Security Analytics Engine 1.0. Help Desk User Guide
|
|
- Nelson Townsend
- 8 years ago
- Views:
Transcription
1
2 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Dell Inc. The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Dell does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Dell Inc. Attn: LEGAL Dept 5 Polaris Way Aliso Viejo, CA Refer to our web site (software.dell.com) for regional and international office information. Trademarks Dell and the Dell logo are trademarks of Dell Inc. and/or its affiliates. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest in the marks and names of others. Legend CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death. IMPORTANT NOTE, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information. Security Analytics Engine Updated - January 2015 Software Version - 1.0
3 Contents Administration Web Site Overview Introduction How the Security Analytics Engine works Launch the Administration web site Web site components Heading bar Main web pages Navigating the Administration web site Auditing Introduction Auditing page Filtering options Audit Events table Event Details pane Filtering the audit events Displaying details for an individual audit event Adding and managing overrides on the Auditing page Adding a policy override Managing a policy override Policy Overrides Introduction Policy Overrides page Adding and managing overrides on the Policy Overrides page Adding a policy override Managing a policy override About Dell Contacting Dell Technical Support Resources
4 Administration Web Site Overview 1 Introduction Launch the Administration web site Web site components Introduction The Security Analytics Engine from Dell is used by applications for adaptive authorization. By using risk policies, an application is able to customize their authorization requirements to better minimize the risk of a malicious user gaining access to the application. In some instances a legitimate user will receive a threat level that blocks their access to an application (for example, due to a business trip outside their normal geographic location). In these cases, the user can contact a help desk operator to get a temporary override. How the Security Analytics Engine works When a user attempts to access an application which uses the Security Analytics Engine, they are evaluated by a customizable risk policy to determine the risk of allowing the user access. Each risk policy is made up of conditions which have assigned scores. For each access attempt these conditions are evaluated, and the scores for the conditions that are triggered during the attempt are combined to create a risk score. For example, suppose an application has a risk policy containing the following conditions: For an access attempt outside of the user s login time pattern (Abnormal Time), assign a score of 4. For an access attempt from a whitelisted IP address range (Whitelist), assign a score of -2. For an access attempt from a restricted country (Restricted Country), assign a score of Major Threat. A user attempting to access the application from a whitelisted IP address range at 10 p.m., instead of their regular access time of 9 a.m., is assigned a risk score of 2 (-2 for the IP address and 4 for the time of access). This risk score is then turned into a threat level (a numeric value between 0 and 7), which is sent to the application. For this example, the risk score of 2 would also be a threat level of 2 since it already falls within the threat level range. However, if the user is also attempting access from a restricted country they would receive a threat level of 7 since triggering a condition assigned the score of Major Threat will increase a risk score by The application then uses the threat level to determine whether to allow access, request additional authentication information before allowing access, or deny access. A user can then contact a help desk operator for further assistance if they are unable to access an application due to a high threat level. Launch the Administration web site You can access the Security Analytics Engine Administration web site from any computer that has network access to the server. 4
5 To launch the Security Analytics Engine Administration web site: NOTE: In order to launch the Security Analytics Engine Administration web site, you must be added to the help desk operator role. If you do not have the correct permissions, contact your Security Analytics Engine Administrator. 1 Open your web browser and enter the URL of the Security Analytics Engine Administration web site: NOTE: Where <server> is the IP address or host name (or localhost ) of the server where the Security Analytics Engine was installed. 2 When the web site is launched, enter your username and password. 3 (Optional) Select the Keep me logged in check box to remain logged in to the Security Analytics Engine Administration web site until the Log Out option is selected. 4 Click Log in. 5 The Home page of the Security Analytics Engine Administration web site appears. Web site components The Security Analytics Engine Administration web site consists of the following components allowing you to navigate and use the Security Analytics Engine Administration web site. Heading bar Main web pages Navigating the Administration web site Heading bar The heading bar, at the top of each page, displays the account and general information about the Security Analytics Engine. Security Analytics Engine - Administration Click to return to the Home page of the Security Analytics Engine Administration web site. NOTE: If the following two items are not automatically displayed, click the corner. button in the upper right <Username> About Click <Username> and select Log Out to disconnect from the Security Analytics Engine Administration web site. Click to display the About Security Analytics Engine dialog which displays general release information about the Security Analytics Engine, copyright information, third-party components, legal notices and contact information. 5
