User Guidance. CimTrak Integrity & Compliance Suite

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "User Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19"

Transcription

1 CimTrak Integrity & Compliance Suite Master Repository Management Console File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface User Guidance

2 LEGAL NOTICES The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. COPYRIGHT NOTICE Copyright CIMCOR, Inc. All Rights Reserved. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without prior consent in writing from CIMCOR Inc., 8252 Virginia Street Suite C, Merrillville, IN ALL EXAMPLES WITH NAMES, COMPANY NAMES, OR COMPANIES THAT APPEAR IN THIS DOCUMENT ARE IMAGINARY AND DO NOT REFER TO, OR PORTRAY ANY ACTUAL NAMES, COMPANIES, ENTITIES, OR INSTITUTIONS. ANY RESEMBLANCE TO ANY REAL PERSON, COMPANY, ENTITY, OR INSTITUTION IS PURELY COINCIDENTAL. Every effort has been made to ensure the accuracy of this document. However, CIMCOR Inc. makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. CIMCOR Inc. shall not be liable for any errors or for incidental or consequential damages in connection with the furnishing, performance, or use of this document or the examples herein. The information in this document is subject to change without notice. TRADEMARKS CimTrak is a trademark of CIMCOR Inc. Microsoft, MS, Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows 2008, and Windows 7 are trademarks of Microsoft Corporation in the United States and/or other countries. Macintosh and Mac OSX are registered trademarks of Apple Inc. in the USA and other countries. Netscape is a registered trademark and Netscape Communicator is a trademark of Netscape Communications Corporation. InstallShield is a registered trademark and service mark of InstallShield Software Corporation. Linux is a registered trademark of Linus Torvalds. Solaris is a registered trademark of Sun Microsystems. All other products mentioned are trademarks and/or registered trademarks of their respective owners. Document Released June 15, 2011 CIMCOR CimTrak Integrity Suite 2 CIMCOR CimTrak Integrity & Compliance Suite

3 Table of Contents K 1. INTRODUCTION DOCUMENTATION PURPOSE AND CONVENTIONS CIMCOR CIMTRAK INTEGRITY & COMPLIANCE SUITE INTRODUCTION CIMTRAK MASTER REPOSITORY CIMTRAK MANAGEMENT CONSOLE CIMTRAK FILE SYSTEM AGENT CIMTRAK NETWORK DEVICE AGENT CIMTRAK TOOLS CONFIGURATION PRE-REQUISITES PRE-REQUISITE OVERVIEW CONFIGURING AND USING THE CIMTRAK MANAGEMENT CONSOLE STARTING THE CIMTRAK MANAGEMENT CONSOLE ASSOCIATING THE MANAGEMENT CONSOLE WITH A MASTER REPOSITORY NEGOTIATING A MASTER REPOSITORY COMMUNICATION CERTIFICATE AUTHENTICATING WITH THE MASTER REPOSITORY VIA THE MANAGEMENT CONSOLE NAVIGATING THE CIMTRAK MANAGEMENT CONSOLE UNDERSTANDING THE MANAGEMENT CONSOLE SYSTEM MENU UNDERSTANDING THE MANAGEMENT CONSOLE TOOLBAR UNDERSTANDING THE MANAGEMENT CONSOLE OBJECT GROUP TREE UNDERSTANDING THE MANAGEMENT CONSOLE INFORMATION DISPLAY AREA CIMTRAK MANAGEMENT CONSOLE SYSTEM MENU: HELP ABOUT CIMTRAK SYSTEM INFORMATION LEGAL NOTICES CONFIGURING AND USING THE CIMTRAK MASTER REPOSITORY MANAGING THE MASTER REPOSITORY FROM THE MANAGEMENT CONSOLE MASTER REPOSITORY PROPERTIES CONFIGURING LOGGING OPTIONS CONFIGURING SMTP NOTIFICATIONS CONFIGURING NITROSECURITY NPP LOGGING CONFIGURING SNMP LOGGING CONFIGURING SYSLOG LOGGING CONFIGURING WEBTRENDS LOGGING CONFIGURING MASTER REPOSITORY SETTINGS CONFIGURING THE MASTER REPOSITORY NAME CONFIGURING THE MANAGEMENT CONSOLE DISCONNECT TIMEOUT CONFIGURING THE MASTER REPOSITORY DISK SPACE MONITOR CONFIGURING THE MASTER REPOSITORY ACCESS RESTRICTIONS CONFIGURING THE MASTER REPOSITORY PASSWORD POLICIES CONFIGURING THE MASTER REPOSITORY COMMUNICATION SETTINGS CONFIGURING THE MASTER REPOSITORY LOGON BANNER CONFIGURING ACTIVE DIRECTORY/LDAP USER ACCOUNT INTEGRATION ADDING/EDITING/DELETING ACTIVE DIRECTORY/LDAP HOSTS ADDING/DELETING ACTIVE DIRECTORY/LDAP USERS MASTER REPOSITORY OPTIONS CHANGING ACCOUNT PASSWORD CHANGING THE MANAGEMENT CONSOLE LANGUAGE MODIFYING USER PREFERENCES AUDITING THE MASTER REPOSITORY FROM THE MANAGEMENT CONSOLE User Guidance 3

4 MASTER REPOSITORY INFORMATION ADDING, REMOVING, VIEWING AND ACTIVATING CIMTRAK LICENSES MASTER REPOSITORY EVENT LOG FILTERING AND SORTING THE MASTER REPOSITORY EVENT LOG CREATING MASTER REPOSITORY EVENT LOG FILTERS SORTING THE MASTER REPOSITORY EVENT LOG MASTER REPOSITORY NOTES MASTER REPOSITORY LOGGED ON USERS MASTER REPOSITORY LOCKED USER ACCOUNTS MANAGING MASTER REPOSITORY USERS & GROUPS FROM THE MANAGEMENT CONSOLE UNDERSTANDING THE USERS DIALOG TOOLBAR UNDERSTANDING THE USER GROUP TREE UNDERSTANDING CIMTRAK USER GROUPS CIMTRAK ADMINISTRATORS GROUP EXPLAINED CIMTRAK AUDITORS GROUP EXPLAINED CIMTRAK INSTALLERS GROUP EXPLAINED CIMTRAK STANDARD GROUP EXPLAINED ADDING CIMTRAK LOCAL USER ACCOUNTS ADDING CIMTRAK AD/LDAP USER ACCOUNTS ADDING CIMTRAK USER GROUPS EDITING CIMTRAK LOCAL USER & GROUP ACCOUNTS DELETING CIMTRAK LOCAL USER & GROUP ACCOUNTS DELETING CIMTRAK AD/LDAP USER ACCOUNTS UNLOCKING CIMTRAK USER ACCOUNTS CIMTRAK MASTER REPOSITORY DOCUMENT CONTROL CREATING A MASTER REPOSITORY DOCUMENT CONTROL DOCUMENT CONTROL PRIVATE KEY EDITING MASTER REPOSITORY DOCUMENT CONTROL PROPERTIES WORKING WITH MASTER REPOSITORY DOCUMENT CONTROL FILES AND FOLDERS ADDING FILES AND FOLDERS TO THE MASTER REPOSITORY DOCUMENT CONTROL DELETING FILES AND FOLDERS FROM THE MASTER REPOSITORY DOCUMENT CONTROL VIEWING FILE CONTENT FROM THE MASTER REPOSITORY DOCUMENT CONTROL DOWNLOADING LOCAL COPIES OF FILES FROM THE MASTER REPOSITORY DOCUMENT CONTROL COMPARING CHANGES WITH PAST GENERATIONS FROM THE MASTER REPOSITORY DOCUMENT CONTROL UNDERSTANDING THE DOCUMENT CONTROL FILE COMPARISON RESULTS DIALOG UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG TOOLBAR UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG INFORMATION DISPLAY AREA AND TAB BROWSER EDITING DOCUMENT CONTROL FILES FROM THE MASTER REPOSITORY DOCUMENT CONTROL CHECKING OUT FILES FROM THE MASTER REPOSITORY DOCUMENT CONTROL CHECKING IN FILES FROM THE MASTER REPOSITORY DOCUMENT CONTROL AUDITING MASTER REPOSITORY DOCUMENT CONTROL EVENTS FILTERING AND SORTING THE MASTER REPOSITORY EVENT LOG CREATING DOCUMENT CONTROL EVENT LOG FILTERS SORTING THE DOCUMENT CONTROL EVENT LOG MASTER REPOSITORY DOCUMENT CONTROL GENERATIONS DOWNLOADING COPIES OF DOCUMENT CONTROL GENERATIONS VIEWING AND COMPARING CONTENT OF DOCUMENT CONTROL GENERATIONS DEPLOYING ROLLING BACK DOCUMENT CONTROL GENERATIONS MASTER REPOSITORY DOCUMENT CONTROL NOTES MASTER REPOSITORY DOCUMENT CONTROL PERMISSIONS MODIFYING AN EXISTING USER/GROUP DOCUMENT CONTROL PERMISSIONS ADDING AND REMOVING USERS AND GROUPS TO DOCUMENT CONTROL PERMISSIONS MANAGING MASTER REPOSITORY PERMISSIONS MODIFYING EXISTING USER/GROUP PERMISSIONS CIMCOR CimTrak Integrity & Compliance Suite

