Portal Administration. Administrator Guide

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Portal Administration. Administrator Guide"

Transcription

1 Portal Administration Administrator Guide

2 Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo and are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. Symantec Corporation 350 Ellis Street Mountain View, CA Clients are advised to seek specialist advice to ensure that they use the Symantec services in accordance with relevant legislation and regulations. Depending on jurisdiction, this may include (but is not limited to) data protection law, privacy law, telecommunications regulations, and employment law. In many jurisdictions, it is a requirement that users of the service are informed of or required to give consent to their being monitored or intercepted for the purpose of receiving the security services that are offered by Symantec. Due to local legislation, some features that are described in this documentation are not available in some countries. Configuration of the Services remains your responsibility and entirely in your control. In certain countries it may be necessary to obtain the consent of individual personnel. Symantec advises you to always check local legislation prior to deploying a Symantec service. You should understand your company s requirements around electronic messaging policy and any regulatory obligations applicable to your industry and jurisdiction. Symantec can accept no liability for any civil or criminal liability that may be incurred by you as a result of the operation of the Service or the implementation of any advice that is provided hereto. The documentation is provided "as is" and all express or implied conditions, representations, and warranties, including any implied warranty of merchantability, fitness for a particular purpose or non-infringement, are disclaimed, except to the extent that such disclaimers are held to be legally invalid. Symantec Corporation shall not be liable for incidental or consequential damages in connection with the furnishing, performance, or use of this documentation. The information that is contained in this documentation is subject to change without notice. Symantec may at its sole option vary these conditions of use by posting such revised terms to the website.

3 Technical support If you need help on an aspect of the security services that is not covered by the online Help or administrator guides, contact your IT administrator or Support team. To find your Support team's contact details in the portal, click Support > Contact us.

4 Contents Technical support... 3 Chapter 1 Introduction to the portal... 5 About the portal... 5 Logging on and off the portal... 7 Language support in the portal... 7 How long do settings take to apply?... 8 Setting SMS alerts... 8 General security best practice... 8 About logging in to the portal using the authentication server Setting up your authentication security information Updating your authentication profile About access control About two factor authentication Enabling two factor authentication About IP restrictions Enabling IP restrictions Chapter 2 Managing portal users and domains About managing portal users and domains Defining a portal user Managing portal users Defining standard roles Defining custom roles Making domain changes for Services Changing the number of service users Managing your contact list Changing your organization's address details Chapter 3 Managing your details in My Profile Viewing and editing your details in My Profile Changing your time zone in My Profile Changing your password in My Profile... 28

5 Chapter 1 Introduction to the portal This chapter includes the following topics: About the portal Logging on and off the portal Language support in the portal How long do settings take to apply? Setting SMS alerts General security best practice About logging in to the portal using the authentication server Setting up your authentication security information Updating your authentication profile About access control About two factor authentication Enabling two factor authentication About IP restrictions Enabling IP restrictions About the portal Use the service management portal as a center for the resources, support, and configuration of your security services. The easy-to-use pages offer a Dashboard view of your service statistics, with extensive reporting features and functionality for managing your users, all in one place.

6 Introduction to the portal About the portal 6 The features that you see in the portal depend on your access permissions and on your organization's service configuration. Note: We do not recommend you to use Microsoft Internet Explorer 6 for viewing the portal. Table 1-1 Section Dashboard Sections of the portal Description The Dashboard provides a visual snapshot of all your key service statistics in one place. You can configure the Dashboard to show the key statistics that are most important to you. Users and Groups Services The Users and Groups tab is a central point of access for the management of users and groups across your services. You can configure the settings for your cloud Security, Web Security, and Instant Messaging Security services. You can also open the Endpoint Protection and Backup Exec portal. In the portal you can check the status of your subscribed computers, add new computers, and manage your Backup Exec services. See How long do settings take to apply? on page 8. Reports Tools Support Administration You can download PDF summary reports of your , Web, and IM services. The reports contain graphs, tables, and key statistics relating to traffic volumes and service performance. You can download CSV files containing detailed statistics on your services. You can also schedule reports to be ed to you at regular intervals. The Tools tab provides access to resources such as Track and Trace, and to software that you can download to help you manage your services. The Support tab provides links to the Support Ticketing Center and the online Help system. You can set up alerts to inform you of issues with your services. Use the Administration tab to manage your users and submit change requests.

