|
|
|
- Emory Melton
- 10 years ago
- Views:
Transcription
1
2 Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release notes, and/or the latest version of the applicable documentation, which are available from the Trend Micro website at: Trend Micro, the Trend Micro t-ball logo, Trend Micro Antivirus, TrendLabs, TrendEdge, and Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright Trend Micro Incorporated. All rights reserved. Document Part No.: APEM26478/ Release Date: December 2015 Protected by U.S. Patent No.: Patents pending.
3 This documentation introduces the main features of the product and/or provides installation instructions for a production environment. Read through the documentation before installing or using the product. Detailed information about how to use specific features within the product may be available at the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base. Trend Micro always seeks to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro document, please contact us at [email protected]. Evaluate this documentation on the following site:
4
5 Table of Contents Preface Preface... iii Documentation... iv Audience... iv Document Conventions... v Chapter 1: Introduction About Trend Micro Hosted Security About Active Directory Synchronization Tool Chapter 2: Installing Active Directory Synchronization Tool System Requirements Downloading Active Directory Synchronization Tool Installation Program Enabling Hosted Security Web Services Installing Active Directory Synchronization Tool Updating Active Directory Synchronization Tool Chapter 3: Using Active Directory Synchronization Tool Configuring Active Directory Synchronization Tool Configuring Service Settings Configuring Source Directory Removing Source Directory Updating Source Directory Testing Synchronization Locally Synchronizing Groups and Accounts Viewing Synchronization History i
6 Active Directory Synchronization Tool User Guide Configuring Hosted Security Server Appendix A: Troubleshooting Active Directory Synchronization Tool Diagnostic Logs in Active Directory Synchronization Tool... A-2 Troubleshooting Active Directory Synchronization Tool... A-2 Index Index... IN-1 ii
7 Preface Preface Welcome to the Trend Micro Hosted Security Active Directory Synchronization Tool User Guide. This guide introduces the Active Directory Synchronization Tool and explains how to use the Active Directory Synchronization Tool to synchronize groups and accounts from Active Directory to the Hosted Security server. This section includes the following topics: Documentation on page iv Audience on page iv Document Conventions on page v iii
8 Active Directory Synchronization Tool User Guide Documentation The documentation set for Hosted Security includes the following: Table 1. Product Documentation Document Administrator Guide Active Directory Synchronization Tool User Guide Support Portal Description The Administrator Guide contains information about Hosted Security and provides instructions on how to configure Hosted Security to protect your network from spam, phishing and malware before they reach your network. The Active Directory Synchronization Tool User Guide is a PDF document that introduces Hosted Security Active Directory Synchronization Tool and explains how to use the Active Directory Synchronization Tool to synchronize groups and accounts from Active Directory to the Hosted Security server. The Support Portal is an online database of problemsolving and troubleshooting information. It provides the latest information about known product issues. To access the Support Portal, go to the following website: View and download the documentation at: Audience The Hosted Security documentation is written for IT administrators and security analysts. The documentation assumes that the reader has an in-depth knowledge of networking and information security, including the following topics: Network topologies Active Directory management iv
9 Preface Policy management and enforcement The documentation does not assume the reader has any knowledge of threat event correlation. Document Conventions The documentation uses the following conventions: Table 2. Document Conventions Convention UPPER CASE Bold Italics Monospace Navigation > Path Note Description Acronyms, abbreviations, and names of certain commands and keys on the keyboard Menus and menu commands, command buttons, tabs, and options References to other documents Sample command lines, program code, web URLs, file names, and program output The navigation path to reach a particular screen For example, File > Save means, click File and then click Save on the interface Configuration notes Tip Recommendations or suggestions Important Information regarding required or default configuration settings and product limitations v
10 Active Directory Synchronization Tool User Guide Convention WARNING! Description Critical actions and configuration options vi
11 Chapter 1 Introduction This section provides a brief introduction about Trend Micro Hosted Security and Hosted Security Active Directory Synchronization Tool. This section includes the following topics: About Trend Micro Hosted Security on page 1-2 About Active Directory Synchronization Tool on page
