Cloud Services MDM. Reports & Alerts Admin Guide

Size: px
Start display at page:

Download "Cloud Services MDM. Reports & Alerts Admin Guide"

Transcription

1 Cloud Services MDM Reports & Alerts Admin Guide 10/27/2014

2 Reports and Alerts is one of nine sections of the overall Admin Guide for Mobile Device Manager. The following is the complete list of MDM Admin Guide components: MDM Overview and Setup Device Management Profile Management Geofencing Application Management Content Management Management Telecom Management Reports and Alerts REPORTS AND ALERTS REPORTS MDM has extensive reporting capabilities that provide administrators with actionable, result- driven statistics about their device fleets. IT administrators can leverage these pre- defined reports or create custom reports based on specific devices, User Groups, date ranges, or file preferences. In addition, the administrator can schedule any of these reports for automated distribution to a group of users and recipients on either a defined schedule or a recurring basis. These features are all centralized within the Web Console. To access the Reports page: Navigate to Reports & Alerts Reports. From here, there are several key pieces of functionality that administrators can use to leverage reporting capabilities: 1

3 Generating Custom Reports Administrators can create custom reports on the fly through Web Console. To generate a custom report: 1. Navigate to the Reports page at Reports & Alerts Reports. 2. Select a pre- defined report template from the list and then click the Actions icon on the right and then click View. 3. Specify all of the report parameters. Required fields are indicated with a red mark. 4. Select View Report. Adding a Report to My Reports Adding a report to My Reports allows administrators to bookmark popular reports that they find particularly useful. To add a report to My Reports: 1. Navigate to the Reports page at Reports & Alerts Reports. 2. Select a pre- defined report template from the list. 3. Click the Actions icon on the right. 4. Click the [Add to My Reports] button. From now on the report will be accessible from the My Reports View on the left side of the Reports page for quick access. Creating Report Subscriptions Report subscriptions can be used to send custom generated reports to specific recipients at a scheduled occurrence. To subscribe to a report: 1. Navigate to the Reports page at Reports & Alerts Reports. 2. Select a pre- defined report template from the list. 3. Click the Actions icon on the right. 4. Click the [Subscribe] button. 2

4 5. Complete the Report Subscriptions Form with all required information. General Information The name of the subscription, the subject, etc. Report Parameters The parameters defining the scope and options of the report. Distribution List The recipients who will receive the custom report whenever the subscription is executed. Execution Schedule The time and schedule at which the custom report is generated. 6. Click [Save]. Additional Reporting Tools There are also several other additional tools that help administrators utilize MDM reporting capabilities: Search Assistance Tools The Report Category drop- down and Search Box at the top of the Reports page make finding particular reports very simple. Report Samples Tool To view a sample output from a particular report, click the Actions icon on the right and then click the [Sample] button. Report Export Tool To export a report in one of several formats, use the Export Bar on a custom generated report. ALERTS Alerts provide administrators with the ability to receive immediate notifications when specific events occur across the managed smart device fleet. They are comprised of two components: A Creation Policy that describes the criteria that must be met to trigger the alert A Routing Policy that describes the devices being monitored, when the alert will be sent, and who will receive it. Creation Policies In order to create a new creation policy: 1. Navigate to Reports & Alerts Alert Setup Creation Policy. From here, a list of all available creation policies can be seen. 2. If any policies are similar to the policy that needs to be created, try editing the policy by selecting the Edit icon on the left of the row. 3. Select Add Alert Creation Policy to open the Alert Creation Policy Form. 3

5 4. Enter all required information. Description The name of the creation policy that will be displayed in the Web Console. Resource The type of resource that is going to be monitored. o Select Device to monitor the smart device fleet. Attribute The parameter that will be used to determine whether the alert should go off or not. Comparison Operator The comparison operator to test whether the attribute will set off an alert. Value The value that will set off the alert when (Attribute) <Comparison Operator> (Value) = True. Duration The duration that the alert will last before stopping. 5. Click [Save] to complete the process. Routing Policies In order to create a routing policy: 1. Navigate to Reports & Alerts Alert Setup Routing Policy. 2. Select Add Alert Routing Policy to open the Alert Routing Policy Form. 4

