Network Detective. Network Detective Inspector RapidFire Tools, Inc. All rights reserved Ver 3D

Size: px
Start display at page:

Download "Network Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D"

Transcription

1 Network Detective 2015 RapidFire Tools, Inc. All rights reserved Ver 3D

2 Contents Overview... 3 Components of the Inspector... 3 Inspector Appliance... 3 Inspector Diagnostic Tool... 3 Network Detective Application... 3 Inspector Features... 4 IT and Compliance Assessment Data Collection and Scans... 4 Automated Assessment Reporting... 5 Tech Alerts... 5 Security Bulletins... 6 Remote Updating of the Appliance... 6 Automated Scanning and Scheduling Best Practices... 7 Getting Started... 8 Connecting the Inspector... 8 Associating the Appliance to a Site... 9 Step 1 - Creating a New Site... 9 Step 2 - Adding an Inspector to a Site Creating New Scans Selecting and Configuring Data Collection Scans Using Inspector Network Scan Network Scan with Layer 2/3 Discovery Internal Vulnerability Scan SQL Server Data Collection Local Data Scans HIPAA Compliance Scans PCI Compliance Scans External Vulnerability Scan Managing the Scan Queue Scheduling a Scan Scan Library versus Scan Queue

3 Cancelling a Scan Downloading Scans Preferences Menu Options Setting the Master Inspector Alerting Preferences Steps to Set Master Inspector Alerting Preferences Using the Manage Inspector Feature to Configure Automatic Report Generation Setting Up Automatic Reports for Network Assessments Setting Up Automatic Reports for Security Assessments Setting Up Automatic Reports for HIPAA Compliance Assessments Setting Up Automatic Reports for PCI Compliance Assessments Setting Up Tech Alerts and Security Bulletins Setting Up Tech Alerts Suppressing No Issues Tech Alerts Setting-up Security Bulletins Suppressing No Issues Security Bulletins Configuring the Local Data Scan Merges Updating the Inspector Appliance Appendices Appendix I Diagnostic Tool

4 Overview The is an appliance-based system used for performing scheduled IT and Compliance assessment scans, automatic assessment reporting, IT infrastructure change alerts, security bulletins, and deeper dive diagnostics. This guide is designed to provide an overview and specific steps required to install and configure the Inspector appliance and schedule the collection of data remotely, schedule automated assessment reports, issue network change related Tech Alerts, and brandable Security Bulletins. Components of the Inspector Inspector Appliance This is the hardware component of the Inspector. It is a small, portable appliance which plugs into the target network through an Ethernet connection. Inspector Diagnostic Tool This tool is used for configuring and troubleshooting the Inspector. The Diagnostic Tool should be run on the same network as the Inspector appliance to perform diagnostics checks such as for Inspector connectivity or for available updates. Network Detective Application This is the same Network Detective desktop application and report generator that is used with any other Network Detective modules. This application contains additional features to manage the Inspector remotely. 3

5 Inspector Features IT and Compliance Assessment Data Collection and Scans One key purpose of the is to perform scans from the point-of-view of the client s internal network. Below is an overview of the scans that can be performed by the Inspector Appliance. Network Assessment Network Scan Note that this feature requires the Network Assessment Module. The full Network Assessment Scan from the point-of-view of the Inspector Appliance. The resulting scan can be used to generate reports from the Network Assessment module. Layer 2/3 Discovery of Network Devices (Exclusive to the Inspector) Run when the Network Assessment Network Scan is executed. Scans network devices for Layer 2 and Layer 3 connectivity information. Used to generate Layer 2/3 diagram and detail reports. Internal Vulnerability Scan (Exclusive to the Inspector) This scan takes advantage of the point-of-view provided by being connected to the client s internal network. Data is collected about Open Ports and Protocol Vulnerability that would be exploited once a hacker is in the network. The Internal Vulnerability Scan focuses on INSIDE attacking INSIDE whereas the External Vulnerability scan checks for OUTSIDE attacking EDGE (INSIDE). Internal vulnerability scans are similar to external scans; however, are performed from inside the target network. They look for vulnerabilities that are normally blocked externally by firewalls. Within a network, un-patched or vulnerable systems may exist that an external scan may not capture. This scan option performs a vulnerability scans with additional options which may be more intensive than the external equivalent. Please be aware that the scans may be resource intensive and should be run during non-business hours if possible. HIPAA Compliance and Risk Assessment Scans Note that this feature requires the HIPAA Assessment Module. 4

6 These network and local scans can be scheduled and executed by Inspector in order to identify ephi, network vulnerabilities, security vulnerabilities, and local computer vulnerabilities necessary to perform a HIPAA IT Risk Assessment. PCI Compliance and Risk Assessment Scans Note that this feature requires the PCI Assessment Module. These network and local scans can be scheduled and executed by Inspector in order to identify credit/debit card Primary Account Number (PAN) data, network vulnerabilities, security vulnerabilities, and local computer vulnerabilities necessary to perform a PCI Data Security Standard (DSS) Compliance and IT Risk Assessment. External Vulnerability External Vulnerability scans are performed at the external Network Edge to check for security holes and weakness that can help you help make better network security decisions. The External Vulnerability Scan performed by Inspector includes a full NMap Scan which checks all 65,535 ports and reports which are open. This is an essential scan and is a standard security check to ensure a viable security policy has been defined, implemented and maintained to protect the network from outside attacks Automated Assessment Reporting Automatic Report Generation enables you to use the Inspector to schedule and generate of a number of assessment reports associated with the following: Network Assessments Security Assessments HIPAA Compliance Assessments PCI Compliance Assessments Tech Alerts Inspector Tech Alerts is an Inspector feature whereby you and other designated recipients within your company can be sent Alerts via based on automated Inspector scans being performed. These Alerts serve the purpose of notifying you of changes identified within your customer s IT infrastructure after pre-scheduled scans/assessments have been performed. 5

7 Security Bulletins Security Bulletins are designed to provide high value alerts designed for end-users. Security Bulletins are sent as HTML s and are personalized based on the Security Bulletins configuration information. Remote Updating of the Appliance The Inspector Appliance is easy to update remotely. Updates include bug fixes, new features, and additional scans types. 6

8 Automated Scanning and Scheduling Best Practices It is recommended that Network, Local Computer, and External Vulnerability scans are scheduled to be performed on a weekly basis. It is recommended that Internal Vulnerability scans are scheduled to be performed on a monthly basis or after any significant IT infrastructure change has taken place. 7

9 Getting Started Connecting the Inspector To set up the, first go to the physical location of the target network. After finding a secure location for the device, connecting it to the network can be accomplished in two easy steps: 8

