UP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab
|
|
- Kelley Small
- 8 years ago
- Views:
Transcription
1 UP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab Description The objective of this course is to introduce students to the various concepts of 3rd party patching. Students will model several use cases whereby various non-microsoft applications. Students will report on which installed applications require updates and then follow through by patching each of the applications. The instructor will relate this process to the standardized "4A Model" or a best practice approach. At the end of this lab, you should be able to Understand Patch Management configuration options Report vulnerabilities on all computers with the software update agent installed Report on individual computers update needs Understand how to use the 4A model to create best practices Review common patch problems Deploy updates Create policies Notes **Note This lab is not about configuring Patch Management Solution. A significant amount of basic configuration has been completed prior to the lab. A brief presentation will introduce this lab session and discuss key concepts. The lab will be directed and provide you with step-by-step walkthroughs of key features. Be sure to ask your instructor any questions you may have. Thank you for coming to our lab session.
2 Table of Contents UP L04 Introduction to 3 rd Party Patching Using the 4A Model Hands-On Lab... 1 Introduction to the 4A Model... 3 Assessment Phase... 3 Step 1 Identify New Updates... 3 Step 2 Review the Nature of the Vulnerability... 5 Step 3 Devices Affected... 5 Step 4 Define Custom Security Levels... 7 Step 5 Assign Custom Severity Levels... 8 Analysis Phase Application Phase Step 1 Creating the Update Policies Step 2 Processing the Policy Step 3 Reporting on Status Advancement Phase of 21
3 Introduction to the 4A Model Given the challenges involved, many organizations have found it advantageous to manage the software update process by following a best practice approach based on predictable, orderly, and repeatable processes that can be sized based on their needs and the resources available to them. One such approach is the 4A model, which seeks to strike the optimal balance between risk on one hand and the cost and impact involved in mitigating that risk on the other hand. The 4A model includes four phases: the Assessment phase, the Analysis phase, the Application phase, and the Advancement phase. Because the names of each phase begin with the letter A, this approach is known as the 4A Model. Assessment Phase The first phase of the software update process is the Assessment phase. The Assessment phase is the phase where the security team is most actively involved. The goals of the Assessment phase are to become aware of new updates, evaluate them, and prioritize them. This requires the security team to review security advisories/bulletins describing vulnerabilities, threat management alerts/feeds describing known exploits of those vulnerabilities, and information about the potential impact of the vulnerabilities on their environment. The security team uses this information to create a Risk Assessment, which prioritizes each of the updates. Step 1 Identify New Updates 1) Switch to the NS75 virtual machine and open the Symantec Management Console by double clicking on the desktop icon 2) Navigate to Home-> Patch Management-> 3) On the left side of the screen click on the link for Bulletins and Updates Note: This is typically the default screen for the Patch Management home page 4) After the report screen finishes loading, locate the column labeled Released and click it until you are sorted by descending This sorts all of the updates by most recent date top to bottom 3 of 21
4 5) From here we need to look at just the Adobe updates that have been released. From the Vendor drop down select Adobe 6) Press the Refresh button located on the menu bar (not the browser refresh button) 7) Now we need to organize the report by criticality. On the upper right side of the report menu bar locate the Group by drop down and select Severity This will create a tree view of all the Adobe updates 4 of 21
5 Step 2 Review the Nature of the Vulnerability After identifying the new updates that have been released since your prior rollout, the next step in the Assessment Phase is to understand the nature of the issues being addressed by those updates. This can only be done by reviewing the vendor security bulletins, security advisories and KB articles associated with the updates. 1) Since there is no unified mechanism for review details about any particular update (each process is vender specific) we have included a URL to show an example of what one would look like: It is a best practice to research all potential updates before they are deployed to the population. This is not always feasible in every situation but it can eliminate a large number of problems up front. Step 3 Devices Affected Once the nature of the issues addressed by the new updates is determined, the next step in the Assessment Phase is to develop an understanding of the number of devices in your environment that may be affected. 1) In the Symantec Management Console navigate to Reports-> All Reports 2) Expand Software-> Patch Management-> Compliance-> 3) Click on the Windows Compliance by Bulletin report to run it 4) Now that the report has been generated you have the ability to manipulate several of the sorting parameters as well as the date ranges. Sort the report defensing by compliance. 5) Filter out everything except for Windows 7 Professional by selecting it from the Operating System: drop down. 5 of 21