7 Introduction to the portal Logging on and off the portal 7 Logging on and off the portal To log on to the portal, you need a user name and password. If your administrator has configured two factor authentication, then you also need a VIP credential. See About VIP credentials. To log on to the portal 1 Enter your user name. 2 Enter your password. 3 Click Log in. To log out of the portal From any screen in the portal, click the Log Out link in the top right of the screen. See About logging in to the portal using the authentication server on page 10. Language support in the portal You can view the portal in 11 languages. To change the language you see on screen, do one of the following Select the required language from the drop-down menu at the top of any screen. Select the My Profile link at the top of any page of the portal, then choose the required language from the Preferred language drop-down and click Save and Exit. In most places where you enter characters in the portal, you can use all Unicode characters. You are limited to single-byte alphanumeric characters (ASCII characters) in Content Control and IM Content Control, in the following areas: Names of lists Names of rules Names of groups Names of files can be entered using double-byte characters but these must be UTF-8 encoded. Most character sets and encoding types are supported for use in Content Control and IM Content Control lists to detect text content in s and instant messages.

8 Introduction to the portal How long do settings take to apply? 8 How long do settings take to apply? Setting SMS alerts Typically, changes that you make to settings in the portal take effect within an hour. Some configuration changes are visible in the portal within minutes. You can receive SMS alerts to inform you of critical announcements on your security services. For example, we can send you an alert to notify you of a delay to our services. The alerts are delivered to a mobile device as text messages. The SMS alerts are specific to your services. You can define the domains that you want to receive alerts for. You can have SMS alerts sent to up to five telephone numbers. Note: Depending on how the portal is set up, you may not be able to set up SMS alerts. To receive SMS alerts 1 Select Support > SMS Alerts. 2 From the Global settings drop-down list, either: To receive SMS alerts for all domains on the same telephone numbers, select Global settings, or To receive SMS alerts for a specific domain, select the required domain name. 3 Enter up to five telephone numbers on which to receive SMS alerts. Include the country and the area codes. 4 Click Save and Exit. General security best practice The following guidelines will help the users in your organization follow computer security best practices: You should understand your company's requirements around electronic messaging policy and any regulatory obligations applicable to your industry and jurisdiction. We recommend that you have such a policy in place to govern your employees' use of . The online resources are provided to help enable you to enforce and effectively implement an acceptable computer use policy.

9 Introduction to the portal General security best practice 9 Logon details to the portal should be kept secure and only used on a secure computer and a trusted computer. Because the portal is accessed over the Internet, ensure that procedures exist to revoke access when a member of staff leaves or no longer needs access. ServiceDesk authorized contacts should also be kept current. Choose long, non-obvious, and complex passwords that cannot be guessed by using a combination of uppercase, lowercase, numerals, and special characters, e.g.!#&'()+. Do not write down passwords. If you have difficulty remembering them, use Password Safe (if approved by your companies IT/Information Security department). Password Safe enables you to store multiple passwords securely, and means that you only have to remember one password to access them. Do not share passwords Change your password on a regular basis When logging into the portal, ensure that your Web browser goes to the correct URL for the portal. Further verification of the correct site can be made by viewing the site SSL certificate which is issued by the Entrust certificate authority. Your Web browser should verify that the certificate is genuine with the Entrust root certificate. When you download documents from the portal, the spreadsheet, word processing, or document software may cache a copy to a temporary area on your hard drive. Caching definitely occurs if an automatic save function is active. The cached copy may not be removed automatically - even after you close the document. The cached copy may be accessible to other users of your computer. Web browsers cannot cache the portal contents. Increase your security by not enabling Web browsers or proxy servers to override this feature. Be careful when adding or changing the settings in the portal. Check and check again that the correct settings are entered. Although we have safeguards in place, inadvisable changes to the portal settings may result in disrupted service or that is directed to the wrong location. Regularly check the list of users who have access to the portal. Do users have more access than required for their role? Should they still have an account or be removed? Ensure that the computer that you use to access the portal is protected from malicious attacks. Use firewalls, proxy services, anti-malware detection, and other methods, as appropriate. Have security policies, standards, processes, and procedures in place at your company to ensure that you protect your information assets appropriately for your business. Ask your local IT/Information