5 ADDING AND REMOVING USERS AND GROUPS TO MASTER REPOSITORY PERMISSIONS MASTER REPOSITORY AREAS CREATING AND DELETING MASTER REPOSITORY AREAS MODIFYING MASTER REPOSITORY AREA PROPERTIES MANAGING AREA PERMISSIONS MODIFYING EXISTING USER/GROUP PERMISSIONS ADDING AND REMOVING USERS AND GROUPS TO AREA PERMISSIONS AREA EVENT LOG FILTERING AND SORTING THE AREA EVENT LOG CREATING AREA EVENT LOG FILTERS SORTING THE AREA EVENT LOG AREA NOTES AREA OVERVIEW MASTER REPOSITORY TEMPLATES IMPORTING MASTER REPOSITORY TEMPLATES EXPORTING MASTER REPOSITORY TEMPLATES CUSTOMIZING EXPORTED MASTER REPOSITORY TEMPLATES CONFIGURING AND USING THE CIMTRAK FILE SYSTEM AGENT MANAGING THE CIMTRAK FILE SYSTEM AGENT FROM THE MANAGEMENT CONSOLE FILE SYSTEM AGENT PROPERTIES CONFIGURING THE FILE SYSTEM AGENT DESCRIPTION PROPERTIES CONFIGURING THE FILE SYSTEM AGENT LICENSE PROPERTIES CONFIGURING THE FILE SYSTEM AGENT LOG RETENTION PROPERTIES CONFIGURING THE FILE SYSTEM AGENT DISCONNECT WARNING CONFIGURING THE FILE SYSTEM AGENT HEARTBEAT AND STATISTIC GATHERING INTERVAL CONFIGURING THE FILE SYSTEM AGENT THROTTLE FILE SYSTEM AGENT MONITORING PARAMETERS ADDING FILE SYSTEM AGENT MONITORING PARAMETERS EDITING FILE SYSTEM AGENT MONITORING PARAMETERS DELETING FILE SYSTEM AGENT MONITORING PARAMETERS WORKING WITH FILE SYSTEM AGENT POLICIES CREATING AND EDITING OBJECT GROUP WATCH POLICIES OBJECT GROUP PROPERTIES OBJECT GROUP WATCH POLICY PRIVATE KEY WATCH PROPERTIES CORRECTIVE ACTION AUTHORITATIVE COPY FILE COMPARISON METHOD STORE CHANGES AUTO EXCLUDE OPTIONS EVENT DETECTION METHOD CONNECTION LOSS TUNING WATCH PROPERTIES EXCLUDING AND INCLUDING USING REGULAR EXPRESSIONS EXCLUDING FOLDERS USING REGULAR EXPRESSIONS EXCLUDING FILES USING REGULAR EXPRESSIONS INVERSE EXCLUDING OF FOLDERS USING REGULAR EXPRESSIONS INVERSE EXCLUDING OF FILES USING REGULAR EXPRESSIONS SAVING OBJECT GROUP WATCH POLICIES TO TEMPLATES CREATING OBJECT GROUP WATCH POLICIES USING TEMPLATES DELETING OBJECT GROUP WATCH POLICIES ENABLING AND DISABLING OBJECT GROUP MONITORING SYNCHRONIZING OBJECT GROUP DATA FILE SYSTEM AGENT INFORMATION DISPLAY REVIEWING FILE SYSTEM AGENT SETTINGS AUDITING FILE SYSTEM AGENT EVENTS FILTERING AND SORTING THE FILE SYSTEM AGENT EVENT LOG User Guidance 5

6 CREATING FILE SYSTEM AGENT EVENT LOG FILTERS SORTING THE FILE SYSTEM AGENT EVENT LOG REVIEWING FILE SYSTEM AGENT STATISTICS FILE SYSTEM AGENT NOTES FILE SYSTEM AGENT OBJECT GROUP OVERVIEW FILE SYSTEM AGENT PERMISSIONS MODIFYING AN EXISTING USER/GROUP FILE SYSTEM AGENT PERMISSIONS ADDING AND REMOVING USERS AND GROUPS TO FILE SYSTEM AGENT PERMISSIONS OBJECT GROUP INFORMATION DISPLAY AUDITING OBJECT GROUP EVENTS FILTERING AND SORTING THE OBJECT GROUP EVENT LOG CREATING OBJECT GROUP EVENT LOG FILTERS SORTING THE FILE SYSTEM AGENT EVENT LOG REVIEWING OBJECT GROUP MONITORED CHANGES FILTERING AND SORTING THE OBJECT GROUP CHANGE LOG CREATING OBJECT GROUP CHANGE LOG FILTERS SORTING THE FILE SYSTEM AGENT CHANGE LOG ACCESSING THE CHANGE LOG TAB CONTEXT MENU VIEWING CHANGE CONTENT VIEWING CHANGE CONTENT IN BINARY VIEWING CHANGE FORENSIC DATA DOWNLOADING A COPY OF CHANGE DATA COMPARING CHANGE DATA WITH THE AUTHORITATIVE COPY AT THE TIME OF THE CHANGE UNDERSTANDING THE OBJECT GROUP CHANGE TAB FILE COMPARISON RESULTS DIALOG UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG TOOLBAR UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG INFORMATION DISPLAY AREA AND TAB BROWSER COMPARING CHANGE DATA WITH THE CURRENT AUTHORITATIVE COPY UNDERSTANDING THE OBJECT GROUP CHANGE TAB FILE COMPARISON RESULTS DIALOG UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG TOOLBAR UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG INFORMATION DISPLAY AREA AND TAB BROWSER REVIEWING OBJECT GROUP MONITORING INFORMATION REVIEWING OBJECT GROUP DATA PENDING REPAIR FILTERING AND SORTING THE PENDING REPAIR TAB CREATING PENDING REPAIR FILTERS SORTING THE PENDING REPAIR TAB CHANGES PENDING APPROVAL OBJECT GROUP GENERATIONS DOWNLOADING GENERATION DATA VIEWING AND COMPARING CONTENT OF OBJECT GROUP GENERATIONS UNDERSTANDING THE OBJECT GROUP CHANGE TAB FILE COMPARISON RESULTS DIALOG UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG TOOLBAR UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG INFORMATION DISPLAY AREA AND TAB BROWSER DEPLOYING ROLLING BACK OBJECT GROUP GENERATIONS OBJECT GROUP NOTES OBJECT GROUP PERMISSIONS MODIFYING AN EXISTING USER/GROUP OBJECT GROUP PERMISSIONS ADDING AND REMOVING USERS AND GROUPS TO OBJECT GROUP PERMISSIONS CONFIGURING AND USING THE CIMTRAK NETWORK DEVICE AGENT MANAGING THE CIMTRAK NETWORK DEVICE AGENT FROM THE MANAGEMENT CONSOLE NETWORK DEVICE AGENT PROPERTIES CONFIGURING THE NETWORK DEVICE AGENT DESCRIPTION PROPERTIES CONFIGURING THE NETWORK DEVICE AGENT LICENSE PROPERTIES CIMCOR CimTrak Integrity & Compliance Suite