6 Main web pages The Security Analytics Engine Administration web site s Home page contains the following pages: Table 1. Main web pages Page Auditing Policy Overrides Description Allows you to view and filter the auditing data collected by the Security Analytics Engine. Allows you to create and manage policy overrides. Navigating the Administration web site To navigate the Security Analytics Engine Administration web site, use the breadcrumb trail directly beneath the heading bar or your browser s navigation buttons. As you open pages they become links in the breadcrumb trail, with the Home page to the far left and the currently displayed page underlined furthest to the right. These links are used to navigate back to parent pages but after being clicked will erase all links for later pages. For example, if the Home link is clicked while on the Policy Overrides page, the Policy Overrides link disappears. To return to the Policy Overrides page, use your browser s back button or from the Home page click Policy Overrides. 6
7 2 Auditing Introduction Auditing page Filtering the audit events Displaying details for an individual audit event Adding and managing overrides on the Auditing page Introduction When a user is unable to log in to an application due to a high threat level, the help desk operator is able to create an override to allow them access. This is done by locating the audit event and creating an override for the user that will allow them to access Security Analytics Engine protected applications for a specified period of time. Auditing page The Auditing page is displayed when Auditing is clicked on the Home page of the Security Analytics Engine Administration web site. 7
8 The Auditing page displays a list of the events for the applications currently utilizing the Security Analytics Engine. These results are filtered using the fields located at the top of the page. Filtering options The following are the filtering options at the top of the page: NOTE: Refreshing the screen returns the Auditing page to its default settings. From To This field specifies a start date for searching events. By default, this is the current date. Click the button to display a calendar from which to select a start date for searching events. This field specifies an end date for searching events. By default, this is the current date. Click the button to display a calendar from which to select an end date for searching events. Application(s) This drop-down list displays the currently configured applications. Select to display auditing information for all applications or a specific application. By default, auditing events for all applications are displayed. 8
9 Max Records Search This field is used for setting the maximum number of records ( ) to return for the search. By default, this is 1000 records. The Search button updates the Audit Events table located beneath the filtering options. Filter Results This field is used to filter the displayed events based on the keywords entered. The table is updated automatically as characters are entered into the field. Audit Events table The following information is displayed for each event in the Audit Events table located beneath the filtering options: Date/Time Application Message Policy User Name IP Address This column displays the date and time the event was detected. This column displays the name of the application. This column displays the message associated with the event and the threat level assigned to the access attempt. This column displays the risk policy that was evaluated. This column displays the name of the user who accessed, or attempted to access, an application protected by the Security Analytics Engine. This column displays the IP address of the user who accessed, or attempted to access, an application protected by the Security Analytics Engine. Event Details pane When an event is selected from the audit events list, a Details button appears at the bottom of the screen. Clicking the Details button will open a panel along the bottom of the page with the following fields and button: Conditions that returned TRUE (Default) This section shows the conditions evaluated for the application that returned true and thus impacted the threat level sent to the application. The score listed to the right of a condition name is the score assigned to the triggered condition. Selecting a condition will display information regarding what caused the condition to return as true. Clicking show all will switch to displaying the Monitored Conditions section. 9
10 One of the following icons will appear to the left of each condition name: - indicates a good condition. - indicates a bad condition. Monitored Conditions Override Displayed when the show all link is clicked, this will display all conditions that were monitored during the access attempt. Selecting a condition will display information regarding what caused the condition to return as true or false. Clicking show only true will switch to displaying the Conditions that returned TRUE section. One of the following icons will appear to the left of each condition name: - indicates a good condition. - indicates a bad condition. If there is no override currently assigned to the user, clicking this button will open the Add Override dialog. If there is an override currently assigned to the user, the Modify Override dialog will be displayed. Filtering the audit events The following procedure explains how to filter the events displayed in the Audit Events table. To filter audit events: NOTE: Refreshing the screen removes filtering and returns the Auditing page to its default settings. 1 From the Home page, click Auditing to open the Auditing page. 2 In the From field, click the button to display a calendar and select the start date. 3 In the To field, click the button to display a calendar and select the end date. 4 In the Application(s) field, select to display auditing information for all applications or a specific application. 5 In the Max Records field, set the maximum number of records ( ) to return for the search. By default, this is 1000 records. 6 Click the Search button to update the Audit Events table. 7 To further filter the list of events, enter characters into the Filter Results field. The Audit Events table is updated automatically. 8 The results can also be sorted to help you locate a specific event. To sort the data: Click on the column heading to be used for the sort criteria. The sort order will be in ascending order, but can be changed to descending order by clicking the heading a second time. To remove the sort order from a column, click the column heading until the arrow disappears. 10
