User Guide. Hosted Web Security. Copyright CensorNet Limited,
|
|
- Melinda Floyd
- 8 years ago
- Views:
Transcription
1 User Guide Hosted Web Security Copyright CensorNet Limited, This document is designed to provide information about the first time configuration and administrator use of the Hosted Web Security (cloud based web filtering). Every effort has been made to make this document as complete and accurate as possible, but no warranty or fitness is implied. CensorNet Ltd does not accept any liability for poorly designed or malfunctioning networks. 1
2 CONTENTS Basics... 3 Getting started with Cloud Link installation... 3 Getting started with web console functionality Home Account Custom Filters Policies Policy Schedule Users & Groups Reports Unblocks Status Technical support
3 BASICS Hosted Web Security is a web content filtering service hosted in the cloud that enables you to quickly and effectively centrally manage web access for fixed or mobile computers (and any windows based device). You are able to define rules which allow or deny web access based on conditions such as time, user, group, domain or category. Hosted Web Security is a SaaS (Software-as-a-Service) product. This method of delivery means there is no need to install hardware on the local network. The product is hosted in data centres on the Internet and the management of the product takes place by logging into Software Requirements: Windows XP, 2000 Windows Vista, Windows 7 32-bit or 64-bit Web Console: Internet Explorer 9 and above Firefox 10 and above Chrome 11 and above For more details about this product, please visit GETTING STARTED WITH CLOUD LINK INSTALLATION In order to use CensorNet Hosted Web Security, you will need to download Cloud Link. Cloud Link is a small piece of software that acts as a proxy on the local PC. It captures traffic and filters it. Why do you need Cloud Link? This enables 100% ICAP compliant communication between the client and service, which delivers optimal performance to the user. The client also provides a 'single-sign-on' style authentication system which is transparent to the end-user. The client is locked down so that only administrators can change the configuration, making it ideal for remote and mobile computers. IMPORTANT: You will need access credentials from CensorNet Ltd in order to configure Cloud Link correctly. Please make sure you have this information to hand. Note for Windows 7 / Vista: You should run the setup program with administrator privileges or have an administrator account to hand during installation. Double click the setup program that you downloaded or right click and choose "Run as Administrator" if using Vista or Windows 7. To find out which system your computer is using and its bit version, click Start, right click Computer and select Properties. 3
4 Go to: Select the relevant download for your computer from the list and click to run. The Setup Wizard will start up. Press Next to continue. You will be asked to choose a path where the Cloud Link files should be installed. Unless you have a specific reason, accepting the default is fine. Press Next. 4
5 The next screen will ask you what mode you wish to use. For Cloud Link with Hosted Web Security you should select ICAP Mode. Now press Next. You will now be asked to enter the settings for ICAP Mode. They are: ICAP host: icap.cloudwebfiltering.com for Europe or icap.us.cloudwebfiltering.com for the US. ICAP port:
6 Global/Admin Password: This is an administrator password that prevents the employee from configuring or removing Cloud Link from their PC. You should choose a secure password and keep it safe. If you are using Active Directory authentication, you must enter here the global password that you have configured in the web console under Account -> Global Settings -> Global Password. This password must be used when installing all Cloud Link clients on your network. Note: If you change the Global Password via the web console you must also change it in all of your Cloud Link installations otherwise users will receive a message stating Login Failed Due To Incorrect Credentials. This password also doubles up as the admin password for configuring Cloud Link after installation. You should choose a secure password and keep it safe. Do not forget this password! Intercepted ports: These are the ports that Cloud Link will intercept traffic on before forwarding it to the cloud. The only ports supported are 80 (HTTP) and 443 (HTTPS). You can intercept both, or just one, by specifying a comma separated list here. You can alter this later. Active Directory Authorization: If you are not planning to use Active Directory as a method of authentication or you have no address within Active Directory to use, untick this option to revert to the standard method of authentication (See AD PDF for further advise Fail Open Enabled: You can chose to leave this ticked so that in the unlikely event that Cloud Link cannot connect to the Cloud servers e.g. The ICAP port is blocked by a firewall, internet routing issue or the computer running Cloud Link is using a Hot Spot environment, open internet access will be provided. When Cloud Link can reconnect to the Cloud, filtering will resume. Cloud Link is now ready to be installed. Click Back if you need to alter any settings, otherwise click Next to start the installation. Click Install. 6