10 Associating the Appliance to a Site Before using the Inspector, the Appliance must be associated with a Site in the Network Detective Application. Step 1 - Creating a New Site If you have not yet added any Sites, open the Network Detective Application and navigate to New Site from the Home screen. Define a name for the Site. This should be unique and easily identifiable, such as the customer name or physical location. 9

11 Step 2 - Adding an Inspector to a Site From the Site s dashboard, select Add from the Inspectors bar. Select the Inspector ID of the Inspector from the drop down menu. Note that the Inspector ID can be found on a printed label on the Inspector Appliance. After successfully adding an Inspector it will appear under the Inspectors bar in the Site s dashboard. 10

12 To view a list of all Inspectors and their associated Sites, navigate to the Inspectors tab from the top bar of the Home screen. This will show a summary of all Inspectors, their activity status, and other useful information. Creating New Scans After associating the Inspector Appliance with a customer specific Site used for performing assessments, it is very simple to configure an Internal Vulnerability Scan, Network Scans, Push Local Scans, and External Vulnerability Scan using the Inspector appliance remotely from within the Network Detective desktop application. With the Inspector, it is only necessary to go through the configuration and setup of a Network Scan one time. After completing the setup, the Scan configurations will be stored and associated with the Inspector Appliance to be run either on-demand or on a set schedule. 11

13 To set up a scan, first, go to the target Site s dashboard and verify that an Inspector has been successfully associated with the Site. The Inspector(s) will appear under the Inspectors bar. If the Site does not already have an active Assessment, start a new Assessment by clicking Start and following the prompts to choose the desired type of Assessment. If an active Assessment is available, click Go to Active Assessment from the Active Assessment bar in the Site s dashboard. Upon selecting the Active Assessment, you will be directed to the assessment s Assessment Window. 12

14 From the Site s active Assessment, select Initiate Inspector Collection from the Import Scans bar. The Create Task window will be displayed enabling you to select the IT or Compliance Assessment Scan you want to perform, configure the scan task, and to store the scan task in the Inspector Task Library for either manual or scheduled execution. If this is the first time a Scan has been initiated from the Inspector appliance, follow the Network Detective Data Collector prompts to configure the Scan. 13

15 Selecting and Configuring Data Collection Scans Using Inspector Below is an overview of the scans that can be set-up and performed using the Inspector and the steps to set-up the scans to be performed automatically or manually. Network Scan Note that the Network Assessment Reports are only available as part of the Network Assessment module. Data Collector Task Configuration Wizard If this is the first time a Scan has been initiated from the Inspector appliance, follow the Network Detective Data Collector prompts to configure the Scan. Step 1: Select Scan Type Choose Network Scan from the wizard and click the Next button. 14

16 Step 2: Input Credentials Input administrative credentials to access the Domain Controller or indicate that the target network does not contain a Domain Controller. Step 3: Select Local Domains 15

17 Choose either to scan all Domains detected on the target network or to restrict the Scan to selected Organizational Units (OUs) and Domains. Step 4: Input External Domains External Domain names allow others to visit the target site and facilitate services, such as . Input External Domains here to include them as part of the data collection. Examples of External Domains include: example.com mycompany.biz 16

18 Step 5: Specify IP Ranges The IP ranges from the target network will be auto-detected and included in the scan. To include additional subnets input them here. Step 6: Add SNMP Information By default, the software will retrieve data from devices with the community string public. If desired, define an additional community string (such as private ) and enter it here. 17

19 Step 7: Use MBSA If the Microsoft Baseline Security Analyzer (MBSA) is installed on the target computer or domain controller, the Data Collector can use it as part of the detection process to perform vulnerability assessment checks. Check Run MBSA to perform a weak password check. Check Include Patch Analysis to gather information on missing patches (this second option will increase the time required to perform the scan). 18

20 Step 8: Verify and Schedule Check Send an notification when schedule completes to notify a desire address upon completion of the scan. This option is recommended as the time a scan takes to complete varies depending on the target network. 19

21 Network Scan with Layer 2/3 Discovery To create this scan task, perform the following steps: 1. Select the Scan Type Network Scan with Layer 2/3 Discovery. 2. Follow the prompts to set-up the Credentials, Local Domains, External Domains, IP Ranges, SNMP Information, Microsoft Base Security Analyzer (MBSA) parameters. 3. Verify the settings and Schedule the Scan. 20

22 Internal Vulnerability Scan The Internal Vulnerability Scan is an exclusive feature available through the. Data Collector Task Configuration Wizard If this is the first time a Scan has been initiated from the Inspector appliance, follow the Network Detective Data Collector prompts to configure the Scan. Step 1: Select Scan Type Choose Internal Vulnerability Scan from the wizard and click Next. The Ports to Scan window will be displayed. 21

23 Step 2: Specify Ports to Scan When the Ports to Scan window is displayed. The Ports to Scan setup option allows you to select one of two available scanning options. One option, referenced as the Standard Scan, is used to scan Standard TCP ports and Top 1000 UDP ports. The second option, referenced as the Comprehensive Scan, is used to execute a comprehensive scan of all TCP ports and Top 1000 UDP ports. To proceed, select the appropriate number of ports to scan for your assessment s purposes. Then select the Next button. The IP Ranges screen will be displayed. Step 3: Specify IP Ranges At this point the Inspector appliance will perform Auto-Detect to identify an IP address range that can be scanned. Alternatively, you can manually set the IP address range that you would like to scan during the scheduled internal vulnerability scan. IMPORTANT: THE AUTO-DETECT FEATURE WILL IDENTIFY THE IP RANGE OF THE INTERNAL SUBNET THAT IS FROM THE INSPECTOR. THIS COULD RESULT IN A SUBSTANTIALLY LARGER NUMBER OF IP ADDRESSES THAT WILL BE SCANNED VERSES THE ACTUAL NUMBER OF WORKSTATIONS, SERVERS, AND OTHER IP-BASED NETWORK COMPONENTS WHICH COULD BE A FAR SMALLER NUMBER. 22

24 IF THIS INTERNAL VULNERABILTIY SCAN IS CONFIGUED TO INTERROGATE A LARGE NUMBER OF IP ADDRESSES THAT ARE NOT USED BY ANY DEVICE, THE VULNERABILITY SCAN MAY RESULT IN TAKING AN EXPONENTIALLY LONGER TIME THAN NECESSARY. Define the IP Range that you would like to scan and select Next button. The Create Task - Verify and Schedule window will be displayed. 23

