SONAR RESELLER TRAINING. Technical Training.. Slides 2 25 Sales Training. Slides 26 35
|
|
- Brendan Clarke
- 8 years ago
- Views:
Transcription
1 SONAR RESELLER TRAINING Technical Training.. Slides 2 25 Sales Training. Slides 26 35
2
3 System Requirements SONAR consists of a desktop agent and a host server where the database resides. Typically, we host data for smaller customers. Contact your sales rep if you need more information about hosting your own data. Data is transmitted via https in a governed stream and SONAR is optimized for dial up, so you should not experience any negative impact on resources or bandwidth. Desktop Requirements: Intel or AMD processor running at 733 MHz or faster, 128 Mb RAM (256 preferred), 20 Mb hard drive space [Agent = 2.5 Mb, average block list = 15 Mb] with Windows 2000, XP or Vista operating system Server Requirements: Dual Xeon or Opteron (Dual Core ok) CPU, 15 Mb 100 Mb/user/month file storage, 2 GB RAM, Windows Server 2003 with IIS, Index Services & MSMQ, MS SQL Server 2005 Standard Database (allow 25 GB for database file) and MS Outlook 2003
4 Installation Depending on your client s network architecture, different deployment methods are available. These include: Manual installation at each workstation Installation through remote desktop session Exe or MSI files including silent builds Active Directory (only for users with intact group policies and 25+ licenses) Third party silent installers for networked PCs. We have tested and can recommend a few solutions you can use to easily install SONAR and other software, and there are trial versions available as well.
5
6 Centralized Reporting Console Viewing of data, updating of settings and report generation are all done from the centralized reporting console. Installs can also be completed here. The console is accessible from ANY computer with an internet connection. No special installations or additional licenses are required for the viewing workstation(s). You can create multiple administrators with different permissions and limit them to certain departments as well.
7 Products/Feature Overview There are 2 primary SONAR products available: SONAR Monitoring & Control Bundle , Webmail, IM & Chats Application monitoring & blocking Website monitoring & blocking Keystroke Logging Screenshot Capture SONAR Data Loss Prevention Bundle Attachment monitoring & blocking Document tracking Removable media monitoring & blocking
8 Additional Products For companies that only want to monitor and control internet use, Web Filtering is offered as a stand alone module. Web Filtering is also included in the Monitoring/Control Bundle. Laptop Cop, our stolen asset recovery and remote data deletion service is offered as a stand alone product. Anyone with laptops can benefit from this solution. DLP clients are often interested in it as well.
9 How the features work Monitoring & Control Bundle Website Filtering allows you to monitor all sites users visit and block sites in any combination of the following 4 methods: Block by word viewed or typed Block by category (we define these with the combination of an algorithm and handpicking and update them regularly) Blacklisting: Block by specific URLs Whitelisting: Block all internet access except allowed sites
10 How the features work Monitoring & Control Bundle Communications monitoring includes: Monitoring of all incoming and outgoing outlook, outlook express, yahoo, hotmail, gmail and aol & webmail. Attachment names are captured. Monitoring of instant messengers: yahoo, MSN and aol. Both sides of the IM are captured. Instances appear time stamped in the appropriate category under Recorded Data. Clicking on any of the instances will provide text details in the lower portion of the screen.
11 How the features work Monitoring & Control Bundle Screenshots may be taken in two ways: Desktop image triggered by an alert word. These can be the same alert words you set to show up as highlights in any other recorded data. These are unlimited. SmartCamera activity recording triggered by programs or websites. SmartCamera will only record the window corresponding to the trigger to reduce file size. You can set the interval and duration of SmartCamera screenshots and later watch them in succession as a slideshow, much like a video recording of the activity as it happens. These are limited to 1000 per license and can be purchased in addition as needed.
12 How the features work Attachment Capturing & Blocking Data Loss Prevention Bundle Screen the contents of attachments sent through and block based on configurable criteria Removable Media Monitoring & Blocking Block use of removable media (USB, flash drives, external hard drives, CDs, etc.) based on intelligent criteria Document Tracking See what files are moved, deleted, copied, renamed, etc.