6 6) We are only concerned about updates that have been released in Use the Release Date From: parameter to filter the date 7) Press the button to reload the report with the new set of parameters 8) Locate the MS bulletin, right click on it and select View Not Installed Computers by Bulletin Note: This will open a new tab with a custom report showing which computers need this specific update. Additional custom reports can be created to tailor the solution to fit any current internal process you may have at your company 9) Close the custom report tab 6 of 21
7 Step 4 Define Custom Security Levels After becoming aware of new updates that are available and gathering information regarding devices in the environment that require those updates, the security team can then prepare a Risk Assessment prioritizing distribution of the updates. One way that this can be done is by using the Custom Severity functionality in the Patch Management Solution. Application vendors assign their own severity rating to security bulletins. However, those ratings do not account for factors unique to each organization s environment. For example, Microsoft may rate a security bulletin related to vulnerability in Internet Explorer to be Critical. While the vulnerability may be considered critical to those who use Internet Explorer, its potential impact on your organization may be much less severe if your organization s standard calls for employees to use another browser such as Chrome or Firefox. The Altiris Patch Management Solution allows users to assign custom severity ratings to software bulletins. The Core Services page of the Patch Management Solution, which you see here, allows you to define the values for the Custom Severity data element. In this example, three different Custom Severity values will be defined: Severity 1 for updates involving a vulnerability or issue that could have a significant impact on the organization Severity 2 for updates involving a vulnerability or issue that could have a moderate impact on the organization Severity 3 for updates involving issues that are likely to have a minimal impact on the organization 1) Navigate to Settings-> All Settings-> 2) Expand Software-> Patch Management-> 3) Select Core Services 4) On the right side of the screen click on the Custom Security tab 5) Enter: Severity 1 into the Security Level box and press Add 6) Repeat this process for Severity 2 and Severity 3 7) Finally, enter: Known Issue into the Security Level box. Your screen should now look like this: 7 of 21
8 8) Press Save Changes Note: This process edits the right click menu in the Patch Management reports windows. It allows you to set custom severities on individual and/or groups of updates. This process may be repeated or updated as needed as many times as your organization needs Step 5 Assign Custom Severity Levels After defining the values for the Custom Severity data element, the security team can assign a custom severity rating to each bulletin to assist the IT operations team in prioritizing the distribution of updates. Most organizations consider updates that do not have security implications to be of the lowest priority. Updates that address issues that have security implications but which are not likely to have an immediate and significant impact on an organization are usually considered to be of the second highest priority. Many organizations consider out of band releases from vendors that are assigned a severity rating of Critical by the vendor to be of the highest priority. In many cases, organizations rate security bulletins released as part of a vendor s normal release cycle as being of the second highest priority. Those updates which are not security related are often given the lowest priority. Because such updates tend to be less critical, organizations typically distribute them less frequently (e.g. quarterly or bi-annually). 1) While still in the Symantec Management Console navigate to Home-> Patch Management 2) Select the Compliance by Computer report on the left side of the screen 3) Locate and highlight the WIN7 computer 4) Right click and select View Not Installed Updates Note: This will open a new custom report window 8 of 21
9 5) Locate and highlight MS and APSB13-09 Note: Use ctrl + left click to highlight multiple items 6) With the two updates highlighted, right click on one of them and choose Custom Severity-> 01 Severity 1 7) Locate and highlight MS13-021, JAVA6-43 and MS13-A01. Set their custom severity level to Severity 2 using the method from the previous exercise 8) Finally, locate and highlight AQ and MS Set their custom severity level to Severity 3 9) Close the custom report window/tab 9 of 21
10 10) Review the custom severity settings by clicking on the Compliance by Bulletin link on the left side of the screen 11) Set the following parameters: Vendor: Operating System: Distribution Status: Any Any All 12) On the upper right side of the report menu bar select the Group by: drop down and choose Custom Severity 13) Refresh the report by pressing the button. Your report should now look like this: 10 of 21
11 14) Expand each of the custom severity tress (leave the Not Set tree collapsed). You should see the seven updates that were manipulated in previous exercises *** Do not close this page Analysis Phase The second phase of the software update process is the Analysis phase. Think of the Analysis phase as change management applied to the software update process. The Analysis phase involves defining the full scope of a rollout, understanding the potential impact of the rollout, and developing a plan to mitigate risk if something goes wrong with the rollout. The starting point for the Analysis phase is the Risk Assessment produced the Security Team as part of the Assessment phase, which prioritizes the various updates. The primary deliverable coming out of the Analysis phase is the Remediation Strategy, which identifies the updates to be distributed, endpoints to be included or excluded, and the roll back plan to be used in case things go astray. Because this particular topic is very abstract it is difficult to demonstrate in a lab environment. The deliverables, digital or otherwise, will very much depend on the available resources, maturity and scale required to create a recovery plan. Symantec has many solutions that assist with various aspects of this process. For the purposes of this lab we will leave this topic to Q&A. Regardless of the resources at your disposal it is highly recommended that everyone that could potentially be affected by failed patch deployment be made aware of the situation, even if ultimately you are unable to implement a proper and useful disaster recovery plan at this time. Disastery recovery (or lack there of) plans can and should have a significant impact on how and when updates are applied to various systems in the environment. 11 of 21