11 Displaying details for an individual audit event The following procedure explains how to view a detailed explanation of the conditions that were evaluated during an audit event. To display details for an individual audit event: 1 From the Home page, click Auditing to open the Auditing page. By default, the audit events for the current date are displayed. 2 Select an event and click the Details button on the bottom left of the page (see Filtering the audit events for information on locating a specific event and/or an event from a previous date). 3 A new panel appears at the bottom of the page displaying the Conditions that returned TRUE section on the left side of the panel. This section displays the conditions evaluated for the application that returned true and thus impacted the threat level sent to the application. The score listed to the right of the condition name is the score assigned to the triggered condition. One of the following icons will appear to the left of each condition name: - indicates a good condition. - indicates a bad condition. Clicking the show all link will display all conditions that were monitored during the access attempt regardless of whether they returned true or false. 4 Selecting a condition from the left column will display additional information in the right column regarding the condition. Each condition includes the following additional details: <plugin name> - <condition name> (Result: <true/false>) - This displays the name of the plugin, the name of the condition and whether the condition returned as true or false during the access attempt. For example, BuiltinPlugin1 - IsAbnormalTime (Result: true). Use the expand properties button (right arrow) to the left of the heading to display the following information for the condition: Parameters - Use the expand properties button (right arrow) to the left of this heading to display each condition parameter with its current setting. For example, Days = 30. Details - Use the expand properties button (right arrow) to the left of this heading to display information on what caused the condition to trigger or not trigger during the access attempt. 5 To close the Details panel, click the Details button. 11
12 Adding and managing overrides on the Auditing page NOTE: Policy overrides can also be created and managed on the Policy Overrides page. See Policy Overrides page for more information. NOTE: In cases where overrides have been disabled for a risk policy, the threat level will always be reported regardless of whether or not there is an override in place for the user. Adding a policy override When a user has failed to authenticate due to a high threat level, you can create an override to allow that user access for a specified period of time. IMPORTANT: To avoid allowing a malicious user access to applications, only create an override when you are positive the user is legitimate. To add a policy override: 1 From the Home page, click Auditing. By default, the audit events for the current date are displayed. 2 Select the audit event you want to override and click the Details button on the bottom left of the page (see Filtering the audit events for information on locating a specific event and/or an event from a previous date). 3 From the Details panel, click the Override button in the lower right corner. The Add Override dialog appears. 4 The name of the user appears in the User Name field. Verify that this is the correct user for the override. NOTE: This field cannot be edited. 5 For Browser ID, select the browser ID that corresponds to the selected audit event or select Any to allow any browser. 6 In the Expiration field, click the button to select an expiration date for the override. By default, the next day is selected. 7 Click the Save button to save the override and close the dialog. The override is now in effect for the user until the specified expiration date. Managing a policy override To edit a policy override: 1 From the Home page, click Auditing. 2 Select an audit event from the list that is associated with a current override and click the Details button on the bottom left of the page (see Filtering the audit events for information on locating a specific event). 3 From the Details panel, click the Override button in the lower right corner. The Modify Override dialog appears. 12
13 4 The following information is displayed for the override: Last Updated By: <nn> - The username of the administrator or help desk operator that last created or modified the override. NOTE: This field cannot be edited. User Name - The name of the user to whom the override applies. NOTE: This field cannot be edited. Browser ID - The browser ID to which the override applies. User Address - The IP address to which the override applies. In the Expiration field, click the button to select an expiration date for the override. Make any necessary changes to the override. 5 Click the Save button to save the changes to the override and close the dialog. The changes to the override are now in effect for the user until the specified expiration date. To delete a policy override: 1 From the Home page, click Auditing. 2 Select an audit event from the list that is associated with a current override and click the Details button on the bottom left of the page (see Filtering the audit events for information on locating a specific event). 3 From the Details panel, click the Override button in the lower right corner. The Modify Override dialog appears. 4 Click the Delete button to delete the policy override. 5 A confirmation dialog will appear. Click the Delete button. 13
14 3 Policy Overrides Introduction Policy Overrides page Adding and managing overrides on the Policy Overrides page Introduction From the Home page of the Security Analytics Engine Administration web site, click on the Policy Overrides link to open the Policy Overrides page where you can view and manage all policy overrides that are currently in effect. Policy Overrides page This page allows you to view, create and manage override policies. The following button appears at the top of the page: Add Override This button is used for creating a new override. The following filtering option is available at the top of the page: Filter This field is used for filtering overrides. The table updates automatically as characters are entered into the field. The following information and buttons are displayed for each policy override: User Name The name of the user to whom the override applies. 14