13 How the features work Laptop Cop allows you to: Laptop Cop Start recording activity as soon as you know the laptop is stolen to see how the thief is using it Remotely retrieve files Destroy data remotely Utilize our recovery assistance to help get your laptop back
14 Recorded Data IM/Chat Once SONAR is installed, recorded activity will begin to populate into the appropriate categories beneath recorded data. Clicking on any instance will make details appear below. In this instant message, an alert word was present, so it s highlighted in the content. Clicking on related events will show us the screenshot taken when this alert word appeared.
15 Recorded Data IM/Chat Screenshot Since this screenshot was triggered by an alert word, it took an image of the entire desktop. We see the buddy list and can prove this person was sharing this information.
16 Recorded Data Screenshots This screenshot was triggered by this program being opened. The recording is only of the active window. If the user changes focus from the recording target window, SmartCamera will automatically stop recording to reduce file sizes and prevent the need to look through useless screenshots. When you access the screenshots category under recorded data, you can scroll through instances, then select one and click play slideshow for video like this.
17 Recorded Data Select other categories to add to the display here by using the dropdowns above the recorded data. View, delete, filter and sort data with these and with the red filter section of your console. contents appear as text in the lower portion of the screen, even for webmail. Stripping the traditional interfaces and reducing the data to text keeps file sizes small and the software running lean.
18 Recorded Data Keystrokes Keystrokes are grouped by program and date. Instances appear as headings in the upper right portion of the screen. Clicking on one will produce the formatted and unformatted data in the lower portion of the screen.
19 Recorded Data Websites All sites users visit will appear here. Click into any site to see specific visits. Sort and filter easily and quickly to report on a user, computer or department s web use.
20 Application Monitoring See how long a program is open (duration) AND how much of that time was active use of the program.
21 Reports/Exporting Turn any recorded data into a report. First filter data to pull up a user s activity, date set, department, etc. Use the export dropdown to select either detail or summary Export the report into pdf, image, excel, CSV, html or xml or print Pre configured graphical reports provide a quick overview of activity in each category
22 Settings Recording Options by Department Turn specific recording monitors on and off with these radio buttons. Quickly and easily assign users or computers to different departments. Change settings for entire departments at once. All users will appear in the unassigned department by default. Click on the blue settings hyperlinks to specify website blocking, program blocking, SmartCamera triggers and Alert Words.
23 Settings Screenshots by Application All the programs run after SONAR is installed will populate into your settings list for quick access. Here you can also set the interval and duration of screenshots.
24 Settings Blocking Application Profiles You can even schedule program blocking with different timeframes for different users.
25 Settings Account Access Here s where you can create different administrator logins with different permissions. You can also customize your hotkey sequence, used by your authorized administrators to disable recording or uninstall a license manually on thefly.
26 SONAR Reseller Sales Training
27 Why SONAR Comprehensive Saves budget by eliminating the need for multiple solutions Ease of Use Centralized reporting console, accessibility of data from any PC, real time reporting, easy deployments Smart Investment Extremely quick ROI with improved productivity, insurance for intellectual property, acts as a constant supervisor eliminating the need for additional salaries, stealth preserves morale Flexibility SaaS or host behind your firewall Benefits for every industry and department
28 With SONAR, you can: Improve productivity Prevent theft of intellectual property Help stop compliance violations Track inappropriate behavior Gather actionable evidence Reduce strain on IT & supervisors Create reports for management
29 When presenting monitoring/control for the first time to your client.. Explain that while anti virus, firewalls, spam filters, etc. defend against external threats, SONAR can protect them from internal vulnerabilities Highlight that a desktop agent is more effective than a network based solution or appliance since it works offnetwork and can t be circumvented Let them know that this is an easy, cost effective way to enforce multiple company policies Don t forget to offer your client a free SONAR evaluation!
30 Keep the industry & department in mind Since SONAR solves so many problems, it can help to point out the specific issues relevant to your clients and link them to SONAR benefits. Here are some examples: SONAR in the HR department Build termination cases, prove whether or not harassment is occurring and stop it SONAR for High Tech Make sure traveling employees aren t selling company information during a business trip SONAR for Schools Protect students from viewing objectionable content & using malicious software. Plus we offer educational discounts too!
31 Awareness Technologies Order Process Review our How to order SONAR guide and Pricing Model for Resellers on the Partner Extranet for step by step instructions Place an order with your SONAR sales rep Install SONAR for your client. Technical support is always available to you.
