QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014"

Transcription

1 QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014

2 Copyright by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc Bridge Parkway Redwood Shores, CA (650)

3 Contents Welcome to WAS... 4 QualysGuard WAS Features... 4 About the Platform: Benefits for Users... 5 Let s Begin... 6 Let s go to WAS... 6 Add a new web application... 7 Launch a discovery scan... 8 View your discovery scan results... 9 Launch a vulnerability scan View your vulnerability scan results Configure scan schedules Check out your dashboard View a sitemap of your web application Using the Catalog Do you want to import Burp findings Reporting Account Management Contact Support

4 Welcome to WAS QualysGuard Web Application Scanning (WAS) enables organizations to assess, track and remediate web application vulnerabilities. Delivered on demand, the service allows users to: Crawl web applications and scan them for vulnerabilities Identify web applications handling of sensitive or secret data Customize: authentication, black/white lists, robots.txt, sitemap.xml and more View reports with recommended security coding practice and configuration QualysGuard WAS provides several major enhancements to help customers catalog their web applications on a global scale and scan them for vulnerabilities that can lead to exploitation. Delivered via the QualysGuard Cloud Platform and its Java-based backend, the WAS user interface (UI) raises the bar in terms of ease-of-use, flexible reporting and automation of scanning tasks. Web Application Scanning Lifecycle The web application scanning lifecycle assists users with managing security and compliance through web application creation, scanning, reporting and remediation. QualysGuard WAS Features Major features in QualysGuard WAS include: Scanning of web applications (Intranet, Internet) Fully interactive UI with flexible workflows and reporting Supports scanning HTML web applications with JavaScript and embedded Flash 4

5 Welcome to WAS Comprehensive detection of custom web application vulnerabilities including: OWASP Top 10 Vulnerabilities: SQL injection, cross-site scripting (XSS), source disclosure, directory traversal Checks web applications handling of sensitive or secret data Reports on recommended secure coding practice and configuration Differentiates exploitable fault-injection problems from simple information disclosure Customizable scanning options Customized crawling using Black/White lists, Robots.txt and Sitemap.xml files Supports common authentication schemes Performs brute force attacks using pre-defined and custom password lists Profiles custom web application behaviors Configures scanning performance with customizable performance level About the Platform: Benefits for Users New technologies implemented in the Java-based backend offer many benefits for users: UI with dynamic and interactive interfaces, wizards and new report templates to present scan data with a wide range of presentation options. Customizable template-driven reporting engine outputs reports in a variety of formats (html, pdf, encrypted pdf, ppt, xml, cvs). Fast searching of several extensive Qualys data sets, including scan results, asset data, scan profiles, users and vulnerabilities. Create and manage tags (static and dynamic) to group and organize web applications. Dynamic distribution of scans on multiple scanners based on availability and load to optimize scanning of large networks, drastically reducing the overall scan time required to complete large scan jobs. 5

6 Let s Begin Welcome to WAS. As you are getting started we recommend you first review the WAS features and become familiar with the user interface. Let s go to WAS It s easy. Just log in to QualysGuard and select WAS from the application picker. Your WAS dashboard will be blank until you (or another user) adds a web application and scans are completed in your account. It will be automatically updated as new scan results are ready. 6

7 Let s Begin Add a new web application Use the wizard to add your first web application. Enter the web application details and configure scan settings. Turn on Malware Monitoring for an external site if you want us to perform automatic daily malware scans. Tip: Turn help tips on in the title bar and get help for each setting as you mouse over a field name. Your web application appears in the Web Applications tab, where you can edit the application or launch a scan on it. Why use authentication? Using authentication allows our service to access to all parts of your web application during the crawling process. This way we can perform more in-depth assessment of your web application. Some web applications require authenticated access to the majority of their functionality. Authenticated scanning can be configured for HTML forms like login pages and server-based authentication (HTTP Basic, Digest, NTLM, or SSL client certificates). Just go to the Authentication tab, select New Record and configure an authentication record with access credentials. Form and server authentication may be combined as needed - we ll monitor the session state to ensure an authenticated scan remains authenticated throughout the crawl. Warning about scans and their potential impact Web application scans submit forms with test data. If this is not desired you should add configurations for black lists, POST data black lists, and/or select the GET only method within the option profile. Keep in mind when these configurations are used, testing of certain areas of the web application is not included and any vulnerabilities that exist in these areas may not be detected. 7