7 Just before completion, or immediately after, you will most likely be prompted by Windows to allow "ProxyTray" to access the Internet through the firewall. Please accept this exception, by clicking "Allow Access". 7
8 The cloud link is now installed and running. Click Finish. After installation, you will need to enter the credentials for the user that is being filtered, unless using AD mode. User accounts are created on the web console. You will be provided with an administrator username and password for accessing the web console. If you have not received this, please contact CensorNet Ltd. Right click the Cloud Link icon in the bottom right hand corner of your screen and select Change Credentials. Enter the credentials of the user to be filtered and press OK. You will not need to enter these credentials again. 8
9 Note: To make sure the changes have taken effect, shut down your web browsers and restart them. Alternatively you can restart your computer which will achieve the same result. To test if Cloud Link is working, you should try and browse to a site that is normally blocked by our Default Policy e.g. a proxy anonymizer web site etc. If all is working, you should receive the standard blocked page. 9
10 GETTING STARTED WITH WEB CONSOLE FUNCTIONALITY Go to You will be prompted for administrator login details; these will be provided by CensorNet. Click login. HOME The Dashboard will now be displayed. This is an overview of web browsing activity that has taken place across all Cloud Link users. This will initially appear blank until Cloud Link is installed and you have user activity. Productivity Monitor (previous 3 hours) shows you the last 3 hours of browsing trends via a line graph. Green line: Sites that have been allowed. Amber line: Sites that have been visited with blocked and unblocked content. Red Line: Sites that have been blocked instantly by rules. Top 10 users by time online (previous 3 hours) show the of the users and how long they have been online in minutes. Top 10 sites by time online (previous 3 hours) show the top domains and amount of visits to them. Top 10 categories visited (previous 3 hours) uses a pie chart to break down the types of sites users have been accessing. Definitions of the graph can be found on our website: 10
11 At the bottom of the screen, you will see Message Logs and beneath that two tabs. Logs tab is an audit trail of administrator s activities on the system. News tab contains updates from CensorNet that are relevant to the product. 11
12 ACCOUNT Account has three tabs that sit within this page. Customer Details will show you your company information, the number of license purchased and authorised domain list. You are not able to edit these details yourself. To make changes please contact CensorNet. Global Settings allow you to view and change filtering options via policy and schedule. The Default Policy is a catch all for any user or group who does not have their own policy applied to them. Initially you will be set to Default Policy and Default Schedule no other options will appear. This can be changed once you have defined your own filtering policies and schedules. Then select your options from the drop down list and click Update. You may of course choose to keep the Default option. Schedule Time Zone. Making sure you set a Schedule Time Zone for your location, ensures that when you create a Policy Schedule, the policy is active according to your time zone. Global Password is used for authenticating all the cloud link clients automatically and transparently that were installed with Active Directory mode enabled. You should set the Global Password first and then set your administrator password for the Cloud Link client to match it. This will enable Active Directory to transparently authenticate users without them being asked for a username or password. Unblock Notifications. When a user accesses a page that is blocked and they request an unblock of that page, an notification will be sent to the address of the person specified here. 12
13 Note: Within Active Directory, the users profile must contain their address. That address has to match the user profile that has been set up within the web console. Cloud Link Client has been designed so that you can make changes to Ignored Apps and Bypassed Hosts for every user with Cloud Link client installed, from one central location. Ignored Apps adding applications to this section will mean that they are ignored in the filtering process. Cloud Link will intercept all HTTP or HTTPS traffic (depending on the Intercepted ports option) and filter it. Some applications use their own protocol over HTTP(s) and should not be filtered as it will cause degradation in performance. You can bypass these applications. Bypassed Hosts are domains or IP address that run web services that you do not want to filter. 13
14 CUSTOM FILTERS Custom URL module allows you to maintain a list of your own website address to allow or block and can be used within Policies for individual users or groups, to override the core list of URL categories. Think of this as an index of your own categorised web content. A classification of the categories can be found on our website: Open up Custom Allowed Sites and Custom Blocked Sites to view your customised entries. You have the option to create unlimited new categories to store web domains in. Simply select New Category and enter a name. 14