32 Lead Share Program You will be invited to participate in our Lead Share Program if you: Sell SONAR within your client base first Are prompt in your communications with us. Responding to new leads in a timely fashion is paramount to the success of our Lead Share Program.
33 Marketing We are happy to provide logos and product information for you to display on your website or in a newsletter. These are available on our partner extranet. If you have specific questions or need material you can t find on the extranet, contact your sales rep for assistance.
34 Technical Support Because we want to preserve the integrity of your relationship with your client, you will be expected to provide level one technical support to your customers. We will provide training and technical support to you at any time. How to get Technical Support: PHONE: option 2 support@awarenesstechnologies.com CHAT: visit our site and click any chat link Please report any bugs or issues you encounter.
35 Sales Support In addition to the materials in our partner extranet, your sales rep is always happy to assist you. Your sales contact is: Marianne Bland Toll Free x422 Local Fax Skype ID marianne.bland
Using Computer Surveillance to Watch Corporate Security and Employee Performance
Using Computer Surveillance to Watch Corporate Security and Employee Performance AtomPark Software Inc. 2008 2008. AtomPark Software Inc. All rights reserved 1 Using Computer Surveillance to Watch Corporate
More informationEmployee PC and Server Activity Monitoring Solution
Employee PC and Server Activity Monitoring Solution Employee PC and Server Activity Monitoring Ever dreamed of a software tool to track your network activity in real time? Ever thought of how useful it
More informationHow to avoid Five Blind Spots in Internet Filtering
How to avoid Five Blind Spots in Internet Filtering If you re like most managers today, you d like to know what your employees are up to on company time, especially when they re using company PCs and laptops.
More informationData Sheet: Work Examiner Professional and Standard
Data Sheet: Work Examiner Professional and Standard Editions Overview One of the main problems in any business is control over the efficiency of employees. Nowadays it is impossible to imagine an organization
More informationBillQuick Agent 2010 Getting Started Guide
Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)
More information4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
More informationStep-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet
Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from
More informationEndpoint Security Console. Version 3.0 User Guide
Version 3.0 Table of Contents Summary... 2 System Requirements... 3 Installation... 4 Configuring Endpoint Security Console as a Networked Service...5 Adding Computers, Groups, and Users...7 Using Endpoint
More informationEkran System List of Frequently Asked Questions
Ekran System List of Frequently Asked Questions User Activity Monitoring Where can I perform user activity monitoring? User activity monitoring is performed via the Ekran System Monitor. It provides an
More informationSysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
More informationSMART Classroom Suite 2011
SMART Classroom Suite 2011 Windows operating systems System administrator s guide Trademark notice SMART Board, SMART Classroom Suite, SMART Notebook, SMART Response, SMART Sync, SMART Document Camera,
More informationMediasite EX server deployment guide
Mediasite EX server deployment guide 2008 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc. Additional copies
More informationEnterprise Deployment
Enterprise Deployment Deployment Overview Version 1.1 Contents 1. Deployment Overview... 3 1.1 System Requirements... 3 2. ES1 Email Invite... 3 3. Web Based Method... 4 4. USB or Network Drive... 4 5.
More informationWeb Supervisor/Agent. System Requirements & Troubleshooting Guide. 989 Old Eagle School Road Wayne, PA 19087 (610) 964-8000. www.evolveip.
Web Supervisor/Agent System Requirements & Troubleshooting Guide 989 Old Eagle School Road Wayne, PA 19087 (610) 964-8000 www.evolveip.net Evolve IP Guide Copyright Notice Trademarks Copyright 2011 Evolve
More informationSMART Sync 2011. Windows operating systems. System administrator s guide
SMART Sync 2011 Windows operating systems System administrator s guide Trademark notice SMART Sync, smarttech and the SMART logo are trademarks or registered trademarks of SMART Technologies ULC in the
More informationNovell Open Workgroup Suite
Novell Open Workgroup Suite Small Business Edition QUICK START GUIDE September 2007 v1.5 Page 1 Introduction This Quick Start explains how to install the Novell Open Workgroup Suite software on a server.
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationDesktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
More informationQuestions & Answers from the Webcast: Your Mac Users Deserve Quality Support Too. Sponsors: Atempo. Centrify. Group Logic. LANrev.