6 3. Fill out the form on the Criteria tab. Creation Policy The creation policy that will trigger this alert. Location Group The location group that contains the devices that are being monitored for the creation policy criteria. Location The location that contains the devices that are being monitored for the creation policy criteria. The default is Any. Device Any specific devices that are being monitored for this creation policy. The default is Any. Sample Time and Sample Days The date and time in which this policy is tested on the selected devices Severity & Priority Metrics to organize alerts in terms of priority and several for administrative purposes. Consolidation Window The period of time in which only one alert will occur from multiple triggers of the same creation policy. All alerts that occur within the consolidation window of one another, and stem from the same creation and routing policy, are consolidated into a single alert. 4. Select the Preferences tab to configure the recipients of these alerts: User Alerting Select an administrative user or users to receive this alert. Role Alerting Select a location group and subsequent role to receive this alert. o To add additional roles, use the [Add Role] button. 5. Click [Save] to complete this process. 5

7 VIEWING ALERTS Once alerts have been created, they can be viewed by navigating to Reports & Alerts Search Alerts. My Alerts View alerts by user or role that received the alert. You can also view alerts that were triggered by a particular device on the Device Details page by selecting System Activity Alerts. KEEP IN MIND... To enable the highest level of control and security over distribution of report information across the enterprise, edit role- based access to reports by navigating to Users User Accounts Add Role. Report Access is enabled or disabled by checking the boxes under Resource Categories. OVERVIEW OF SYSLOG Syslog is a client\server protocol used to integrate the event log data from Web Console on a separate server in a reliable and secure way. Syslog is used in MDM for logging and storing event logs that have occurred on Web Console and on managed devices. Syslog protocol is originally written on BSD Unix and the messages are sent using UDP/TCP protocol. The two major reasons for having a centralized Syslog server: For Security When an administrator wants to keep some of the event logs safely off- site in a secure location. For Convenience In case of crashed server, the administrator can check the kernel error logs on the centralized Syslog server. The Syslog pattern between various dates over an extended time can also be checked, and log files from the Syslog server can be matched, searched, and replaced at any time. 6

8 Integrating Syslog The administrator can configure Syslog integration on the Syslog settings page by navigating to Configuration System Settings Admin Syslog. 1. Enter information in all the fields. Required fields have a red asterisk ( * ). Server URL Enter the Syslog server URL to store event logs. Protocol Enter the protocol type for MDM console and the Syslog server to communicate, either UDP or TCP. Port Enter the destination port number the MDM console wants to send Syslog data to the Syslog server. When sending messages using UDP, the destination port is usually 514 and for TCP, the destination port is usually The port number is 514 by default. Syslog Facility Syslog facility lists the type of messages that are to be sent to the server. Select a Syslog facility from the drop- down list. Some Syslog accepts messages only from certain facilities. Event Types Logged o Enable Console check box To send console events. o Enable Device check box To send device events. Message Tag Enter a message tag to help Syslog server to identify where the message came from. Message Content Enter what the message should include. o Include lookup value helper control with: {EventType}, {Event}, {User}, {EventSource}, {EventModule}, {EventCategory}, {EventData} 2. Click [Save] or click [Test Connection] to test the connection setup. Once the integration is completed, the administrator has to schedule the time frequency limits. This allows the MDM server to know how often it has to send Syslog data to the Syslog server. 7

9 The time frequency limit is set using the MDM Scheduler by navigating to Configuration System Settings Device General Scheduler. The Scheduler has a built- in task called Syslog Task, where the time frequency is set. The administrator has permission to edit the Syslog Task only at the Global level. 1. Click [Edit]. The Syslog Task page displays (see below). 2. Enter information in the required fields. Recurrence Type Select a recurrence type and the corresponding frequency to send Syslog data to the Syslog server. The following recurrence types are available: o Daily o Weekly o Monthly o Time- Based Range Enter the start and end date and timings. 3. Click [Save]. 8

Mobile Device Manager Admin Guide. Reports and Alerts

Mobile Device Manager Admin Guide. Reports and Alerts Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview

More information

Integrate ExtraHop with Splunk

Integrate ExtraHop with Splunk Integrate ExtraHop with Splunk Introduction The ExtraHop system monitors network and application performance by gathering data passively on the network. It offers deep and customizable analytics of wire