15 User Address Browser ID Expiration The IP address of the user to which the override applies. The browser ID to which the override applies. The date the policy override expires. After this date the override will no longer appear in the list and the user will again be evaluated according to an application s risk policy. Last Updated By Edit Delete The username of the administrator or help desk operator that last created or edited the override. Click this button to edit the selected override. Click this button to delete the override. Once the override is deleted it will no longer be in effect for the user. When multiple pages are necessary to display the overrides, the following buttons located at the bottom of the screen are used to navigate between the pages: Use this button to display the previous page. Click a page number to display that page. Use this button to display the next page. Adding and managing overrides on the Policy Overrides page NOTE: Policy Overrides can also be created and managed on the Auditing page by selecting specific audit events. See Auditing page for more information. NOTE: In cases where overrides have been disabled for a risk policy, the threat level will always be reported regardless of whether or not there is an override in place for the user. Adding a policy override When a user has failed to authenticate due to a high threat level, you can create an override to allow that user access to Security Analytics Engine protected applications for a specified period of time. IMPORTANT: To avoid allowing a malicious user access to an application, only create an override when you are positive the user is legitimate. 15
16 To add a policy override: 1 From the Home page, click Policy Override. 2 Click the Add Override button in the upper right corner to open the Add Override dialog. 3 In the User Name field, enter the name of the user to which the override applies. 4 For Browser ID, enter the browser ID for the user. 5 In the User Address field, enter the user s IP address. 6 Click the button to select the date the override will expire. By default, the next day is selected. 7 Click the Save button to save the override and close the dialog. The new override will appear listed on the Policy Overrides page. Managing a policy override To edit a policy override: 1 From the Home page, click Policy Override. 2 Select the override to edit and click Edit to open the Modify Override dialog. 3 The following information is displayed for the override: Last Updated By: <nn> - The username of the administrator or help desk operator that last created or modified the override. NOTE: This field cannot be edited. User Name - The name of the user to whom the override applies. NOTE: This field cannot be edited. Browser ID - The browser ID to which the override applies. User Address - The IP address to which the override applies. Expiration - Click the button to select an expiration date for the override. 4 Click the Save button to save the changes to the override and close the dialog. The changes to the override will now be in effect for the user until the specified expiration. To delete a policy override: 1 From the Home page, click Policy Override. 2 On the Policy Override page, use one of the following methods to delete a policy override: Locate the policy override to delete and click the corresponding Delete button. Click the Edit button associated with the override to open the Modify Override dialog. Click the Delete button. Select the check box to the left of the policy override(s) to delete and click the Delete Selected Overrides button located in the lower left corner. 3 A dialog will be displayed confirming that you want to delete the selected override(s). Click the Delete button. 16
17 About Dell Dell listens to customers and delivers worldwide innovative technology, business solutions and services they trust and value. For more information, visit Contacting Dell Technical Support: Online Support Product Questions and Sales: (800) Technical Support Resources Technical support is available to customers who have purchased Dell software with a valid maintenance contract and to customers who have trial versions. To access the Support Portal, go to The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. In addition, the portal provides direct access to product support engineers through an online Service Request system. The site enables you to: Create, update and manage Service Requests (cases) View Knowledge Base articles Obtain product notifications Download software. For trial software, go to Trial Downloads. View how-to videos Engage in community discussions Chat with a support engineer 17
Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationSpotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
More informationDell Statistica Document Management System (SDMS) Installation Instructions
Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationDell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
More informationDell Migration Manager for Enterprise Social What Can and Cannot Be Migrated
Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated MMES - What Can and Cannot Be Migrated First Release - April 2015 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationDell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationSpotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations
More informationDell InTrust 11.0. Preparing for Auditing CheckPoint Firewall
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationDell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS
Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationNew Features and Enhancements
Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements
More informationDell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
More informationEnterprise Reporter Report Library
Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports
More informationformerly Help Desk Authority 9.1.3 HDAccess Administrator Guide
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656
More informationDell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide
Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationDell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide
Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More informationDell One Identity Manager 7.0. Help Desk Module Administration Guide
Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure
More informationformerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual
formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,
More informationDell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationDell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
More informationDell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationDell NetVault Backup Plug-in for SQL Server 6.1
