0 4/21/2014 Contents Introduction... 2 Installing Citrix Receiver for Windows... 3 Before
More informationDepartment of Supply & Services (CIMS) RSA Web Express User Guide v1.2
Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2 Created: May 22, 2008 Updated: April 23, 2009 The RSA Web Express web express web site automates functions required to deploy hardware
More informationMigrating helpdesk to a new server
Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2
More informationMary Immaculate. ICT Services. ICT Helpdesk. User Guide
Mary Immaculate ICT Services ICT Helpdesk User Guide Table of Contents 1. Introduction 3 2. How To Log A Call With The ICT Helpdesk 3 2.1 Email 3 2.2 Phone 3 2.3 Voicemail 3 2.4 Web Self Service Option
More informationOffice of Information Technology Addendum to Managed Workstation Service Level Agreement
Office of Information Technology Addendum to Managed Workstation Service Level Agreement This Addendum further defines and explains the Basic Support, Extended Support and Premium Support Level Services
More information1-888-440-3311 P.O. Box 1937, Hughesville, MD 20637. www.smeco.coop
1-888-440-3311 P.O. Box 1937, Hughesville, MD 20637 People. Power. Progress. www.smeco.coop SMECO Supplier Diversity- IT Opportunity Announcement Anticipated Award Date: Q1 2016 Place of Performance: Hughesville,
More informationOhio University Office of Information Technology
Standard Desktop Support General Overview Standard Desktop Support service level of the Office of Information Technology (OIT) is comprised of: The Standard Desktop Support (SDS) Service The general levels
More informationConfigure AirWatch for Your Mobile Device
Configure AirWatch for Your Mobile Device These instructions created using an Android Smartphone AirWatch Mobile Device Management (MDM) Agent is an app that provides faculty and staff secure access to
More informationThese Frequently Asked Questions include information about both the Remote Identity Proofing (RIDP) and
Questions and Answers about Remote Identity Proofing and Multi- Factor Authentication About the Frequently Asked Questions These Frequently Asked Questions include information about both the Remote Identity
More informationKaseya 2. User Guide. Version 1.0
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
More informationFully Managed IT Support. Proactive Maintenance. Disaster Recovery. Remote Support. Service Desk. Call Centre. Fully Managed Services Guide July 2007
Fully Managed IT Support Proactive Maintenance Disaster Recovery Remote Support Service Desk Call Centre London Office ITVET Limited 2 nd Floor 145 157 St John Street London EC1V 4PY t: +44(0)8704 232
More informationBooth Gmail Configuration
Student email is accessed via a Booth branded Gmail service. Student mailboxes will be accessed via Gmail. Configure Gmail Settings Before you connect Gmail to send and receive Booth Gmail on your mobile
More informationInstructions for Using Secure Email. (SMail) via Outlook Web Access. with an RSA Token
Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy Requirements
More information