Cloud Services MDM. Reports & Alerts Admin Guide

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Cloud Services MDM. Reports & Alerts Admin Guide"

Transcription

1 Cloud Services MDM Reports & Alerts Admin Guide 10/27/2014

2 Reports and Alerts is one of nine sections of the overall Admin Guide for Mobile Device Manager. The following is the complete list of MDM Admin Guide components: MDM Overview and Setup Device Management Profile Management Geofencing Application Management Content Management Management Telecom Management Reports and Alerts REPORTS AND ALERTS REPORTS MDM has extensive reporting capabilities that provide administrators with actionable, result- driven statistics about their device fleets. IT administrators can leverage these pre- defined reports or create custom reports based on specific devices, User Groups, date ranges, or file preferences. In addition, the administrator can schedule any of these reports for automated distribution to a group of users and recipients on either a defined schedule or a recurring basis. These features are all centralized within the Web Console. To access the Reports page: Navigate to Reports & Alerts Reports. From here, there are several key pieces of functionality that administrators can use to leverage reporting capabilities: 1

3 Generating Custom Reports Administrators can create custom reports on the fly through Web Console. To generate a custom report: 1. Navigate to the Reports page at Reports & Alerts Reports. 2. Select a pre- defined report template from the list and then click the Actions icon on the right and then click View. 3. Specify all of the report parameters. Required fields are indicated with a red mark. 4. Select View Report. Adding a Report to My Reports Adding a report to My Reports allows administrators to bookmark popular reports that they find particularly useful. To add a report to My Reports: 1. Navigate to the Reports page at Reports & Alerts Reports. 2. Select a pre- defined report template from the list. 3. Click the Actions icon on the right. 4. Click the [Add to My Reports] button. From now on the report will be accessible from the My Reports View on the left side of the Reports page for quick access. Creating Report Subscriptions Report subscriptions can be used to send custom generated reports to specific recipients at a scheduled occurrence. To subscribe to a report: 1. Navigate to the Reports page at Reports & Alerts Reports. 2. Select a pre- defined report template from the list. 3. Click the Actions icon on the right. 4. Click the [Subscribe] button. 2

4 5. Complete the Report Subscriptions Form with all required information. General Information The name of the subscription, the subject, etc. Report Parameters The parameters defining the scope and options of the report. Distribution List The recipients who will receive the custom report whenever the subscription is executed. Execution Schedule The time and schedule at which the custom report is generated. 6. Click [Save]. Additional Reporting Tools There are also several other additional tools that help administrators utilize MDM reporting capabilities: Search Assistance Tools The Report Category drop- down and Search Box at the top of the Reports page make finding particular reports very simple. Report Samples Tool To view a sample output from a particular report, click the Actions icon on the right and then click the [Sample] button. Report Export Tool To export a report in one of several formats, use the Export Bar on a custom generated report. ALERTS Alerts provide administrators with the ability to receive immediate notifications when specific events occur across the managed smart device fleet. They are comprised of two components: A Creation Policy that describes the criteria that must be met to trigger the alert A Routing Policy that describes the devices being monitored, when the alert will be sent, and who will receive it. Creation Policies In order to create a new creation policy: 1. Navigate to Reports & Alerts Alert Setup Creation Policy. From here, a list of all available creation policies can be seen. 2. If any policies are similar to the policy that needs to be created, try editing the policy by selecting the Edit icon on the left of the row. 3. Select Add Alert Creation Policy to open the Alert Creation Policy Form. 3

5 4. Enter all required information. Description The name of the creation policy that will be displayed in the Web Console. Resource The type of resource that is going to be monitored. o Select Device to monitor the smart device fleet. Attribute The parameter that will be used to determine whether the alert should go off or not. Comparison Operator The comparison operator to test whether the attribute will set off an alert. Value The value that will set off the alert when (Attribute) <Comparison Operator> (Value) = True. Duration The duration that the alert will last before stopping. 5. Click [Save] to complete the process. Routing Policies In order to create a routing policy: 1. Navigate to Reports & Alerts Alert Setup Routing Policy. 2. Select Add Alert Routing Policy to open the Alert Routing Policy Form. 4