7 CONFIGURING THE NETWORK DEVICE AGENT LOG RETENTION PROPERTIES CONFIGURING THE NETWORK DEVICE AGENT DISCONNECT WARNING CONFIGURING THE NETWORK DEVICE AGENT HEARTBEAT AND STATISTIC GATHERING INTERVAL CONFIGURING THE NETWORK DEVICE AGENT THROTTLE NETWORK DEVICE AGENT MONITORING PARAMETERS ADDING NETWORK DEVICE AGENT MONITORING PARAMETERS EDITING NETWORK DEVICE AGENT MONITORING PARAMETERS DELETING NETWORK DEVICE AGENT MONITORING PARAMETERS WORKING WITH NETWORK DEVICE AGENT POLICIES CREATING AND EDITING OBJECT GROUP WATCH POLICIES OBJECT GROUP PROPERTIES OBJECT GROUP WATCH POLICY PRIVATE KEY WATCH PROPERTIES CORRECTIVE ACTION AUTHORITATIVE COPY FILE COMPARISON METHOD STORE CHANGES AUTO EXCLUDE OPTIONS EVENT DETECTION METHOD CONNECTION LOSS TUNING WATCH PROPERTIES EXCLUDING AND INCLUDING USING REGULAR EXPRESSIONS EXCLUDING FOLDERS USING REGULAR EXPRESSIONS EXCLUDING FILES USING REGULAR EXPRESSIONS INVERSE EXCLUDING OF FOLDERS USING REGULAR EXPRESSIONS INVERSE EXCLUDING OF FILES USING REGULAR EXPRESSIONS SAVING OBJECT GROUP WATCH POLICIES TO TEMPLATES CREATING OBJECT GROUP WATCH POLICIES USING TEMPLATES DELETING OBJECT GROUP WATCH POLICIES ENABLING AND DISABLING OBJECT GROUP MONITORING SYNCHRONIZING OBJECT GROUP DATA NETWORK DEVICE AGENT INFORMATION DISPLAY REVIEWING NETWORK DEVICE AGENT SETTINGS AUDITING NETWORK DEVICE AGENT EVENTS FILTERING AND SORTING THE NETWORK DEVICE AGENT EVENT LOG CREATING NETWORK DEVICE AGENT EVENT LOG FILTERS SORTING THE NETWORK DEVICE AGENT EVENT LOG REVIEWING NETWORK DEVICE AGENT STATISTICS NETWORK DEVICE AGENT NOTES NETWORK DEVICE AGENT OBJECT GROUP OVERVIEW NETWORK DEVICE AGENT PERMISSIONS MODIFYING AN EXISTING USER/GROUP NETWORK DEVICE AGENT PERMISSIONS ADDING AND REMOVING USERS AND GROUPS TO NETWORK DEVICE AGENT PERMISSIONS OBJECT GROUP INFORMATION DISPLAY AUDITING OBJECT GROUP EVENTS FILTERING AND SORTING THE OBJECT GROUP EVENT LOG CREATING OBJECT GROUP EVENT LOG FILTERS SORTING THE NETWORK DEVICE AGENT EVENT LOG REVIEWING OBJECT GROUP MONITORED CHANGES FILTERING AND SORTING THE OBJECT GROUP CHANGE LOG CREATING OBJECT GROUP CHANGE LOG FILTERS SORTING THE NETWORK DEVICE AGENT CHANGE LOG ACCESSING THE CHANGE LOG TAB CONTEXT MENU VIEWING CHANGE CONTENT VIEWING CHANGE CONTENT IN BINARY VIEWING CHANGE FORENSIC DATA DOWNLOADING A COPY OF CHANGE DATA COMPARING CHANGE DATA WITH THE AUTHORITATIVE COPY AT THE TIME OF THE CHANGE 357 User Guidance 7

8 UNDERSTANDING THE OBJECT GROUP CHANGE TAB FILE COMPARISON RESULTS DIALOG UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG TOOLBAR UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG INFORMATION DISPLAY AREA AND TAB BROWSER COMPARING CHANGE DATA WITH THE CURRENT AUTHORITATIVE COPY UNDERSTANDING THE OBJECT GROUP CHANGE TAB FILE COMPARISON RESULTS DIALOG UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG TOOLBAR UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG INFORMATION DISPLAY AREA AND TAB BROWSER REVIEWING OBJECT GROUP MONITORING INFORMATION REVIEWING OBJECT GROUP DATA PENDING REPAIR FILTERING AND SORTING THE PENDING REPAIR TAB CREATING PENDING REPAIR FILTERS SORTING THE PENDING REPAIR TAB CHANGES PENDING APPROVAL OBJECT GROUP GENERATIONS DOWNLOADING GENERATION DATA VIEWING AND COMPARING CONTENT OF OBJECT GROUP GENERATIONS UNDERSTANDING THE OBJECT GROUP CHANGE TAB FILE COMPARISON RESULTS DIALOG UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG TOOLBAR UNDERSTANDING THE FILE COMPARISON RESULTS DIALOG INFORMATION DISPLAY AREA AND TAB BROWSER DEPLOYING ROLLING BACK OBJECT GROUP GENERATIONS OBJECT GROUP NOTES OBJECT GROUP PERMISSIONS MODIFYING AN EXISTING USER/GROUP OBJECT GROUP PERMISSIONS ADDING AND REMOVING USERS AND GROUPS TO OBJECT GROUP PERMISSIONS CONFIGURING AND USING THE CIMTRAK COMMAND LINE UTILITY ACCESSING THE CIMTRAK COMMAND LINE UTILITY DISPLAYING THE CIMTRAK COMMAND LINE UTILITY PARAMETERS AND SYNTAX LOCKING AND UNLOCKING OBJECT GROUPS FROM THE COMMAND LINE DISPLAYING THE STATUS OF OBJECT GROUPS FROM THE COMMAND LINE DISPLAYING A LIST OF ALL OBJECT GROUPS FROM THE COMMAND LINE ENTERING AND EXITING DATABASE BACKUP MODE FROM THE COMMAND LINE DEFRAGMENTING THE CIMTRAK DATABASE FROM THE COMMAND LINE SYNCHRONIZING OBJECT GROUPS FROM THE COMMAND LINE RUNNING CIMTRAK REPORTS FROM THE COMMAND LINE CONFIGURING AND USING THE CIMTRAK FTP SERVER UTILITY ACCESSING AND USING THE CIMTRAK FTP SERVER UTILITY CONFIGURING AND USING THE CIMTRAK PING UTILITY ACCESSING AND USING THE CIMTRAK PING UTILITY CONFIGURING AND USING THE CIMTRAK PROXY UTILITY ACCESSING AND USING THE CIMTRAK PROXY UTILITY CIMTRAK INTEGRATED REPORTING ACCESSING CIMTRAK REPORTING NAVIGATING THE AVAILABLE REPORTS DIALOG AND EXECUTING REPORTS EXPLAINING AVAILABLE CIMTRAK REPORTS EXPLAINING CIMTRAK COMPLIANCE FLAGS WORKING WITH CIMTRAK REPORT PACKAGES UPLOADING ADDITIONAL CIMTRAK REPORTS CIMCOR CimTrak Integrity & Compliance Suite

9 APPENDIX A: DOCUMENT VERSIONING A.1 CIMTRAK USER GUIDANCE DOCUMENTATION HISTORY APPENDIX B: FILE SYSTEM AGENT OBJECT GROUP WORKSHEET B.1 OBJECT GROUP WORKSHEET APPENDIX C: NETWORK DEVICE AGENT OBJECT GROUP WORKSHEET C.1 OBJECT GROUP WORKSHEET APPENDIX D: MESSAGE LEVELS AND EXAMPLES D.1 OBJECT GROUP WORKSHEET APPENDIX E: SUPPORT CONTACT INFORMATION E.1 CIMTRAK TECHNICAL SUPPORT SERVICES E.2 SUPPORT VIA ELECTRONIC MAIL User Guidance 9

10 This page is intentionally left blank. 10 CIMCOR CimTrak Integrity & Compliance Suite

11 Index of Tables TABLE 1: TEMPLATE ENVIRONMENT VARIABLES TABLE 2: NETWORK DEVICE COMMUNICATION AND FILE TRANSFER PROTOCOLS TABLE 3: DOCUMENT VERSIONING TABLE 4: COMMON LOG MESSAGES Index of Images FIGURE 1: CIMTRAK ARCHITECTURE FIGURE 2: CIMTRAK MANAGEMENT CONSOLE ICON FIGURE 3: CIMTRAK MANAGEMENT CONSOLE SPLASH SCREEN FIGURE 4: CIMTRAK MANAGEMENT CONSOLE (NO CONNECTIONS) FIGURE 5: CIMTRAK MANAGEMENT CONSOLE "NEW" BUTTONS (OUTLINED IN RED) FIGURE 6: CONNECT TO CIMTRAK REPOSITORY DIALOG FIGURE 7: CIMTRAK MANAGEMENT CONSOLE "CONNECT" BUTTON (OUTLINED IN RED) FIGURE 8: CONNECT TO CIMTRAK REPOSITORY DIALOG FIGURE 9: AUTHENTICATED CIMTRAK MANAGEMENT CONSOLE FIGURE 10: CIMTRAK MANAGEMENT CONSOLE SECTIONS FIGURE 11: CIMTRAK SYSTEM MENU FIGURE 12: EXAMPLE MASTER REPOSITORY NODE FIGURE 13: CIMTRAK TOOLBAR FIGURE 14: OBJECT GROUP TREE SHOWING MASTER REPOSITORY AND ASSOCIATED CIMTRAK AGENTS FIGURE 15: CIMTRAK MANAGEMENT CONSOLE INFORMATION DISPLAY AREA (MASTER REPOSITORY LEVEL) FIGURE 16: CIMTRAK ABOUT DIALOG FIGURE 17: SYSTEM INFORMATION DIALOG FIGURE 18: CIMTRAK END USER LICENSE AGREEMENT FIGURE 19: CIMTRAK MASTER REPOSITORY PROPERTIES FIGURE 20: CIMTRAK MASTER REPOSITORY LOGGING DIALOG FIGURE 21: CIMTRAK MASTER REPOSITORY REPOSITORY SETTINGS DIALOG FIGURE 22: CIMTRAK PASSWORD POLICIES DIALOG FIGURE 23: CIMTRAK MASTER REPOSITORY COMMUNICATION SETTINGS FIGURE 24: CIMTRAK LOGON BANNER DIALOG FIGURE 25: CIMTRAK LOGON BANNER FIGURE 26: AD/LDAP PROPERTIES DIALOG FIGURE 27: AD/LDAP HOSTS FIGURE 28: CIMTRAK MANAGEMENT CONSOLE ALERT DIALOG FIGURE 29: SEARCH AD/LDAP SERVER DIALOG FIGURE 30: EXAMPLE AD/LDAP SERVER SEARCH INFORMATION FIGURE 31: ADD USERS DIALOG FIGURE 32: ALLOWING/DENYING AD/LDAP USERS FIGURE 33: CIMTRAK MANAGEMENT CONSOLE DIALOG FIGURE 34: NEW PASSWORD DIALOG FIGURE 35: MANAGEMENT CONSOLE DIALOG FIGURE 36: CHANGE PASSWORD DIALOG User Guidance 11