Dell NetVault Backup Plug-in for SQL Server 6.1 April 2014 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Enhancements Resolved issues Known
More informationDell NetVault Backup Plug-in for SQL Server 10.0.1
Dell NetVault Backup Plug-in for SQL Server 10.0.1, Revision 1 February 2015 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Dell NetVault Backup
More informationDell InTrust 11.0 Best Practices Report Pack
Complete Product Name with Trademarks Version Dell InTrust 11.0 Best Practices Report Pack November 2014 Contents About this Document Auditing Domain Controllers Auditing Exchange Servers Auditing File
More informationAbout Recovery Manager for Active
Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System
More informationHow to Deploy Models using Statistica SVB Nodes
How to Deploy Models using Statistica SVB Nodes Abstract Dell Statistica is an analytics software package that offers data preparation, statistics, data mining and predictive analytics, machine learning,
More informationIntroduction to Version Control in
Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any
More informationDell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview
Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview May 2015 Overview Functional highlights Functional details Legal notices Overview Support for Dell SonicWALL malware detection
More informationformerly Help Desk Authority 9.1.3 Upgrade Guide
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationFOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More informationQuest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide
Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More informationObject Level Authentication
Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required
More informationDell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationformerly Help Desk Authority 9.1.3 HDAccess User Manual
formerly Help Desk Authority 9.1.3 HDAccess User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA
More informationDell One Identity Quick Connect for Cloud Services 3.6.1
Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved
More informationDell One Identity Quick Connect for Cloud Services 3.6.0
Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved
More informationFoglight. Dashboard Support Guide
Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationChangeAuditor 6.0 For Windows File Servers. Event Reference Guide
ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationChangeAuditor 5.6. For Windows File Servers Event Reference Guide
ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDell Spotlight on Active Directory 6.8.4. Deployment Guide
Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationDell NetVault Backup Plug-in for SharePoint 1.3. User s Guide
Dell NetVault Backup Plug-in for 1.3 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
More informationAbout Dell Statistica 12.6... 2
Complete Product Name with Trademarks Version Dell TM Statistica TM 12.6 Contents Dell TM Statistica TM... 1 About Dell Statistica 12.6... 2 New Features... 2 Workspace Enhancements: Statistica Enterprise
More informationFoglight for Active Directory 5.6.8. User and Reference Guide
Foglight for Active Directory 5.6.8 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationDell InTrust 11.0. Real-Time Monitoring Guide
Dell InTrust 11.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure
More informationSecurity Explorer 9.5. User Guide
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More information4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
More informationDell Client Profile Updating Utility 5.5.6
Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System
More informationChangeAuditor 6.0. Web Client User Guide
ChangeAuditor 6.0 Web Client User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationDefender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationDell NetVault Backup Plug-in for Hyper-V 10.0.1. User s Guide
Dell NetVault Backup Plug-in for Hyper-V 10.0.1 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationSecurity Explorer 9.5. About Security Explorer 9.5. New features. June 2014
June 2014 These release notes provide information about Dell. About New features s Known issues System requirements Product licensing Getting started with Security Explorer Globalization About Dell About
More informationActiveRoles 6.8. Web Interface User Guide
ActiveRoles 6.8 Web Interface User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationQuest ChangeAuditor 4.8
Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide
More informationFoglight for Oracle. Managing Oracle Database Systems Getting Started Guide
Foglight for Oracle Managing Oracle Database Systems Getting Started Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationFoglight 1.0.0.0. Cartridge for Active Directory Installation Guide
Foglight 1.0.0.0 Cartridge for Active Directory Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDell Recovery Manager for Active Directory 8.6.0
Dell Recovery Manager for Active Directory 8.6.0 April, 2014 These release notes provide information about the Recovery Manager for Active Directory release. About Recovery Manager for Active Directory
More informationFoglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server
Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationToad for Apache Hadoop 1.1.0
Toad for Apache Hadoop 1.1.0 January 23, 2015 These release notes provide information about the Toad for Apache Hadoop release. About New features Enhancements Known issues System requirements Product
More informationDell Migration Manager for Exchange 8.11. Product Overview
Dell Migration Manager for Exchange 8.11 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationDell Recovery Manager for Active Directory 8.6.3
Dell Recovery Manager for Active Directory 8.6.3 May 15, 2015 These release notes provide information about the Dell Recovery Manager for Active Directory release. Resolved Issues Known Issues System Requirements
More information8.7. Resource Kit User Guide
8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under
More informationQuest Privilege Manager Console 1.1.1. Installation and Configuration Guide
Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationWeb Portal Installation Guide 5.0
Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationQuest vworkspace Virtual Desktop Extensions for Linux
Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.