6 3. Fill out the form on the Criteria tab. Creation Policy The creation policy that will trigger this alert. Location Group The location group that contains the devices that are being monitored for the creation policy criteria. Location The location that contains the devices that are being monitored for the creation policy criteria. The default is Any. Device Any specific devices that are being monitored for this creation policy. The default is Any. Sample Time and Sample Days The date and time in which this policy is tested on the selected devices Severity & Priority Metrics to organize alerts in terms of priority and several for administrative purposes. Consolidation Window The period of time in which only one alert will occur from multiple triggers of the same creation policy. All alerts that occur within the consolidation window of one another, and stem from the same creation and routing policy, are consolidated into a single alert. 4. Select the Preferences tab to configure the recipients of these alerts: User Alerting Select an administrative user or users to receive this alert. Role Alerting Select a location group and subsequent role to receive this alert. o To add additional roles, use the [Add Role] button. 5. Click [Save] to complete this process. 5

7 VIEWING ALERTS Once alerts have been created, they can be viewed by navigating to Reports & Alerts Search Alerts. My Alerts View alerts by user or role that received the alert. You can also view alerts that were triggered by a particular device on the Device Details page by selecting System Activity Alerts. KEEP IN MIND... To enable the highest level of control and security over distribution of report information across the enterprise, edit role- based access to reports by navigating to Users User Accounts Add Role. Report Access is enabled or disabled by checking the boxes under Resource Categories. OVERVIEW OF SYSLOG Syslog is a client\server protocol used to integrate the event log data from Web Console on a separate server in a reliable and secure way. Syslog is used in MDM for logging and storing event logs that have occurred on Web Console and on managed devices. Syslog protocol is originally written on BSD Unix and the messages are sent using UDP/TCP protocol. The two major reasons for having a centralized Syslog server: For Security When an administrator wants to keep some of the event logs safely off- site in a secure location. For Convenience In case of crashed server, the administrator can check the kernel error logs on the centralized Syslog server. The Syslog pattern between various dates over an extended time can also be checked, and log files from the Syslog server can be matched, searched, and replaced at any time. 6

8 Integrating Syslog The administrator can configure Syslog integration on the Syslog settings page by navigating to Configuration System Settings Admin Syslog. 1. Enter information in all the fields. Required fields have a red asterisk ( * ). Server URL Enter the Syslog server URL to store event logs. Protocol Enter the protocol type for MDM console and the Syslog server to communicate, either UDP or TCP. Port Enter the destination port number the MDM console wants to send Syslog data to the Syslog server. When sending messages using UDP, the destination port is usually 514 and for TCP, the destination port is usually The port number is 514 by default. Syslog Facility Syslog facility lists the type of messages that are to be sent to the server. Select a Syslog facility from the drop- down list. Some Syslog accepts messages only from certain facilities. Event Types Logged o Enable Console check box To send console events. o Enable Device check box To send device events. Message Tag Enter a message tag to help Syslog server to identify where the message came from. Message Content Enter what the message should include. o Include lookup value helper control with: {EventType}, {Event}, {User}, {EventSource}, {EventModule}, {EventCategory}, {EventData} 2. Click [Save] or click [Test Connection] to test the connection setup. Once the integration is completed, the administrator has to schedule the time frequency limits. This allows the MDM server to know how often it has to send Syslog data to the Syslog server. 7

9 The time frequency limit is set using the MDM Scheduler by navigating to Configuration System Settings Device General Scheduler. The Scheduler has a built- in task called Syslog Task, where the time frequency is set. The administrator has permission to edit the Syslog Task only at the Global level. 1. Click [Edit]. The Syslog Task page displays (see below). 2. Enter information in the required fields. Recurrence Type Select a recurrence type and the corresponding frequency to send Syslog data to the Syslog server. The following recurrence types are available: o Daily o Weekly o Monthly o Time- Based Range Enter the start and end date and timings. 3. Click [Save]. 8

Mobile Device Manager Admin Guide. Reports and Alerts

Mobile Device Manager Admin Guide. Reports and Alerts Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview

More information

Cloud Services MDM. Overview & Setup Admin Guide

Cloud Services MDM. Overview & Setup Admin Guide Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4

More information

EventTracker: Integrating Imperva SecureSphere

EventTracker: Integrating Imperva SecureSphere EventTracker: Integrating Imperva SecureSphere Publication Date: June 14, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract This guide provides instructions

More information

Integrate ExtraHop with Splunk

Integrate ExtraHop with Splunk Integrate ExtraHop with Splunk Introduction The ExtraHop system monitors network and application performance by gathering data passively on the network. It offers deep and customizable analytics of wire

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

How do I Configure, Enable, and Schedule Reports?