15 Click New URL to add a website URL and select an option from the Category drop down list to choose what category to add the URL to. Please Note: When entering Custom URL entries into the Hosted Web Security web console, you will need to obey the following rules: You cannot enter a protocol header or e.g. This is not required. You cannot enter an asterisk (*) e.g. *bbc.co.uk. This is already implied by the system. You cannot start the URL with a period (.)e.g..bbc.co.uk. To allow or block a specific path within a website you should enter it in full e.g. bbc.co.uk/sport or To allow a particular sub-domain for domain.com, you must specify the sub domain explicitly e.g. To allow an entire domain (sub domain + path), add just the domain e.g bbc.co.uk The key to Custom URL is to be as specific as you can to avoid matching URL s that you did not intend to block or allow. your = Sub domain bbc = Domain co.uk = Top Level Domain /news = Path 15
16 POLICIES A policy is a set of rules that define a user s ability to access content on the web. Each user will have a policy assigned to them so that their access to content is within the scope of the rules applied to that policy. A policy can be set at default, group and individual user level. Note: A policy cannot be applied directly to the user or group and is instead applied through a schedule (see category on Schedule). Initially all users will have the Default Policy applied, which has been created by CensorNet. This policy is defined to block all malware, pornography, adult content and anonymizers. Everything else is set to ignore which means it will not try to filter or take any other steps after the block rule. The Default Policy is a catch all which means it is applied to any user that does not already have their own user policy or belong to a group which has a policy. You should modify the default policy to be the basic level of filtering that you want to apply to all users and then you can be more specific by defining group and user policies (see section on Groups). When you have highlighted a policy e.g. default policy, there are additional tabs to make changes. The General tab, shown above, lets you type the policy name and give a brief description of the policy. 16
17 Filter Mode is important and allows you to set the type of filtering action your policy will use. Filter Mode has four options: Filtered - A filtered policy has one or more filters applied. These filters determine the types of sites, or even specific URLs, which are allowed or blocked. A filtered policy is useful when you are setting up rules for general permitted surfing but where unwanted content, such as pornography, or adverts are blocked. Unfiltered - An unfiltered policy has no block rules and will allow a user to access to any site. Restricted - A restricted policy allows users to visit only the specific sites (or categorized sites of a certain type) that the administrator has set. Every other site will be completely blocked from the user. Blocked - A blocked policy is one that is totally closed. A user on this policy cannot surf to any site at all. Conflict Resolution - conflicts occur when accessed content belongs to more than one category. As a default this is set to Block Rules override Allow Rules. You should select the Conflict Resolution rule you would like applied when a conflict is detected e.g. A user tries to access a website that contains both pornographic content and news. The default policy the user is assigned to, is set to allow news and is also set to block pornography. At this point a conflict has occurred because the site belongs to both categories, how will the system react? The option you have select in Conflict Resolution will either Block Rules override Allow Rules (the blocked pornography category takes precedence over the allowed news category and access is denied to the user) or Allow Rules override Block Rules (the allowed news category takes precedence over the blocked pornography category and access is granted). Unknown Sites can either be set to Block and classify or Allow. When a user accesses content that has not been classified e.g. does not belong to a category, access to the page will be denied and you will see from the blocked page that it is noted as unclassified. If you set Unknown Sites to Allow, all unclassified sites can now be access by users who are assigned to this policy. Color is simply the color you choose to view that particular policy in from the main list and is used to identify the policy in Schedule. For any changes you make in this area, you will need to click the Update button. Please note that changes may take up to 5 minutes to take effect. 17
18 New Policy To create a new policy select New Policy from the bottom left of the pannel. You will be asked to fill out a policy name and description. You will need to select a filter mode, conflict resolution state, unknown site action and finally the colour to identify the policy. Once you have completed this, click Insert. You will now be able to see your created policy in the main list. Delete Policy click the policy you no longer need so that it is highlighted, now select Delete Policy from the bottom left of the screen. Take care to only highlight the policy you wish to remove. Clone - All of the settings you have applied to the original policy will be replicated into the new one. Once you have created the copy, you are free to edit to make the necessary changes, such as the name of the policy etc. 18