12 Active Directory Synchronization Tool User Guide About Trend Micro Hosted Security Trend Micro Hosted Security is a no-maintenance solution that delivers continuously updated protection to stop spam, phishing, and malware before they reach your network. Using Trend Micro Hosted Security, mail administrators can set up rules to remove detected viruses and other malware from incoming messages before they reach the corporate network. Administrators can quarantine detected spam and other inappropriate messages. Then, intended message recipients or mail administrators can choose to release or delete the quarantined messages. About Active Directory Synchronization Tool The Hosted Security Active Directory Synchronization Tool is a Microsoft Active Directory connector, installed in your environment and has access to your Hosted Security. It can synchronize the user accounts and the group members accounts from the Active Directory server to the Hosted Security server. Synchronizing accounts enables the Hosted Security server to verify each message by performing a valid recipient check. Synchronizing user groups enables you to define policies for user groups in Hosted Security. 1-2
13 Chapter 2 Installing Active Directory Synchronization Tool This section includes the following topics: System Requirements on page 2-2 Downloading Active Directory Synchronization Tool Installation Program on page 2-2 Enabling Hosted Security Web Services on page 2-3 Installing Active Directory Synchronization Tool on page 2-4 Updating Active Directory Synchronization Tool on page
14 Active Directory Synchronization Tool User Guide System Requirements Review the following requirements before installing Hosted Security Active Directory Synchronization Tool. Table 2-1. System Requirements for Active Directory Synchronization Tool Component Requirements Operating System Microsoft Windows Server 2008 or 2012 Memory Hard disk Minimum 2-GB Minimum 1-GB available for installation and processing data Others Internet access Support for Microsoft Active Directory 2003, 2008 or 2012 Microsoft.NET Framework 3.5 Downloading Active Directory Synchronization Tool Installation Program Procedure 1. Log on to the Hosted Security administration console by navigating to one of the following URLs: European region: Other regions: 2. Go to Administration > Web Services. 3. Under the Downloads section on the Web Services screen, click to download the Active Directory Synchronization Tool. 2-2
15 Installing Active Directory Synchronization Tool Enabling Hosted Security Web Services Web services programs in Hosted Security are disabled for your domains by default. Enable Web services to allow the Active Directory Synchronization Tool to communicate and synchronize directory data from Active Directory to Hosted Security. Procedure 1. Go to Administration > Web Services. 2. Make sure that you have a Service Authentication Key. If no Authentication Key is generated before, click Generate New Key. The Active Directory Synchronization Tool uses the Authentication Key to authenticate the communication. If an Authentication Key is already generated on your administrative console, copy and paste the Authentication Key to the Active Directory Synchronization Tool. Without the Authentication Key, the Active Directory Synchronization Tool will be unable to communicate with Hosted Security Web services. Note For added security, you may choose to periodically generate a new Authentication Key by clicking Generate New Key. You will then update your Active Directory Synchronization Tool to use the new Authentication Key. Note that once a new Authentication Key is generated, the old key becomes obsolete. 3. Click the disabled icon on the right to enable Applications. This allows your Active Directory Synchronization Tool to communicate with Hosted Security Web services. 2-3
16 Active Directory Synchronization Tool User Guide Figure 2-1. Web Services screen Installing Active Directory Synchronization Tool Note Before installing the Active Directory Synchronization Tool, make sure that the computer where you want to install the tool meets the system requirements mentioned under the section System Requirements on page 2-2. Note Trend Micro recommends installing this tool on a separate computer than where the Active Directory is installed. 2-4
17 Installing Active Directory Synchronization Tool Procedure 1. Run the HESActiveDirectorySynchronizationTool.msi application package to start the installation program. The welcome screen appears. 2. Click Next. The End-User License Agreement screen displays. 3. Accept the license agreement and click Next. The Destination Folder screen displays. 4. Select the location where you want to install the tool, and then click Next. The Ready to Install screen displays. 5. Click Install. The Installing screen displays. Note If the User Account Control is enabled on your operating system, a pop-up appears requiring you to provide the administrator's access. Click Yes on the User Account Control pop-up to allow the installation. 6. Click Finish on the screen that appears after the installation completes. Updating Active Directory Synchronization Tool If your Active Directory Synchronization Tool is outdated or a new version is available in Hosted Security, you can update the Synchronization Tool by uninstalling the current program and then installing the latest version. 2-5