25 Step 4: Verify and Schedule Scan Task After the Create Task - Verify and Schedule window is displayed you can finalize the creation of the scan task. To have an Notification sent to you when the scan task completes, select the Send notification when schedule completes option, and type in the address where the notification should be sent. Click on the Finish button to complete the scheduling of the internal vulnerability scan task which will display the Appliance Tasks and Queue window. The scheduled internal vulnerability scan can be confirmed in the Appliance Tasks and Queue window is that displayed in the Task Library list referenced below. 24

26 Upon viewing the scan task, you can select the run now option link under the Queue column to initiate the scan which will place the scan into the Queued Tasks list. Or, you can click on schedule link to execute the scan sometime in the future by selecting the interval (daily, weekly, monthly, annually, or just once) option and the time that the scan should be scheduled to run. When you click the schedule link, The CRON Builder scheduler window is displayed and is used to set the schedule action s execution time. Please note that the time zone used for the CRON Builder time is Eastern Standard Time (EST). Note the Pending task present in the Queued Task list after the Run Now option has been selected for the Vulnerability Scan in the window below. 25

27 26

28 SQL Server Data Collection To create this scan task, perform the following steps: 1. Select the Scan Type SQL Server Collection. 2. Follow the prompts to set-up the Credentials for the SQL Servers being assessed. 3. Verify the settings and Schedule the Scan. Note that the SQL Server Module s Assessment Reports are only available as part of the SQL Server Module subscription. 27

29 Local Data Scans Configuring Network Local Collection Push Scan 1. Select the Local Push Network Local Collector to scan remote computers. 2. Follow the prompts to set-up the Credentials and Remote Computer IP Addresses for the equipment being scanned. 3. Verify the settings and Schedule the Scan. Configuring Security Local Collection Push Scan 1. Select the Local Push Security Local Collector to scan remote computers. 28

30 2. Follow the prompts to set-up the Credentials and Remote Computer IP Addresses for the equipment being scanned. 3. Verify the settings and Schedule the Scan. HIPAA Compliance Scans To learn more about how to configure the scans related to a HIPAA Compliance Assessment, please refer to the HIPAA Module with Inspector User Guide. Note that the HIPAA Module s Assessment Reports are only available as part of the HIPAA Module subscription. PCI Compliance Scans To learn more about how to configure the scans related to a PCI Compliance Assessment, please refer to the PCI Module with Inspector User Guide. Note that the PCI Module s Assessment Reports are only available as part of the PCI Module subscription. 29

31 External Vulnerability Scan To create this scan task, perform the following steps: 1. Select the Scan Type External Vulnerability Scan. 2. Follow the prompts to set-up the IP Addresses of the equipment/network being scanned. 3. Verify the settings and Schedule the Scan. 30

32 Managing the Scan Queue After going through the steps to Associate the Inspector Appliance with a Site and configuring Network Scans and storing them in the Task Library, it is a simple process to run either an immediate or scheduled Data Collection on the target network. Note that the Scan configuration process must only be completed one time and the resulting configuration will be stored for future use. This simplifies both automation and remote execution of Data Collections. To view the Scan Queue, first associate the Inspector Appliance with a Site. Then navigate to the target Site s dashboard. Under the Inspectors bar in the Active Assessment window select the manage link. This will bring up the Scan Queue and the Scan Library in another window. Running a Scan On-Demand Scans can be executed immediately through the use of the Run Now feature. 31

33 To run a Scan configuration, locate the task in the Task Library and select run now. After the task has been queued, it will run as soon as resources are available. A Scan that is run ondemand (i.e. instead of on a schedule) will have no value in the table under the Next Run column. 32

34 Scheduling a Scan To schedule a scan, select the Schedule option available within a Scan Task listed within the Task Library. To run a Scan configuration on a regular basis or at a future date, locate the Scan in the Task Library and select schedule. This will bring up the CRON Builder. Choose a date, time, or other periodic range from the drop-downs in the CRON Builder. Please note that the time zone used for the CRON Builder time is Eastern Standard Time (EST). After selecting a time frame, the scans will be executed according to the given schedule. Please be aware that only one scan of a particular type can execute on the Inspector appliance at a time. 33

35 After the schedule is set, the table entry for the Scan in Queued Tasks will display the next run time and whether or not the scan will repeat the schedule. Please be aware that the scans may be intensive and should be run during non-business hours if possible. Scan Library versus Scan Queue The Scan Library contains saved Scan configurations which can be run on demand or on a schedule to conduct Network Scans. The advantage of the Scan Library is that the Network Scan configurations can be reused and run on-demand or on a schedule. There is no need to repeatedly enter the same information (such as the domain controller password or the IP Range) each time a data collection is performed using this model. Cancelling a Scan To cancel a queued Scan, click the manage link under the Inspectors bar of the Site s dashboard. From Queued Tasks, click the Delete button for the Scan. This will only delete the Scan from the Queue so it will not be run until it has been re-scheduled. The Scan configuration will still be stored in the Task Library. 34

36 Downloading Scans Successfully completed Network Scans are immediately available to download through the Network Detective Application. After downloading these Scan files, they can be used to explore data or generate reports as needed. First, go to the Active Assessment of the Site associated with the Inspector Appliance. From the Assessment s dashboard, select Download Scans from the Imported Scans bar. All available Scans which have not yet been downloaded will be shown in a list. Check the desired Scans and choose Download Selected or select Download All to receive all Scans. 35

37 After being successfully downloaded, Scans will immediately be displayed under the Imported Scans bar and available for data exploration or report generation. 36

38 Preferences Menu Options The Network Detective Preferences menu presents two sets of options that can be configured as defaults for Network Detective use. Report Defaults Inspector Alerting Settings Impacting Tech Alerts Setting the Master Inspector Alerting Preferences There are a series of master Inspector Alerting preferences that must be configured to ensure that the Inspector that you are using to send Tech Alerts. Tech Alerts are automatic alerts sent to notify you of changes to your customers network. These alerts are sent via to the individuals you have configured to receive the alerts in the Tech Alert settings on the actual Inspector that us being used to perform automated scans and automatically generate assessment reports. Each Tech Alert preference configuration assigned at the assessment level relies on one or more of these Master Inspector Alerting preferences enabling the availability of the assessment level Tech Alert preferences available for use. Below is a summary of the Inspector Alerting settings that can be set at the Master Level: 37