10 Introduction to the portal About logging in to the portal using the authentication server 10 Security department for the policies that govern how information security is carried out in your company. Occasionally we may send you an that requests that you log into the portal, for example to access a report. To reduce the risk of being exposed to a phishing that contains branding or links that mimic the genuine portal, use the AntiVirus service. We recommend that you set up a separate account for the portal for each of your users. It is not advisable to share accounts. Ensure that your DNS is secure to prevent alteration of the MX records, which can potentially allow malicious redirection and unauthorized interception of . To prevent domain hi-jacking, also ensure that contact details and security procedures are in place and up to date with the domain registrar. About logging in to the portal using the authentication server The authentication server handles your login to the portal. You may notice that the system redirects you to this authentication server when you log in to the portal. Once you have authenticated successfully, the system redirects you back to the portal. The authentication server lets you change your own password. If you forget your password, you can reset it by answering the security questions that you have already set up. See Updating your authentication profile on page 11. See Setting up your authentication security information on page 10. See Logging on and off the portal on page 7. Setting up your authentication security information The first time that you log in to the portal using the authentication server, you need to set up your security information. To set up your security information: 1 The login page for the portal redirects you to the authentication server. Enter your user name and password. 2 The first time that you log in using the authentication server, it identifies you as having an incomplete authentication profile. It prompts you to set up your security information.

11 Introduction to the portal Updating your authentication profile 11 Enter your address (optional). For all three security questions, select the new question from the list. Enter your answers. You must choose three unique questions. Your answers to the questions must be between 3 and 50 character long. See Updating your authentication profile on page 11. See About logging in to the portal using the authentication server on page 10. Updating your authentication profile Your authentication profile contains your password and security questions. Your security questions are used to confirm your identity if you forget your password. To update your profile 1 To view your profile, click My Profile. The My Profile page is displayed. 2 To change your password: About access control Click Create new password Enter your old password. Enter and confirm your new password. 3 To change your security questions and answers: Click Create new security questions For all three security questions, select the new question from the list. Enter your answers. You must choose three unique questions. Your answers to the questions must be between 3 and 50 character long. 4 To complete updating your profile, click Save and Exit. To abandon your changes click Cancel. See About logging in to the portal using the authentication server on page 10. See Setting up your authentication security information on page 10. Access control provide a more comprehensive approach to security for your portal users. Two factor authentication enables an extra layer of security, in addition to the username and password.

12 Introduction to the portal About two factor authentication 12 IP restrictions limit your users to only logging in from approved IP addresses or address ranges. See About two factor authentication on page 12. See Enabling two factor authentication on page 12. See About IP restrictions on page 12. See Enabling IP restrictions on page 13. About two factor authentication Two factor authentication means that all of your portal users require a VIP credential, as well as their username and password, to log in to the portal. This significantly increases security. Only one set of credential per user is permitted. You cannot use different credentials (for example, VIP for Mobile and VIP Security Token) for a single user. To ensure that you can continue to access the portal, set up your own VIP credential before enabling this setting. See About VIP credentials. See About access control on page 11. See Enabling two factor authentication on page 12. Enabling two factor authentication To ensure that you can continue to access the portal, set up your own VIP credential before enabling this setting. To enable two factor authentication 1 Browse to Administration > Access Control. 2 Set Two Factor Authentication to Activate. See About VIP credentials. About IP restrictions See About access control on page 11. See About two factor authentication on page 12. IP restrictions limit all of your portal users to accessing the portal only from an IP address included in any of the specified ranges.

13 Introduction to the portal Enabling IP restrictions 13 This restriction provides a limited measure of security, as IP addresses could potentially be spoofed. Note: IP-based restricted access cannot detect instances in which the HTTP_FORWARDED_FOR header has been spoofed. We recommend using two factor authentication as well as IP restrictions for a more comprehensive approach to access control. See About access control on page 11. See About VIP credentials. See About IP restrictions on page 12. See About two factor authentication on page 12. See Enabling two factor authentication on page 12. Enabling IP restrictions We recommend using two factor authentication as well as IP restrictions for a more comprehensive approach to access control. To enable IP restrictions 1 Browse to Administration > Access Control. 2 Enter an IP address or range of IP addresses, then click Add. To ensure that you can continue to access the portal, add your own IP address details to the list. 3 Add more IP addresses or ranges as required, then click Add. 4 Change the State of all required IP addresses to On, either individually, or click Activate All. See About access control on page 11. See About IP restrictions on page 12. See About two factor authentication on page 12. See About VIP credentials. See Enabling two factor authentication on page 12.