12 Application Phase The third phase in the software update process is the Application phase. The Application phase is the phase that many in this room may be most familiar with. It is the phase in which the IT operations team is most actively involved, rolling out updates based on the Remediation Strategy created during the Analysis phase. The overall goal of the Application phase is to ensure that updates are rolled out on a timely basis, while appropriately mitigating risk and minimizing disruption to the business. The primary deliverable of the Application phase is a Compliance Report, verifying that the updates were successfully rolled out. Step 1 Creating the Update Policies The first step involved in Phased rollouts is to create a Software Update Plug-in Policy for each group of computers one for the Test Group, one for the Pilot Group, and one for each of the groups of computers in the production environment. The Software Update Plug-in Policy not only defines the default installation schedule for the computers that it targets and includes Start and End Dates. The Start Date can be updated at the start of each rollout cycle to ensure that new updates don t get rolled out to a particular group of computers until it is time to do so. 1) While still on Group by Custom Severity report page (created in the last exercise) highlight the updates in the Severity 1 group (MS & APSB13-09) Use crtl + left click to highlight multiple lines 2) Right click the highlighted updates and select Distribute Packages from the menu The Software Update wizard loads 3) Change the name of the policy to Critical Updates Deployment 12 of 21
13 4) Expand the Package Options and check the boxes for Allow immediate restart if required & Run (As soon as possible ) 5) In the Apply to computers section, highlight the Windows Computers with Software Update Plug-in Installed Target line item and press the button 6) Press the button and select Computers from the list The Filter wizard loads 7) Press the Add rule button and create your filter with the following parameters: exclude computers not in Computer list WIN7 8) Press the Update results button. You should now see the WIN7 computer in the filter list 9) Press OK. Your Policy should now look like this: 10) Press Next > 11) Enable the policy by press the red orb button ( ) and choosing ON ( ) 13 of 21
14 12) Press the Distribute software updates button to deploy the updates In a production environment rather than selecting an individual computer to deploy the first round of updates to we would use a test group that would have been created prior to creating the policy. Assuming there aren t any problems in the test group, the policy would then be cloned and applied to additional groups as necessary until the rollout is complete. Step 2 Processing the Policy It is important to note that this step will happen naturally, without manual intervention, based on the agent policies in your environment. We are simply forcing the process for the sake of time. 1) On the NS75 virtual machine locate and click the shortcut for the Windows Task Scheduler on the Start Bar 2) After the Task Scheduler loads, select the Task Scheduler Library on the left side of the screen Note: Many of the schedules that the Symantec Management Platform utilizes are located on this screen. It is import that you take extreme caution when modifying the scheduling settings. Even something as simple as changing an interval from 60 minutes to 30 minutes may have a dramatic effect in your environment. Always consult Symantec documentation or a certified partner for advice 3) Sort the Name column ascending (Z-A) by clicking on the name column once If performed correctly, the first line item should be NS.Windows Patch Remediation Settings. {GUID} 4) Highlight it, right click and press Run 14 of 21
15 5) This process can take anywhere from 60 seconds to 15 minutes to complete. In our lab it should take approximately 2 minutes. Press the Refresh button in the Actions pane to the right periodically to view status. Once your status changes from to you may proceed to the next step Note: As previously mentioned this process will happen naturally on a scheduled basis. It essentially associates the newly created Patch Policies with the appropriate targeted resources 6) Switch to the WIN7 virtual machine 7) Double click the Symantec Management Agent Icon in the system tray 8) Press the button to bring up the agent settings screen 9) Locate and press the Update button to force the agent to check in with the management server If performed correctly, you will see the Changed time stamp closely match the Requested time stamp 15 of 21
16 10) Back on the Symantec Management Agent screen, select the Software Updates tab 11) Once the agent receives the policy and processes it, you should begin to see the updates listed on the screen: 12) Again, this next set of steps would happen automatically but in order to speed it along, locate the Start Software Update Cycle link on the bottom right of the Agent page and press it Note: You may have to wait a few minutes for any current processes to finish (the agent may be in the middle of an Inventory, etc) 16 of 21