How do I Configure, Enable, and Schedule Reports? How do I Configure, Enable, and Schedule Reports? There are four core steps involved in the production and delivery of scheduled reports in Ad Hoc. 1. Configuration of the Scheduler Service 2. Enabling

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

TUTORIAL: Marketing Automation Gold-Vision 7

TUTORIAL: Marketing Automation Gold-Vision 7 Marketing Automation What is a Marketing Automation? Campaign Automation Automated Connect Campaigns Automated Telephone Campaigns Automated Lead Call Back Campaigns Phone Campaigns with Activities Creating

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Fax and SMS Quickguide

Fax and SMS Quickguide INTRODUCTION U2 Fax and SMS allow faxes and SMS to be sent directly from a user s workstation via the Internet using U2 Webservices. This improves staff efficiency by removing the need to physically fax

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

Salesforce Integration

Salesforce Integration Salesforce Integration 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

NAS 272 Using Your NAS as a Syslog Server

NAS 272 Using Your NAS as a Syslog Server NAS 272 Using Your NAS as a Syslog Server Enable your NAS as a Syslog Server to centrally manage the logs from all network devices A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this

More information

DocuSign Connect for Salesforce Guide

DocuSign Connect for Salesforce Guide Information Guide 1 DocuSign Connect for Salesforce Guide 1 Copyright 2003-2013 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER USER GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from NetWrix

More information

Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c

Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c This document describes how to set up Oracle Enterprise Manager 12c to monitor

More information

System Log Setup (RTA1025W Rev2)

System Log Setup (RTA1025W Rev2) System Log Setup (RTA1025W Rev2) System Log As shown on the web page, you can view the system log and configure system log whenever you want. To view the system log, you must configure system log first.

More information

LogLogic Trend Micro OfficeScan Log Configuration Guide

LogLogic Trend Micro OfficeScan Log Configuration Guide LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and

More information

Protecting the Home Network (Firewall)

Protecting the Home Network (Firewall) Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection

More information

Using AppMetrics to Handle Hung Components and Applications

Using AppMetrics to Handle Hung Components and Applications Using AppMetrics to Handle Hung Components and Applications AppMetrics has the ability to detect hung COM+ components and applications, providing a means of alerting staff to situations where critical

More information

Integrating Trend Micro OfficeScan 10 EventTracker v7.x

Integrating Trend Micro OfficeScan 10 EventTracker v7.x Integrating Trend Micro OfficeScan 10 EventTracker v7.x Publication Date: August 26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help you in

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Remote Monitoring Service - Setup Guide for InfraStruXure Central and StruxureWare 1 5

Remote Monitoring Service - Setup Guide for InfraStruXure Central and StruxureWare 1 5 Remote Monitoring Service Setup Guide for InfraStruXure Central and StruxureWare Overview This document explains how to setup Remote Monitoring Service using InfraStruXure Central or StruxureWare server.

More information

Cloud Services MDM. Email Management Admin Guide

Cloud Services MDM. Email Management Admin Guide Cloud Services MDM Email Management Admin Guide 10/27/2014 CONTENTS Email Management... 2 Email Compliance Policies... 3 Email Policies... 4 Attachment Security Policies... 8 Attachment Security Policies

More information

Integrating LivePerson with Salesforce

Integrating LivePerson with Salesforce Integrating LivePerson with Salesforce V 9.2 March 2, 2010 Implementation Guide Description Who should use this guide? Duration This guide describes the process of integrating LivePerson and Salesforce

More information

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration Hosted VoIP Phone System Admin Portal User Guide for Call Center Administration Contents Table of Figures... 4 1 About this Guide... 6 2 Accessing the Hosted VoIP Phone System Administration Portal...