14 Chapter 2 Managing portal users and domains This chapter includes the following topics: About managing portal users and domains Defining a portal user Managing portal users Defining standard roles Defining custom roles Making domain changes for Services Changing the number of service users Managing your contact list Changing your organization's address details About managing portal users and domains You can manage your portal users and your domains within the Administration tab of the portal. The main administrative areas are as follows: User Management Domain Changes User Changes View, add, edit or delete Administrator users and their permissions Add a new domain to use the services. Increase or decrease the number of service users associated with this account.

15 Managing portal users and domains Defining a portal user 15 Contact List Changes Address Changes Request changes to the account technical, invoicing or management contacts. Request a change of company name, address, phone, fax, or Web site. See Defining a portal user on page 15. See Managing portal users on page 16. See Defining custom roles on page 19. Defining a portal user See Defining standard roles on page 17. See Making domain changes for Services on page 23. See Changing the number of service users on page 23. See Managing your contact list on page 24. See Changing your organization's address details on page 25. Users can be delegated one of several roles that give them various levels of permission to carry out administrative tasks in the portal. To define a portal user 1 Select Administration > User Management. 2 Click Create new user. 3 Enter the user's full name (required), login name (required), and address (optional). All portal users must have a unique login name, so an address is recommended. 4 Select the Preferred language that the portal displays in. 5 Select the Preferred time zone for the user. The preferred time zone is used in time-related settings such as for scheduled reports and rules for Content Control. 6 Enter a password for the user (required). The new password must be at least eight characters long and contain alphabetic, numeric, and symbol characters. The user is prompted to change this password when they next log in to the system. Their new password is not visible to any other user.

16 Managing portal users and domains Managing portal users 16 7 Ensure that the User is enabled button is set to Yes. Setting this option to No disables the account. When the user has been created, this setting can be used to prevent future access to the portal for this account, without deleting the user altogether. 8 Select the appropriate option button to define whether User can manage other users. Setting this option to Yes enables the user to create new portal users and to manage existing portal users, including assigning new passwords to other users. 9 Click Save and Exit. Managing portal users The new user is added to the list of authorized portal users. Currently, the new user has no role allocated. See Defining standard roles on page 17. See Defining custom roles on page 19. The primary login account for the portal is the default administrator account that you are given when provisioned with the cloud security services. This account has permission to configure all provisioned services, create new users, and define user roles. To prevent accidental deletion of all portal users, this primary account cannot be deleted. We recommend that you set up all of your users with named accounts, and only use the primary login account as a default account to ensure that there is always an account that has full permissions. To view existing portal users 1 Select Administration > User Management. The names of the portal users that you manage and their logins are listed. Use the search facility or the navigation buttons to locate the required user. 2 To view and edit more details of the user, including their roles, click the user's name. To delete a portal user 1 Select Administration > User Management. 2 Select the user to delete by ticking the checkbox to the left of their name. 3 Click Delete selected.

17 Managing portal users and domains Defining standard roles 17 To edit a user's details 1 Select Administration > User Management. 2 Use the search facility or the navigation buttons to locate the required user. 3 Click the user's name. The details of the user are displayed. 4 Edit the details as appropriate. 5 Click Save and Exit. See Defining standard roles on page 17. See Defining custom roles on page 19. See Defining a portal user on page 15. Defining standard roles Assigning a role to a user gives them permission to view and where applicable, edit areas and settings in the portal. A Standard role enables you to grant access to all or a group of settings in the portal. A user can be assigned more than one role. Note: To enable a user to request changes to your provisioned domains, to use the Track and Trace feature, to raise support tickets, etc, assign a custom role. The standard roles are as follows: Full access View and edit configurations, generate reports, manage domains, and view Dashboards for all of your services and domains. Access the Administration screens to manage users and make change requests. Reports View Dashboards and generate reports for all of your services and domains. The user does not see the Services and Administration sections of the portal. The user only sees the Contact Support page in the Support section. Support Access all of the Support pages. The user does not see the Services, Administration, and Reports sections of the portal.