17 13) After a brief period, you will see a notification screen like this: Feel free to wait or press Install now to begin the update process Note: The notification itself as well as the amount of time given to the user can be configured based on your companies requirements The updates will now go through a series of steps while they are process, installed and verified. You will typically see a set of assigned updates in this status when they are ready to be installed, but waiting for a specific time to execute (in our case we are waiting on the Patch engine to make sure the updates are still applicable to this specific computer): 17 of 21
18 14) Press the Start Software Update Cycle link again to force the update process to proceed After a few moments you should see that status change to Installation in progress and then to Verification. The Verification step runs another Assessment Scan to make sure the updates were installed correctly Once the installation has completed successfully, the status will change to reflect the success: 18 of 21
19 Step 3 Reporting on Status After the updates have been installed you can report on the state of each of the computers that were part of the patch cycle. Since the patch process is in constant communication with the management server, this data is readily available 1) Switch to the NS75 virtual machine 2) Open the Symantec Management Console and navigate to Home-> Patch Management Note: There are several ways to report on update status. You can view the resource to see if the update is missing/needs to be installed. You can see all of the applicable updates and their installation status as well as look at the individual logs for each policy deployment. For the purposes of this lab we are going to focus on the more global approach by looking at all applicable updates 3) Select the Compliance by Computer report on the left side of the screen 4) Locate and highlight the WIN7 computer 5) Right click and select View Applicable Updates This dynamic report will show us all of the updates that apply to this resource and their installation status 6) From here we can search for the specific updates that were installed via the policy created in the previous steps. Locate the Search bar in the upper right and enter: MS of 21
20 7) The report will filter the results and show us the MS update. Note that its Installed status is True As previously mentioned there are numerous methods for presenting patch status data and an almost unlimited combination of data may be displayed via custom reporting. In production these reports would be tailored to meet the specific needs of the individuals who are responsible for reviewing the data 20 of 21
21 Advancement Phase The fourth and final phase of the software update process is the Advancement phase. Think of the Advancement phase as the continuous improvement part of the process. This part of the process often utilizes a lessons learned type of approach and usually involves all of those who play an active role in the process. The primary goal of the Advancement phase is to fine-tune and optimize the process. It is important to understand that the patch management process is constantly evolving. There are many individual roles and specific responsibilities that are often performed by a single individual and should probably have several teams involved. Whether it is resource constraints or something else the most important thing that can be done is to modularize the process and collect data along the way. Collecting data from each step allows for a post mortem analysis of the process and modularizing the process allows you to quickly fine tune at a granular level without having to rewrite the entire process itself. This concludes the hands on portion of the lab. 21 of 21
EML-09 Keeping Operating Systems and Applications up to date with Patch Management 7.1
EML-09 Keeping Operating Systems and Applications up to date with Patch Management 7.1 Description Maintianing consistant and current patch status is a critical part of any security strategy. In this lab,
More informationUP L07 Maintaining Application Customizations as Part of the Patch Process
UP L07 Maintaining Application Customizations as Part of the Patch Process Description The objective of this course is to provide students with methodologies for customizing the update packages that are
More informationCreating a Patch Management Dashboard with IT Analytics Hands-On Lab
Creating a Patch Management Dashboard with IT Analytics Hands-On Lab Description This lab provides a hands-on overview of the IT Analytics Solution. Students will learn how to browse cubes and configure
More informationUPL09 Reporting on Software License Compliance Hands-On Lab
UPL09 Reporting on Software License Compliance Hands-On Lab Description Explore various methodologies that can be utilized to extend the outof-the-box supported software license compliance and tracking
More informationEML 03 Best Practices for Policy Management in Client Management Suite Hands-On Lab
EML 03 Best Practices for Policy Management in Client Management Suite Hands-On Lab Description If you are new to the Symantec Management Technologies or are just looking to reinforce your existing knowledge
More informationIS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection Description Lab flow At the end of this lab, you should be able to Discover how to harness the power and capabilities
More informationBest Practices. Understanding BeyondTrust Patch Management
Best Practices Understanding BeyondTrust Patch Management February 2014 Contents Overview... 3 1 - Configure Retina CS... 4 2 - Enable Patch Management for Smart Groups... 6 3 Identify and Approve Patches...