8 Let s Begin Launch a discovery scan We recommend that you start by running a discovery scan. A discovery scan finds information about your web application without performing vulnerability testing. This is a good way to understand where the scan will go and whether there are URIs you should blacklist for vulnerability scans. Select Web Applications (on the top menu). Click the Web Applications tab and then select New Scan > Discovery Scan. Enter your scan settings using the launch scan wizard. A scan name is provided and you can enter a custom one. Select a web application. If the application has defaults, these appear for Option Profile (scan settings) and Scanner Appliance. If there are no defaults, you must make selections. Want to use authentication? Be sure to select an authentication record that you ve configured for your application. Tell me about the option profile An option profile is a set of scan configuration options. We recommend Initial WAS Options to get started. Editing options in the profile allows you to customize crawling and to use password bruteforcing. Do I need a scanner appliance? Our security service provides cloud scanners for external scanning on the network perimeter. For internal scanning you need to setup a scanner appliance (physical or virtual). Go to VM > Scans > Appliances and select an option from the New menu and we ll walk you through the steps. (Do you have Express Lite? Your account may be enabled with External scanning, Internal scanning or both). 8

9 Let s Begin View your discovery scan results There are multiple ways to view discovery scan results. Check out the scan view Double click the finished discovery scan in the scan list to display the scan view. Overview shows the scan findings. Click Scan Details to see details like the date and time of the scan and the target web application. Click Scan Settings to see the crawling settings, detection scope, other settings you may have configured. Check out the full scan report Click View Report in the View Scan window to view the interactive scan report. You can view the report online, change its settings to update it and then save it to multiple formats. The Results section shows the scan findings. Each QID represents a security check from the KnowledgeBase. The Severity icons indicates the level of severity: minimal, medium and serious. While viewing the report, be sure to check QID Links Crawled and QID Scan Diagnostics. 9

10 Let s Begin Click a row to view details. Launch a vulnerability scan A vulnerability scan performs vulnerability checks, information gathered checks and sensitive content checks (if configured in the option profile). Vulnerability checks may include: cross-site vulnerability checks (persistent, reflected, header, browser-specific) and SQL injection vulnerabilities (regular and blind). Sensitive content checks may include: social security numbers - US Format, credit card numbers and custom strings. Let s get started. Select Scans on the top menu. Click the Scan List tab and then select New Scan > Vulnerability Scan. 10

11 Let s Begin The target for a vulnerability scan is the same as for a discovery scan. Review your settings.when you re ready to launch the scan, click Finish. View your vulnerability scan results There are multiple ways to view vulnerability scan results. Check out the scan preview Select the finished vulnerability scan in the scan list to display a preview of the scan results below the list area. 11

12 Let s Begin Check out the scan view To view the results of a completed vulnerability scan, double click the scan. For this demo application WAS was able to take a screenshot of the application and you ll see a thumbnail image. Click the image to go to the web application. A bar graph shows you a breakdown of the scan findings - vulnerabilities, sensitive content detections and information gathered. Tip: Want to see the scan report? Click the View Report button. The vulnerability checks (QIDs) performed by a web application scan are listed in the KnowledgeBase. We constantly update the KnowledgeBase as new security information becomes available. Click KnowledgeBase on the top menu. Vulnerability checks (in Red) include OWASP Top 10 Vulnerabilities: SQL injection, cross-site scripting (XSS), source disclosure and directory traversal. Information gathered checks (in Blue) identify information gathered during the scan process. This includes information about the web application and about the scan process itself. Red vulnerability severity levels 1-5: minimal, medium, serious, critical, urgent Blue information gathered severity levels 1-3: minimal, medium, serious 12