18 Managing portal users and domains Defining standard roles 18 Service View and edit configurations and generate reports for all provisioned domains for the service(s) selected from the list. The user does not see the Administration section of the portal. The user only sees the Contact Support page in the Support section. Domain ( ) View and edit configurations and generate reports for all provisioned services for the domains that you select from the drop-down list. The user does not see the Administration section of the portal. Note: This option only affects Services. The user cannot configure Web and IM Services with this role. Archiving Archive Administrator Option available when you create a Service Administrator. Search the Web browsing archive. Apply legal holds to the archive. The user does not see the Administration section of the portal. The user only sees the Contact Support page in the Support section. Note: This option only affects Archive Services. The Archive Administrator cannot configure Web Security Services. Archive Viewer Option available when you create a Service Administrator. Search the Web browsing archive. The user does not see the Administration section of the portal. The user only sees the Contact Support page in the Support section. Note: This option only affects Archive Services. The Archive Viewer cannot configure Web Security Services. To define a standard role for a user 1 Select Administration > User Management. 2 Select an existing user to allocate a role for (or create a new user). 3 Click the User roles tab. 4 Click Use standard role. 5 Select the role type to apply for this user. 6 Click Add role. The role is listed in the User roles tab.

19 Managing portal users and domains Defining custom roles 19 See Defining custom roles on page 19. Defining custom roles Assigning a role to a user gives permissions to view and configure certain areas and settings in the portal. A Custom role enables you to define more precisely the areas of the portal that a user can access, including the ability to make change requests to your provisioned setup. Defining a custom role for a user enables you to grant permission to view and edit configurations, statistics, and areas of the portal, and to raise change requests. Custom roles can be applied for all or specific services and domains. However, domain settings do not apply for some roles and some services. A user can be assigned more than one role. The uses of custom roles are explained in the following table. Table 2-1 Custom role Custom roles Description Edit Configuration Edit the configuration settings for the selected services. To edit configuration settings, the user requires both the View Configuration and Edit Configuration roles. The user does not see the dashboards and the Reports and Administration sections of the portal. The user only sees the Contact Support page in the Support section. View Configuration View the current configurations settings for the selected services; no changes can be made. The user does not see the dashboards and the Reports and Administration sections of the portal. The user only sees the Contact Support page in the Support section.

20 Managing portal users and domains Defining custom roles 20 Table 2-1 Custom role View Statistics Custom roles (continued) Description View the dashboards and generate reports for the selected services. The user does not see the Services and Administration sections of the portal. The user only sees the Contact Support page in the Support section. Request Changes In the Administration section, request domain, user, contact list, and address changes. The user does not see the dashboards and the Services and Reports sections of the portal, nor the dashboards. The user only sees the Contact Support page in the Support section. Raise Tickets Raise support tickets in the Ticketing page of the Support section. The user does not see the dashboards and the Services, Administration, and Reports sections of the portal. The user only sees the Ticketing, and Contact Support page in the Support section. Track and Trace Perform a search for an individual on behalf of other people in the organization by the Track and Trace feature in the Support section. This role is only visible if your organization is provisioned to use Track and Trace. The user does not see the dashboards and the Services, Administration, and Reports sections of the portal. The user only sees the Track and Trace and Contact Support page in the Support section. Purchasing View Service Alerts If your organization purchased from the Symantec online store, this role enables the user to purchase more cloud security services from the store. View the Service Alerts page in the Support section. View the Contact Support page in the Support section. The user does not see the Services, Administration, and Reports sections of the portal.

21 Managing portal users and domains Defining custom roles 21 Table 2-1 Custom role View News Alerts Custom roles (continued) Description View the News Alerts page in the Support section. View the Contact Support page in the Support section. The user does not see the Services, Administration, and Reports sections of the portal. View Intelligence View the Intelligence page in the Support section. View the Contact Support page in the Support section. The user does not see the Services, Administration, and Reports sections of the portal. View Support Content View the Online Help page in the Support section. View the Contact Support page in the Support section. View the Contact Support area in the Support section. The user does not see the Services, Administration, and Reports sections of the portal. View Content View and search the content of the Web log archive; no changes can be made. The user does not see the dashboards and the Reports, Users and Groups, and Administration sections of the portal. The user only sees the Contact Support page in the Support section. Manage Content View and search the content of the Web log archive, create, edit, and remove legal holds. To edit content, the user requires both the View Content and Edit Content roles. The user does not see the dashboards and the Reports, Users and Groups, and Administration sections of the portal. The user only sees the Contact Support page in the Support section. View Community View the customer community where you can get help and tips and share information on our services with users in other organizations.