More informationDell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide
Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationToad for Apache Hadoop 1.2.0
Toad for Apache Hadoop 1.2.0 September 16, 2015 These release notes provide information about the Toad for Apache Hadoop release. About New features Enhancements Known issues System requirements Product
More informationQuick Connect Express for Active Directory
Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationformerly Help Desk Authority 9.1.2 Quick Start Guide
formerly Help Desk Authority 9.1.2 Quick Start Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationFoglight. Managing Hyper-V Systems User and Reference Guide
Foglight Managing Hyper-V Systems User and Reference Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationCisco UCS Director Payment Gateway Integration Guide, Release 4.1
First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
More information2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer
What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationFoglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server
Foglight for SQL Server 5.6.5.2 Managing SQL Server Database Systems Getting Started Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationDell InTrust 11.0. Auditing and Monitoring Microsoft Windows
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationFoglight for SQL Server 5.7.0. Getting Started Guide
Foglight for SQL Server 5.7.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationAbout Dell SonicWALL Analyzer 8.1
Complete Product Name with Trademarks Version Dell SonicWALL Analyzer 8.1 February 2016 These release notes provide information about the Dell SonicWALL Analyzer 8.1 release. Topics: About Pre 8.1 Upgrade
More information2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
More informationFoglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide
Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationQuest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationQuest SQL Optimizer 6.5. for SQL Server. Installation Guide
Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationUsing Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
More informationHow to Quickly Create Custom Applications in SharePoint 2010 or 2013 without Custom Code
How to Quickly Create Custom Applications in SharePoint 2010 or 2013 without Custom Code A Guide through Web Parts in Quick Apps for SharePoint By Dan Barker, product manager, Dell Software Table of Contents
More informationBuilt-in Plug-ins User s Guide
Quest NetVault Backup version 9.1 Built-in Plug-ins User s Guide Version: Product Number: NVG-129-9.1-EN-01 NVG-129-9.1-EN-01 05/10/13 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains
More informationQuest Collaboration Services 3.5. How it Works Guide
Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationManaging the Risk of Privileged Accounts and Privileged Passwords in Defense Organizations
Managing the Risk of Privileged Accounts and Privileged Passwords in Defense Organizations Reduce Risk while Streamlining Administrative Workflows Written by Dell Software Abstract Even IT environments
More informationFoglight 5.5.5. Managing Microsoft Active Directory Installation Guide
Foglight 5.5.5 Managing Microsoft Active Directory 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationFoglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide
Foglight Foglight for Virtualization, Enterprise Edition 7.2 Virtual Appliance Installation and Setup Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected
More informationDesktop Authority vs. Group Policy Preferences
Desktop Authority vs. Group Policy Preferences A Comparison of Desktop Lifecycle Management Features Introduction Group Policy Preferences In Windows Server 2008 and Windows Vista Service Pack 1, Microsoft
More informationDATA GOVERNANCE EDITION
Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationActive Directory Auditing: What It Is, and What It Isn t
Active Directory Auditing: What It Is, and What It Isn t Abstract What s wrong with Active Directory s native audit logging? More importantly, what functionality do you really need in an AD auditing solution,
More informationNetVault LiteSpeed for SQL Server version 7.5.0. Integration with TSM
NetVault LiteSpeed for SQL Server version 7.5.0 Integration with TSM 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationFoglight Experience Monitor and Foglight Experience Viewer
Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains
More informationCisco Unified Communications Self Care Portal User Guide, Release 10.5(1)
Cisco Unified Communications Self Care Portal User Guide, Release 10.5(1) Unified Communications Self Care Portal 2 Unified Communications Self Care Settings 2 Phones 4 Additional Settings 12 Revised:
More informationEnterprise Self Service Quick start Guide
Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.
More informationDell Directory Analyzer 4.14. Installation Guide
Dell Directory Analyzer 4.14 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More information