13 Let s Begin Check out the full scan report Here s the Results section of the scan report including the details of a selected vulnerability. Vulnerabilities are sorted by group. Click a vulnerability row to view all detected instances of that vulnerability. Click a vulnerability instance to display details. Configure scan schedules By scheduling scans you ll get results on a regular basis (daily, weekly or monthly) and during a time window convenient for your organization. You can also run one-time only scans. It s easy to schedule a scan. Just go to Scans > Schedules and select New Schedule. Select Scans on the top menu and then click the Schedules tab. 13

14 Let s Begin Check out your dashboard Your dashboard helps you understand the overall security status of your web applications and provides an interactive way to take actions within your account. The dashboard shows current security risks based on the most recent scan results on all your web applications. 1 View current vulnerability counts for your web applications. High Severity shows levels 4 and 5, Med Severity shows level 3, and Low Severity shows levels 1 and 2. Click an option to see details and further explore the findings 2 You ll see the number of malware detections if you ve enabled malware monitoring for your web applications (and we ve detected malware). You ll also see the highest severity level (High, Med or Low) of your detections. Click to see details in the MDS application. 3 Check out your most vulnerable web applications. 4 View discovered web applications in your Catalog. (This option is not available to Express Lite users.) 5 Check out your latest scans. Mouse over the Scan Date to view complete date and time information. 6 Check out your upcoming scans (your scan schedules). 7 Check out the latest reports. 14

15 Let s Begin View a sitemap of your web application The sitemap gives you an up-to-date view of the security of your entire web application based on the latest scan results. You can drill down to see nested links and explore the security of different parts of your application. Go to Web Applications > Web Applications, hover over a web application and choose View Sitemap from the Quick Actions menu. Here s a sample sitemap for a web application that has 271 total pages crawled, 306 total vulnerabilities and 8 sensitive content detections. 15

16 Let s Begin Filter the Sitemap Click one of the page view filters such as Crawled for crawled pages or Vulnerabilities for current vulnerabilities. Drill down to see nested links Double click a parent folder to display child links. Take actions on links You can create a new web application from a link, or add a link to a black list or white list. Just hover over a row and choose an action from the menu. You can view a link in your browser - just select that row then click the link in the right pane. Move the sitemap to a new browser window If you want to keep the sitemap open while you continue working in the WAS UI, click the icon in the upper right corner to move the sitemap to a new browser window. All the sitemap functionality remains available in the new window. 16

17 Let s Begin Using the Catalog The Catalog is the staging area for web applications you can choose to add to your subscription. Catalog entries are processed from completed maps and vulnerability scans in your account. (The Catalog feature is not available to Express Lite users.) How do I get started? Your catalog will be empty until you (or another user) launches maps and/or vulnerability scans using the VM application. Once they are complete you are ready to process the results. - For vulnerability scans, go to Web Applications > Catalog and select Update above the list. You can safely close the window and track the progress in the Catalog section. - For maps, go to Web Applications > Maps, select one or more maps and then select Process Results. You can safely close the window and track the progress in the Catalog section. You ll see new catalog entries for the newly discovered web applications. You can easily choose to add these web applications to your account and scan them for security risks. 17

18 Let s Begin Do you want to import Burp findings We recognize that there's a place for both automated scanning and attack proxies. To combine the best of both approaches, we've integrated the Burp Suite toolkit into WAS. Click the Burp option on the top menu to access the Burp Management feature. (This feature is not available to Express Lite users.) The Burp section gives you a way to store the findings discovered by the Burp Suite scanner with those discovered by WAS and share this information with multiple users. To learn more about this and future integrations refer to this blog article at the Qualys Community. Go to Burp > Reports and click Import to get started. You can manage your imported Burp reports in the Burp reports list. You ll see the issues from your imported reports in the Burp issues list. 18