39 There are four primary Inspector Alert settings. Some of these settings can be overridden by similar settings available in the Inspector specific Tech Alerts configuration window. These settings are: Inspector Alerting ON/OFF - This is the Master switch that can be used to turn OFF all Inspector Alerting ON ALL OF THE INSPECTORS that are licensed to operate with your Network Detective subscriptions. The OFF selected cannot be overridden by the Tech Alert settings available on each individual Inspector. The Inspector Alerting ON global setting can be overridden by turning OFF Tech Alerts within the Tech Alert settings for each individual Inspector. Alert Time This is a Global time setting where all of the Inspectors will be configured to send their respective Tech Alerts based on the local Tech Alert settings within each Inspector appliance. NOTE: The Alert Time clock is based on Greenwich Mean Time (GMT), therefore set the time for the Alerts to be sent to a GMT time that best suites the sending of alerts in a time window that is after the completion of the scans configured on all of the Inspectors you manage. Alerts (type) There are two categories of alerts that can be turned ON and OFF at the global level. These are the types of Network and Security alerts. These settings can be overridden at the Inspector level on an Inspector by Inspector basis through the use of the Inspector s Tech Alert settings. The Network Alerts consist of alerts regarding changes to the Domain Users, Computers, Printers, non- AD Devices, DNS, and Layer 2/3 network configurations. The Security Alert specifically controls the sending of alerts when changes to Internal Vulnerabilities are detected. IMPORTANT: One setting that cannot be set at the assessment level is the Alert Time. When using multiple Inspectors, take into consideration the Scan Schedule and the time necessary to complete the scans for each Inspector appliance versus the time when reports relying on these scheduled scans are to be performed. Being aware of length of time necessary to perform a scan versus a particular reporting task s start time is so that you can select a time that ensure that the most recent scan data will be used. Using the latest scan data will ensure that the most up to date network change information will be sent to you in the form of a Tech Alert. Please note the reference to Greenwich Mean Time (GMT). Take this time zone into consideration when selecting the default time to issue Inspector Alerts. 38

40 Steps to Set Master Inspector Alerting Preferences Step 1 Select Preferences At the top of the Network Detective window select the Preferences option. The Preferences window will be displayed. Step 2 Select Inspector Alerting Select the Inspector Alerting tab to access the global settings for Inspector Alerting. This action will present the setting selections for Inspector Alerting. 39

41 Step 3- Setting Inspector Alerting Preferences (Important) Set the global Inspector Alerting settings as summarized below. Inspector Alerting Setting This setting allows you to turn ON or OFF the Inspector Alerting at the global level. Turning OFF this setting will result in NO Tech Alert bulletins being sent to you after automatic scans have been performed by an Inspector that installed at a client site. This OFF setting CANNOT be overridden by a Tech Alert ON setting set on any or all of the Inspectors licensed to operate with your Network Detective subscriptions. Alerts Setting This setting allows you to turn On or Off the types of alerts that will be send based on changes in (additions or removals) Domain Users, Computers, Printers, Non-Active Directory Devices, DNS, and Layer 2/3 network level device analysis of your client s network. Security New Internal Vulnerability This setting allows you to activate or deactivate Alerts associated with any new Internal Vulnerabilities that have been identified as a result of a scheduled Internal Vulnerability Scan s comparison to a previous scan performed by Inspector. Set the Inspector Alerting On/Off, the Alert Time, and select the Default Alerts that should be sent by all Inspectors and select the OK button. Your Inspector Alerting Preferences will be saved and the Preferences window will close. 40

42 Using the Manage Inspector Feature to Configure Automatic Report Generation Below is an overview of the steps required to setup Automatic Report Generation for the following Assessment reporting: Network Assessments Security Assessments HIPAA Compliance Assessments PCI Compliance Assessments Setting Up Automatic Reports for Network Assessments Automatic report generation for the Network Assessment Module requires that the scans be run on an Inspector before a report can be generated. Following are the steps necessary to set up automatically generated reports for the Network Assessment Module: 1. Create a new assessment that is of the type Network Assessment. (In Network Detective?) 2. Associate your Inspector with the Site that this new Assessment is created. 3. Manage the Inspector and create a new Scan Task that collects the Network Assessment data. 41

43 4. After the scan task is created, Schedule the scan task for the times that are appropriate for this Assessment. 5. Using the Manage Inspector feature and the Task Library Window, create a Report Task that specifies desired reports from the Network Assessment Module. 42

44 6. Schedule the created Report Task for a time which is certain to be after the scan is complete. Reports will use whatever data is on the inspector based on the most recent scan that has been completed, so if the scan is not complete then the reports will not have the most recent scan s data either. 7. If the user has specified that reports be delivered by , the specified should receive an with a.zip file of the reports attached as long as the zip file is less than 5 MB in size. 8. Report generation can take several minutes. After sufficient time has passed after the report generation task schedule, view the generated reports by navigating to the Download Reports item on the left hand side of the Network Detective application. The Download Inspector Reports option will appear at the top of the Network Detective window. Then press the Download Inspector Reports button at the top. A dialog will appear with reports generated by the Inspector. 9. Select and right click on a report to download the report. 43

45 Setting Up Automatic Reports for Security Assessments Automatic report generation for the Security Assessment Module requires that the scans be run on an Inspector before a report can be generated. Following are the steps necessary to set up automatically generated reports for the Security Assessment Module: 1. Create a new assessment that is of the type Security Assessment. 2. Associate your Inspector with the Site that this new Assessment is created. 3. Manage the Inspector and create a new Scan Task that collects the Security Assessment data. 4. Schedule the Scan Task for the times that are appropriate for this Assessment. 5. Using the Manage Inspector feature and the Task Library Window, create a Report Task that specifies desired reports from the Security Assessment Module. 44

46 6. Schedule the created Report Task for a time which is certain to be after the scan is complete. Reports will use whatever data is on the inspector based on the most recent scan that has been completed, so if the scan is not complete then the reports will not have the most recent scan s data either. 7. If the user has specified that reports be delivered by , the specified should receive an with a.zip file of the reports attached as long as the zip file is less than 5 MB in size. 8. Report generation can take several minutes. After sufficient time has passed after the report generation task schedule time, view the generated reports by navigating to the Download Reports item on the left hand side of the Network Detective application. The Download Inspector Reports option will appear at the top of the Network Detective window. Then press the Download Inspector Reports button at the top. A dialog will appear with reports generated by the Inspector. 45

47 9. Select and right click on a report to download the report. 46

48 Setting Up Automatic Reports for HIPAA Compliance Assessments Automatic report generation for the HIPAA Compliance Module requires that a full assessment that includes scans, worksheets and surveys be completed and synced with the Inspector before reports can be generated. This is the only way for user completed forms to be transferred to the Inspector. Once the assessment is complete and synced, new scans can be run on an Inspector and new reports be generated with the previously specified Inform-based Survey and Worksheet data. Following are the steps necessary to set up automatically generated reports for the HIPAA Compliance Module: 1. Using Network Detective, create a new assessment that is of the type HIPAA Risk Assessment. 2. Associate your Inspector with the Site that this new HIPAA Assessment is created within. 3. Complete all the requirements for a successful HIPAA Risk Assessment within this new assessment. This includes external scans, network scans, local scans, and all appropriate inform-based Surveys and Worksheets. When this step is complete the user should be able to generate all HIPAA reports. The user is free to use the inspector during this initiate HIPAA Assessment to gather the scan information as appropriate. 4. Once satisfied with a complete HIPAA assessment, press the Finish button. Confirm that you wish to upload the data to the inspector to be used with automatic report generation. 5. Start a new Assessment that is of the type HIPAA Risk Assessment 6. On the Create New Assessment Wizard Screen, select the checkbox to sync the assessment to the inspector. 47