Questions & Answers from the Webcast: Your Mac Users Deserve Quality Support Too Sponsors: Atempo Centrify Group Logic LANrev Parallels November 10, 2009 Web Help Desk Contents Compilation of the questions
More informationViRobot Desktop 5.5. User s Guide
ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,
More informationCentral Management System
Central Management System Software Installation Guide Ver. 1.5.0.101115.001 ... ii System Introduction... 3 Client/Server Architecture...3 System Requirements... 4 System Setup...4 Multiple Monitor Configuration...5
More informationPractice Management Installation Guide. Requirements/Prerequisites: Workstation Requirements. Page 1 of 5
Practice Management Installation Guide Your computers must meet the Workstation, Server and Network Requirements (see below for specifics). These requirements will ensure that Practice Management will
More informationUser manual of the Work Examiner Contents
User manual of the Work Examiner Contents About this document... 4 Overview... 4 What is Work Examiner?... 4 Standard vs Professional Comparison Chart... 5 FAQ... 6 Install... 7 WE Standard Edition...
More informationNote: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.
Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.
More information(606) 785-3450 Knott County (606) 439-3167 Perry County (606) 633-0778 Letcher County. support@tvscable.com
TVS CableNet Technical Support Guide Effective August 15, 2006 All materials 2006 TV Service, Inc. This material may not be reproduced in any form except for personal private use by TV Service Cable Internet
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationRightNow November 09 Workstation Specifications
RightNow November 09 Workstation Specifications This document includes the workstation specifications required for using RightNow November 09. Additional requirements for Outlook Integration, RightNow
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationArchive Add-in Administrator Guide
Archive Add-in Administrator Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential
More informationHosted IP Phone System Voice Operator Panel User Guide
Voice Operator Panel Main Window: 1. Incoming Calls Incoming calls display here. 2. Outgoing Calls Outgoing calls display here. 3. Dial Enter [10-digit phone number] in this field to make an outgoing call.
More informationDriveLock Quick Start Guide
Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationEkran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
More informationSyncLockStatus Evaluator s Guide
SyncLockStatus Evaluator s Guide 2011 Table of Contents Introduction... 2 System Requirements... 2 Required Microsoft Components... 2 Contact Information... 3 SyncLockStatus Architecture... 3 SyncLockStatus
More informationintertrax Suite resource MGR Web
intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;
More informationInterGuard. Incredible and True Case Studies. A whitepaper provided by: InterGuard
InterGuard Incredible and True Case Studies A whitepaper provided by: InterGuard Three Case Studies to Amaze Best Use of Time Our first story comes to us from one of our clients with a company with 53
More informationReceptionist-Small Business Administrator guide
Receptionist-Small Business Administrator guide What is it? Receptionist-Small Business works with your desk phone, soft phone, or mobile device so you can control calls, monitor the lines of employees,
More informationProtegent 360- Complete Security Software
Protegent 360- Complete Security Software It s Time to Think Beyond Anti-Virus Anti-virus, Internet Security and total security are common words describing security software, but only for Internet threats.
More informationONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0
ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a
More informationOrientation Course - Lab Manual
Orientation Course - Lab Manual Using the Virtual Managed Workplace site for the lab exercises Your instructor will provide the following information before the first lab exercise begins: Your numerical
More informationUsing WMI Scripts with BitDefender Client Security
Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...
More informationescan Corporate Edition User Guide
Anti-Virus & Content Security escan Corporate Edition (with Hybrid Network Support) User Guide www.escanav.com sales@escanav.com The software described in this guide is furnished under a license agreement
More informationAdminToys Suite. Installation & Setup Guide
AdminToys Suite Installation & Setup Guide Copyright 2008-2009 Lovelysoft. All Rights Reserved. Information in this document is subject to change without prior notice. Certain names of program products
More informationVidyo Network Configuration Guide Windows XP and Vista
Vidyo Network Configuration Guide Windows XP and Vista Introduction Vidyo is a new video conferencing system used in the latest Attend Anywhere professional networking, video collaboration & service delivery
More informationMcAfee Family Protection
User Guide The Easiest, Most Complete Way to Keep Your Children Safe Online Quick Start Easy CD Installation STEP 1: First, ensure that your computer meets or exceeds the minimum systems requirements listed
More informationHow To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
More informationDESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO
DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download
More informationGood Practice use of Outlook, Thunderbird and HORDE Webmail
Midwest Data, Inc. Good Practice use of Outlook, Thunderbird and HORDE Webmail This document is merely suggested setups and usage that in MDI s experience works best. For any questions please e-mail mdisupport@midwestdatainc.com.