19 Reporting Create and manage reports on your web applications within the Reports section. You can create various reports -Web Application Report, Scan Report, Scorecard Report and Catalog Report - and download them in various formats. All reports are interactive. You can create them online, change the parameters and settings and see results instantly. Create your first report Select Reports and then select New report, or click the + button (on the right, below your user name). How do I get started? Select a report type. In this example we ve selected Scan Report. Choose a target for your report. For a scan report, you can choose any number of scans that have the same target web application. Click Finish to create the report. Your report will appear on its own tab. 19

20 Reporting Here s a sample scan report. Click Edit Report if you want to change the report settings and apply filters to the report content. You might want to save the report, so that it s available to other users and available to you the next time you log in to WAS. To save the report, click Downloaded and select the format. The summary displays graphs showing the findings of the scans you reported on. 20

21 Reporting Scroll down to view the results. You ll see the detected vulnerabilities (QIDs) with their severity levels. Click a vulnerability row to view the instances of that vulnerability. Click an instance to view the Vulnerability Details window. Move your report to a new browser window If you want to do side-by-side comparisons or work with multiple reports at one time, click the icon in the report header to move your report to a new browser window. You can edit and download your report in the new window just as you would within the UI. 21

22 Reporting Manage your reports The Report List is where you view your reports, create new reports, and download them. 1 Launch new reports, save and download reports to the local file system in one of many formats or delete selected reports. 2 View your report history. Click column headings to sort reports by name, format, type, status and generation date. Mouse over a report to take quick actions. 3 Select one report and view it in the preview pane below the list. Use the actions menu in the preview pane to download or delete the selected report. 4 Search and filter your results. Search and apply filters to quickly find reports you re looking for. 22

23 Account Management How do I manage the web applications and users in my account? Tell me about tags The tag management feature allows you to create tags (static and dynamic) to group and organize your web applications. When your account has the Asset Tagging feature turned on you can manage tags within the Asset Management application - select AM from the application picker. Contact Support or your Account Manager if you are interested in using the Asset Tagging feature. You can manage tags for web applications and other configurations, for example option profiles and search lists. Express Lite users can manage tags for web applications only. What tags do I start with? You ll see certain asset tags in your account when you first log in. These are provided as a convenience, and you can add child tags to them to create tag trees. You can also create other toplevel tags, edit tags and assign them to tag trees and hierarchies. An Asset Group tag appears for each asset group in your account. An Unassigned Business Unit tag appears. All users are assigned to the Unassigned Business Unit tag unless your organization has configured custom business units. A Business Unit tag appears for each custom business unit in your account. Business units can be defined using the VM application. (Custom business units are not available for Express Lite users.) Where do I manage tags? You can manage tags by going to Configuration > Tag Management. If your account has the Asset Tagging feature turned on, you can manage tags within the Asset Management application - select AM from the application picker. Tell me about users Users are created in the VM application. Once a new user logs in to our security service and goes to the WAS application the user is automatically assigned WAS roles (what the user can do) and scope (what the user can access). We ll assign one or more WAS roles to each user, depending on the user's roles and permissions within the VM application. Are you an Express Lite user? If yes then all users will be Manager users. When these users go to the WAS application they will be assigned the Manager role with full scope (access to all configurations, scans and reports). 23

24 Contact Support Do you have another service type? We ll assign an initial WAS role automatically, based on the user's role within the VM application. You can edit user settings, including roles, scopes and permissions, using the Administration utility. You ll see this option in the application picker. What about the user scope? We ll assign each user an initial scope automatically, and this can be changed using the Administration utility. Users with the Manager role are granted full permissions and full scope. Other users (Scanners, Readers) are assigned the tag "Unassigned Business Unit or a custom business unit tag. Here s a summary of the initial user settings: Contact Support Qualys is committed to providing you with the most thorough support. Through online documentation, telephone help, and direct support, Qualys ensures that your questions will be answered in the fastest time possible. We support you 7 days a week, 24 hours a day. Access online support information at 24

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015 QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

Policy Compliance. Getting Started Guide. January 22, 2016

Policy Compliance. Getting Started Guide. January 22, 2016 Policy Compliance Getting Started Guide January 22, 2016 Copyright 2011-2016 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