49 7. Manage the Inspector and set up a task schedule or schedules for collecting data as desired. 8. Schedule the created Report Task for a time which is certain to be after the scan is complete. Reports will use whatever data is on the inspector based on the most recent scan that has been completed, so if the scan is not complete then the reports will not have the most recent scan s data either. 9. If the user has specified that reports be delivered by , the specified should receive an with a.zip file of the reports attached as long as the zip file is less than 5 MB in size. 10. Report generation can take several minutes. After sufficient time has passed after the report generation task schedule, view the generated reports by navigating to the Download Reports item on the left hand side of the Network Detective application. The Download Inspector Reports option will appear at the top of the Network Detective window. Then press the Download Inspector Reports button at the top. A dialog will appear with reports generated by the Inspector. 11. Select and right click on a report to download the report. 12. If an Exception Report is present in the available reports, or was contained in the.zip file sent in the notification OR if you feel that data in the generated report is using data from an inform-based worksheet or survey that is outdated: a. Note any missing elements present in the Exception report (if present) 48

50 b. Update Inform forms in currently active Assessment to reflect that data desired. c. If current Informs do not contain the topics that are noted as missing: i. Press the Finish button for the currently active Assessment. ii. DO NOT agree to the question which asks if you would like to sync the data to the inspector. iii. Start a new active Assessment. Check the checkbox which says Sync with latest inspector scan iv. New assessment with latest data from inspector will be created. Update Inform as appropriate. d. Press Finish button for currently active Assessment e. DO agree to sync the data to the inspector. f. Then return to step 5 above. 49

51 Setting Up Automatic Reports for PCI Compliance Assessments Automatic report generation for the PCI Compliance Module requires that a full assessment that includes scans, worksheets and surveys be completed and synced with the Inspector before reports can be generated. This is the only way for user completed forms to be transferred to the Inspector. Once the assessment is complete and synced, new scans can be run on an Inspector and new reports be generated with the previously specified Inform-based Survey and Worksheet data. Following are the steps necessary to set up automatically generated reports for the PCI Compliance Module: 1. Using Network Detective, create a new assessment that is of the type PCI Risk Assessment. 2. Associate your Inspector with the Site that this new PCI Assessment is created. 3. Complete all the requirements for a successful PCI Risk Assessment within this new assessment. This includes, external scans, network scans, local scans, and all appropriate inform-based surveys and worksheets. When this step is complete the user should be able to generate all PCI reports. The user is free to use the inspector during this initial PCI Assessment to gather the scan information as appropriate. 4. Once satisfied with a complete assessment, press the Finish button. Confirm that you wish to upload the data to the inspector to be used with automatic report generation. 5. Start a new Assessment that is of the type PCI Risk Assessment. 6. On the Create New Assessment Wizard Screen, select the checkbox to sync the assessment to the inspector. 50

52 7. Manage the Inspector and set up a task schedule or schedules for collecting data as desired. 8. Manage the inspector and set up reporting tasks for times that are certain to be not when the data collection tasks are running. 9. If the user has specified that reports be delivered by mail, the specified should receive an with a zip of the reports attached as long as the zip file is less than 5 MB in size. 10. Report generation can take several minutes. After sufficient time has passed after the report generation task schedule, view the generated reports by navigating to the Download Reports item on the left hand side, and press the Download Inspector Reports button at the top. A dialog will appear with reports generated by the Inspector. 11. Select and right click on a report to download the report. 12. If an Exception Report is present in the available reports, or was contained in the zip sent in the notification OR if you feel that data in the generated report is using data from an inform-based worksheet or survey that is outdated: a. Note any missing elements present in the Exception report (if present) b. Update Inform forms in currently active Assessment to reflect that data desired. c. If current Informs do not contain the topics that are noted as missing: i. Press the Finish button for the currently active Assessment. 51

53 ii. DO NOT agree to the question which asks if you would like to sync the data to the inspector. iii. Start a new active Assessment. Check the checkbox which says Sync with latest inspector scan iv. New assessment with latest data from inspector will be created. Update Inform as appropriate. d. Press Finish button for currently active Assessment e. DO agree to sync the data to the inspector. f. Then return to step 5 above. 52

54 Setting Up Tech Alerts and Security Bulletins Setting Up Tech Alerts The use of the Inspector Tech Alerts feature presumes that you have set up one (1) or more automated scans for one (1) or more of the Assessments types available on the Inspector Appliance. Inspector Tech Alerts is an Inspector feature whereby you and other designated recipients within your company can be sent Alerts via . These Alert serve the purpose of notifying you of changes identified within your customer s IT infrastructure after pre-scheduled scans/assessments have been performed. The changes contained within a Tech Alert will be a result of a comparison of the most current and previous scans being performed by Inspector. To setup Inspector Tech Alerts perform the following steps. Step 1 Select the Site Double click your mouse pointer on the Site that you are configuring automated scan and reports to be performed upon in order to view and access the Site. 53

55 Step 2 Select Manage Inspector After the Site has been opened, selected the Manage option present under the Inspectors bar. The Manage Inspector window will be displayed. 54

56 Step 3 Configure Tech Alerts Select the Tech Alerts tab to view and configure the settings for the alerts. Select the Tech Alerts tab to access the Tech Alerts setting Window. 55

57 Step 4 Turn on Tech Alerts 56

58 Select ON to turn on Tech Alerts. Note: Tech Alerts can be only turned ON if the Inspector Alerts setting in the Preference Option is turned ON. When Inspector Alerts are turned ON, then you can turn the Tech Alerts feature ON and OFF as required. Please note that the default setting for alert distribution frequency of Tech Alerts is for alerts to be sent daily at the Alert Time specified within Preferences. Alerts will be sent alert recipients to notify them of network and/or security issues related to internal vulnerabilities that are detected as changes to the network or its security status. Also, alerts may be sent with a No Alerts status as presented in the example below. Suppressing No Issues Tech Alerts To prevent Tech Alerts from being sent to recipients with no alert information, you can select the Suppress no issues alerts option in the Manage Inspector Tech Alerts settings window as displayed below. 57