12 FIGURE 37: OPEN LANGUAGE DIALOG FIGURE 38: CIMTRAK MANAGEMENT CONSOLE INFORMATION DISPLAY AREA (MASTER REPOSITORY LEVEL) FIGURE 39: CIMTRAK LICENSING DIALOG FIGURE 40: ADD LICENSE DIALOG FIGURE 41: ACTIVATE SERIAL NUMBER DIALOG FIGURE 42: 67 FIGURE 43: ACTIVATION CODE RESPONSE FIGURE 44: SERIAL NUMBER REQUIRING ACTIVATION (DISPLAYED IN RED) FIGURE 45: MASTER REPOSITORY EVENT LOG FIGURE 46: FILTERS DIALOG SHOWING FILTER DATA FIGURE 47: OPERATOR SELECTION DROPDOWN FIGURE 48: GROUPED FILTERS FIGURE 49: FILTERED EVENT LOG DATA FIGURE 50: FILTERS DIALOG SHOWING SORT DATA FIGURE 51: FILTERED EVENT LOG DATA FIGURE 52: CIMTRAK NOTES TOOLBAR FIGURE 53: MASTER REPOSITORY NOTES DIALOG FIGURE 54: MASTER REPOSITORY LOGGED ON USERS TAB FIGURE 55: MASTER REPOSITORY LOCKED ACCOUNT TAB FIGURE 56: USERS DIALOG FIGURE 57: USERS DIALOG TOOLBAR FIGURE 58: USER GROUP TREE SHOWING GROUPS AND CHILD USERS FIGURE 59: EDIT USERS DIALOG FIGURE 60: RANDOMLY GENERATED PASSWORD FIGURE 61: EXAMPLE AD/LDAP SERVER SEARCH INFORMATION FIGURE 62: ADD USERS DIALOG FIGURE 63: EDIT GROUP DIALOG FIGURE 64: EDIT USERS DIALOG FIGURE 65: EDIT GROUP DIALOG FIGURE 66: USER/GROUP DELETION CONFIRMATION DIALOG FIGURE 67: MASTER REPOSITORY LOCKED ACCOUNTS TAB FIGURE 68: LOCKED USER ACCOUNT (HIGHLIGHTED IN RED) FIGURE 69: DOCUMENT CONTROL PROPERTIES DIALOG FIGURE 70: DOCUMENT CONTROL OBJECT GROUP FIGURE 71: SET DOCUMENT CONTROL PRIVATE KEY DIALOG FIGURE 72: DOCUMENT CONTROL PROPERTIES DIALOG FIGURE 73: DOCUMENT CONTROL DIRECTORY/FILE DIALOG FIGURE 74: DOCUMENT CONTROL ADD FILES DIALOG FIGURE 75: ENTER PRIVATE KEY DIALOG FIGURE 76: DOCUMENT CONTROL INFORMATION DISPLAY AREA SHOWING ADDED FILES FIGURE 77: ENTER PRIVATE KEY DIALOG FIGURE 78: FILE VIEW DIALOG (NON-BINARY) FIGURE 79: FILE VIEW DIALOG (BINARY) FIGURE 80: ENTER PRIVATE KEY DIALOG FIGURE 81: ENTER PRIVATE KEY DIALOG FIGURE 82: FILE TO COMPARE AGAINST DIALOG FIGURE 83: ENTER PRIVATE KEY DIALOG FIGURE 84: FILE COMPARISON RESULTS DIALOG FIGURE 85: FILE COMPARISON RESULTS DIALOG TOOLBAR FIGURE 86: FILE COMPARISON RESULTS DIALOG CHANGES TAB FIGURE 87: ENTER PRIVATE KEY DIALOG FIGURE 88: EDIT FILE DIALOG FIGURE 89: ENTER PRIVATE KEY DIALOG FIGURE 90: DOCUMENT CONTROL INFORMATION DISPLAY AREA SHOWING CHANGED FILE FIGURE 91: BROWSE FOR FOLDER DIALOG CIMCOR CimTrak Integrity & Compliance Suite

13 FIGURE 92: ENTER PRIVATE KEY DIALOG FIGURE 93: DOCUMENT CONTROL FILE CHECKED OUT FIGURE 94: ENTER PRIVATE KEY DIALOG FIGURE 95: DOCUMENT CONTROL INFORMATION DISPLAY AREA SHOWING CHANGED FILE FIGURE 96: DOCUMENT CONTROL EVENT LOG FIGURE 97: FILTERS DIALOG SHOWING FILTER DATA FIGURE 98: OPERATOR SELECTION DROPDOWN FIGURE 99: GROUPED FILTERS FIGURE 100: FILTERED EVENT LOG DATA FIGURE 101: FILTERS DIALOG SHOWING SORT DATA FIGURE 102: FILTERED EVENT LOG DATA FIGURE 103: DOCUMENT CONTROL GENERATION TAB FIGURE 104: ENTER PRIVATE KEY DIALOG FIGURE 105: FILE VIEW DIALOG (NON-BINARY) FIGURE 106: FILE VIEW DIALOG (BINARY) FIGURE 107: ENTER PRIVATE KEY DIALOG FIGURE 108: FILE TO COMPARE AGAINST DIALOG FIGURE 109: ENTER PRIVATE KEY DIALOG FIGURE 110: FILE COMPARISON RESULTS DIALOG FIGURE 111: CONFIRM DEPLOY DIALOG FIGURE 112: NOTES DIALOG FIGURE 113: CIMTRAK NOTES TOOLBAR FIGURE 114: DOCUMENT CONTROL NOTES DIALOG FIGURE 115: DOCUMENT CONTROL SECURITY PERMISSIONS DIALOG FIGURE 116: ADD USERS DIALOG FIGURE 117: EXAMPLE AD/LDAP SERVER SEARCH INFORMATION FIGURE 118: ADD USERS DIALOG FIGURE 119: DOCUMENT CONTROL SECURITY PERMISSIONS DIALOG FIGURE 120: ADD USERS DIALOG FIGURE 121: EXAMPLE AD/LDAP SERVER SEARCH INFORMATION FIGURE 122: ADD USERS DIALOG FIGURE 123: AREA DIALOG FIGURE 124: OBJECT GROUP TREE SHOWING AREA FIGURE 125: DOCUMENT CONTROL SHOWING MULTIPLE AREAS WITH CHILDREN FIGURE 126: CONFIRM DELETE DIALOG FIGURE 127: AREA DIALOG FIGURE 128: AREA SECURITY PERMISSIONS DIALOG FIGURE 129: ADD USERS DIALOG FIGURE 130: EXAMPLE AD/LDAP SERVER SEARCH INFORMATION FIGURE 131: ADD USERS DIALOG FIGURE 132: AREA EVENT LOG FIGURE 133: FILTERS DIALOG SHOWING FILTER DATA FIGURE 134: OPERATOR SELECTION DROPDOWN FIGURE 135: GROUPED FILTERS FIGURE 136: FILTERED EVENT LOG DATA FIGURE 137: FILTERS DIALOG SHOWING SORT DATA FIGURE 138: FILTERED EVENT LOG DATA FIGURE 139: CIMTRAK NOTES TOOLBAR FIGURE 140: AREA NOTES DIALOG FIGURE 141: AREA OVERVIEW FIGURE 142: TEMPLATE MAINTENANCE FIGURE 143: TEMPLATE OPEN DIALOG FIGURE 144: IMPORT TEMPLATE(S) DIALOG FIGURE 145: TEMPLATE MAINTENANCE DIALOG FIGURE 146: BROWSE FOR FOLDER DIALOG FIGURE 147: CIMTRAK FILE SYSTEM AGENT IN OBJECT GROUP TREE User Guidance 13