19 The Custom URL tab allows you to specify, which of your custom URL categories are set to allow or block in this policy. This action will override the setting in the Categories tab, which applies to the category the URL belongs to e.g. If facebook.com belongs to a Custom URL category that is set to Allow, this will override the social networking category that is set to Block in the Categories tab, just for the facebook.com domain, all other social networking sites will still be blocked. Allow - URL s in a category set to Allow will grant access to the web content and no further filtering will take place. Ignore will take no action on the web content and will instead pass the request to the next set of filtering rules. Block will instantly deny access to the content and the user will be shown the Access Denied screen. Click Update to save: Please note that changes may take up to 5 minutes to take effect. Categories - Content from the web is grouped into Categories. For a full list of definitions visit: 19
20 Categories - The rules that you apply here will determin what web content the users within the policy can access. In the screen shot above, Adult Offensive is set to Block, this is a Top level category. It is useful if you wish to blanket allow, block or ignore access for an entire category. If you expand a top level, you will see the categories within it. Although you may have blocked the Top level category, you are still able to change the action within this category to Allow, Block or Ignore e.g. you can block Adult Offensive, but allow Hate and block Violence, which sits within the same category. If you expand further, you can view the sub-categories, these contain the actual websites to be allowed or blocked. These appear in the reports and on the access denied pages. You can be granular in what you wish to allow, block or ignore e.g. Block category Hate but Allow sub category Hate Speech. If you are unsure what category a website belongs to, use the Quick Site Lookup tool. Simply type in the web address, click Lookup and it will provide you with the relevant category. Click Update to save: Please note that changes may take up to 5 minutes to take effect. 20
21 POLICY SCHEDULE A policy schedule enables you to define when one or more policies are active during a rolling 7 day week. A policy schedule must contain at least one policy. A policy schedule can be applied to individual users or groups. Schedules are used as a method to apply policies at different times of the day e.g. I want to Allow Social Networking web content only during lunchtime for the default policy on Fridays. When your account is created by CensorNet, it will contain a Default Schedule that applies the default policy 24x7. You can modify the Default Schedule or create your own. As shown above, the General tab lets you view the name and description of the selected schedule. If you wish to make changes to the policy schedules basic details, you can do so and then click Update. To create a new Policy Schedule, click New in the bottom left of the screen. Enter the name you wish your schedule to be called and put in a brief description as to its purpose. Click Insert, you will now be able to see your newly created Policy Schedule in the main list. Delete - If you wish to delete a schedule, highlight it and then select delete from the bottom left of the screen. Take care to only highlight the schedule you wish to remove. 21
22 Schedule Definition Allows you to specify the times of day when policies are active. From the drop down list in the top left hand corner, select the policy that you wish to add to the schedule. Down the left hand side you will see all the days in the week, followed by AM and PM. With your cursor, click on the selected time slots you wish the policy to be active on. The time slot will change to the colour of the policy, indicating that this has been made active. Above you can see a highlighted section where a chosen policy has been applied to Monday AM and Monday PM (as an example). Build the policy schedule that you need. Note: Time slots are defaulted to increments of 5 minutes but you can change this to increments of 15, 30 or 1 hour. Fill At the end of the row is an option Fill, if you wish to apply the selected policy to the whole day click Fill. Clone at the end of the row allows you to replicate a day schedule to every day in the week. This saves you having to recreate the same schedule for each day. 22