22 Managing portal users and domains Defining custom roles 22 Table 2-1 Custom role Manage Domains Custom roles (continued) Description Enables the user to add domains using the Domains section in the portal. The user can then add a domain using the guided steps, and have it tested and registered with the appropriate routes and associated address list. Without this permission, users can see the Domains section in the portal, but they cannot add domains. To define a custom role for a user 1 Select Administration > User Management. 2 Select an existing user to allocate a role for (or create a new user). 3 Click the User roles tab. 4 Click Create custom role. 5 Select the role to apply for this user from the drop-down list in the Permission section. 6 Select the service to apply the permissions for from the drop-down list in the Services section. 7 To apply the permission to: All domains, select All domains. Selected domains, select All selected domains, select the domain(s) to apply the role to, and click Add to list. In some circumstances it is useful to exclude domains from the selected domains list. To do so, select the domain(s) to exclude from the role and select All except selected domains 8 Click Append Role The role is applied for the user. Selecting services and domains is not appropriate for certain roles. If any of these are selected, the Services and Domains section is inactive. Selecting domains is not appropriate for certain services. If any of these are selected, the Domains section is inactive. See Defining standard roles on page 17.

23 Managing portal users and domains Making domain changes for Services 23 Making domain changes for Services You can no longer request changes to domains, inbound routes, or outbound routes with the Domain Change Request form. To manage your domains, navigate in the portal to Services > Services > Domains. To manage your inbound routes, navigate in the portal to Services > Services > Inbound Routes. To manage your outbound routes, navigate in the portal to Services > Services > Outbound Routes. You must complete a Change Request form to add your domain or domains to your Encryption or Archiving/ Continuity configuration. You can access the necessary forms on the Change Request form page. Complete the necessary form or forms and your request to Order Services. Changing the number of service users You can request to increase or decrease the number of users that the services are provisioned for. When you request to add or remove users, the Client Services team process the request and a confirmation of the change to you. We aim to process your request within two days. The change comes into effect when you receive the confirmation . To add or remove users 1 Select Administration > User Changes. The User Change Request page is displayed. 2 In the Contact Details section, enter or amend your contact details. EMEA means Europe, Middle East, and Africa. APAC means Asia and Pacific regions. 3 In the Add or Remove Users section, enter the number of users to increase or decrease your account by in the appropriate box.

24 Managing portal users and domains Managing your contact list 24 4 To provide us with any further information, enter your comments in the Additional Notes section (optional). 5 Click Submit. Managing your contact list The system displays a confirmation that the changes have been submitted. The confirmation includes a reference number to identify the request in case you need to query it in future. You can submit a request to add or delete contacts in your account. When you request a change to your contacts, the Client Services team processes the request and s a confirmation of the change to you. We aim to process your request within two days. The change comes into effect when you receive the confirmation . To add a contact 1 Select Administration > Contact List Changes. 2 In the Contact Details section, enter or amend your contact details. EMEA means Europe, Middle East, and Africa. APAC means the Asia and Pacific regions. 3 In the Add Contacts section, enter the details of the contact to add in the appropriate fields. 4 In the Authorization field, enter the department type that the contact belongs to. 5 Click Request. The details you have entered are listed. 6 In the Additional Notes section, provide us with any further information or comment (optional). 7 Click Submit. Confirmation that the changes have been submitted is displayed and you are given a reference number. The reference number helps you to identify the request in future, if required.

25 Managing portal users and domains Changing your organization's address details 25 To delete a contact 1 Select Administration > Contact List Changes. 2 In the Contact Details section, enter or amend your contact details. EMEA means Europe, Middle East, and Africa. APAC means the Asia and Pacific regions. 3 In the Delete Contacts section, enter the details of the contact to delete in the appropriate fields. 4 In the Authorization field, enter the department type that the contact belongs to. 5 Click Request. The details you have entered are listed. 6 In the Additional Notes section, provide us with any further information or comment (optional). 7 Click Submit. Confirmation that the changes have been submitted is displayed and you are given a reference number. The reference number helps you to identify the request in future, if required. Changing your organization's address details You can submit a request to change your mail address. When you request a change to your address details, the Client Services team processes the request and s a confirmation of the change to you. We aim to process your request within two days. The change comes into effect when you receive the confirmation . To change your address details 1 Select Administration > Address Changes. The Address Change Request page is displayed. 2 In the Contact Details seciton, enter or amend your contact details. EMEA means Europe, Middle East, and Africa. APAC means Asia and Pacific regions. 3 In the Address Change Request section, enter your new address details (required) and your fax number and Web site URL (optional) in the appropriate fields.

26 Managing portal users and domains Changing your organization's address details 26 4 In the Additional Notes section, provide us with any further information or comments (optional). 5 Click Submit. The system displays a confirmation that the changes have been submitted. The confirmation includes a reference number to identify the request in case you need to query it in future.