14 FIGURE 148: CIMTRAK AGENT CONFIGURATION FIGURE 149: FILE SYSTEM AGENT DESCRIPTION FIGURE 150: CIMTRAK AGENT LICENSE SETTINGS FIGURE 151: NUMBER OF EVENTS TO KEEP SETTINGS FIGURE 152: CIMTRAK AGENT DB OPTIONS SETTINGS FIGURE 153: CIMTRAK AGENT POLL INTERVALS SETTINGS (DEFAULTS) FIGURE 154: FILE SYSTEM AGENT THROTTLING SETTINGS FIGURE 155: AGENT MONITORING PARAMETERS FIGURE 156: AGENT MONITOR PARAMETERS DIALOG FIGURE 157: CIMTRAK EVENT LOG PERFORMANCE ALERT (MEMORY UTILIZATION) FIGURE 158: AGENT MONITOR PARAMETERS DIALOG (DEVICE SELECTED) FIGURE 159: CIMTRAK EVENT LOG PERFORMANCE ALERT (MEMORY UTILIZATION) FIGURE 160: CIMTRAK MANAGEMENT CONSOLE'S OBJECT GROUP TREE SHOWING OBJECT GROUPS FIGURE 161: OBJECT GROUP PROPERTIES DIALOG FIGURE 162: FILE SYSTEM AGENT OBJECT INFORMATION FIGURE 163: FILE SYSTEM AGENT OBJECT GROUP PRIVATE KEY BUTTON FIGURE 164: FILE SYSTEM AGENT MONITORING INFORMATION FIGURE 165: MICROSOFT WINDOWS OPERATING SYSTEM TREE FIGURE 166: WATCH NOTIFICATIONS FIGURE 167: SET OBJECT GROUP PRIVATE KEY DIALOG FIGURE 168: WATCH PROPERTIES DIALOG FIGURE 169: WATCH PROPERTIES SECTION SHOWING MONITORED DIRECTORY FIGURE 170: CORRECTIVE ACTION PROPERTIES FIGURE 171: CORRECTIVE ACTION ADVANCED SETTINGS FIGURE 172: OPEN FILE DIALOG FIGURE 173: CORRECTIVE ACTION WAIT & TIMEOUT SETTINGS FIGURE 174: CORRECTIVE ACTION PARAMETERS SETTINGS FIGURE 175: AUTHORITATIVE COPY PARAMETER SETTINGS FIGURE 176: FILE COMPARISON METHOD PARAMETER SETTINGS FIGURE 177: AUTO EXCLUDE PARAMETER SETTINGS FIGURE 178: OPTIONS PARAMETER SETTINGS FIGURE 179: EVENT DETECTION METHOD PARAMETER SETTINGS FIGURE 180: CONNECTION LOSS PARAMETER SETTINGS FIGURE 181: WATCH PROPERTIES SECTION SHOWING MONITORED DATA FIGURE 182: ADD REGULAR EXPRESSION EXCLUDE DIALOG FIGURE 183: REGULAR EXPRESSION FOLDER EXCLUDE (BLUE TEXT) FIGURE 184: REGULAR EXPRESSION FILE EXCLUDE (BLUE TEXT) FIGURE 185: REGULAR EXPRESSION FOLDER EXCLUDE (BLUE TEXT) FIGURE 186: REGULAR EXPRESSION FILE EXCLUDE (BLUE TEXT) FIGURE 187: SAVE TO TEMPLATE DIALOG FIGURE 188: SELECT TEMPLATE DIALOG FIGURE 189: CONFIRM DELETE DIALOG FIGURE 190: OBJECT GROUP LOCK PROCESS (EVENT LOG) FIGURE 191: OBJECT GROUP LOCK PROCESS STOPPED (EVENT LOG) FIGURE 192: OBJECT GROUP UNLOCK PROCESS (EVENT LOG) FIGURE 193: OBJECT GROUP SYNCHRONIZATION PROCESS (EVENT LOG) FIGURE 194: FILE SYSTEM AGENT INFORMATION DISPLAY AREA (AGENT SETTINGS TAB SELECTED)..207 FIGURE 195: FILE SYSTEM AGENT INFORMATION DISPLAY AREA (AGENT SETTINGS TAB SELECTED) FIGURE 196: FILE SYSTEM AGENT EVENT LOG FIGURE 197: FILTERS DIALOG SHOWING FILTER DATA FIGURE 198: OPERATOR SELECTION DROPDOWN FIGURE 199: GROUPED FILTERS FIGURE 200: FILTERED EVENT LOG DATA FIGURE 201: FILTERS DIALOG SHOWING SORT DATA FIGURE 202: FILTERED EVENT LOG DATA CIMCOR CimTrak Integrity & Compliance Suite

15 FIGURE 203: CIMTRAK FILE SYSTEM AGENT STATS TAB FIGURE 204: GRAPH QUANTITY BUTTON FIGURE 205: CIMTRAK NOTES TOOLBAR FIGURE 206: FILE SYSTEM AGENT NOTES DIALOG FIGURE 207: FILE SYSTEM AGENT OVERVIEW TAB FIGURE 208: FILE SYSTEM AGENT SECURITY PERMISSIONS DIALOG FIGURE 209: ADD USERS DIALOG FIGURE 210: EXAMPLE AD/LDAP SERVER SEARCH INFORMATION FIGURE 211: ADD USERS DIALOG FIGURE 212: OBJECT GROUP INFORMATION DISPLAY AREA (EVENT LOG TAB SELECTED) FIGURE 213: FILE SYSTEM AGENT EVENT LOG FIGURE 214: FILTERS DIALOG SHOWING FILTER DATA FIGURE 215: OPERATOR SELECTION DROPDOWN FIGURE 216: GROUPED FILTERS FIGURE 217: FILTERED EVENT LOG DATA FIGURE 218: FILTERS DIALOG SHOWING SORT DATA FIGURE 219: FILTERED EVENT LOG DATA FIGURE 220: OBJECT GROUP CHANGE LOG FIGURE 221: FILTERS DIALOG SHOWING FILTER DATA FIGURE 222: OPERATOR SELECTION DROPDOWN FIGURE 223: GROUPED FILTERS FIGURE 224: FILTERED EVENT LOG DATA FIGURE 225: FILTERS DIALOG SHOWING SORT DATA FIGURE 226: FILTERED EVENT LOG DATA FIGURE 227: FILE VIEW DIALOG FIGURE 228: ENTER PRIVATE KEY DIALOG FIGURE 229: FILE VIEW DIALOG (BINARY) FIGURE 230: ENTER PRIVATE KEY DIALOG FIGURE 231: FORENSIC DATA DIALOG FIGURE 232: SAVE AS DIALOG FIGURE 233: ENTER PRIVATE KEY DIALOG FIGURE 234: FILE COMPARISON RESULTS FIGURE 235: ENTER PRIVATE KEY DIALOG FIGURE 236: FILE COMPARISON RESULTS DIALOG TOOLBAR FIGURE 237: FILE COMPARISON RESULTS DIALOG CHANGES TAB FIGURE 238: FILE COMPARISON RESULTS FIGURE 239: ENTER PRIVATE KEY DIALOG FIGURE 240: FILE COMPARISON RESULTS DIALOG TOOLBAR FIGURE 241: FILE COMPARISON RESULTS DIALOG CHANGES TAB FIGURE 242: OBJECT GROUP MONITOR INFO TAB FIGURE 243: MONITOR INFO STATS DIALOG FIGURE 244: MONITOR INFO STATUS WINDOW TAB FIGURE 245: MONITOR INFO DETAILS TAB FIGURE 246: PENDING REPAIR TAB SHOWING 3 PENDING REPAIRS FIGURE 247: FILTERS DIALOG SHOWING FILTER DATA FIGURE 248: OPERATOR SELECTION DROPDOWN FIGURE 249: GROUPED FILTERS FIGURE 250: FILTERED PENDING REPAIR DATA FIGURE 251: FILTERS DIALOG SHOWING SORT DATA FIGURE 252: FILTERED PENDING REPAIR DATA FIGURE 253: CHANGES PENDING APPROVAL DIALOG FIGURE 254: OBJECT GROUP GENERATION TAB FIGURE 255: ENTER PRIVATE KEY DIALOG FIGURE 256: FILE VIEW DIALOG (NON-BINARY) FIGURE 257: FILE VIEW DIALOG (BINARY) FIGURE 258: ENTER PRIVATE KEY DIALOG User Guidance 15