QualysGuard Asset Management

QualysGuard Asset Management QualysGuard Asset Management Quick Start Guide January 28, 2014 Dynamic Asset Tagging provides a flexible and scalable way to automatically discover and organize the assets in your environment and make

More information

Security and Compliance Suite

Security and Compliance Suite Security and Compliance Suite Quick Tour The Qualys user interface is easy-to-use with powerful Web 2.0 capabilities featuring interactive dashboards, actionable menus and workflows, context-based interactions

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Offline Scanner Appliance

Offline Scanner Appliance Offline Scanner Appliance User Guide March 27, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc. All other

More information

First Steps Opt in to New Data Security Model Go to Asset Management

First Steps Opt in to New Data Security Model Go to Asset Management Dynamic Asset Tagging provides a flexible and scalable way to automatically discover and organize the assets in your environment and make them available for scanning, reporting and ticketing within Qualys.

More information

Qualys PC/SCAP Auditor

Qualys PC/SCAP Auditor Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS

More information

Security and Compliance Suite Evaluator s Guide. August 11, 2015

Security and Compliance Suite Evaluator s Guide. August 11, 2015 Security and Compliance Suite Evaluator s Guide August 11, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

QUALYSGUARD CONSULTANT VIRTUAL SCANNER USER GUIDE

QUALYSGUARD CONSULTANT VIRTUAL SCANNER USER GUIDE QUALYSGUARD CONSULTANT VIRTUAL SCANNER USER GUIDE January 10, 2012 Copyright 2012 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd. Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive

More information

Managed Security Web Portal USER GUIDE

Managed Security Web Portal USER GUIDE Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1

More information

Creating a generic user-password application profile

Creating a generic user-password application profile Chapter 4 Creating a generic user-password application profile Overview If you d like to add applications that aren t in our Samsung KNOX EMM App Catalog, you can create custom application profiles using

More information

Elastic Detector on Amazon Web Services (AWS) User Guide v5

Elastic Detector on Amazon Web Services (AWS) User Guide v5 Elastic Detector on Amazon Web Services (AWS) User Guide v5 This guide is intended for Elastic Detector users on AWS. Elastic Detector is available as SaaS or deployed as a virtual appliance through an

More information

Security and Compliance Suite Rollout Guide. August 4, 2015

Security and Compliance Suite Rollout Guide. August 4, 2015 Security and Compliance Suite Rollout Guide August 4, 2015 Copyright 2005-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE

TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE .trust TRUSTWAVE VULNERABILITY MANAGEMENT USER GUIDE 2007 Table of Contents Introducing Trustwave Vulnerability Management 3 1 Logging In and Accessing Scans 4 1.1 Portal Navigation and Utility Functions...

More information

PCI Compliance. Network Scanning. Getting Started Guide

PCI Compliance. Network Scanning. Getting Started Guide PCI Compliance Getting Started Guide Qualys PCI provides businesses, merchants and online service providers with the easiest, most cost effective and highly automated way to achieve compliance with the

More information

Salesforce Customer Portal Implementation Guide

Salesforce Customer Portal Implementation Guide Salesforce Customer Portal Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

JD Edwards EnterpriseOne Tools. 1 Understanding JD Edwards EnterpriseOne Business Intelligence Integration. 1.1 Oracle Business Intelligence

JD Edwards EnterpriseOne Tools. 1 Understanding JD Edwards EnterpriseOne Business Intelligence Integration. 1.1 Oracle Business Intelligence JD Edwards EnterpriseOne Tools Embedded Business Intelligence for JD Edwards EnterpriseOne Release 8.98 Update 4 E21426-02 March 2011 This document provides instructions for using Form Design Aid to create

More information

GETTING STARTED WITH THE PCI COMPLIANCE SERVICE VERSION 2.3. May 1, 2008

GETTING STARTED WITH THE PCI COMPLIANCE SERVICE VERSION 2.3. May 1, 2008 GETTING STARTED WITH THE PCI COMPLIANCE SERVICE VERSION 2.3 May 1, 2008 Copyright 2006-2008 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys,