18 Active Directory Synchronization Tool User Guide Procedure 1. Navigate to the location on your computer where the Active Directory Synchronization Tool is installed, and backup the following files: clientconf.xml sources.xml 2. Download the latest version of Active Directory Synchronization Tool form the Hosted Security server. See Downloading Active Directory Synchronization Tool Installation Program on page 2-2 for the procedure. 3. Uninstall the current version of Active Directory Synchronization Tool on your computer. 4. Install the latest version of Active Directory Synchronization Tool you downloaded in Step 2 of this procedure, into the same folder where you installed the previous version. See Installing Active Directory Synchronization Tool on page 2-4 for the procedure. 5. Copy the following files that you had backed up in Step 1 of this procedure to your installation folder: clientconf.xml sources.xml 6. Start the Active Directory Synchronization Tool to review your settings. 2-6
19 Chapter 3 Using Active Directory Synchronization Tool This section includes the following topics: Configuring Active Directory Synchronization Tool on page 3-2 Synchronizing Groups and Accounts on page 3-8 Testing Synchronization Locally on page 3-7 Viewing Synchronization History on page
20 Active Directory Synchronization Tool User Guide Configuring Active Directory Synchronization Tool Configuring Service Settings You can configure your Hosted Security connection settings on Service Settings tab. Procedure 1. Start the Active Directory Synchronization Tool application. 2. On the Service Settings tab, configure the following: Under Hosted Security Administrator Logon Account section: Account Name: Your administrator account name you use to log on to Hosted Security administration console. Service Auth Key: Your service authentication key for Hosted Security server. Note You can find your service authentication key on the Web Services screen (Administration > Web Services) on Hosted Security administration console. Under Proxy Settings section: Do not use a proxy: If your network does not require a proxy, select this option to disable this setting. Automatically detect proxy settings: Select this option to let Active Directory Synchronization Tool automatically detect your network proxy settings. 3-2
21 Using Active Directory Synchronization Tool Manually set the proxy (HTTP): Select this option to manually set the proxy Server and Port settings for your proxy server. If required, also type the proxy User Name and Password. Note Active Directory Synchronization Tool currently supports HTTP proxy only. Synchronize every x hours: Select this option and specify the duration in hours, if you want the Active Directory Synchronization Tool to automatically synchronize the user groups and accounts from Active Directory to Hosted Security on a recurrent basis. 3. Click Apply. Note This setting requires you to synchronize data manually for the first time. Later on, the Active Directory Synchronization Tool automatically synchronizes data according to your setting. Configuring Source Directory You can configure your Active Directory connection settings and synchronization source on Source Directory tab. Note If your network includes multiple Active Directory sources, configure all of these sources on the Source Directory tab, to enable Active Directory Synchronization Tool to synchronize directory data from all of the sources. Procedure 1. Start the Active Directory Synchronization Tool application. 3-3
22 Active Directory Synchronization Tool User Guide 2. On the Source Directory tab, configure the following under Synchronization Source Setting section: Source Name: The name of the Active Directory source directory from where users and groups are imported to Hosted Security server. Source Type: The type of directory that you are connecting that hosts users and groups. Select Microsoft Active Directory or Microsoft AD Global Catalog from the drop-down list. Host Name: The host name or IP address of the Active Directory server. Port: The port number used by Active Directory server. Use SSL: If your Active Directory requires an encrypted connection, select this option. User Name and Password: The user name and password that Active Directory Synchronization Tool will use to bind to Active Directory. Base DN: The base distinguished name of the Active Directory server. If your source type is Microsoft AD Global Catalog, you can leave this field blank. Sync Type: The items (Valid recipients or Groups) to synchronize from Active Directory server to Hosted Security server. 3. Click Add to add the source to the List of Source Directories to Sync at the bottom of the screen. 4. Click the text Click here to manage groups under Sync Groups column, or the group count under Group Count column to manage groups that you want to synchronize to the Hosted Security server. 3-4
23 Using Active Directory Synchronization Tool Figure 3-1. Source Directory tab The Manage Groups to Sync window appears. 5. From the Available Groups in Directory list on the left side of the screen, select the groups that you want to synchronize, and then click the >> button to move the 3-5