59 Step 5 Configure Alert Selection Settings To specify which network and security change events should trigger Tech Alerts to be sent to one or more alert recipients, the Alert Selection settings must be defined. You can either select the Use Default Alert Settings option or use Specify Alerts to select which Network and/or Security change events will trigger an alert. Note that the Use Default Alert Settings option relies on the global Inspector Alert settings that are available under Preferences. To specify which Network and Security change events should trigger an alert, select which events contained within the Specify Alerts section of the Tech Alerts settings window as listed below. After specifying the Network and Security change events that trigger Tech Alerts, continue to the next step. 58

60 Step 6 Configure the Send To settings for Tech Alerts. Configuring the Send To settings allows you to select which of your company s Network Detective users should receive Tech Alerts. Also, the Subject for Tech Alert message that is sent to recipients of a Tech Alert can be defined. When configuring the Send To options, It is recommended that you create a Subject that: identifies your customer s company name and the name of the Site that the Tech Alerts pertain. Creating an informative Subject like will help avoid confusion of what alert is coming from which customer site when your company uses multiple Inspectors at multiple customer sites. the name of the Network Detective Site that is being used with the Inspector sending the alerts. This information might be of value in case there is a need for one of the Tech Alert recipients to quickly access or manage the Inspector sending the alerts. 59

61 To configure the send to settings perform the following steps: 1. Widen the column of the Subject field. 2. Type in text for the Subject to be contained within the Tech Alert as illustrated below. 3. Define the recipient(s) of the Tech Alerts by selecting the recipient from the available Network Detective users. The available Network Detective Users list is displayed as illustrated in the next step. 60

62 4. Select Recipients of Tech Alerts Select the Network Detective user from the list presented in the Select Users window that is to be a recipient of the Tech Alerts and select the OK button. If you do not see an address for an individual that you want to be assigned as a Tech Alert recipient, then add the desired individual as a user of the Network Detective using the Manage Users option. Then repeat this process. After the completion of Step 5, the Subject text to be present within each Tech Alert message along with the recipients that will receive Tech Alerts will have been defined. Step 7 Save Tech Alert Settings to Complete the Tech Alert Configuration Process After completing the definition of the settings for Tech Alerts, select the Save and Close button to save the settings and close the Manage Inspector window. 61

63 Example of a Tech Alert Below is an example of a Tech Alert message sent by Inspector. 62

64 Setting-up Security Bulletins The use of the Security Bulletins feature presumes that you have set up one (1) or more automated scans for one (1) or more of the Assessments types available on the Inspector Appliance. Security Bulletins will be sent to your customers when a number of changes to their IT infrastructure have been identified as a result of automated scans being performed by Inspector. The changes detected and reported upon include: changes to network users, computers, and the network itself. Please note: Security Bulletins (i.e. alerts) will be sent at the global Alert Time set in the Inspector Alerting Preferences. The time zone for the Alert Time setting is based on GMT. To send branded Security Bulletins containing important information to contacts at your client s company, setup Inspector Security Bulletins to be sent to designated recipients by performing the following steps. Step 1 Select the Site Double click your mouse pointer on the Site that you are configuring automated scan and reports to be performed upon in order to view and access the Site. 63

65 Step 2 Select Manage Inspector After the Site has been opened, selected the Manage option present under the Inspectors bar. The Manage Inspector window will be displayed. 64

66 Step 3 Configure the Security Bulletins Select the Security Bulletins tab in the Manage Inspector window to configure the settings for the bulletins. The Security Bulletins window will be displayed. 65

67 Step 4 Configure Settings for Security Bulletins There are four primary settings options that can be configured to set-up Security Bulletins. These options are: Security Bulletins On-Off This settings option enables you to turn Security Bulletins ON or OFF. Security Bulletins can only be turned ON when the Global Inspector Alerts setting is set to ON. Security Bulletin Configuration This settings option enables you to configure Customized and Branded Security Bulletin message format to be used when bulletins are to your customers. This feature includes the ability to personalize the Security Bulletin message. Send To This settings option enables you to define the Subject text that is to be presented in the Security Bulletin message itself and to enable you to assign the addresses for recipients that are to receive the Security Bulletin messages. Alert Level This setting enables you to control what priority/type of Security Bulletins that are to be automatically sent to your customers. There are 3 levels: o o o 3 All Bulletins 2 - Medium and High Priority Bulletins 1 High Priority Bulletins. 66

68 Domain Used by Inspector for Sending Security Bulletins The domain used by all Inspectors to send Security Bulletins is: security-bulletins.com. Be sure to notify your customers of this fact so that they can configure their Spam filters to all messages from this domain to be delivered to their Inbox. Please perform the following steps to configure the settings for Security Bulletins: 1. Turn Security Bulletins On. 2. Enter the Greeting that you want to use in the Security Bulletin text. 3. Complete the From field. For example, enter first name.jastname, firstinitiallastname, yourcompanynamewithnospaces, or any other text string that is meets STMP address standards. Whatever you text you place into this field, this setting will create a From address of yourrtext@security-bulletins.com. 4. Complete the Prepared By field. 5. Complete the Service Provider field 6. Add your Personalized Message that will be placed into the bulletin 7. Add Signature information to tell your client how to reach you 8. Type in the Security Bulletin s Subject text in the Send To section. 9. Add address to the To field of the Send To section. 10. Set the High, Medium, or All Alert Level to determine the priority level of events that will cause the recipients to receive a Security Bulletin. Upon completion of these steps, the Security Bulletin settings should look similar to the Security Bulletin settings below. 67

69 Click on Save and Close to save Security Bulletin settings. Suppressing No Issues Security Bulletins To prevent Security Bulletins from being sent to recipients with no alert bulletin information, you can select the Suppress no issues bulletins option in the Manage Inspector Security Bulletins settings window as displayed below. 68

70 Example of a Security Bulletin Below is an example of a MSP branded Security Bulletin message sent by Inspector. 69

71 Configuring the Local Data Scan Merges When local scans are performed by Inspector, they can be merged into a particular domain data set. The Configuration of Local Scan Merges feature allows you to select which method you prefer to use when merging local scans. This setting will impact Alerts, Bulletins, and Automated Report Generation. To select the process to be used by Inspector to Merge any Local Scan Data into domain, perform the following steps. Step 1 Select the Site Double click your mouse pointer on the Site that you are configuring automated scan and reports to be performed upon in order to view and access the Site. 70

72 Step 2 Select Manage Inspector After the Site has been opened, selected the Manage option present under the Inspectors bar. The Manage Inspector window will be displayed. 71