More information

EventTracker: Integrating Imperva SecureSphere

EventTracker: Integrating Imperva SecureSphere EventTracker: Integrating Imperva SecureSphere Publication Date: June 14, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract This guide provides instructions

More information

TUTORIAL: Marketing Automation Gold-Vision 7

TUTORIAL: Marketing Automation Gold-Vision 7 Marketing Automation What is a Marketing Automation? Campaign Automation Automated Connect Campaigns Automated Telephone Campaigns Automated Lead Call Back Campaigns Phone Campaigns with Activities Creating

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Cloud Services MDM. Overview & Setup Admin Guide

Cloud Services MDM. Overview & Setup Admin Guide Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4

More information

NAS 272 Using Your NAS as a Syslog Server

NAS 272 Using Your NAS as a Syslog Server NAS 272 Using Your NAS as a Syslog Server Enable your NAS as a Syslog Server to centrally manage the logs from all network devices A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this

More information

Fax and SMS Quickguide

Fax and SMS Quickguide INTRODUCTION U2 Fax and SMS allow faxes and SMS to be sent directly from a user s workstation via the Internet using U2 Webservices. This improves staff efficiency by removing the need to physically fax

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

How do I Configure, Enable, and Schedule Reports?

How do I Configure, Enable, and Schedule Reports? How do I Configure, Enable, and Schedule Reports? There are four core steps involved in the production and delivery of scheduled reports in Ad Hoc. 1. Configuration of the Scheduler Service 2. Enabling

More information

LEARNING MANAGEMENT SYSTEM (LMS) SUBSCRIBING TO A REPORT

LEARNING MANAGEMENT SYSTEM (LMS) SUBSCRIBING TO A REPORT LEARNING MANAGEMENT SYSTEM (LMS) SUBSCRIBING TO A REPORT This QRG provides instructions for subscribing to a report in the LMS. Report subscriptions in the LMS allow reports to be emailed at scheduled

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

NEW FEATURE OVERVIEW SPRINGCM S APPROVAL WORKFLOW TOOL (AKA ROUTING AND APPROVAL WORKFLOW)

NEW FEATURE OVERVIEW SPRINGCM S APPROVAL WORKFLOW TOOL (AKA ROUTING AND APPROVAL WORKFLOW) NEW FEATURE OVERVIEW SPRINGCM S APPROVAL WORKFLOW TOOL (AKA ROUTING AND APPROVAL WORKFLOW) SpringCM is deploying a new series of enhancements to the Approval workflow. Approval Workflows is a core platform

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER USER GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from NetWrix

More information

WebSphere Business Monitor V7.0 Business space dashboards

WebSphere Business Monitor V7.0 Business space dashboards Copyright IBM Corporation 2010 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 7.0 LAB EXERCISE WebSphere Business Monitor V7.0 What this exercise is about... 2 Lab requirements... 2 What you should

More information

How to Program a Commander or Scout to Connect to Pilot Software

How to Program a Commander or Scout to Connect to Pilot Software How to Program a Commander or Scout to Connect to Pilot Software Commander and Scout are monitoring and control products that can transfer physical environmental conditions and alarm sensor electrical

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Link and Sync Guide for Hosted QuickBooks Files

Link and Sync Guide for Hosted QuickBooks Files Link and Sync Guide for Hosted QuickBooks Files A How-To Guide for Syncing QuickBooks Files Table of Contents Hosted QuickBooks Files Overview:... 2 Rules Overview:... 2 Link and Sync Hosted QuickBooks

More information

Using AppMetrics to Handle Hung Components and Applications

Using AppMetrics to Handle Hung Components and Applications Using AppMetrics to Handle Hung Components and Applications AppMetrics has the ability to detect hung COM+ components and applications, providing a means of alerting staff to situations where critical

More information

First Financial Bank Online Banking Quick Reference. February, 2013

First Financial Bank Online Banking Quick Reference. February, 2013 February, 2013 PURPOSE... 2 SUPPORT... 2 ACCESSING ONLINE BANKING... 2 Getting to the Online Banking Site... 2 Requesting Enrollment in Online Banking... 2 Logging in for the First Time... 2 Registering

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Quick Start Guide Sendio Hosted

Quick Start Guide Sendio Hosted Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START

More information

Salesforce Integration

Salesforce Integration Salesforce Integration 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