24 Active Directory Synchronization Tool User Guide selected groups to the Groups to Sync list on the right. You can use the search box at the top of the list to find groups from the list. To remove groups, that you do not want to synchronize, from the Groups to Sync list, select the groups that you want to remove and then click << button to move the selected groups to the Available Groups in Directory list. You can use the search box at the top of the list to find groups from the list. Note 6. Click Apply. You can only select up to 50 groups from all the sources to synchronize. Removing Source Directory You can remove the source directory in Active Directory Synchronization Tool from the Source Directory tab. Important Removing a directory source will also remove the policies applied to the groups from this source while synchronizing directories the next time. Procedure 1. Start the Active Directory Synchronization Tool application. 2. Click the Source Directory tab. 3. Under the List of Source Directories to Sync section at the bottom of the screen, click the Active Directory source you want to remove from the list, and then click Remove at the bottom right of the screen. 3-6
25 Using Active Directory Synchronization Tool Updating Source Directory If you have already configured a source directory in Active Directory Synchronization Tool, you can update its information to match the current settings. Procedure 1. Start the Active Directory Synchronization Tool application. 2. Click the Source Directory tab. 3. Under the List of Source Directories to Sync section at the bottom of the screen, double-click the Active Directory source that you want to update. All the fields under Synchronization Source Setting section populate with the current source information. 4. Modify the information as required, and then click Update to update and save the source information. Testing Synchronization Locally The Active Directory Synchronization Tool enables you to test the synchronization on the local computer before synchronizing with the Hosted Security server. Procedure 1. Start the Active Directory Synchronization Tool application. 2. Click the Source Directory tab. 3. Configure at least one source directory for Active Directory Synchronization Tool to synchronize from. See Configuring Source Directory on page 3-3 for the procedure. 4. Click Test Sync Locally, and select a folder on your local computer where you want to save the directory data. 3-7
26 Active Directory Synchronization Tool User Guide 5. The synchronization starts and creates the text (txt) files that contain groups and/or accounts, at your selected location. 6. The synchronization starts and creates one or both of the following text (txt) files after it completes: Valid_recipients_yyyymmdd-hhmmss.txt: This file includes the addresses that are included in the source directory, and belong to the domains that are registered with Hosted Security. Groups_yyyymmdd-hhmmss.txt: This file provides the association of each address with the groups in Active Directory, and includes the following information: The number of addresses that are included in each group. The group names that include a certain address. Note The Active Directory Synchronization Tool will only create these files if the related sync type is selected, and the directory sources contain the related data. Synchronizing Groups and Accounts The Active Directory Synchronization Tool synchronizes groups and accounts from the Active Directory to the Hosted Security server. Note Trend Micro recommends testing the synchronization locally before synchronizing the groups and accounts from Active Directory to the Hosted Security server. See Testing Synchronization Locally on page 3-7 for the procedure. 3-8
27 Using Active Directory Synchronization Tool Important You can only use one Active Directory Synchronization Tool application to synchronize data. If you use Active Directory Synchronization Tool application installed on another location, the data synchronized from the last tool will be overwritten. Procedure 1. Start the Active Directory Synchronization Tool application. 2. Configure the Hosted Security service settings. See Configuring Service Settings on page 3-2 for the procedure. 3. Configure at least one source directory for Active Directory Synchronization Tool to synchronize from. See Configuring Source Directory on page 3-3 for the procedure. 4. On the Service Settings tab, click Synchronize Now. The synchronization starts and, displays the status on the Synchronization History tab. Viewing Synchronization History The Active Directory Synchronization Tool keeps the synchronization history and displays the last seven (7) days of history on the Synchronization History tab. Procedure 1. Start the Active Directory Synchronization Tool application. 2. Click the Synchronization History tab to view the history. The logs includes the following statuses: Synchronization started Synchronizing data 3-9
28 Active Directory Synchronization Tool User Guide Synchronization successful Synchronization unsuccessful Configuring Hosted Security Server After synchronizing groups and accounts from Active Directory to Hosted Security server, you can perform the following: Configure policies on the Hosted Security server for the newly imported groups. See Configuring a Policy topic in Hosted Security Administrator s Guide for the configuration details and procedure. Enable Hosted Security to perform the valid recipient check on Directory Management screen (Administrator > Directory Management). See About Directory Management topic in Hosted Security Administrator s Guide for the configuration details. 3-10