More informationClosing the Vulnerability Gap of Third- Party Patching
SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage
More informationLumension Endpoint Management and Security Suite
Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module
More informationAV Management Dashboard
LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data
More informationHP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
More informationUnderstanding BeyondTrust Patch Management
Best Practices WHITE PAPER Understanding BeyondTrust Patch Management February 2014 Contents Overview... 3 1 - Configure Retina CS... 4 2 - Enable Patch Management for Smart Groups... 6 3 Identify and
More informationSetting up Email in Outlook Express
Setting up Email in Outlook Express If you have more than one email account but need to use a single computer to access them, then Outlook Express can help. To begin, open Outlook Express by double-clicking
More informationManaging Software Updates with System Center 2012 R2 Configuration Manager
Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Microsoft Updates with Configuration Manager 2012 R2 This document is for informational purposes only. MICROSOFT MAKES
More informationUP L17 Virtualization: Security Without Sacrificing Performance
UP L17 Virtualization: Security Without Sacrificing Performance Hands on lab Description In this hands on lab you will learn how to optimize SEP 12 for your virtual desktops to get maximum protection without
More informationSonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in
More informationSymantec PGP Whole Disk Encryption Hands-On Lab V 3.7
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption
More informationIBM Business Monitor V8.0 Global monitoring context lab
Copyright IBM Corporation 2012 All rights reserved IBM BUSINESS MONITOR 8.0 LAB EXERCISE IBM Business Monitor V8.0 lab What this exercise is about... 2 Lab requirements... 2 What you should be able to
More informationRemote Desktop Web Access. Using Remote Desktop Web Access
Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off
More informationALTIRIS Patch Management Solution 6.2 for Windows Help
ALTIRIS Patch Management Solution 6.2 for Windows Help Notice Altiris Patch Management Solution 6.2 2001-2006 Altiris, Inc. All rights reserved. Document Date: February 13, 2007 Protected by one or more
More informationXythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
More informationMicrosoft Dynamics CRM Clients
Microsoft Dynamics CRM Clients A user can work with Microsoft Dynamics CRM in two ways: By accessing the Microsoft Dynamics CRM application using Microsoft Internet Explorer, Google Chrome, FireFox, and
More informationKnowledge Base Articles
Knowledge Base Articles 2005 Jalasoft Corp. All rights reserved. TITLE: How to configure and use the Jalasoft Xian Syslog Server. REVISION: Revision : B001-SLR01 Date : 11/30/05 DESCRIPTION: Jalasoft has
More informationAccessing Windows 7 in the Student Labs
Accessing Windows 7 in the Student Labs This document explains how to access and use Windows 7 and some of the software installed on Windows 7, such as Microsoft Office 2010, on the student lab computers.
More informationIBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
More informationModule SYSTEM INTRODUCTION & BASIC NAVIGATION. Astra Schedule Training Guide
Module 1 SYSTEM INTRODUCTION & BASIC NAVIGATION Astra Schedule Training Guide Table of Contents Introduction... 1 Lesson Audience... 1 Lesson Objectives... 1 Configuration Requirements... 1 Common Practices...
More informationTable of Contents. 1. Content Approval...1 EVALUATION COPY
Table of Contents Table of Contents 1. Content Approval...1 Enabling Content Approval...1 Content Approval Workflows...4 Exercise 1: Enabling and Using SharePoint Content Approval...9 Exercise 2: Enabling
More informationNorthwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
More informationA Best Practice Approach to Third Party Patching
A Best Practice Approach to Third Party Patching Mike Grueber Senior Product Manager 1 Effective patch management is essential 90% of successful attacks occurred against previously known vulnerabilities
More informationPresentation Reporting Quick Start
Presentation Reporting Quick Start Topic 50430 Presentation Reporting Quick Start Websense Web Security Solutions Updated 19-Sep-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web
More informationAltiris Patch Management Solution for Windows 7.1 from Symantec Release Notes
Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes The software described in this book is furnished
More informationpcanywhere Advanced Configuration Guide
Introduction The pcanywhere Solution Advanced Configuration Guide is provided to assist customers with advanced features once they have the Symantec Management Platform with pcanywhere Solution installed.