16 FIGURE 259: FILE TO COMPARE AGAINST DIALOG FIGURE 260: ENTER PRIVATE KEY DIALOG FIGURE 261: FILE COMPARISON RESULTS DIALOG FIGURE 262: FILE COMPARISON RESULTS DIALOG TOOLBAR FIGURE 263: FILE COMPARISON RESULTS DIALOG CHANGES TAB FIGURE 264: CONFIRM DEPLOY DIALOG FIGURE 265: NOTES DIALOG FIGURE 266: CIMTRAK NOTES TOOLBAR FIGURE 267: OBJECT GROUP NOTES DIALOG FIGURE 268: OBJECT GROUP SECURITY PERMISSIONS DIALOG FIGURE 269: ADD USERS DIALOG FIGURE 270: EXAMPLE AD/LDAP SERVER SEARCH INFORMATION FIGURE 271: ADD USERS DIALOG FIGURE 272: CIMTRAK NETWORK DEVICE AGENT IN OBJECT GROUP TREE FIGURE 273: CIMTRAK AGENT CONFIGURATION FIGURE 274: NETWORK DEVICE AGENT DESCRIPTION FIGURE 275: CIMTRAK AGENT LICENSE SETTINGS FIGURE 276: NUMBER OF EVENTS TO KEEP SETTINGS FIGURE 277: CIMTRAK AGENT DB OPTIONS SETTINGS FIGURE 278: CIMTRAK AGENT POLL INTERVALS SETTINGS (DEFAULTS) FIGURE 279: NETWORK DEVICE AGENT THROTTLING SETTINGS FIGURE 280: AGENT MONITORING PARAMETERS FIGURE 281: AGENT MONITOR PARAMETERS DIALOG FIGURE 282: CIMTRAK EVENT LOG PERFORMANCE ALERT (MEMORY UTILIZATION) FIGURE 283: AGENT MONITOR PARAMETERS DIALOG (DEVICE SELECTED) FIGURE 284: CIMTRAK EVENT LOG PERFORMANCE ALERT (MEMORY UTILIZATION) FIGURE 285: CIMTRAK MANAGEMENT CONSOLE'S OBJECT GROUP TREE SHOWING OBJECT GROUPS FIGURE 286: NEW NETWORK DEVICE DIALOG FIGURE 287: OBJECT GROUP PROPERTIES DIALOG FIGURE 288: NETWORK DEVICE AGENT OBJECT INFORMATION FIGURE 289: NETWORK DEVICE AGENT OBJECT GROUP PRIVATE KEY BUTTON FIGURE 290: NETWORK DEVICE AGENT MONITORING INFORMATION FIGURE 291: CISCO IOS OPERATING SYSTEM TREE FIGURE 292: WATCH NOTIFICATIONS FIGURE 293: SET OBJECT GROUP PRIVATE KEY DIALOG FIGURE 294: WATCH PROPERTIES DIALOG FIGURE 295: WATCH PROPERTIES SECTION SHOWING MONITORED DIRECTORY FIGURE 296: CORRECTIVE ACTION PROPERTIES FIGURE 297: CORRECTIVE ACTION ADVANCED SETTINGS FIGURE 298: OPEN FILE DIALOG FIGURE 299: CORRECTIVE ACTION WAIT & TIMEOUT SETTINGS FIGURE 300: CORRECTIVE ACTION PARAMETERS SETTINGS FIGURE 301: AUTHORITATIVE COPY PARAMETER SETTINGS FIGURE 302: FILE COMPARISON METHOD PARAMETER SETTINGS FIGURE 303: AUTO EXCLUDE PARAMETER SETTINGS FIGURE 304: OPTIONS PARAMETER SETTINGS FIGURE 305: EVENT DETECTION METHOD PARAMETER SETTINGS FIGURE 306: CONNECTION LOSS PARAMETER SETTINGS FIGURE 307: WATCH PROPERTIES SECTION SHOWING MONITORED DATA FIGURE 308: ADD REGULAR EXPRESSION EXCLUDE DIALOG FIGURE 309: REGULAR EXPRESSION FOLDER EXCLUDE (BLUE TEXT) FIGURE 310: REGULAR EXPRESSION FILE EXCLUDE (BLUE TEXT) FIGURE 311: REGULAR EXPRESSION FOLDER EXCLUDE (BLUE TEXT) FIGURE 312: REGULAR EXPRESSION FILE EXCLUDE (BLUE TEXT) FIGURE 313: SAVE TO TEMPLATE DIALOG CIMCOR CimTrak Integrity & Compliance Suite

17 FIGURE 314: SELECT TEMPLATE DIALOG FIGURE 315: CONFIRM DELETE DIALOG FIGURE 316: OBJECT GROUP LOCK PROCESS (EVENT LOG) FIGURE 317: OBJECT GROUP LOCK PROCESS STOPPED (EVENT LOG) FIGURE 318: OBJECT GROUP UNLOCK PROCESS (EVENT LOG) FIGURE 319: OBJECT GROUP SYNCHRONIZATION PROCESS (EVENT LOG) FIGURE 320: NETWORK DEVICE AGENT INFORMATION DISPLAY AREA (AGENT SETTINGS TAB SELECTED) FIGURE 321: NETWORK DEVICE AGENT INFORMATION DISPLAY AREA (AGENT SETTINGS TAB SELECTED) FIGURE 322: NETWORK DEVICE AGENT EVENT LOG FIGURE 323: FILTERS DIALOG SHOWING FILTER DATA FIGURE 324: OPERATOR SELECTION DROPDOWN FIGURE 325: GROUPED FILTERS FIGURE 326: FILTERED EVENT LOG DATA FIGURE 327: FILTERS DIALOG SHOWING SORT DATA FIGURE 328: FILTERED EVENT LOG DATA FIGURE 329: CIMTRAK NETWORK DEVICE AGENT STATS TAB FIGURE 330: GRAPH QUANTITY BUTTON FIGURE 331: CIMTRAK NOTES TOOLBAR FIGURE 332: NETWORK DEVICE AGENT NOTES DIALOG FIGURE 333: NETWORK DEVICE AGENT OVERVIEW TAB FIGURE 334: NETWORK DEVICE AGENT SECURITY PERMISSIONS DIALOG FIGURE 335: ADD USERS DIALOG FIGURE 336: EXAMPLE AD/LDAP SERVER SEARCH INFORMATION FIGURE 337: ADD USERS DIALOG FIGURE 338: OBJECT GROUP INFORMATION DISPLAY AREA (EVENT LOG TAB SELECTED) FIGURE 339: NETWORK DEVICE AGENT EVENT LOG FIGURE 340: FILTERS DIALOG SHOWING FILTER DATA FIGURE 341: OPERATOR SELECTION DROPDOWN FIGURE 342: GROUPED FILTERS FIGURE 343: FILTERED EVENT LOG DATA FIGURE 344: FILTERS DIALOG SHOWING SORT DATA FIGURE 345: FILTERED EVENT LOG DATA FIGURE 346: OBJECT GROUP CHANGE LOG FIGURE 347: FILTERS DIALOG SHOWING FILTER DATA FIGURE 348: OPERATOR SELECTION DROPDOWN FIGURE 349: GROUPED FILTERS FIGURE 350: FILTERED EVENT LOG DATA FIGURE 351: FILTERS DIALOG SHOWING SORT DATA FIGURE 352: FILTERED EVENT LOG DATA FIGURE 353: FILE VIEW DIALOG FIGURE 354: ENTER PRIVATE KEY DIALOG FIGURE 355: FILE VIEW DIALOG (BINARY) FIGURE 356: ENTER PRIVATE KEY DIALOG FIGURE 357: SAVE AS DIALOG FIGURE 358: ENTER PRIVATE KEY DIALOG FIGURE 359: FILE COMPARISON RESULTS FIGURE 360: ENTER PRIVATE KEY DIALOG FIGURE 361: FILE COMPARISON RESULTS DIALOG TOOLBAR FIGURE 362: FILE COMPARISON RESULTS DIALOG CHANGES TAB FIGURE 363: FILE COMPARISON RESULTS FIGURE 364: ENTER PRIVATE KEY DIALOG FIGURE 365: FILE COMPARISON RESULTS DIALOG TOOLBAR FIGURE 366: FILE COMPARISON RESULTS DIALOG CHANGES TAB FIGURE 367: OBJECT GROUP MONITOR INFO TAB User Guidance 17