PIM SOFTWARE TR50. Configuring the Syslog Feature TECHNICAL REFERENCE. www.panduit.com systemsupport@panduit.com 866-721-5302 page 1

PIM SOFTWARE TR50. Configuring the Syslog Feature TECHNICAL REFERENCE. www.panduit.com systemsupport@panduit.com 866-721-5302 page 1 PIM SOFTWARE Configuring the Syslog Feature TECHNICAL REFERENCE TR50 Published: 5/14/08 Syslogs are typically used for computer system management and security audits and are supported by a wide variety

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Cloud Services MDM. Email Management Admin Guide

Cloud Services MDM. Email Management Admin Guide Cloud Services MDM Email Management Admin Guide 10/27/2014 CONTENTS Email Management... 2 Email Compliance Policies... 3 Email Policies... 4 Attachment Security Policies... 8 Attachment Security Policies

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Integration Guide. Help Desk Authority, Perspective and sl360. 1.800.424.9411 www.scriptlogic.com

Integration Guide. Help Desk Authority, Perspective and sl360. 1.800.424.9411 www.scriptlogic.com Integration Guide Help Desk Authority, Perspective and sl360 1.800.424.9411 www.scriptlogic.com Table of Contents Introduction... 3 Product Overview... 3 Benefits of Product Integration... 3 Advanced Help

More information

Protecting the Home Network (Firewall)

Protecting the Home Network (Firewall) Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection

More information

Process Document Campus Community: Create Communication Template. Document Generation Date 7/8/2009 Last Changed by Status

Process Document Campus Community: Create Communication Template. Document Generation Date 7/8/2009 Last Changed by Status Document Generation Date 7/8/2009 Last Changed by Status Final System Office Create Communication Template Concept If you frequently send the same Message Center communication to selected students, you

More information

Remote Monitoring Service - Setup Guide for InfraStruXure Central and StruxureWare 1 5

Remote Monitoring Service - Setup Guide for InfraStruXure Central and StruxureWare 1 5 Remote Monitoring Service Setup Guide for InfraStruXure Central and StruxureWare Overview This document explains how to setup Remote Monitoring Service using InfraStruXure Central or StruxureWare server.

More information

Managing Virtual Servers

Managing Virtual Servers CHAPTER 4 Content Switching Module Device Manager (CVDM-CSM) displays details of existing virtual servers and enables users to perform detailed tasks that include creating or deleting virtual servers,

More information

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Configuration Syslog server add and check Configure SNMP on

More information

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration Hosted VoIP Phone System Admin Portal User Guide for Call Center Administration Contents Table of Figures... 4 1 About this Guide... 6 2 Accessing the Hosted VoIP Phone System Administration Portal...

More information

USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB

USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29 Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB Table of Contents UNIT 1: Lab description... 3 Pre-requisites:... 3 UNIT 2: Launching an instance on EC2...

More information

Quick Setup Guide. FaxGwise Version 6.0. SKyPRO AG, Gewerbestrasse 7, 6330 Cham Switzerland, +41 41 741 4770. SKyPRO USA,

Quick Setup Guide. FaxGwise Version 6.0. SKyPRO AG, Gewerbestrasse 7, 6330 Cham Switzerland, +41 41 741 4770. SKyPRO USA, Quick Setup Guide FaxGwise Version 6.0 SKyPRO AG, Gewerbestrasse 7, 6330 Cham Switzerland, +41 41 741 4770 SKyPRO USA, 4700 Millenia Blvd., Suite 175, Orlando, FL 32839 +1 (407) 442 0285 Getting started

More information

WebSphere Business Monitor V6.2 Business space dashboards

WebSphere Business Monitor V6.2 Business space dashboards Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 What this exercise is about... 2 Lab requirements... 2 What you should

More information

LogLogic Trend Micro OfficeScan Log Configuration Guide

LogLogic Trend Micro OfficeScan Log Configuration Guide LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and

More information

McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do?

McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do? McAfee SIEM Alarms Setting up and Managing Alarms Introduction McAfee SIEM provides the ability to send alarms on a multitude of conditions. These alarms allow for users to be notified in near real time

More information

How To Configure Syslog over VPN

How To Configure Syslog over VPN How To Configure Syslog over VPN Applicable Version: 10.00 onwards Overview Cyberoam provides extensive logging capabilities for traffic, system and network protection functions. Detailed log information

More information

Dynamic DNS How-To Guide

Dynamic DNS How-To Guide Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol

More information

McAfee Network Threat Response (NTR) 4.0

McAfee Network Threat Response (NTR) 4.0 McAfee Network Threat Response (NTR) 4.0 Configuring Automated Reporting and Alerting Automated reporting is supported with introduction of NTR 4.0 and designed to send automated reports via existing SMTP

More information

SonicWALL GMS Custom Reports

SonicWALL GMS Custom Reports SonicWALL GMS Custom Reports Document Scope This document describes how to configure and use the SonicWALL GMS 6.0 Custom Reports feature. This document contains the following sections: Feature Overview

More information

Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c

Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c This document describes how to set up Oracle Enterprise Manager 12c to monitor

More information

Important Notes for WinConnect Server VS Software Installation:

Important Notes for WinConnect Server VS Software Installation: Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),

More information

Altaro Hyper-V Backup - Getting Started

Altaro Hyper-V Backup - Getting Started Altaro Hyper-V Backup - Getting Started System Requirements Supported Host Operating Systems: Altaro Hyper-V Backup: o Windows 2008 R2 (all editions) o Windows 2008 R2 SP1 o Windows Hyper-V Server 2008

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

XpoLog Center Suite Log Management & Analysis platform

XpoLog Center Suite Log Management & Analysis platform XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -

More information

Zoho CRM and Google Apps Synchronization

Zoho CRM and Google Apps Synchronization Zoho CRM and Google Apps Synchronization Table of Contents End User Integration Points 1. Contacts 2. Calendar 3. Email 4. Tasks 5. Docs 3 6 8 11 12 Domain-Wide Points of Integration 1. Authentication

More information

Hyperoo 2.0 A (Very) Quick Start

Hyperoo 2.0 A (Very) Quick Start Hyperoo 2.0 A (Very) Quick Start Download and install the Hyperoo 2.0 beta Hyperoo 2.0 is a client/server based application and as such requires that you install both the Hyperoo Client and Hyperoo Server

More information

Integrating with IBM Tivoli TSOM

Integrating with IBM Tivoli TSOM Integration Notes Integrating with IBM Tivoli TSOM The Cascade Profiler integrates with the IBM Tivoli Security Operations Manager (TSOM) through the use of SNMP traps. It has been tested with TSOM Version

More information

ExactTarget GENESIS I N TEGRATION GUIDE

ExactTarget GENESIS I N TEGRATION GUIDE ExactTarget GENESIS I N TEGRATION GUIDE GENESIS INTEGRATION GUIDE II Table of Contents Terms and Conditions of Use... 4 Intended Audience... 4 Account Support... 4 Service and Billing Information... 4

More information

DocuSign Connect for Salesforce Guide

DocuSign Connect for Salesforce Guide Information Guide 1 DocuSign Connect for Salesforce Guide 1 Copyright 2003-2013 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

How To Use A Help Desk With A Pnettrap On A Pc Or Mac Or Mac (For A Laptop)

How To Use A Help Desk With A Pnettrap On A Pc Or Mac Or Mac (For A Laptop) Integration Guide Help Desk Authority, PacketTrap and sl360 1.800.424.9411 www.scriptlogic.com 2010 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo, Help Desk Authority and

More information

Configuring NetFlow Secure Event Logging (NSEL)

Configuring NetFlow Secure Event Logging (NSEL) 73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter

More information

Configuring Situation Events in Action Manager for WebSphere Business Monitor Version 6.0

Configuring Situation Events in Action Manager for WebSphere Business Monitor Version 6.0 Copyright IBM Corporation 2006 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.0 LAB EXERCISE for WebSphere Business Monitor Version 6.0 What this exercise is about... 1 Lab Requirements... 1 What

More information

Onboarding for Administrators

Onboarding for Administrators Welcome! This resource will walk you through the quick and easy steps for configuring your Paylocity Onboarding module and managing events. Login Launch Events Complete Tasks Create Records Configure Events

More information

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs...