More informationUsing Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab
Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab Description In this hands-on session, you will learn how to turn your proxy into a security
More informationNovell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
More informationPatch Management Hands-On Exercises. Patch Management Hands-on Exercise
Patch Management Hands-On Exercises Patch Management Hands-on Exercise 192 Chapter 5 Patch Management Hands-On Exercises Background Story You have been hired as the lead IT Administrator at the Florida
More informationEM L09 Simplify IT with Creative Ways to Leverage Dashboards, Reports and Workflows Hands-On Lab
EM L09 Simplify IT with Creative Ways to Leverage Dashboards, Reports and Workflows Hands-On Lab Description Operationally many IT departments are flooded with things to do," and with every additional
More informationCHAPTER 11: SALES REPORTING
Chapter 11: Sales Reporting CHAPTER 11: SALES REPORTING Objectives Introduction The objectives are: Understand the tools you use to evaluate sales data. Use default sales productivity reports to review
More informationCHAPTER 6: ANALYZE MICROSOFT DYNAMICS NAV 5.0 DATA IN MICROSOFT EXCEL
Chapter 6: Analyze Microsoft Dynamics NAV 5.0 Data in Microsoft Excel CHAPTER 6: ANALYZE MICROSOFT DYNAMICS NAV 5.0 DATA IN MICROSOFT EXCEL Objectives The objectives are: Explain the process of exporting
More informationEM L12 Symantec Mobile Management and Managed PKI Hands-On Lab
EM L12 Symantec Mobile Management and Managed PKI Hands-On Lab Description Building and Managing a Certficate Authority infrastructure to support your Mobile Management infrastructure can be time consuming
More informationCECH Virtual Lab Guide Windows 7/Vista Edition
CECH Virtual Lab Guide Windows 7/Vista Edition Introduction: This guide is a step-by-step walkthrough of installing, configuring, and using the VMware Horizon View Client to access the University of Cincinnati
More informationClient Manager for Endpoint Protection (CMEP) User s Guide
Client Manager for Endpoint Protection (CMEP) July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product
More informationWebSphere Business Monitor V6.2 KPI history and prediction lab
Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...
More informationEM L18 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab
EM L18 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab Description The Symantec Mobile Management platform continues to expand it s offering with new support for native
More informationEM L07 Thinking Outside the Box with Complex Software Licensing
EM L07 Thinking Outside the Box with Complex Software Licensing Description Through its flexible options for data presentation and manipulation, Asset Management Suite provides several options to best
More informationBackup Assistant. User Guide. NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6
Backup Assistant User Guide NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6 Liability Disclaimer NEC Unified Solutions, Inc. reserves the right to change the specifications, functions,
More informationEM L05 Working with Change and Problem Management Using ITIL Best Practices Hands-On Lab
EM L05 Working with Change and Problem Management Using ITIL Best Practices Hands-On Lab Description Change and problem management have new features in ServiceDesk 7.1 SP2. In this session, we will apply
More informationCAS CLOUD WEB USER GUIDE. UAB College of Arts and Science Cloud Storage Service
CAS CLOUD WEB USER GUIDE UAB College of Arts and Science Cloud Storage Service Windows Version, April 2014 Table of Contents Introduction... 1 UAB Software Policies... 1 System Requirements... 2 Supported
More informationFile Share Navigator Online 1
File Share Navigator Online 1 User Guide Service Pack 3 Issued November 2015 Table of Contents What s New in this Guide... 4 About File Share Navigator Online... 5 Components of File Share Navigator Online...
More informationExchange Server Backup and Restore
WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...
More informationStarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No
More informationDeploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide
Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection
More informationAltiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide
Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide Altiris Patch Management Solution for Linux 7.1 SP2 from Symantec User Guide The software described in this book is furnished
More informationTest Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
More informationConfiguring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task.