18 FIGURE 368: MONITOR INFO STATS DIALOG FIGURE 369: MONITOR INFO STATUS WINDOW TAB FIGURE 370: MONITOR INFO DETAILS TAB FIGURE 371: PENDING REPAIR TAB SHOWING 3 PENDING REPAIRS FIGURE 372: FILTERS DIALOG SHOWING FILTER DATA FIGURE 373: OPERATOR SELECTION DROPDOWN FIGURE 374: GROUPED FILTERS FIGURE 375: FILTERED PENDING REPAIR DATA FIGURE 376: FILTERS DIALOG SHOWING SORT DATA FIGURE 377: FILTERED PENDING REPAIR DATA FIGURE 378: CHANGES PENDING APPROVAL DIALOG FIGURE 379: OBJECT GROUP GENERATION TAB FIGURE 380: ENTER PRIVATE KEY DIALOG FIGURE 381: FILE VIEW DIALOG (NON-BINARY) FIGURE 382: FILE VIEW DIALOG (BINARY) FIGURE 383: ENTER PRIVATE KEY DIALOG FIGURE 384: FILE TO COMPARE AGAINST DIALOG FIGURE 385: ENTER PRIVATE KEY DIALOG FIGURE 386: FILE COMPARISON RESULTS DIALOG FIGURE 387: FILE COMPARISON RESULTS DIALOG TOOLBAR FIGURE 388: FILE COMPARISON RESULTS DIALOG CHANGES TAB FIGURE 389: CONFIRM DEPLOY DIALOG FIGURE 390: NOTES DIALOG FIGURE 391: CIMTRAK NOTES TOOLBAR FIGURE 392: OBJECT GROUP NOTES DIALOG FIGURE 393: OBJECT GROUP SECURITY PERMISSIONS DIALOG FIGURE 394: ADD USERS DIALOG FIGURE 395: EXAMPLE AD/LDAP SERVER SEARCH INFORMATION FIGURE 396: ADD USERS DIALOG FIGURE 397: CIMTRAK COMMAND LINE UTILITY COMMANDS AND SYNTAX FIGURE 398: LOCKING AN OBJECT GROUP FROM THE COMMAND LINE FIGURE 399: UNLOCKING AN OBJECT GROUP FROM THE COMMAND LINE FIGURE 400: SHOWING THE STATUS OF AN OBJECT GROUP FROM THE COMMAND LINE FIGURE 401: SHOWING THE LIST OF OBJECT GROUPS FROM THE COMMAND LINE FIGURE 402: DEFRAGMENTING THE CIMTRAK DATABASE FIGURE 403: SYNCING AN OBJECT GROUP FROM THE COMMAND LINE FIGURE 404: AVAILABLE REPORTS (VARIANCE BY QUANTITY SELECTED) FIGURE 405: VARIANCE BY QUANTITY PARAMETERS FIGURE 406: EXAMPLE FTP CONNECTION FIGURE 407: CIMTRAK PING PARAMETERS AND SYNTAX FIGURE 408: EXAMPLE CIMTRAK PING STANDARD OUTPUT FIGURE 409: CIMTRAK PROXY PARAMETERS AND SYNTAX FIGURE 410: CIMTRAK PROXY TOGGLE PARAMETERS FIGURE 411: EXAMPLE PROXY CONSOLE OUTPUT FIGURE 412: AVAILABLE REPORTS DIALOG (MASTER REPOSITORY LEVEL) FIGURE 413: REPORT PARAMETERS DIALOG FIGURE 414: SAMPLE CIMTRAK REPORT (PAGE 1 OF 2) FIGURE 415: SAMPLE CIMTRAK REPORT (PAGE 2 OF 2) FIGURE 416: FILE REPORT TOOLBAR FIGURE 417: COMPLIANCES DIALOG FIGURE 418: REPORT PACKAGES DIALOG CIMCOR CimTrak Integrity & Compliance Suite

19 1. Introduction 1.1. DOCUMENTATION PURPOSE AND CONVENTIONS The purpose of this documentation is to provide user guidance to users and administrators of the CimTrak Integrity & Compliance Suite. Conformance with this guidance documentation is intended to result in deployment and configuration of the CimTrak product consistent with CIMCOR recommended best practices. This guidance document is comprised of sections detailing the configuration options associated with each CimTrak component. Additional components, not described in this documentation, may also exist in your region. Contact an authorized CimTrak sales representative for more information. Occasionally additional notes are relevant to the component being described. These notes are indicated by the information symbol CIMCOR CIMTRAK INTEGRITY & COMPLIANCE SUITE INTRODUCTION The CIMCOR CimTrak Integrity & Compliance Suite application provides a flexible file-based security solution that allows Administrators the capability to protect selected files, operating system components, and network device configurations against unauthorized changes from a centralized location within the network. CimTrak immediately identifies the change, determines if it is authorized and then institutes corrective action based on the application configuration. Since CimTrak maintains a master set of protected files, unauthorized changes can immediately be reversed to mitigate malicious activity or human error. CimTrak is comprised of a multi-component architecture. The primary CimTrak components consist of the Master Repository, Management Console, and File System Agent. Additional (optional) CimTrak components may be attached to the primary configuration to enhance file and configuration monitoring and remediation. The CimTrak Integrity Suite presents a multifaceted approach to protecting key information system resources and provides comprehensive change control tracking. The application consists of three primary components: CimTrak Master Repository CimTrak Management Console CimTrak File System Agent User Guidance 19

20 Additionally the CimTrak Integrity Suite has a combination of multiple (optional) components including: CimTrak Network Device Agent CimTrak Tools These required and optional components will be discussed in subsequent sections of the documentation. Additional CimTrak optional components may exist based on your region. Please contact an authorized CimTrak sales representative for details CIMTRAK MASTER REPOSITORY The CimTrak Master Repository component maintains a centralized store of protected files and change history within a centralized server. This store provides an isolated, compressed, and encrypted copy of critical files that allows for restoration in the event of unauthorized change and provides a basis for identifying changes made to protected files and configurations within the network. Additionally, the application supports a rollback capability which allows previous versions of a protected file or configuration to be restored at a later date CIMTRAK MANAGEMENT CONSOLE The CimTrak Integrity Suite includes a Management Console which features a Graphic User Interface (GUI) that allows Administrators the capability to manage and configure the application from a separate Administrator management workstation within the network. The Management Console supports the selection of files and configurations on attached components to lock and configure an action to take in the event a change is detected. The Management Console provides access to a series of reports that detail changes made based on a series of saved baselines stored in the Master Repository. This capability can be used to superimpose changes over the stored baselines to immediately identify what aspects of the locked file were changed. Use of the Management Console is not intended for mobile users CIMTRAK FILE SYSTEM AGENT The CimTrak File System Agent is installed on protected resources within the Operational Environment. The File System Agent provides real-time or poll based monitoring of protected files and configurations and identifies changes made to protected files. When a change is detected, the File System Agent communicates with the CimTrak Master Repository to report change status and (when configured) transfer the master file (Authoritative Copy) from the Master Repository to the File System Agent server to overwrite unauthorized 20 CIMCOR CimTrak Integrity & Compliance Suite

21 changes. The File System Agent utilizes CimTrak configuration data to determine if the change is allowed based on Administrator policy settings for the subject file or configuration. The File System Agent can then institute one of the following actions on the change: Allow the change and log the event, update the master file baseline stored within the Master Repository, disallow the change and immediately overwrite the change with the master file copy from the Master Repository, or Prompt the authorized user to either allow or disallow the file change attempt. Additionally the CimTrak File System Agent can be configured to allow a combination of remediation settings. In addition to file change detection and remediation, the File System Agent provides configuration monitoring remediation. 1 Windows file system configuration monitoring includes: Read Access monitoring Monitoring and remediation of the Windows Registry Monitoring of Windows Local User accounts Monitoring of Windows Local Groups Monitoring of Windows Local Security Policy settings Monitoring of Windows Local Services Monitoring of Windows Local Device Drivers Monitoring of Windows Local Installed Software Monitoring of Windows Network Share Settings 1.6. CIMTRAK NETWORK DEVICE AGENT The CimTrak Network Device Agent component is installed on device monitoring resources within the Operational Environment. The CimTrak Network Device Agent provides real-time (SNMPv3) or poll based (SSHv1, SSHv2, Telnet) monitoring of protected files and identifies changes made to protected files. When a change is detected, the CimTrak File System Agent communicates with the CimTrak Master Repository to report change status and/or transfer the master file (authoritative copy) from the Master Repository to the Agent Network Host server to overwrite unauthorized changes. The CimTrak Network Device Agent utilizes CimTrak configuration data to determine if the change is allowed based on Administrator policy settings for the subject file. The Agent can then institute one of the following actions on the change: Allow the change and log the event, Update the master file baseline stored within the Master Repository, Disallow the change and immediately overwrite the change with the master file copy from the Master Repository, or Prompt the authorized user to either allow or disallow the file change attempt. 1 Monitoring of the Windows registry allows for remediation when changes are detected. All other configuration monitoring features only provide monitoring capabilities. User Guidance 21

CimTrak Integrity & Compliance Suite 2.0.6.19

CimTrak Integrity & Compliance Suite 2.0.6.19 CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console App Server File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Installing Sage ACT! 2013 for New Users

Installing Sage ACT! 2013 for New Users Installing Sage ACT! 2013 for New Users Installing Sage ACT! 2013 for New Users Copyright 2012 Sage Software, Inc. All Rights Reserved. Sage, the Sage logos, ACT!, and the Sage product and service names

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

M86 Authenticator USER GUIDE. Software Version: 2.0.10 Document Version: 04.26.11

M86 Authenticator USER GUIDE. Software Version: 2.0.10 Document Version: 04.26.11 M86 Authenticator USER GUIDE Software Version: 2.0.10 Document Version: 04.26.11 M86 AUTHENTICATOR USER GUIDE 2011 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version 1.01,