More information

Managing Virtual Servers

Managing Virtual Servers CHAPTER 4 Content Switching Module Device Manager (CVDM-CSM) displays details of existing virtual servers and enables users to perform detailed tasks that include creating or deleting virtual servers,

More information

Quick Start Guide Sendio Hosted

Quick Start Guide Sendio Hosted Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START

More information

IP Phone Services Configuration

IP Phone Services Configuration CHAPTER 96 Using Cisco Unified Communications Manager Administration, you define and maintain the list of IP phone services to which users can subscribe at their site. IP phone services comprise XML applications

More information

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products 1.0 Overview By default, Windows XP Service Pack 2 (SP2) enables Windows Firewall, previously known as Internet

More information

GE Measurement & Control. Remote Comms System. Installation and User Reference Guide

GE Measurement & Control. Remote Comms System. Installation and User Reference Guide GE Measurement & Control Remote Comms System Installation and User Reference Guide Contents BENEFITS OF REMOTE COMMS SYSTEM... 1 HOW THE REMOTE COMMS SYSTEM WORKS... 3 COMPONENTS OF REMOTE COMMS SYSTEM...

More information

LEARNING MANAGEMENT SYSTEM (LMS) SUBSCRIBING TO A REPORT

LEARNING MANAGEMENT SYSTEM (LMS) SUBSCRIBING TO A REPORT LEARNING MANAGEMENT SYSTEM (LMS) SUBSCRIBING TO A REPORT This QRG provides instructions for subscribing to a report in the LMS. Report subscriptions in the LMS allow reports to be emailed at scheduled

More information

How to Program a Commander or Scout to Connect to Pilot Software

How to Program a Commander or Scout to Connect to Pilot Software How to Program a Commander or Scout to Connect to Pilot Software Commander and Scout are monitoring and control products that can transfer physical environmental conditions and alarm sensor electrical

More information

Integrating with IBM Tivoli TSOM

Integrating with IBM Tivoli TSOM Integration Notes Integrating with IBM Tivoli TSOM The Cascade Profiler integrates with the IBM Tivoli Security Operations Manager (TSOM) through the use of SNMP traps. It has been tested with TSOM Version

More information

UM8000 Voicemail System Administration Guide

UM8000 Voicemail System Administration Guide UM8000 Voicemail System Administration Guide CUSTOMER INFORMATION: Phone System (SV8100) IP Address: User Name: Password: Voicemail (UM8000) IP Address: Login ID: Password: Logging into the Voice Mail

More information

Integration Guide. Help Desk Authority, Perspective and sl360. 1.800.424.9411 www.scriptlogic.com

Integration Guide. Help Desk Authority, Perspective and sl360. 1.800.424.9411 www.scriptlogic.com Integration Guide Help Desk Authority, Perspective and sl360 1.800.424.9411 www.scriptlogic.com Table of Contents Introduction... 3 Product Overview... 3 Benefits of Product Integration... 3 Advanced Help

More information

USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB

USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29 Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB Table of Contents UNIT 1: Lab description... 3 Pre-requisites:... 3 UNIT 2: Launching an instance on EC2...

More information

HighPoint Technologies, Inc. Web RAID Management Software (WebGUI)

HighPoint Technologies, Inc. Web RAID Management Software (WebGUI) HighPoint Technologies, Inc. Web RAID Management Software (WebGUI) Table of Contents 1 Array Management... 3 Creating an Array... 3 Deleting an Array... 4 Adding Disk to Array... 5 Verifying an Array...