27 Chapter 3 Managing your details in My Profile This chapter includes the following topics: Viewing and editing your details in My Profile Changing your time zone in My Profile Changing your password in My Profile Viewing and editing your details in My Profile The My Profile page enables you to makes changes to your preferences for the portal. In the My Profile page you can view your Login name and address Table 3-1 My Profile details Full name Preferred language Preferred time zone Your full name is displayed at the top of any page in the portal. Make the required changes to your name and click Save and Exit. You can define the language of the portal when you log in. Select the required language from the Preferred language drop-down and click Save and Exit. The time zone that you specify here is used in several pages within the portal. For example, the time zone affects the reporting schedule and some time-related rules in Content Control. See Changing your time zone in My Profile on page 28.

28 Managing your details in My Profile Changing your time zone in My Profile 28 Table 3-1 My Profile details (continued) Password You can change the password that you use to log on to the portal. See Changing your password in My Profile on page 28. Changing your time zone in My Profile In the Preferred time zone drop-down in My Profile you establish your default time zone. Your default time zone is used in Report Requests and for other settings such as time-based rules in Content Control. To change your time zone 1 Select the My Profile link at the top of any page of the portal. 2 In the User Details section, select the required time zone from the Preferred time zone drop-down. 3 Click Save and Exit. Changing your password in My Profile You change your password in the My Profile area within the portal. Your password must be at least eight characters long and must contain at least one of each of the following character types: Alphabetic characters. Numeric characters. Symbol characters. To change your password for the portal 1 Select the My Profile link at the top of any page of the portal. 2 In the My Details section, select the Create new password option button. 3 Enter your current password. 4 Enter and confirm your new password. 5 Click Save and Exit. Confirmation that your password has been changed is displayed.

29 Managing your details in My Profile Changing your password in My Profile 29 Note: Authorized portal users who have the Can manage other users option set to Yes can reset passwords for other portal users. See Defining a portal user on page 15.

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Email Data Protection. Administrator Guide

Email Data Protection. Administrator Guide Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,

More information

Email Track and Trace. Administration Guide

Email Track and Trace. Administration Guide Administration Guide Track and Trace Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the

More information

Email Quick Reference. Administrator Guide

Email Quick Reference. Administrator Guide Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Domains. Administrator Guide

Domains. Administrator Guide Domains Administrator Guide Domains Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Email AntiVirus. Administrator Guide

Email AntiVirus. Administrator Guide Email AntiVirus Administrator Guide Email AntiVirus Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Web Security Firewall Setup. Administrator Guide

Web Security Firewall Setup. Administrator Guide Web Security Firewall Setup Administrator Guide Web Security Firewall Setup Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

Boundary Encryption.cloud Deployment Process Overview

Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Documentation version: 1.0 Legal Notice Legal Notice Copyright 2011 Symantec Corporation. All

More information

Spam Manager. User Guide

Spam Manager. User Guide Spam Manager User Guide Spam Manager User Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Email Address Registration. Administrator Guide

Email Address Registration. Administrator Guide Email Address Registration Administrator Guide Address Registration Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

Email Image Control. Administrator Guide

Email Image Control. Administrator Guide Email Image Control Administrator Guide Image Control Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Spam Manager. Quarantine Administrator Guide

Spam Manager. Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

Email Services Deployment. Administrator Guide

Email Services Deployment. Administrator Guide Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the

More information

Policy Based Encryption Essentials. Administrator Guide

Policy Based Encryption Essentials. Administrator Guide Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.

More information

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Email Encryption. Administrator Guide

Email Encryption. Administrator Guide Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Symantec Backup Exec Management Plug-in for VMware User's Guide

Symantec Backup Exec Management Plug-in for VMware User's Guide Symantec Backup Exec Management Plug-in for VMware User's Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Services Deployment. Administrator Guide

Services Deployment. Administrator Guide Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

Symantec Data Center Security: Server Advanced v6.0. Agent Guide

Symantec Data Center Security: Server Advanced v6.0. Agent Guide Symantec Data Center Security: Server Advanced v6.0 Agent Guide Symantec Data Center Security: Server Advanced Agent Guide The software described in this book is furnished under a license agreement and

More information

Enabling Windows Management Instrumentation Guide

Enabling Windows Management Instrumentation Guide Enabling Windows Management Instrumentation Guide Enabling Windows Management Instrumentation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Resource Online User Guide JUNE 2013