23 USERS & GROUPS Users Initially the user list will only contain one user which is the administrator. This user is set up by CensorNet and there must always be at least one administrator. To apply filtering to members of your organization, you should add them as a user. The administrator will need the user s login credentials when they install the Cloud Link software onto a machine. After the first time login has been completed, authentication from this point on is transparent, the user will no longer be asked to log in as it will be automatic. From the main tree you will be able to see your user list and groups. To create a new user, click New User from the bottom left of your screen. You will be asked to enter an address and password. You should enter the address of the user. Please note the domain name must match a domain found in the Account information (see section on Accounts). You are however, required to enter a unique address for every user e.g. captain.kirk@enterprise.com / lieutenant.commander.spock@enterprise.com etc you should also specify a password. Click Insert to add the user. 23
24 From the main tree, highlight the user and view the details in the General tab. If you wish the user to be a member of a group e.g. The Marketing Team, from the Group drop down choose the group and click Update. In the main tree the user will now belong to the group The Marketing Team. There is an option to assign a Policy Schedule to this user. From the drop down list select the schedule you wish to apply and click Update. The chosen Policy Schedule will be applied to this user regardless of the Group Policy. If you do not need a separate policy schedule for this user, select the No Schedule option. Note: The user Policy Schedule will take precedence over the group policy, so be careful when applying these settings. The General tab lets you set whether your user is to be an Administrator or normal user. Click the box next to Administrator to set your user at Admin level. Ticking the Administrator box allows that person to view and use the Web Console. Leaving the box unticked means the user does not have access to the web console. 24
25 To Delete a user or reset their Password, select required option from within the General tab. You may right click on the user from the main tree and select either Delete or Reset Password according to your needs. Existing users can be dragged and dropped into a group using the cursor. CSV Uploader - If you wish to upload bulk users, rather than add them manually, you are able to upload a CSV file. Click Upload CSV (button located next to New Group and New user). The format for CSV is username,group,password. For more information visit Click the computer screen icon circled above and select your file. Now click Upload. 25
26 Groups Groups allow you to collate users so they are more manageable and so policies can be applied on Group basis. You can group by department, team, function, position etc From the main tree, if you expand a Group, below it you will find a list of the users you have assigned to that group. To create a new group, click New Group at the bottom of the main tree. Type the name you wish your Group to be called. Now select a Policy Schedule from the drop down list that you would like applied to that Group. If you do not wish to apply a Policy Schedule to the group, you can select No Schedule. Note: You should only use No Schedule if you want the Default Policy applied automatically or the individual users within the Group have their own policy. When you highlight the Group, you are able to view the name and Policy Schedule details now applied. 26
27 REPORTS Reports The reporting function has been designed to give the administrator full disclosure as to the web activities of any user with Cloud Link installed. Understanding the type of web browsing that takes place within your organization can lead to cost saving and greater efficiency. Within the Reports tab, you have various reporting tools available to you. Analyse The analyse tab allows you to set the type of criteria you wish to search for. You can request a search for one or multiple criteria based on Timespan, Username, Web Domain and Display action. Timespan is broken down into specific time increments of web activity. Starting at Previous 15 mins. Select the option for your search. 27
28 Timespan option Custom, allows you to set your own From and To timescale. This is ideal if you know the exact period you need information for. Username can be selected from the drop down list or typed in manually. You can type a partial username such as kirk, captain.kirk or the full username captain.kirk@enterprise.com the wildcard will do the rest of the work but being as specific as possible is always best for accuracy. Web Domain is the name of the website you wish to search for user activity on, for example bbc.co.uk or again the key is always to be as specific as possible for the best accuracy. Display allows you to filter the report based on action. The options are Only with Blocked which means only show results where the user has been blocked from accessing a site. Only with Allowed which means only show results where the user has been allowed to access a site. Allowed & Blocked which includes both. After you have selected all of your criteria, click Run Report All matching results will be displayed to you in the right hand pane of the screen. 28
29 The data provided by the report can be saved in two formats, PDF and CSV. To save the data as a CSV file, select CSV (located just above your Allow Hits column) shown above. A pop up box will inform you that the data will be sent to your address. Click OK. The subsequent you receive will have the subject header Your cloudwebfiltering.com report. Follow the same process to have the data sent in PDF format. Report tab (located next to analyse), is a list of pre defined reports that you can view. You have the option to select a report for 5 minutes, 1 hour, 3 hours, 1 day, 1 week, 1 month or 1 year ago. 29