More information

Configuring Situation Events in Action Manager for WebSphere Business Monitor Version 6.0

Configuring Situation Events in Action Manager for WebSphere Business Monitor Version 6.0 Copyright IBM Corporation 2006 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.0 LAB EXERCISE for WebSphere Business Monitor Version 6.0 What this exercise is about... 1 Lab Requirements... 1 What

More information

NEW FEATURE OVERVIEW SPRINGCM S APPROVAL WORKFLOW TOOL (AKA ROUTING AND APPROVAL WORKFLOW)

NEW FEATURE OVERVIEW SPRINGCM S APPROVAL WORKFLOW TOOL (AKA ROUTING AND APPROVAL WORKFLOW) NEW FEATURE OVERVIEW SPRINGCM S APPROVAL WORKFLOW TOOL (AKA ROUTING AND APPROVAL WORKFLOW) SpringCM is deploying a new series of enhancements to the Approval workflow. Approval Workflows is a core platform

More information

Verizon Firewall. 1 Introduction. 2 Firewall Home Page

Verizon Firewall. 1 Introduction. 2 Firewall Home Page Verizon Firewall 1 Introduction Verizon Firewall monitors all traffic to and from a computer to block unauthorized access and protect personal information. It provides users with control over all outgoing

More information

SonicWALL GMS Custom Reports

SonicWALL GMS Custom Reports SonicWALL GMS Custom Reports Document Scope This document describes how to configure and use the SonicWALL GMS 6.0 Custom Reports feature. This document contains the following sections: Feature Overview

More information

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared

More information

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs...

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs... Connect With Confidence Astaro Log Management Getting Started Guide About this Getting Started Guide To use Astaro Log Management, logs need to be transferred from individual systems to the cloud. This

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Using HPU Analytics. September 2015

Using HPU Analytics. September 2015 Using HPU Analytics September 2015 1 2 Finding reports Finding reports as a learner Click ME, click Analytics, and then click All. To access the Admin area and some reports, you need to have the necessary

More information

Configuring the Samsung SDS CellWe EMM cloud connector

Configuring the Samsung SDS CellWe EMM cloud connector Appendix 3 Configuring the Samsung SDS CellWe EMM cloud connector This appendix explains how to use the Samsung SDS CellWe EMM cloud connector configuration program to configure and monitor your cloud

More information

Integrate Websense Web Security Gateway (WSG)

Integrate Websense Web Security Gateway (WSG) Integrate Websense Web Security Gateway (WSG) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions

More information

Zoho CRM and Google Apps Synchronization

Zoho CRM and Google Apps Synchronization Zoho CRM and Google Apps Synchronization Table of Contents End User Integration Points 1. Contacts 2. Calendar 3. Email 4. Tasks 5. Docs 3 6 8 11 12 Domain-Wide Points of Integration 1. Authentication

More information

Cloud Services MDM. Application Management Admin Guide

Cloud Services MDM. Application Management Admin Guide Cloud Services MDM Application Management Admin Guide 10/24/2014 CONTENTS Application Management... 2 Using the Applications Page... 2 Enabling the Book Catalog... 9 Application Wrapping Android Apps...

More information

Altaro Hyper-V Backup - Getting Started

Altaro Hyper-V Backup - Getting Started Altaro Hyper-V Backup - Getting Started System Requirements Supported Host Operating Systems: Altaro Hyper-V Backup: o Windows 2008 R2 (all editions) o Windows 2008 R2 SP1 o Windows Hyper-V Server 2008

More information

Startup Guide. Version 2.3.9

Startup Guide. Version 2.3.9 Startup Guide Version 2.3.9 Installation and initial setup Your welcome email included a link to download the ORBTR plugin. Save the software to your hard drive and log into the admin panel of your WordPress

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

WebSphere Business Monitor V7.0 Business space dashboards

WebSphere Business Monitor V7.0 Business space dashboards Copyright IBM Corporation 2010 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 7.0 LAB EXERCISE WebSphere Business Monitor V7.0 What this exercise is about... 2 Lab requirements... 2 What you should

More information

First Financial Bank Online Banking Quick Reference. February, 2013

First Financial Bank Online Banking Quick Reference. February, 2013 February, 2013 PURPOSE... 2 SUPPORT... 2 ACCESSING ONLINE BANKING... 2 Getting to the Online Banking Site... 2 Requesting Enrollment in Online Banking... 2 Logging in for the First Time... 2 Registering

More information

LiveText for Salesforce Quick Start Guide

LiveText for Salesforce Quick Start Guide LiveText for Salesforce Quick Start Guide (C) 2014 HEYWIRE BUSINESS ALL RIGHTS RESERVED LiveText for Salesforce Quick Start Guide Table of Contents Who should be looking at this document... 3 Software

More information

MultiSite Manager. User Guide

MultiSite Manager. User Guide MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

ShadowControl ShadowStream

ShadowControl ShadowStream ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...