More information

Oracle Business Intelligence 11g OPN Advanced Workshop

Oracle Business Intelligence 11g OPN Advanced Workshop Oracle Business Intelligence 11g OPN Advanced Workshop Lab Book OPN: Oracle Business Intelligence 11g Advanced Workshop OPN Workshop: BI 11g Advanced Seite 1 Authors Revision Jignesh Mehta Naresh Nemani

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

Load testing with. WAPT Cloud. Quick Start Guide

Load testing with. WAPT Cloud. Quick Start Guide Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica

More information

Remote Drive PC Client software User Guide

Remote Drive PC Client software User Guide Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files

More information

Web Application Vulnerability Testing with Nessus

Web Application Vulnerability Testing with Nessus The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP rikjones@computer.org Rïk A. Jones Web developer since 1995 (16+ years) Involved with information

More information

Load testing with WAPT: Quick Start Guide

Load testing with WAPT: Quick Start Guide Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

Strategic Asset Tracking System User Guide

Strategic Asset Tracking System User Guide Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data

More information

MultiSite Manager. User Guide

MultiSite Manager. User Guide MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.

More information

Service Provider Guide

Service Provider Guide Service Provider Guide For the latest version of this document please go to: http://www.exchangedefender.com/docs v 1.0 May 16,2011 Audience: Staff Table of Contents ExchangeDefender Overview 3 ExchangeDefender

More information

IT Security & Compliance. On Time. On Budget. On Demand.

IT Security & Compliance. On Time. On Budget. On Demand. IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount

More information

Business Insight Report Authoring Getting Started Guide

Business Insight Report Authoring Getting Started Guide Business Insight Report Authoring Getting Started Guide Version: 6.6 Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software,

More information

EMC Smarts Network Configuration Manager

EMC Smarts Network Configuration Manager EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

WebSphere Business Monitor V7.0 Business space dashboards

WebSphere Business Monitor V7.0 Business space dashboards Copyright IBM Corporation 2010 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 7.0 LAB EXERCISE WebSphere Business Monitor V7.0 What this exercise is about... 2 Lab requirements... 2 What you should

More information

WebSphere Business Monitor V6.2 KPI history and prediction lab

WebSphere Business Monitor V6.2 KPI history and prediction lab Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

ThirtySix Software WRITE ONCE. APPROVE ONCE. USE EVERYWHERE. www.thirtysix.net SMARTDOCS 2014.1 SHAREPOINT CONFIGURATION GUIDE THIRTYSIX SOFTWARE

ThirtySix Software WRITE ONCE. APPROVE ONCE. USE EVERYWHERE. www.thirtysix.net SMARTDOCS 2014.1 SHAREPOINT CONFIGURATION GUIDE THIRTYSIX SOFTWARE ThirtySix Software WRITE ONCE. APPROVE ONCE. USE EVERYWHERE. www.thirtysix.net SMARTDOCS 2014.1 SHAREPOINT CONFIGURATION GUIDE THIRTYSIX SOFTWARE UPDATED MAY 2014 Table of Contents Table of Contents...

More information

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Getting Started with the iscan Online Data Breach Risk Intelligence Platform Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

What is new or different in AppScan Enterprise v9.0.2 if you re upgrading from v9.0.1.1

What is new or different in AppScan Enterprise v9.0.2 if you re upgrading from v9.0.1.1 What is new or different in AppScan Enterprise v9.0.2 if you re upgrading from v9.0.1.1 Larissa Berger Miriam Fitzgerald April 24, 2015 Abstract: This white paper guides customers through the new features

More information

Transaction Monitoring Version 8.1.3 for AIX, Linux, and Windows. Reference IBM

Transaction Monitoring Version 8.1.3 for AIX, Linux, and Windows. Reference IBM Transaction Monitoring Version 8.1.3 for AIX, Linux, and Windows Reference IBM Note Before using this information and the product it supports, read the information in Notices. This edition applies to V8.1.3