73 Step 3 Set Scan Data Merge Configuration Select the Configuration tab in the Manage Inspector Window to view the Local Scan Merge settings. 72

74 Step 4 Set the Local Scan Merge Settings Select the preferred Local Scan Merge method, or select, Do Not Merge Local Scans. Then select the Save and Close button to store the data merge settings. 73

75 Updating the Inspector Appliance After installing the Inspector Appliance at the Site s physical location and associating the Inspector with a Site in the Network Detective Application, it s important to regularly update the Appliance to get the most out of Data Collections, Automated Reports, Tech-Alerts, and Security Bulletins. In the Network Detective Application, navigate to the Site s dashboard and select update now from under the Inspectors bar. Note that the link will only be visible if software updates are available. IMPORTANT: The Inspector Update Now feature, when activated to update the Inspector, will shut down any tasks that are currently running on the Inspector appliance. Before updating the Inspector, either stop a currently running task listed in the Task Library window Queued Tasks list, or perform the update after running tasks are completed. A dialog will appear confirming the request for a software update. 74

76 Appendices Appendix I Diagnostic Tool The Diagnostic Tool is used to gather relevant diagnostic information, test connectivity, manage updates, and allow remote support to the Inspector appliance. 75

Network Detective. PCI Compliance Module Using the PCI Module Without Inspector. 2015 RapidFire Tools, Inc. All rights reserved.

Network Detective. PCI Compliance Module Using the PCI Module Without Inspector. 2015 RapidFire Tools, Inc. All rights reserved. Network Detective PCI Compliance Module Using the PCI Module Without Inspector 2015 RapidFire Tools, Inc. All rights reserved. V20150819 Ver 5T Contents Purpose of this Guide... 4 About Network Detective

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

SevOne NMS Download Installation and Implementation Guide

SevOne NMS Download Installation and Implementation Guide SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and

More information

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201 Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

Immotec Systems, Inc. SQL Server 2005 Installation Document

Immotec Systems, Inc. SQL Server 2005 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

Network Detective. User Guide. Copyright 2015 RapidFire Tools, inc. All Rights Reserved. 20150201

Network Detective. User Guide. Copyright 2015 RapidFire Tools, inc. All Rights Reserved. 20150201 Network Detective User Guide Copyright 2015 RapidFire Tools, inc. All Rights Reserved. 20150201 Contents Contents... 1 Purpose of this Guide... 6 About Network Detective... 6 Network Detective Overview...

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

6.0. Getting Started Guide

6.0. Getting Started Guide 6.0 Getting Started Guide Netmon Getting Started Guide 2 Contents Contents... 2 Appliance Installation... 3 IP Address Assignment (Optional)... 3 Logging In For the First Time... 5 Initial Setup... 6 License

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Appendix E. Captioning Manager system requirements. Installing the Captioning Manager

Appendix E. Captioning Manager system requirements. Installing the Captioning Manager Appendix E Installing and configuring the Captioning Manager The Mediasite Captioning Manager, a separately sold EX Server add-on, allows users to submit and monitor captioning requests through Automatic

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

BillQuick Agent 2010 Getting Started Guide

BillQuick Agent 2010 Getting Started Guide Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)

More information

Amicus Link Guide: Outlook/Exchange E-mail

Amicus Link Guide: Outlook/Exchange E-mail Amicus Link Guide: Outlook/Exchange E-mail Applies to: Amicus Premium 2015 Synchronize your Amicus and Outlook e-mail. Choose a client-side link with your local Microsoft Outlook or a Server-side link

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

ThinManager and Active Directory

ThinManager and Active Directory ThinManager and Active Directory Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit http://www.thinmanager.com/kb/index.php/special:allpages for a list of Knowledge

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Paranet Solutions Network Discovery Client. Paranet Professional Services

Paranet Solutions Network Discovery Client. Paranet Professional Services Paranet Solutions Network Discovery Client Paranet Professional Services Contents 1. INTRODUCTION... 3 1.1 1.2 PURPOSE OF THIS DOCUMENT... 3 WHAT S IN THIS DOCUMENT... 3 2. SCANNING INSTRUCTIONS... 4 3.

More information

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent

More information

Network Detective. Security Assessment Module Using the New Network Detective User Interface Quick Start Guide

Network Detective. Security Assessment Module Using the New Network Detective User Interface Quick Start Guide Network Detective Security Assessment Module Using the New Network Detective User Interface Quick Start Guide 2016 RapidFire Tools, Inc. All rights reserved. V20160111 Ver 3M Overview The Network Detective

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Installation and Program Essentials

Installation and Program Essentials CS PROFESSIONAL SUITE ACCOUNTING PRODUCTS Installation and Program Essentials version 2015.x.x TL 28970 3/26/2015 Copyright Information Text copyright 1998 2015 by Thomson Reuters. All rights reserved.

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Microsoft Outlook Quick Reference Sheet

Microsoft Outlook Quick Reference Sheet Microsoft Outlook is an incredibly powerful e-mail and personal information management application. Its features and capabilities are extensive. Refer to this handout whenever you require quick reminders

More information

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation

More information

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with

More information

Providing Patch Management With N-central. Version 7.2

Providing Patch Management With N-central. Version 7.2 Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central

More information

Trend Micro KASEYA INTEGRATION GUIDE

Trend Micro KASEYA INTEGRATION GUIDE Trend Micro KASEYA INTEGRATION GUIDE INTRODUCTION Trend Micro Worry-Free Business Security Services is a server-free security solution that provides protection anytime and anywhere for your business data.

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

BOTTOM UP THINKING EMAIL SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE

BOTTOM UP THINKING EMAIL SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE BOTTOM UP THINKING Unique businesses require unique solutions EMAIL SETUP INSTRUCTIONS CLIENT GUIDE INDEX How to connect a. Deciding on best method (POP or IMAP) Setting up email on devices Webmail a.

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Network Scanner Tool R3.1. User s Guide Version 3.0.04

Network Scanner Tool R3.1. User s Guide Version 3.0.04 Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,

More information

MultiSite Manager. User Guide

MultiSite Manager. User Guide MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013 Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management

More information

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central and remote sites. Contents Table of Contents Using WhatsUp

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

Project management integrated into Outlook

Project management integrated into Outlook Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: October 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com

More information

TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE

TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE .trust TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE 2007 Table of Contents Introducing Trustwave Vulnerability Management 3 1 Logging In and Accessing Scans 4 1.1 Portal Navigation and Utility Functions...