More information

Google Trusted Stores Setup in Magento

Google Trusted Stores Setup in Magento Google Trusted Stores Setup in Magento Google Trusted Stores is a free badging program that can improve your conversion rate and average order size by reassuring potential customers you offer a great shopping

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Knowledge Base Articles

Knowledge Base Articles Knowledge Base Articles 2005 Jalasoft Corp. All rights reserved. TITLE: How to configure and use the Jalasoft Xian Syslog Server. REVISION: Revision : B001-SLR01 Date : 11/30/05 DESCRIPTION: Jalasoft has

More information

Support Guide: Managing the Subject machine s Firewall.

Support Guide: Managing the Subject machine s Firewall. Support Guide: Managing the Subject machine s Firewall. Note: This guide assumes you have successfully deployed F-Response to the subject/target machine. If not, then we recommend you look at one of the

More information

Integration Guide. Help Desk Authority, PacketTrap and sl360. 1.800.424.9411 www.scriptlogic.com

Integration Guide. Help Desk Authority, PacketTrap and sl360. 1.800.424.9411 www.scriptlogic.com Integration Guide Help Desk Authority, PacketTrap and sl360 1.800.424.9411 www.scriptlogic.com 2010 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo, Help Desk Authority and

More information

Shavlik Patch for Microsoft System Center

Shavlik Patch for Microsoft System Center Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This

More information

Setting up SMTP in Talis Decisions

Setting up SMTP in Talis Decisions Decisions Talis Library Management Suite Setting up SMTP in Talis Decisions This document describes how to configure SMTP (Single Mail Transfer Protocol) in Talis Decisions. It is intended for system administrators

More information

ExactTarget GENESIS I N TEGRATION GUIDE

ExactTarget GENESIS I N TEGRATION GUIDE ExactTarget GENESIS I N TEGRATION GUIDE GENESIS INTEGRATION GUIDE II Table of Contents Terms and Conditions of Use... 4 Intended Audience... 4 Account Support... 4 Service and Billing Information... 4

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

Link and Sync Guide for Hosted QuickBooks Files

Link and Sync Guide for Hosted QuickBooks Files Link and Sync Guide for Hosted QuickBooks Files A How-To Guide for Syncing QuickBooks Files Table of Contents Hosted QuickBooks Files Overview:... 2 Rules Overview:... 2 Link and Sync Hosted QuickBooks

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Windows Service Monitoring

Windows Service Monitoring Windows Service Monitoring Overview SNMPc 9.0.7 includes support for discovering and monitoring Windows services. You can predefine a list of Windows Services into an Application definition (e.g. NMS =

More information

Onboarding for Administrators

Onboarding for Administrators Welcome! This resource will walk you through the quick and easy steps for configuring your Paylocity Onboarding module and managing events. Login Launch Events Complete Tasks Create Records Configure Events

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Configuring NetFlow Secure Event Logging (NSEL)

Configuring NetFlow Secure Event Logging (NSEL) 73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter

More information

Com.X. Call Center Analyser. User Guide

Com.X. Call Center Analyser. User Guide Com.X Call Center Analyser User Guide Version 1.0.1, 21 July 2014 2010 2014 Far South Networks Document History Version Date Description of Changes 1.0.0 21/07/2014 Initial draft M. Knight 1.0.1 29/07/2014

More information

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Setting up Hyper-V for 2X VirtualDesktopServer Manual Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein

More information

WhatsUp Event Alarm v10.x Listener Console User Guide

WhatsUp Event Alarm v10.x Listener Console User Guide WhatsUp Event Alarm v10.x Listener Console User Guide Contents WhatsUp Event Alarm Listener Console Overview Firewall Considerations... 6 Using the WhatsUp Event Alarm Listener Console... 7 Event Alarm