30 UNBLOCKS Unblocks If a user tries to access web content that is blocked, they may genuinely require access, when this happens; they are given the opportunity to request access to that website. The Unblock tab allows you to review these requests. This is Unblock home screen. You will be presented with a list of all the requests that have been made by users to access web content. When a user tries to access a web page that is blocked, they will be shown the Access to this page has been denied screen. On the same screen there is a Request access to this site button which they can click to request unblock. They can optionally supply a reason for access to the site. They will now need to enter their Cloud link password and then click Request Unblock. This will send an to the Technical Contact (specified in Accounts tab) to notify them of the request. 30
31 Unblock requests are available to view in the console by clicking the Unblocks tab. You can select a request by clicking the check box next to it. This will highlight the whole line. You will now be given the option to add the website to a custom URL category or your own created category. Select an option from the drop down list and click Add to category to allow or deny. The web site will now be Allowed/Blocked depending on how the category is configured in Policy. If you wish to delete a request from the list, tick the box next to it so that it appears highlighted and then click Dismiss selected. That entry will now be removed. There is an option for you to send a message to the requesting user. Tick the box next to the request to highlight it, tick the box for Send a message back, type your message and when you click either, Add to category or Dismiss selected, your message will be sent to the end user automatically. 31
32 STATUS Status gives you full visibility of the performance of our service to you. HAproxy Is a load balancer and will choose which server to assign requests to, based on their current workload. icap001 Is a server that handles the filtering. icap002 - Is a server that handles the filtering. Portal Is a web server running the user interface console. Portal SSL Is an encrypted version of Portal. Please note: These details are liable to change over time or more details may be added. LEGEND Service is operating normally 99.90% uptime or better (less than 2 minutes of downtime). Service disruption 99.98/98.00% uptime (between 2 minutes to 29 minutes of downtime). Service outage Less than 98.00% uptime (more than 29 minutes of downtime). No data available Unmonitored. 32
33 By clicking on a server name e.g. HAproxy, you will be shown details specific to the server. You are able to change the server you wish to view from the drop down box at the top of the screen, shown above. Alternatively, you can go back to the main status page and select the next server you wish to see information on. TECHNICAL SUPPORT Telephone +44 (0) Live Support Desk Knowledge Base support@censornet.com
User Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
More informationUser Guide. Cloud Gateway Software Device
User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).
More informationSSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer
SSL Intercept Mode Certificate Installation Guide Revision 1.0.0 Warning and Disclaimer This document is designed to provide information about the configuration of CensorNet Professional. Every effort
More informationGetting Started Guide
Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional
More informationInvestment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationSafe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
More informationAVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
More informationProduct Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
More informationez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
More informationVirtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
More informationManual POLICY PATROL SECURE FILE TRANSFER
Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More informationEvoko Room Manager. System Administrator s Guide and Manual
Evoko Room Manager System Administrator s Guide and Manual 1 1. Contents 1. Contents... 2 2. Read this first! Introduction to this Guide... 6 3. User Guide... 6 4. System Architecture Overview... 8 ----
More informationPOLICY PATROL MFT. Manual
POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated
More informationTest Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationRemote Application Server Version 14. Last updated: 25-02-15
Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationRemote Application Server Version 14. Last updated: 06-02-15
Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationBurst Technology. bt-webfilter User Guide
Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationWebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
More informationSonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
More informationTable of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
More informationTable of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG...