More informationSAFETICA QUICK GUIDE
SAFETICA QUICK GUIDE SAFETICA QUICK GUIDE for Safetica version 5.0.4 Author: Safetica Technologies s.r.o. Safetica was developed by Safetica Technologies s.r.o. All rights reserved. No part of this documentation
More informationSymantec System Recovery 2013 Management Solution Administrator's Guide
Symantec System Recovery 2013 Management Solution Administrator's Guide Symantec System Recovery 2013 Management Solution Administrator's Guide The software described in this book is furnished under a
More informationavast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide
avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even
More informationVerizon Family Protection Powered by McAfee. User Guide
Verizon Family Protection Powered by McAfee User Guide ii Contents Welcome to Verizon Family Protection Powered by McAfee User Guide 3 Setting up Family Protection 5 Managing your family's protection...6
More informationMicrosoft Office Communicator 2007 R2 Getting Started Guide. Published: December 2008
Microsoft Office Communicator 2007 R2 Getting Started Guide Published: December 2008 Information in this document, including URL and other Internet Web site references, is subject to change without notice.
More informationUSER GUIDE: MaaS360 Services
USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document
More informationSetting Up a One-Click Meeting
Chapter 10 10 Setting Up a One-Click Meeting If you want to... get an overview of starting a One-Click Meeting from your WebEx service Web site specify settings for your One-Click Meeting install WebEx
More information8x8 Virtual Room User Guide
8x8 Version 1.0, July 2011 The Champion For Business Communications Table of Contents Introduction...3 System Requirements...4 8x8 Virtual Room...5 Virtual Office Online Login Procedure...5 Create a Virtual
More informationHelp System. Table of Contents
Help System Table of Contents 1 INTRODUCTION 1.1 Features 2 GETTING STARTED! 2.1 Installation 2.2 Registration 2.3 Updates 3 VIEWING RECORDED DATA 3.1 Snapshots 3.2 Programs 3.3 Websites 3.4 Keystrokes
More informationNetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
More informationHomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationShoreTel 13 Conferencing User Guide. Part Number 850-1234-01
ShoreTel 13 Part Number 850-1234-01 Document and Software Copyrights Copyright 1998-2012 by ShoreTel Inc., Sunnyvale, California, USA. All rights reserved. Printed in the United States of America. Contents
More informationGetting Started Guide
Getting Started Guide www.exclaimer.com Contents About This Guide... 2 Signature Manager Overview... 3 How does it Work?... 3 But That s Not All... 4 And There s More... 4 Licensing... 5 Licensing Information...
More informationOnline Proctoring Services
Online Proctoring Services Observing test takers online using webcams and microphones. It sounds simple, yet for educational institutions, it is no simple task. Kryterion is leading the industry in providing
More informationMS SQL Installation Guide
MS SQL Installation Guide Microsoft SQL Database For Debtors Manager Table of contents 1. Overview 2. Minimum server installation requirements for MS SQL 3. Installing MS SQL on your server 4. Installing
More informationEnterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
More informationBITDEFENDER ENDPOINT SECURITY TOOLS
BITDEFENDER ENDPOINT SECURITY TOOLS Beta Version Testing Guide Bitdefender Endpoint Security Tools Beta Version Testing Guide Publication date 2014.11.26 Copyright 2014 Bitdefender Legal Notice All rights
More informationHow to deploy SurveilStar PC/Internet Monitoring Software
How to deploy SurveilStar PC/Internet Monitoring Software 1/16 How to deploy SurveilStar PC/Internet Monitoring Software (Latest updated: April. 9, 2015) www.surveilstar.com This document provides detailed
More informationAVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
More informationLogMeIn Backup. User Guide
LogMeIn Backup User Guide Contents About LogMeIn Backup...4 Getting Started with LogMeIn Backup...5 How does LogMeIn Backup Work, at-a-glance?...5 About Security in LogMeIn Backup...5 LogMeIn Backup System
More informationAbout This Guide... 4. Signature Manager Outlook Edition Overview... 5
Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System
More informationSYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION
SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built
More informationv7.1 Technical Specification
v7.1 Technical Specification Copyright 2011 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,
More informationSymantec Endpoint Protection Small Business Edition cloud Administrator's Guide
Symantec Endpoint Protection Small Business Edition cloud Administrator's Guide Symantec Endpoint Protection Small Business Edition cloud Administrator's Guide Documentation version:january 2015 Legal
More informationTimeValue Software Due Date Tracking and Task Management Software
User s Guide TM TimeValue Software Due Date Tracking and Task Management Software File In Time Software User s Guide Copyright TimeValue Software, Inc. (a California Corporation) 1992-2010. All rights
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationEndpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
More informationNet Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
More informationGUARD1 PLUS SE Administrator's Manual
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
More informationSafe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
More informationYour Assistant Collaboration Module
MITEL Your Assistant Collaboration Module User Guide Notice This guide is released by Mitel Networks Corporation and provides information necessary to use the Mitel Your Assistant Collaboration Module.