More information

WebSphere Business Monitor V6.2 Business space dashboards

WebSphere Business Monitor V6.2 Business space dashboards Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 What this exercise is about... 2 Lab requirements... 2 What you should

More information

Community Edition 3.3. Getting Started with Alfresco Explorer Document Management

Community Edition 3.3. Getting Started with Alfresco Explorer Document Management Community Edition 3.3 Getting Started with Alfresco Explorer Document Management Contents Copyright... 3 Introduction... 4 Important notes...4 Starting with Explorer... 5 Toolbar... 5 Sidebar...6 Working

More information

UH CMS Basics. Cascade CMS Basics Class. UH CMS Basics Updated: June,2011! Page 1

UH CMS Basics. Cascade CMS Basics Class. UH CMS Basics Updated: June,2011! Page 1 UH CMS Basics Cascade CMS Basics Class UH CMS Basics Updated: June,2011! Page 1 Introduction I. What is a CMS?! A CMS or Content Management System is a web based piece of software used to create web content,

More information

EMC Documentum Webtop

EMC Documentum Webtop EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights

More information

Eucalyptus 3.4.2 User Console Guide

Eucalyptus 3.4.2 User Console Guide Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure

More information

Expat Tracker. User Manual. 2010 HR Systems Limited

Expat Tracker. User Manual. 2010 HR Systems Limited Expat Tracker User Manual Expat Tracker Assignee Management Software HR Systems Limited Expat Tracker All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic,

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

Stellar Phoenix. SQL Database Repair 6.0. Installation Guide

Stellar Phoenix. SQL Database Repair 6.0. Installation Guide Stellar Phoenix SQL Database Repair 6.0 Installation Guide Overview Stellar Phoenix SQL Database Repair software is an easy to use application designed to repair corrupt or damaged Microsoft SQL Server

More information

nopcommerce User Guide

nopcommerce User Guide nopcommerce User Guide Open source ecommerce solution Version 1.90 Copyright Notice Information in this document, including URL and other Internet Web site references, is subject to change without notice.

More information

Online Backup and Recovery Manager Setup for Microsoft Windows.

Online Backup and Recovery Manager Setup for Microsoft Windows. Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the

More information

ServerView Inventory Manager

ServerView Inventory Manager User Guide - English FUJITSU Software ServerView Suite ServerView Inventory Manager ServerView Operations Manager V6.21 Edition October 2013 Comments Suggestions Corrections The User Documentation Department

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Reconfiguring VMware vsphere Update Manager

Reconfiguring VMware vsphere Update Manager Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9) Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning

More information

Advanced Service Design

Advanced Service Design vcloud Automation Center 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

CMS Training. Prepared for the Nature Conservancy. March 2012

CMS Training. Prepared for the Nature Conservancy. March 2012 CMS Training Prepared for the Nature Conservancy March 2012 Session Objectives... 3 Structure and General Functionality... 4 Section Objectives... 4 Six Advantages of using CMS... 4 Basic navigation...

More information

GP REPORTS VIEWER USER GUIDE

GP REPORTS VIEWER USER GUIDE GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated

More information

Presentation Reporting Quick Start

Presentation Reporting Quick Start Presentation Reporting Quick Start Topic 50430 Presentation Reporting Quick Start Websense Web Security Solutions Updated 19-Sep-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web

More information

SAS Business Data Network 3.1

SAS Business Data Network 3.1 SAS Business Data Network 3.1 User s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS Business Data Network 3.1: User's Guide. Cary,

More information

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce. Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Specify the location of an HTML control stored in the application repository. See Using the XPath search method, page 2.

Specify the location of an HTML control stored in the application repository. See Using the XPath search method, page 2. Testing Dynamic Web Applications How To You can use XML Path Language (XPath) queries and URL format rules to test web sites or applications that contain dynamic content that changes on a regular basis.