29 Appendix A Troubleshooting Active Directory Synchronization Tool This section includes the following topics: Diagnostic Logs in Active Directory Synchronization Tool on page A-2 Troubleshooting Active Directory Synchronization Tool on page A-2 A-1
30 Active Directory Synchronization Tool User Guide Diagnostic Logs in Active Directory Synchronization Tool In case you encounter any problem in using Hosted Security Active Directory Synchronization Tool, you can collect diagnostic logs and send them to for analysis to provide any solution. The diagnostic log files are located at the following directory: \Trend Micro\HES Directory Sync Client\logs\ The Active Directory Synchronization Tool creates the following three types of logs: dsaconfig.log: Contains the UI configuration log details. dsaservice.log: Contains synchronization tool service log details. dsamonitor.log: Contains monitor log details. Troubleshooting Active Directory Synchronization Tool If the Hosted Security Active Directory Synchronization Tool in unable to synchronize groups and accounts from Active Directory to Hosted Security server, go through the following steps to troubleshoot the problem: Procedure 1. Navigate to the Synchronization History tab to view the reason mentioned in the Details column for the latest unsuccessful attempt. 2. Check the connection with Hosted Security server: Go to the Service Settings tab, and click Apply. The Active Directory Synchronization Tool attempts to connect to the Hosted Security server, and verifies your account name and service authentication key. This step also verifies if the Web Services are enabled on A-2
31 Troubleshooting Active Directory Synchronization Tool the Hosted Security server to allow the Active Directory Synchronization Tool to synchronize data to the Hosted Security server. 3. If the Active Directory Synchronization Tool is outdated, or the new version of the tool is available on the Hosted Security server, download and install the latest version. 4. If the Active Directory Synchronization Tool uploads the synchronization result to the Hosted Security server, but the Hosted Security server still does not update the directory data, then wait for some time, and try again. 5. If the problem persists, contact Trend Micro Technical Support for help. Before contacting Trend Micro Technical Support, make sure that you have the diagnostic logs available with you that you can send to the Technical Support representative, if required. See Diagnostic Logs in Active Directory Synchronization Tool on page A-2 for the details on diagnostic logs. A-3
32
33 Index Symbols.NET Framework, 2-2 A about Active Directory Synchronization Tool, 1-2 Hosted Security, 1-2 Active Directory connector, 1-2 administration console European region, 2-2 other regions, 2-2 authentication key, 2-3, 3-2 generate, 2-3 automatic synchronization, 3-3 D diagnostic logs, A-2 E accounts, 1-2, 3-4, 3-8 service, 3-2 source directory, 3-3 setup file, 2-5 system requirements, 2-2, 2-4 T technical support, A-3 testing synchronization, 3-7, 3-8 troubleshoot, A-2 U user groups, 1-2, 3-4, 3-8 V valid recipient check, 1-2, 3-8 W Web services, 2-2 authentication key, 2-3 download, 2-2 enable, 2-3 I installation package, 2-5 Internet access, 2-2 L log files, A-2 logs, 3-9, A-2 S service authentication key, 2-3, 3-2 generate, 2-3 settings proxy, 3-2 server, 3-10 IN-1
34
35
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
http://docs.trendmicro.com/en-us/enterprise/cloud-app-encryption-foroffice-365.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the cloud service described herein without notice. Before installing and using the cloud service, review the readme files,
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Copyright 2013 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
http://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Trend Micro Email Encryption Gateway 5
Trend Micro Email Encryption Gateway 5 Secured by Private Post Quick Installation Guide m Messaging Security Trend Micro Incorporated reserves the right to make changes to this document and to the products
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
http://docs.trendmicro.com/en-us/home.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Server Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable
http://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product/service described herein without notice. Before installing and using the product/service, review the readme
http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service and installing the software, please review the
Table of Contents. Preface. Chapter 1: Getting Started with Endpoint Application Control. Chapter 2: Updating Components
Table of Contents Preface Preface... v Endpoint Application Control Documentation... vi Audience... vi Document Conventions... vii Terminology... viii Chapter 1: Getting Started with Endpoint Application
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
KeyAdvantage System DMS Integration. Software User Manual
KeyAdvantage System DMS Integration Software User Manual ii Copyright Disclaimer Trademarks and patents Intended use EMC Directive Regulatory 2013 United Technologies Corporation. All rights reserved.