Resource Online User Guide JUNE 2013 Resource Online User Guide JUNE 2013 CHASE PAYMENTECH SOLUTIONS MAKES NO WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

Synchronization Tool. Administrator Guide

Synchronization Tool. Administrator Guide Synchronization Tool Administrator Guide Synchronization Tool Administrator Guide Documentation version: 1.5 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book is furnished under a

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Important Information

Important Information June 2015 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

Smart Connect. Deployment Guide

Smart Connect. Deployment Guide Smart Connect Deployment Guide Smart Connect Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

TIBCO Slingshot User Guide

TIBCO Slingshot User Guide TIBCO Slingshot User Guide v1.8.1 Copyright 2008-2010 TIBCO Software Inc. ALL RIGHTS RESERVED. Page 1 September 2, 2011 Documentation Information Slingshot Outlook Plug-in Important Information SOME TIBCO

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

Norton Small Business. Getting Started Guide

Norton Small Business. Getting Started Guide Norton Small Business Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright 2015

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement and may be used

More information

Symantec Mobile Management 7.2 MR1Quick-start Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only

More information

Strong Authentication for Juniper Networks SSL VPN

Strong Authentication for Juniper Networks SSL VPN Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Total Recall Web. Web Module Manual and Customer Quick Reference Guides

Total Recall Web. Web Module Manual and Customer Quick Reference Guides Total Recall Web Web Module Manual and Customer Quick Reference Guides COPYRIGHT NOTICE Copyright 1994-2009 by DHS Associates, Inc. All Rights Reserved. All TOTAL RECALL, TOTAL RECALL SQL, TOTAL RECALL

More information

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Creating a Content Group and assigning the Encrypt action to the Group.

Creating a Content Group and assigning the Encrypt action to the Group. Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Use QNAP NAS for Backup

Use QNAP NAS for Backup Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information

More information

Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved

Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a

More information

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Application Note. Intelligent Application Gateway with SA server using AD password and OTP Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

PGP CAPS Activation Package

PGP CAPS Activation Package PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online

Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online 062212 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any

More information

NetBak Replicator 4.0 User Manual Version 1.0

NetBak Replicator 4.0 User Manual Version 1.0 NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...

More information

Remote Console Installation & Setup Guide. November 2009

Remote Console Installation & Setup Guide. November 2009 Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Symantec Security Information Manager - Best Practices for Selective Backup and Restore

Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July

More information

CA ARCserve Backup Patch Manager for Windows

CA ARCserve Backup Patch Manager for Windows CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud CaseWare Time CaseWare Cloud Integration Guide For Time 2015 and CaseWare Cloud Copyright and Trademark Notice Copyright. 2015 CaseWare International Inc. ( CWI ). All Rights Reserved. Use, duplication,

More information

BlackShield Authentication Service

BlackShield Authentication Service BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.

More information

IPOne Phone System User Interface Guide

IPOne Phone System User Interface Guide IPOne Phone System User Interface Guide DoubleHorn Communications, LLC 1802 W. 6 th Street Austin, TX 78703 Main Office: 512-637-5200 Toll Free: 877-637-HORN (4676) DHC Support: Dial 611 IPOne Phone System

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Managing users. Account sources. Chapter 1

Managing users. Account sources. Chapter 1 Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service

More information

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5

Symantec NetBackup Backup, Archive, and Restore Getting Started Guide. Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide Release 7.5 Symantec NetBackup Backup, Archive, and Restore Getting Started Guide The software described in this book is furnished

More information

TROUBLESHOOTING GUIDE

TROUBLESHOOTING GUIDE Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Symantec Critical System Protection 5.2.9 Agent Guide

Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection 5.2.9 Agent Guide Symantec Critical System Protection Agent Guide The software described in this book is furnished under a license agreement and may be used only in

More information

GFI Product Manual. Outlook Connector User Manual

GFI Product Manual. Outlook Connector User Manual GFI Product Manual Outlook Connector User Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

Portal User Guide. Customers. Version 1.1. May 2013 http://www.sharedband.com 1 of 5

Portal User Guide. Customers. Version 1.1. May 2013 http://www.sharedband.com 1 of 5 Portal User Guide Customers Version 1.1 May 2013 http://www.sharedband.com 1 of 5 Table of Contents Introduction... 3 Using the Sharedband Portal... 4 Login... 4 Request password reset... 4 View accounts...

More information

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft SharePoint Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Strong Authentication for Juniper Networks

Strong Authentication for Juniper Networks Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright

More information