More information

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Quick Start Guide. Installation and Setup

Quick Start Guide. Installation and Setup Quick Start Guide Installation and Setup Introduction Velaro s live help and survey management system provides an exciting new way to engage your customers and website visitors. While adding any new technology

More information

ESISS Security Scanner

ESISS Security Scanner ESISS Security Scanner How to use the ESISS Automated Security Scanner January 2013 v1.1 Table of Contents The ESISS Automated Security Scanner... 3 Using The ESISS Security Scanner... 4 1. Logging On...

More information

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

EBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators

EBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators EBOX Digital Content Management System (CMS) User Guide For Site Owners & Administrators Version 1.0 Last Updated on 15 th October 2011 Table of Contents Introduction... 3 File Manager... 5 Site Log...

More information

Finance Reporting. Millennium FAST. User Guide Version 4.0. Memorial University of Newfoundland. September 2013

Finance Reporting. Millennium FAST. User Guide Version 4.0. Memorial University of Newfoundland. September 2013 Millennium FAST Finance Reporting Memorial University of Newfoundland September 2013 User Guide Version 4.0 FAST Finance User Guide Page i Contents Introducing FAST Finance Reporting 4.0... 2 What is FAST

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started with Mechanics

More information

Configuring Salesforce

Configuring Salesforce Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:

More information

VALUE LINE INVESTMENT SURVEY ONLINE USER S GUIDE VALUE LINE INVESTMENT SURVEY ONLINE. User s Guide

VALUE LINE INVESTMENT SURVEY ONLINE USER S GUIDE VALUE LINE INVESTMENT SURVEY ONLINE. User s Guide VALUE LINE INVESTMENT SURVEY ONLINE User s Guide Welcome to Value Line Investment Survey Online. This user guide will show you everything you need to know to access and utilize the wealth of information

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

ORACLE BUSINESS INTELLIGENCE WORKSHOP

ORACLE BUSINESS INTELLIGENCE WORKSHOP ORACLE BUSINESS INTELLIGENCE WORKSHOP Integration of Oracle BI Publisher with Oracle Business Intelligence Enterprise Edition Purpose This tutorial mainly covers how Oracle BI Publisher is integrated with

More information

HP Operations Orchestration Software

HP Operations Orchestration Software HP Operations Orchestration Software Software Version: 9.00 HP Business Availability Center Integration Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty The only

More information

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup

More information

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab

More information

Utilities. 2003... ComCash

Utilities. 2003... ComCash Utilities ComCash Utilities All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or

More information

Oracle BI Extended Edition (OBIEE) Tips and Techniques: Part 1

Oracle BI Extended Edition (OBIEE) Tips and Techniques: Part 1 Oracle BI Extended Edition (OBIEE) Tips and Techniques: Part 1 From Dan: I have been working with Oracle s BI tools for years. I am quite the Discoverer expert (a free tool now from Oracle Corp OBISE standard

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync

More information

vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide

vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide This document supports the version of each product listed and supports all subsequent versions until a new edition replaces

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

SAS. Cloud. Account Administrator s Guide. SAS Documentation

SAS. Cloud. Account Administrator s Guide. SAS Documentation SAS Cloud Account Administrator s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS Cloud: Account Administrator's Guide. Cary, NC:

More information

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP

More information

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe Intro to QualysGuard IT Risk & Asset Management Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe A Unified and Continuous View of ICT Security, Risks and Compliance

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Learn About Analysis, Interactive Reports, and Dashboards

Learn About Analysis, Interactive Reports, and Dashboards Learn About Analysis, Interactive Reports, and Dashboards This document supports Pentaho Business Analytics Suite 5.0 GA and Pentaho Data Integration 5.0 GA, documentation revision February 3, 2014, copyright

More information

Oracle Business Intelligence Publisher: Create Reports and Data Models. Part 1 - Layout Editor

Oracle Business Intelligence Publisher: Create Reports and Data Models. Part 1 - Layout Editor Oracle Business Intelligence Publisher: Create Reports and Data Models Part 1 - Layout Editor Pradeep Kumar Sharma Senior Principal Product Manager, Oracle Business Intelligence Kasturi Shekhar Director,

More information