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Dell Active Administrator 7.5. User Guide

Dell Active Administrator 7.5. User Guide Dell Active Administrator 7.5 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

v6.1 Websense Enterprise Reporting Administrator s Guide

v6.1 Websense Enterprise Reporting Administrator s Guide v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

Remote Filtering Software

Remote Filtering Software Remote Filtering Software Websense Web Security Solutions v7.7-7.8 1996 2013, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2013 The products and/or

More information

Installing Act! for New Users

Installing Act! for New Users Installing Act! for New Users Installing Act! for New Users 2014 Swiftpage ACT! LLC. All Rights Reserved. Swiftpage, Act!, and the Swiftpage product and service names mentioned herein are registered trademarks

More information

AD Self-Service Suite for Active Directory

AD Self-Service Suite for Active Directory The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2010 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

GFI Product Manual. ReportPack Manual

GFI Product Manual. ReportPack Manual GFI Product Manual ReportPack Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

SNMP Proxy Agent 2014

SNMP Proxy Agent 2014 MG-SOFT Corporation SNMP Proxy Agent 2014 USER MANUAL (Document Version: 3.2) Document published on 29-September-2014 Copyright 2007-2014 MG-SOFT Corporation Introduction In order to improve the design

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Server Manager Help 10/6/2014 1

Server Manager Help 10/6/2014 1 Server Manager Help 10/6/2014 1 Table of Contents Server Manager Help... 1 Getting Started... 7 About SpectorSoft Server Manager... 8 Client Server Architecture... 9 System Requirements... 10 Screencasts...

More information

Utilities. 2003... ComCash

Utilities. 2003... ComCash Utilities ComCash Utilities All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or

More information

NetBackup Backup, Archive, and Restore Getting Started Guide

NetBackup Backup, Archive, and Restore Getting Started Guide NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.

More information

WatchDox for Windows User Guide. Version 3.9.0

WatchDox for Windows User Guide. Version 3.9.0 Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or

More information

Netwrix Auditor for Windows Server

Netwrix Auditor for Windows Server Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

Integrate Check Point Firewall

Integrate Check Point Firewall Integrate Check Point Firewall EventTracker Enterprise Publication Date: Oct.26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

WINDOWS 7 & HOMEGROUP

WINDOWS 7 & HOMEGROUP WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Universal Management Service 2015

Universal Management Service 2015 Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

NetBak Replicator 4.0 User Manual Version 1.0

NetBak Replicator 4.0 User Manual Version 1.0 NetBak Replicator 4.0 User Manual Version 1.0 Copyright 2012. QNAP Systems, Inc. All Rights Reserved. 1 NetBak Replicator 1. Notice... 3 2. Install NetBak Replicator Software... 4 2.1 System Requirements...

More information

Endpoint Security Console. Version 3.0 User Guide

Endpoint Security Console. Version 3.0 User Guide Version 3.0 Table of Contents Summary... 2 System Requirements... 3 Installation... 4 Configuring Endpoint Security Console as a Networked Service...5 Adding Computers, Groups, and Users...7 Using Endpoint

More information

Moxa Device Manager 2.0 User s Guide

Moxa Device Manager 2.0 User s Guide First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Secure Web Gateway Management Console Reference Guide Version 11.0

Secure Web Gateway Management Console Reference Guide Version 11.0 Secure Web Gateway Management Console Reference Guide Version 11.0 Legal Notice Copyright 2012 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution,

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

Disaster Recovery. Websense Web Security Web Security Gateway. v7.6

Disaster Recovery. Websense Web Security Web Security Gateway. v7.6 Disaster Recovery Websense Web Security Web Security Gateway v7.6 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2011 The products and/or methods

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

MULTIFUNCTIONAL DIGITAL SYSTEMS. Operator s Manual for AddressBook Viewer

MULTIFUNCTIONAL DIGITAL SYSTEMS. Operator s Manual for AddressBook Viewer MULTIFUNCTIONAL DIGITAL SYSTEMS Operator s Manual for AddressBook Viewer 2008, 2009 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in any form without

More information

Printer Driver Installation Manual

Printer Driver Installation Manual Printer Driver Installation Manual Copyrights Any unauthorized reproduction of the contents of this document, in part or whole, is strictly prohibited. Limitation of Liability SATO Corporation and its

More information

Xerox Global Print Driver. Installation Guide

Xerox Global Print Driver. Installation Guide Xerox 2010 Xerox Corporation. All Rights Reserved. Unpublished rights reserved under the copyright laws of the United States. Contents of this publication may not be reproduced in any form without permission

More information

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management

More information

TRITON - Web Security Help

TRITON - Web Security Help TRITON - Web Security Help Websense Web Security Websense Web Filter v7.6 1996 2015, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2015 Printed in the

More information

System 800xA Tools. System Version 5.1. Power and productivity for a better world TM

System 800xA Tools. System Version 5.1. Power and productivity for a better world TM System 800xA Tools System Version 5.1 Power and productivity for a better world TM System 800xA Tools System Version 5.1 NOTICE This document contains information about one or more ABB products and may

More information

Remark FTP Utility. For Remark Office OMR. User s Guide

Remark FTP Utility. For Remark Office OMR. User s Guide Remark FTP Utility For Remark Office OMR User s Guide Remark Products Group 301 Lindenwood Drive, Suite 100 Malvern, PA 19355-1772 USA www.gravic.com Disclaimer The information contained in this document

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Remote Management Reference

Remote Management Reference www.novell.com/documentation Remote Management Reference ZENworks 11 Support Pack 2 October 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

Integrated Citrix Servers

Integrated Citrix Servers Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Nasuni Management Console Guide

Nasuni Management Console Guide Nasuni Management Console Guide Version 5.5 April 2014 2014 Nasuni Corporation All Rights Reserved Document Information Nasuni Management Console Guide Version 5.5 April 2014 Copyright Copyright 2010-2014

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

CA ARCserve Backup Patch Manager for Windows

CA ARCserve Backup Patch Manager for Windows CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves

More information

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252

More information

RemoteTM LAN Server User Guide

RemoteTM LAN Server User Guide RemoteTM LAN Server User Guide Copyright 2008-2013 Maxprograms Contents 3 Contents Introduction...5 Supported Platforms...5 Requirements...5 LAN Server...7 System Tray Menu...7 Server Status...7 Server

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

SonicWALL SSL VPN 3.5: Virtual Assist

SonicWALL SSL VPN 3.5: Virtual Assist SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following

More information

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3 Wavelink Avalanche Mobility Center Java Console User Guide Version 5.3 Revised 17/04/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,

More information

Remote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide

Remote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Note Before using this information and the product it supports,

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net All rights reserved. Redistribution

More information

Database Administration Guide

Database Administration Guide Database Administration Guide 092211 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,

More information

Mobile Configuration Profiles for ios Devices Technical Note

Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights

More information

User Security in UML Models

User Security in UML Models User Security in UML Models Enterprise Architect is an intuitive, flexible and powerful UML analysis and design tool for building robust and maintainable software. This booklet explains the User Security

More information

Heroix Longitude Quick Start Guide V7.1

Heroix Longitude Quick Start Guide V7.1 Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: support@heroix.com Notice Heroix provides

More information

VERITAS NetBackup 6.0

VERITAS NetBackup 6.0 VERITAS NetBackup 6.0 Backup, Archive, and Restore Getting Started Guide for UNIX, Windows, and Linux N15278C September 2005 Disclaimer The information contained in this publication is subject to change

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

WatchDox for Windows. User Guide. Version 3.9.5

WatchDox for Windows. User Guide. Version 3.9.5 WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

v5.2 Installation Guide for Websense Enterprise v5.2 Embedded on Cisco Content Engine

v5.2 Installation Guide for Websense Enterprise v5.2 Embedded on Cisco Content Engine v5.2 Installation Guide for Websense Enterprise v5.2 Embedded on Cisco Content Engine Websense Enterprise Installation Guide 1996 2004, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Configuration Guide for Email Gateway emailgtw v2.7 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

MobileStatus Server Installation and Configuration Guide

MobileStatus Server Installation and Configuration Guide MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Mac OS X Users 8.0 Symantec Information Foundation Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Polar Help Desk 4.1. User s Guide

Polar Help Desk 4.1. User s Guide Polar Help Desk 4.1 User s Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

LDAP Synchronization Agent Configuration Guide for

LDAP Synchronization Agent Configuration Guide for LDAP Synchronization Agent Configuration Guide for Powerful Authentication Management for Service Providers and Enterprises Version 3.x Authentication Service Delivery Made EASY LDAP Synchronization Agent

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

User Guide Release 3.5

User Guide Release 3.5 September 19, 2013 User Guide Release 3.5 User Guide Revision/Update Information: September 19, 2013 Software Version: PowerBroker Auditor for File System 3.5 Revision Number: 0 COPYRIGHT NOTICE Copyright

More information