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs... Connect With Confidence Astaro Log Management Getting Started Guide About this Getting Started Guide To use Astaro Log Management, logs need to be transferred from individual systems to the cloud. This

More information

How to Schedule Report Execution and Mailing

How to Schedule Report Execution and Mailing SAP Business One How-To Guide PUBLIC How to Schedule Report Execution and Mailing Release Family 8.8 Applicable Releases: SAP Business One 8.81 PL10 and PL11 SAP Business One 8.82 PL01 and later All Countries

More information

How To Manage Work Mode On An It Calendar On An Apa System

How To Manage Work Mode On An It Calendar On An Apa System SAP Solution Manager 7.1 Technical Administration Work Center Setup Q2, 2011 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision.

More information

ShadowControl ShadowStream

ShadowControl ShadowStream ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...

More information

HighPoint Technologies, Inc. Web RAID Management Software (WebGUI)

HighPoint Technologies, Inc. Web RAID Management Software (WebGUI) HighPoint Technologies, Inc. Web RAID Management Software (WebGUI) Table of Contents 1 Array Management... 3 Creating an Array... 3 Deleting an Array... 4 Adding Disk to Array... 5 Verifying an Array...

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

NAS 224 Remote Access Manual Configuration

NAS 224 Remote Access Manual Configuration NAS 224 Remote Access Manual Configuration Connect to your ASUSTOR NAS through the Internet A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Configure

More information

Verizon Firewall. 1 Introduction. 2 Firewall Home Page

Verizon Firewall. 1 Introduction. 2 Firewall Home Page Verizon Firewall 1 Introduction Verizon Firewall monitors all traffic to and from a computer to block unauthorized access and protect personal information. It provides users with control over all outgoing

More information

Setting Up Message Notifications in Cisco Unity 8.x

Setting Up Message Notifications in Cisco Unity 8.x CHAPTER 23 Setting Up Message Notifications in Cisco Unity 8.x See the following sections in this chapter: Overview of Message Notifications in Cisco Unity 8.x, page 23-1 Setting Up Text Message Notifications

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Hosted Fax Mail. Hosted Fax Mail. User Guide

Hosted Fax Mail. Hosted Fax Mail. User Guide Hosted Fax Mail Hosted Fax Mail User Guide Contents 1 About this Guide... 2 2 Hosted Fax Mail... 3 3 Getting Started... 4 3.1 Logging On to the Web Portal... 4 4 Web Portal Mailbox... 6 4.1 Checking Messages

More information

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

A quick guide to. Social Media

A quick guide to. Social Media A quick guide to Social Media In this guide... Learn how to integrate your email marketing with social media to get the most out of online buzz! Use Twitter and Facebook integrations to enable readers

More information

Cloud Services MDM. Application Management Admin Guide

Cloud Services MDM. Application Management Admin Guide Cloud Services MDM Application Management Admin Guide 10/24/2014 CONTENTS Application Management... 2 Using the Applications Page... 2 Enabling the Book Catalog... 9 Application Wrapping Android Apps...

More information

How To Create A Virtual Private Cloud In A Lab On Ec2 (Vpn)

How To Create A Virtual Private Cloud In A Lab On Ec2 (Vpn) Virtual Private Cloud - Lab Hands-On Lab: AWS Virtual Private Cloud (VPC) 1 Overview In this lab we will create and prepare a Virtual Private Cloud (VPC) so that we can launch multiple EC2 web servers

More information

Comodo One Software Version 1.8

Comodo One Software Version 1.8 rat Comodo One Software Version 1.8 Patch Management Module Administrator Guide Guide Version 1.8.100915 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1 Introduction

More information

Decision Support AITS University Administration. EDDIE 4.1 User Guide

Decision Support AITS University Administration. EDDIE 4.1 User Guide Decision Support AITS University Administration EDDIE 4.1 User Guide 2 P a g e EDDIE (BI Launch Pad) 4.1 User Guide Contents Introduction to EDDIE... 4 Log into EDDIE... 4 Overview of EDDIE Homepage...