Lab 8 User name: Administrator Password: Password1 Contents Exercise 8-1: Assigning a Custom Load Evaluator... 1 Scenario... 1 Configuring a Custom Load Evaluator... 1 Assigning a Load Evaluator to a Server...
More informationActualtests.C2010-508.40 questions
Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got
More informationQuick guide steps you need to take
Single Sign On user manual (EMM SSO) From website http://www.emm.sk/download/emm-sso we will download file EMM-SSO.ZIP. The file needs to be unpacked and installation programme SETUP.EXE must be run. The
More informationMicrosoft Query, the helper application included with Microsoft Office, allows
3 RETRIEVING ISERIES DATA WITH MICROSOFT QUERY Microsoft Query, the helper application included with Microsoft Office, allows Office applications such as Word and Excel to read data from ODBC data sources.
More informationProviding Patch Management With N-central. Version 7.2
Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
More informationLab Activity File Management with Windows Explorer Windows XP, Vista, Windows 7 and Windows 8 Brought to you by RMRoberts.com
Lab Activity File Management with Windows Explorer Windows XP, Vista, Windows 7 and Windows 8 Brought to you by RMRoberts.com After completing this laboratory activity, you will be able to: o Open and
More informationUP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
More informationAccessing the Online Meeting Room (Blackboard Collaborate)
Step 1: Check your System and Install Required Software NOTE: Make sure you are on the computer you will be using to access the online meeting room AND that you are using the internet browser (ie: firefox,
More informationUsing Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005
Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows
More informationHow To Use Query Console
Query Console User Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Query Console User
More informationModule SYSTEM INTRODUCTION & BASIC NAVIGATION. Astra Schedule Training Guide
Module A SYSTEM INTRODUCTION & BASIC NAVIGATION Astra Schedule Training Guide Table of Contents Introduction... 1 Lesson Audience... 1 Lesson Objectives... 1 Configuration Requirements... 1 Common Practices...
More information1 Installation. Note: In Windows operating systems, you must be logged in with administrator rights to install the printer driver.
Installation A printer driver is an application that manages communication between a printer and your computer. Once installed, the printer driver settings must be configured in the printer Properties
More informationManaging Linux Servers with System Center 2012 R2
Managing Linux Servers with System Center 2012 R2 System Center 2012 R2 Hands-on lab In this lab, you will use System Center 2012 R2 Operations Manager and System Center 2012 R2 Configuration Manager to
More informationBIG LOTS VENDOR COMPLIANCE WEB PORTAL USER GUIDE - VENDOR 300 PHILLIPI RD. COLUMBUS, OH 43228
BIG LOTS VENDOR COMPLIANCE WEB PORTAL USER GUIDE - VENDOR 300 PHILLIPI RD. COLUMBUS, OH 43228 Contents Getting Started...4 Tips for Using Actionable Intelligence... 4 Logging into Actionable Intelligence...
More informationSystem Center 2012 R2 Lab 5: Application Management
System Center 2012 R2 Lab 5: Application Management Hands-On Lab Step-by-Step Guide For the VMs use the following credentials: Username: Contoso\Administrator Password: Passw0rd! Version: 1.5.5 Last updated:
More informationDeploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
More information13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES
LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated
More informationLANDesk Management Suite 9.0. Getting started with Patch Manager
LANDesk Management Suite 9.0 Getting started with Patch Manager DOWNLOAD PATCH CONTENT TO THE CORE SERVER INTRODUCTION This document is intended to assist LANDesk Management Suite administrators with implementing
More informationGetting Started with Vision 6
Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop
More informationBusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 How to configure an Internet Information Services server as a front end to a WebLogic application server Overview Contents This document describes the process of
More informationBest Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
More informationSingle Mailbox Recovery 7.0 Administrative Server Administration Guide
Single Mailbox Recovery 7.0 Administrative Server Administration Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1
More informationSymantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide
Symantec Patch Management Solution for Windows 7.5 SP1 powered by Altiris User Guide Altiris Patch Management Solution for Windows 7.5 SP1 from Symantec User Guide The software described in this book is
More informationHow To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black
Introduction to Cloud-Based Mobile Device Management with Intune Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationVMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
More informationHow To Manage Inventory On Q Global On A Pcode (Q)
Pearson Clinical Assessment Q-global User Guide Managing Inventory PEARSON 2 MANAGING INVENTORY Managing Inventory Overview When inventory is purchased, you will need to set up the allocations for the
More informationPowerSchool Parent Portal User Guide. PowerSchool 7.x Student Information System
PowerSchool 7.x Student Information System Released December 2011 Document Owner: Documentation Services This edition applies to Release 7.1 of the [product name] software and to all subsequent releases
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationAssets, Groups & Networks
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationReference Guide for WebCDM Application 2013 CEICData. All rights reserved.
Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Version 1.2 Created On February 5, 2007 Last Modified August 27, 2013 Table of Contents 1 SUPPORTED BROWSERS... 3 1.1 INTERNET
More informationMICROSOFT OUTLOOK 2011 READ, SEARCH AND PRINT E-MAILS
MICROSOFT OUTLOOK 2011 READ, SEARCH AND PRINT E-MAILS Lasted Edited: 2012-07-10 1 Find the Inbox... 3 Check for New Mail... 4 Manually check for new messages... 4 Change new incoming e-mail schedule options...
More informationManaged Security Web Portal USER GUIDE
Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1
More informationCNW Re-Tooling Exercises
CNW Re-Tooling Exercises I Exercise 1: VPN... 1 Scenario... 1 Detail Steps to perform exercise:... 1 Exercise 2: Install and Configure a Certificate to Web Server... 4 Scenario... 4 Detail Steps to perform
More informationWelcome To Paragon 3.0
Welcome To Paragon 3.0 Paragon MLS is the next generation of web-based services designed by FNIS specifically for agents, brokers, and MLS administrators. Paragon MLS is an amazingly flexible online system
More informationPRINT CONFIGURATION. 1. Printer Configuration
PRINT CONFIGURATION Red Flag Server5 has improved the designs of the printer configuration tool to facilitate you to conduct print configuration and print tasks management in a more convenient and familiar
More informationNetwork Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
More informationMicrosoft Office Access 2007 which I refer to as Access throughout this book
Chapter 1 Getting Started with Access In This Chapter What is a database? Opening Access Checking out the Access interface Exploring Office Online Finding help on Access topics Microsoft Office Access
More informationLab 1: Windows Azure Virtual Machines
Lab 1: Windows Azure Virtual Machines Overview In this hands-on Lab, you will learn how to deploy a simple web page to a Web server hosted in Windows Azure and configure load balancing. Objectives In this
More informationUser Guide Online Backup
User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading
More informationBMC Remedy Service Desk: Incident Management 7.6.00 User s Guide
BMC Remedy Service Desk: Incident Management 7.6.00 User s Guide October 2010 BMC Remedy Service Desk: Incident Management 7.6.00 1 Contents Chapter 1 Introducing BMC Remedy Incident Management... 3 Getting
More informationMODULE 2: SMARTLIST, REPORTS AND INQUIRIES
MODULE 2: SMARTLIST, REPORTS AND INQUIRIES Module Overview SmartLists are used to access accounting data. Information, such as customer and vendor records can be accessed from key tables. The SmartList
More informationChamberMaster - QuickBooks Guide
ChamberMaster - QuickBooks Guide CHAMBERMASTER ChamberMaster QuickBooks Guide ChamberMaster A Division of MicroNet, Inc. 14391 Edgewood Drive Baxter MN 56425 218.825.9200 800.825.9171 support@chambermaster.com
More informationProviding Patch Management with N-central. Version 9.1
Providing Patch Management with N-central Version 9.1 Contents Patch Management 4 Introduction 4 Monitoring for Missing Patches 4 Setting up Patch Management in N-central 5 Adding a WSUS Server to N-central
More informationRochester Institute of Technology. Finance and Administration. Drupal 7 Training Documentation
Rochester Institute of Technology Finance and Administration Drupal 7 Training Documentation Written by: Enterprise Web Applications Team CONTENTS Workflow... 4 Example of how the workflow works... 4 Login
More informationHatco Lead Management System: http://hatco.scangroup.net/
Hatco Lead Management System User Guide General Notes: The Hatco Lead Management System (HLMS) is designed to work with modern web browsers, such as Internet Explorer 9 or newer, Firefox, Chrome & Safari.
More informationImportant Notes for WinConnect Server VS Software Installation:
Important Notes for WinConnect Server VS Software Installation: 1. Only Windows Vista Business, Windows Vista Ultimate, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 (32-bit & 64-bit),
More informationTeam Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide
Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation
More information