More informationJuris Installation & Upgrade Guide. Version 2.6.1
Juris Installation & Upgrade Guide Version 2.6.1 Copyright 2014 LexisNexis. All rights reserved. Copyright and Trademark LexisNexis, Lexis, and the Knowledge Burst logo are registered trademarks of Reed
More informationConfiguration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
More informationGetting Started on the PC and MAC
Getting Started on the PC and MAC Click on the topic you want to view. Download the Desktop App Download the ios or Android App Desktop App Home Screen Home Screen Drop Down Menu Home Screen: Upcoming
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationPartner. Sage Pastel. Accounting. Installation Guide
Sage Pastel Accounting Partner Installation Guide Sage Pastel: +27 11 304 3000 Sage Pastel Intl: +27 11 304 3400 www.pastel.co.za www.sagepastel.com info@pastel.co.za info@sagepastel.com Sage Pastel Accounting
More informationAD Self-Service Suite for Active Directory
The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.
More informationRichmond Systems. SupportDesk Quick Start Guide
Richmond Systems SupportDesk Quick Start Guide Table of Contents SupportDesk Quick Start Guide...1 Introduction...1 Pre-requisites...2 Installation at a Glance...2 Installation...3 Setup Console...13
More informationTeamViewer 9 Manual Management Console
TeamViewer 9 Manual Management Console Rev 9.2-07/2014 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About the TeamViewer Management Console... 4 1.1 About the
More informationAXIS Camera Station Quick Installation Guide
AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera
More informationTeamViewer 8 Manual Remote Control
TeamViewer 8 Manual Remote Control Rev 8.1-12/2012 TeamViewer GmbH Kuhnbergstraße 16 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About TeamViewer... 6 1.1 About the software... 6 1.2 About
More informationSETTING UP AN INSTANT MESSAGING SERVER
SETTING UP AN INSTANT MESSAGING SERVER I recently upgraded a Charlotte company from an NT 4 domain to Small Business 2003. While the employees seemed excited about the Exchange server, Outlook Web Access,
More informationOPTAC Fleet Viewer. Instruction Manual
OPTAC Fleet Viewer Instruction Manual Stoneridge Limited Claverhouse Industrial Park Dundee DD4 9UB Help-line Telephone Number: 0870 887 9256 E-Mail: optac@stoneridge.com Document version 4.0 Part Number:
More informationNETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
More informationBitDefender Security for Exchange
Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the
More informationESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
More informationTable of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
More informationAccounting Manager. User Guide A31003-P1030-U114-2-7619
Accounting Manager User Guide A31003-P1030-U114-2-7619 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001 and ISO14001 standards and are certified
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationSpyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
More informationMobile Device Management Version 8. Last updated: 16-09-14
Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationThis document provides information to install X-Spam for Microsoft Exchange Server 2000-2003
This document provides information to install X-Spam for Microsoft Exchange Server 2000-2003 X-Spam for Microsoft Exchange Server 2000-2003 Installation Guide Installation Guide X-Spam for Microsoft Exchange
More information