More information

How to integrate Verax NMS & APM with Verax Service Desk

How to integrate Verax NMS & APM with Verax Service Desk How to integrate Verax NMS & APM with Verax Service Desk Table of contents Abstract... 3 1. Configuring Service Desk notification profile in Verax Administrator Console... 4 2. Configuring incident categories

More information

UM8000 Voicemail System Administration Guide

UM8000 Voicemail System Administration Guide UM8000 Voicemail System Administration Guide CUSTOMER INFORMATION: Phone System (SV8100) IP Address: User Name: Password: Voicemail (UM8000) IP Address: Login ID: Password: Logging into the Voice Mail

More information

Nimsoft Monitor. dns_response Guide. v1.6 series

Nimsoft Monitor. dns_response Guide. v1.6 series Nimsoft Monitor dns_response Guide v1.6 series CA Nimsoft Monitor Copyright Notice This online help system (the "System") is for your informational purposes only and is subject to change or withdrawal

More information

BroadWorks Call Center Guide

BroadWorks Call Center Guide BroadWorks Call Center Guide Table of Contents Log into Call Center Configuration Settings Page 3 Change Your Password... Page 3 Dashboard... Page 4 Agent View and Status... Page 5 Change Agent ACD State...

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

Startup Guide. Version 2.3.9

Startup Guide. Version 2.3.9 Startup Guide Version 2.3.9 Installation and initial setup Your welcome email included a link to download the ORBTR plugin. Save the software to your hard drive and log into the admin panel of your WordPress

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

LiveText for Salesforce Quick Start Guide

LiveText for Salesforce Quick Start Guide LiveText for Salesforce Quick Start Guide (C) 2014 HEYWIRE BUSINESS ALL RIGHTS RESERVED LiveText for Salesforce Quick Start Guide Table of Contents Who should be looking at this document... 3 Software

More information

Network/Floating License Installation Instructions

Network/Floating License Installation Instructions Network/Floating License Installation Instructions Installation steps: On the Windows PC that will act as License Manager (SERVER): 1. Install HASP Run-time environment, SERVER 2. Plug in the red USB hardware

More information

Containerchain. LIVE User Guide for Transporters

Containerchain. LIVE User Guide for Transporters Containerchain LIVE User Guide for Transporters Table of Contents 1. Introduction 2 2. Admin 3 2.1 Company 3 2.2 Delivery Addresses 3 2.3 Customers 4 2.4 Roles 4 2.4.1 Add New Role 4 2.5 Users 5 2.5.1

More information

1 Requirements. 2 Configuration. Axis-compatible Camera Application Integration. www.exacq.com

1 Requirements. 2 Configuration. Axis-compatible Camera Application Integration. www.exacq.com Requirements The purpose of this integration guide is to explain how to install and set up an Axis-compatible application that can be integrated with an exacqvision VMS system. This guide focuses on serial

More information

AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members

AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members Last updated: 27/06/2014 Contents 1 Introduction... 2 1.1 What is ARMS?... 2 1.2 Glossary Terms... 2 2 Setting up your ARMS configuration

More information

Administration: General Overview. Astra Schedule VII Training Manual

Administration: General Overview. Astra Schedule VII Training Manual Last Update: August 2009 Release 7.3 Administration: General Overview This lesson is specifically designed to introduce system users to the look and feel of the web based application. This lesson will

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange

More information

Ans.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera

Ans.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera Faqs > Spam Monitor General Q1. What is Spam Monitor? Ans.: Spam Monitor is an easy-to-use spam filter that detects and isolates unsolicited junk mail sent to your mailbox. Designed for computer users,

More information

Chapter 10 Encryption Service

Chapter 10 Encryption Service Chapter 10 Encryption Service The Encryption Service feature works in tandem with Dell SonicWALL Email Security as a Software-as-a-Service (SaaS), which provides secure data mail delivery solutions. The

More information

Integrating LivePerson with Salesforce

Integrating LivePerson with Salesforce Integrating LivePerson with Salesforce V 9.2 March 2, 2010 Implementation Guide Description Who should use this guide? Duration This guide describes the process of integrating LivePerson and Salesforce

More information

WebSphere Business Monitor V6.2 KPI history and prediction lab

WebSphere Business Monitor V6.2 KPI history and prediction lab Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...

More information

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13 Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV

More information

Capture Pro Software FTP Server System Output

Capture Pro Software FTP Server System Output Capture Pro Software FTP Server System Output Overview The Capture Pro Software FTP server will transfer batches and index data (that have been scanned and output to the local PC) to an FTP location accessible

More information