More information

Containerchain. LIVE User Guide for Transporters

Containerchain. LIVE User Guide for Transporters Containerchain LIVE User Guide for Transporters Table of Contents 1. Introduction 2 2. Admin 3 2.1 Company 3 2.2 Delivery Addresses 3 2.3 Customers 4 2.4 Roles 4 2.4.1 Add New Role 4 2.5 Users 5 2.5.1

More information

Tool for Automated Provisioning System (TAPS) Version 1.2 (1027)

Tool for Automated Provisioning System (TAPS) Version 1.2 (1027) Tool for Automated Provisioning System (TAPS) Version 1.2 (1027) 2015 VoIP Integration Rev. July 24, 2015 Table of Contents Product Overview... 3 Application Requirements... 3 Cisco Unified Communications

More information

OneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31

OneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31 OneStop Reporting 3.7 Installation Guide Updated: 2013-01-31 Copyright OneStop Reporting AS www.onestopreporting.com Table of Contents System Requirements... 1 Obtaining the Software... 2 Obtaining Your

More information

BroadWorks Call Center Guide

BroadWorks Call Center Guide BroadWorks Call Center Guide Table of Contents Log into Call Center Configuration Settings Page 3 Change Your Password... Page 3 Dashboard... Page 4 Agent View and Status... Page 5 Change Agent ACD State...

More information

Dynamic DNS How-To Guide

Dynamic DNS How-To Guide Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol

More information

Using Driver ID & Automatic Driver Assignment

Using Driver ID & Automatic Driver Assignment Using Driver ID & Automatic Driver Assignment Overview NexTraq s Driver ID and Automatic Driver Assignment feature has simplified the complex task of keeping up with your drivers. If your company has multiple

More information

Information on Syslog For more information on syslog, see RFC 5424. Released: December 2006 Interoperability issues: None. Table 1: Syslog at a Glance

Information on Syslog For more information on syslog, see RFC 5424. Released: December 2006 Interoperability issues: None. Table 1: Syslog at a Glance Syslog on Spectralink 84-Series Handsets Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational,

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

Jive Case Escalation for Salesforce

Jive Case Escalation for Salesforce Jive Case Escalation for Salesforce TOC 2 Contents System Requirements... 3 Understanding Jive Case Escalation for Salesforce... 4 Setting Up Jive Case Escalation for Salesforce...5 Installing the Program...

More information

Decision Support AITS University Administration. EDDIE 4.1 User Guide

Decision Support AITS University Administration. EDDIE 4.1 User Guide Decision Support AITS University Administration EDDIE 4.1 User Guide 2 P a g e EDDIE (BI Launch Pad) 4.1 User Guide Contents Introduction to EDDIE... 4 Log into EDDIE... 4 Overview of EDDIE Homepage...

More information

CTERA Agent File Sync and Share for Mac

CTERA Agent File Sync and Share for Mac Quick Walkthrough for Mac August 2014 Version 4.1 2014, CTERA Networks. All rights reserved. For more detailed information, refer to the for Mac User Guide, available at http://www.ctera.com/support. 1

More information

How To Configure Syslog over VPN

How To Configure Syslog over VPN How To Configure Syslog over VPN Applicable Version: 10.00 onwards Overview Cyberoam provides extensive logging capabilities for traffic, system and network protection functions. Detailed log information

More information

Important Notes for WinConnect Server VS Software Installation:

Important Notes for WinConnect Server VS Software Installation: Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),

More information

WebSphere Business Monitor V6.2 Business space dashboards

WebSphere Business Monitor V6.2 Business space dashboards Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 What this exercise is about... 2 Lab requirements... 2 What you should

More information

McAfee Network Threat Response (NTR) 4.0

McAfee Network Threat Response (NTR) 4.0 McAfee Network Threat Response (NTR) 4.0 Configuring Automated Reporting and Alerting Automated reporting is supported with introduction of NTR 4.0 and designed to send automated reports via existing SMTP

More information

SMS for REST Professional

SMS for REST Professional RockendSMS Enhanced Integration SMS for REST Professional RockendSMS has newly designed and developed an upgrade to the way you send SMS through REST Professional V14 and above (RockendSMS Enhanced Integration).

More information