for Small and Medium Business Quick Start Guide
for Small and Medium Business Quick Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described herein without notice. Before using
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0
Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:
NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices
NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices End-of-Life Notice Please note that GO!Enterprise MDM server version 3.6.3 is the last to officially
Trustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
WatchDox for Windows. User Guide. Version 3.9.5
WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
escan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
Upgrading to Document Manager 2.7
Upgrading to Document Manager 2.7 22 July 2013 Trademarks Document Manager and Document Manager Administration are trademarks of Document Logistix Ltd. TokOpen, TokAdmin, TokImport and TokExRef are registered
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
WatchDox for Windows User Guide. Version 3.9.0
Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or
DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO
DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Worry-FreeTM. Business Security Standard and Advanced Editions. Installation and Upgrade Guide. Administrator s Guide
8 Worry-FreeTM Business Security Standard and Advanced Editions Securing Your Journey to the Cloud Administrator s Guide Installation and Upgrade Guide Trend Micro Incorporated reserves the right to make
ez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
POLICY PATROL MFT. Manual
POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Administrator Operations Guide
Administrator Operations Guide 1 What You Can Do with Remote Communication Gate S 2 Login and Logout 3 Settings 4 Printer Management 5 Log Management 6 Firmware Management 7 Installation Support 8 Maintenance
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Installation and Configuration Guide
Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Manual POLICY PATROL SECURE FILE TRANSFER
Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Client Server Messaging Security3
Client Server Messaging Security3 for Small and Medium Business Getting Started Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without
Trend Micro Worry-Free Remote Manager Agent Installation Guide
Trend Micro Worry-Free Remote Manager Agent Installation Guide Agent Installation Guide The Agent Installation Guide contains information about the Worry-Free Remote Manager (WFRM) agent installation process
Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08
Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL Installation and System Administrator's Guide 4MASIN450-08 2011 Sage Software, Inc. All rights reserved. Sage, the Sage logos and the Sage product
http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
Worry-Free TM Remote Manager
Worry-Free TM Remote Manager for Small and Medium Business Agent Installation Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described
NTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
Cloud Portal for imagerunner ADVANCE
Cloud Portal for imagerunner ADVANCE User's Guide Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG How This
Setting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
WatchDox for Mac User Guide
WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000
ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252
Trend Micro, Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro, Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
Hosting Control Panel (CP) Admin Guide
Hosting Control Panel (CP) Admin Guide Document Revision Date: April 26, 2012 Hosting CP Admin Guide / TOC Page i Contents HOW TO USE THIS HOSTING CP ADMIN GUIDE... 1 GET STARTED WITH EXCHANGE... 1 Other
AV Management Dashboard
LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
DocuPrint C3290 FS Features Setup Guide
DocuPrint C3290 FS Features Setup Guide Adobe and PostScript are trademarks of Adobe Systems Incorporated in the United States and/or other countries. Apple, Bonjour, ColorSync, EtherTalk, Macintosh, and
http://docs.trendmicro.com/en-us/enterprise/endpoint-encryption.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,
Worry-Free TM Remote Manager TM 1
Worry-Free TM Remote Manager TM 1 for Small and Medium Business Getting Started Guide for Resellers Trend Micro Incorporated reserves the right to make changes to this document and to the products described
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Set up Outlook for your new student e mail with IMAP/POP3 settings
Set up Outlook for your new student e mail with IMAP/POP3 settings 1. Open Outlook. The Account Settings dialog box will open the first time you open Outlook. If the Account Settings dialog box doesn't
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Creating a Content Group and assigning the Encrypt action to the Group.
Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
GFI Product Manual. ReportPack Manual
GFI Product Manual ReportPack Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of
User Guide Online Backup
User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading
Reconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
Sage 100 ERP. Installation and System Administrator s Guide
Sage 100 ERP Installation and System Administrator s Guide This is a publication of Sage Software, Inc. Version 2014 Copyright 2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the
Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010
Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
Trend Micro Hosted Email Security. Best Practice Guide
Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described
SafeCom Smart Printing Administrator s Quick Guide
SafeCom Smart Printing Administrator s Quick Guide D10600-08 March 2012 Trademarks: SafeCom, SafeCom Go, SafeCom P:Go, SafeCom epay and the SafeCom logo are trademarks of SafeCom a/s. Company and product
Xerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4
1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create
How To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
LifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Kaspersky Security Center Web-Console
Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION