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

KM-Net ServiceGateway Quick Start Guide. Version #1.0.1118 November 2004

KM-Net ServiceGateway Quick Start Guide. Version #1.0.1118 November 2004 KM-Net ServiceGateway Quick Start Guide Version #1.0.1118 November 2004 Revision History: No. Description Date Version 1.0.1118 Changed the brand name from Kyocera Mita to Kyocera. In the Step 6 section,

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

IntraVUE Plug Scanner/Recorder Installation and Start-Up

IntraVUE Plug Scanner/Recorder Installation and Start-Up IntraVUE Plug Scanner/Recorder Installation and Start-Up The IntraVUE Plug is a complete IntraVUE Hardware/Software solution that can plug directly into any network to continually scan and record details

More information

Virtual Office Account Manager Phone System Setup Guide. 8x8 Virtual Office Phone System Setup Guide

Virtual Office Account Manager Phone System Setup Guide. 8x8 Virtual Office Phone System Setup Guide 8x8 Virtual Office Version 1.1, October 2011 Contents Introduction...3 System Requirements...4 Supported Operating Systems....4 Required Plug-ins....4 Supported Browsers....4 Required Firewall Ports...4

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

Discovery Guide. Secret Server. Table of Contents

Discovery Guide. Secret Server. Table of Contents Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...

More information

Cyclope Print Management Software

Cyclope Print Management Software Cyclope Print Management Software - Installation Guide - Version 4.0 for Windows 2000/XP/Vista and Windows Server 2003/2008 Cyclope-Series, 2010 Table of Contents 1. Introduction...3 2. Requirements and

More information

PrintFleet Local Beacon

PrintFleet Local Beacon PrintFleet Local Beacon User Guide Version 2.5.15 as of March 3, 2008. 2008 PrintFleet Inc. All rights reserved. Copyright 2008 PrintFleet Inc. All rights reserved. PrintFleet Local Beacon User Guide.

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Group Management Server User Guide

Group Management Server User Guide Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring

More information

Flowlink Pro Server Software Installation Guide

Flowlink Pro Server Software Installation Guide Flowlink Pro Server Software Installation Guide Part #69-2543-274 ii Flowlink Pro Server Installation Guide COPYRIGHT 2006, 2014 Teledyne Isco, Inc. 4700 Superior St., Lincoln, Nebraska, U.S.A. 68504 Phone:

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

How to setup a network printer using HP Universal Printer Driver

How to setup a network printer using HP Universal Printer Driver How to setup a network printer using HP Universal Printer Driver This patch is only usable on HP T5730 Thin Client and up. The Printer also has to be networked and be PCL6 driver compatible in order to

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Cloud Services ADM. Agent Deployment Guide

Cloud Services ADM. Agent Deployment Guide Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

eprism Email Security Suite

eprism Email Security Suite Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Applications Notes Best Practices for Using SolarWinds' ORION to Monitor SANiQ Performance Legal Notices Warranty The only warranties for HP products and services

More information

IQSweb Reference G. ROSS Migration/Registration

IQSweb Reference G. ROSS Migration/Registration ROSS Migration/Registration Contents IQSweb V3.0.1 ROSS Connection Requirements... 2 Test Agency Network Connectivity to ROSS... 3 FIREWALL Exceptions... 3 FIREWALL Exception Justification... 4 ROSS Interface

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

SyncThru Database Migration

SyncThru Database Migration SyncThru Database Migration Overview Database Migration for SyncThru application is an intuitive tool that enables the data stored in the database of an older version of SyncThru, to be moved to the database

More information

Quick Installation Guide Network Management Card

Quick Installation Guide Network Management Card Rev.1.1 www.cyberpowersystems.com Quick Installation Guide Network Management Card Intelligent Network Management Card allows UPS to be managed, monitored, and configured via SNMP Card Configuration Tool

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Netwatch Installation For Windows

Netwatch Installation For Windows Netwatch Installation For Windows Netwatch is a program designed to monitor a Powerware UPS unit using the ConnectUPS-Web or Bestlink-Web interfaces and MGE UPS unit using the Network Management Card over

More information

DCA Local Print Agent Push Install

DCA Local Print Agent Push Install DCA Local Print Agent Push Install PageTrac Support DCA Local Print Agent Push Install System Requirements Each workstation on which you install Local Print Agent must have the following: Windows operating

More information

SharePoint AD Information Sync Installation Instruction

SharePoint AD Information Sync Installation Instruction SharePoint AD Information Sync Installation Instruction System Requirements Microsoft Windows SharePoint Services V3 or Microsoft Office SharePoint Server 2007. License management Click the trial link

More information

These options allow you to define baseline settings for how scanning will occur on your network

These options allow you to define baseline settings for how scanning will occur on your network Network Discovery Asset Manager can discover devices attached to your network automatically, probe them for configuration data, and create assets in your database. The network discovery system is fully

More information

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release) Product comparison GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release) GFI LanGuard 2014 Windows Intune General features Scheduled scans Agent-less r Agent-based Integration with Active

More information

Providing Patch Management With N-central. Version 7.1

Providing Patch Management With N-central. Version 7.1 Providing Patch Management With N-central Version 7.1 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

How to monitor servers, network devices and services for uptimes with Services Inspector and NetFort LANGuardian Aisling Brennan

How to monitor servers, network devices and services for uptimes with Services Inspector and NetFort LANGuardian Aisling Brennan N ET F ORT LANG UARDIAN SERVICES INSPECTOR How to monitor servers, network devices and services for uptimes with Services Inspector and NetFort LANGuardian Aisling Brennan With LANGuardian Services Inspector,

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

Vodafone Text Centre User Guide for Microsoft Outlook

Vodafone Text Centre User Guide for Microsoft Outlook Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message

More information

Copyright 2005 Danware Data A/S. Portions used under license from third parties. All rights reserved. Document revision: 2005252 Please send comments

Copyright 2005 Danware Data A/S. Portions used under license from third parties. All rights reserved. Document revision: 2005252 Please send comments Copyright 2005 Danware Data A/S. Portions used under license from third parties. All rights reserved. Document revision: 2005252 Please send comments to: Danware Data A/S Bregnerodvej 127 DK-3460 Birkerod

More information

GE Measurement & Control. Remote Comms System. Installation and User Reference Guide

GE Measurement & Control. Remote Comms System. Installation and User Reference Guide GE Measurement & Control Remote Comms System Installation and User Reference Guide Contents BENEFITS OF REMOTE COMMS SYSTEM... 1 HOW THE REMOTE COMMS SYSTEM WORKS... 3 COMPONENTS OF REMOTE COMMS SYSTEM...

More information

Install MS SQL Server 2012 Express Edition

Install MS SQL Server 2012 Express Edition Install MS SQL Server 2012 Express Edition Sohodox now works with SQL Server Express Edition. Earlier versions of Sohodox created and used a MS Access based database for storing indexing data and other

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information