Table of Contents INTRODUCTION... 2 HOME PAGE... 3 Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... 11 Raising a Service Request... 12 Edit the Service Request...
More informationNovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
More informationInstallation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access
Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Version 1 Revised 11/29/2007 Table of Contents Java Installation:...4 Browser Configuration:...4 Citrix Client Installation:...8 Attempting
More information2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationAdministrators Help Manual
Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service
More informationVirtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationNet Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
More informationNovell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
More informationVodafone Secure Device Manager Administration User Guide
Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure
More informationInstallation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
More informationAdmin Guide for Web Security Service
Admin Guide for Web Security Service Copyright Web Security Service Admin Guide July, 2013; version 4.4 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
More informationShadowControl ShadowStream
ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...
More informationSchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
More informationUser Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
More informationUSER GUIDE WWPass Security for Windows Logon
USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey
More informationNETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationNETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
More information(Installation through ADSelfService Plus web portal and Manual Installation)
ADSelfService Plus Client Software Installation Guide (Installation through ADSelfService Plus web portal and Manual Installation) 1 Table of Contents Introduction:... 3 ADSelfService Plus Client software:...
More informationCloud Services. Mozy Backup. User Guide
Cloud Services Mozy Backup User Guide 10/21/2014 CONTENTS Overview... 2 Installing Mozy... 3 Using the Settings Window... 4 Select Files to Back Up with the File System Tab... 10 Seeing How Much of Your
More informationActive Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
More informationTalk-101 User Guides Web Content Filter Administration
Talk-101 User Guides Web Content Filter Administration Contents Contents... 2 Accessing the Control Panel... 3 Proxy User Management... 4 Adding a new Proxy User... 5 Modifying an existing Proxy User...
More informationHELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1. Revision Date: July 2011
HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1 Revision Date: July 2011 Summary of Contents Summary of Contents... 2 Pre Installation Checklist... 4 Prerequisites...
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationClick Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
More informationBIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without
More informationContents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10
Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationECA IIS Instructions. January 2005
ECA IIS Instructions January 2005 THIS PAGE INTENTIONALLY BLANK ECA IIS Instructions ii July 22, 2005 Table of Contents 1. Install Certificate in IIS 5.0... 1 2. Obtain and Install the ECA Root Certificate
More informationIntroduction to Google Apps for Business Integration
Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.
More informationPortal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationUser Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
More informationContent Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
More informationManaging Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
More informationEasy Manage Helpdesk Guide version 5.4
Easy Manage Helpdesk Guide version 5.4 Restricted Rights Legend COPYRIGHT Copyright 2011 by EZManage B.V. All rights reserved. No part of this publication or software may be reproduced, transmitted, stored
More informationUSER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
More informationTrustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
More informationXIA Configuration Server
XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration
More informationThere are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
More informationCLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE
CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright
More informationCustomer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips dc07cc0432 October 19, 2007 This document applies to these Xerox products: X WC 7328/7335/7345 for the user Xerox Network Scanning TWAIN Configuration for the
More informationvcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationConfiguring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
More informationformerly Help Desk Authority 9.1.3 Upgrade Guide
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationADSelfService Plus Client Software Installation Guide
ADSelfService Plus Client Software Installation Guide ( I n s t a l l a t io n t h r o u g h A DS e l f S e r v ic e P l u s w e b p o r t a l a n d M a n u a l I n s t a l l a t io n ) 1 Table of Contents
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationUser Manual for Web. Help Desk Authority 9.0
User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
More information2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationAstaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
More informationInstallation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationEnterprise Self Service Quick start Guide
Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationHow To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
More informationInstallation Guide. Research Computing Team V1.9 RESTRICTED
Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots
More informationConfiguring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
More informationAdministration and Business Collaboration. User Manual
Administration and Business Collaboration User Manual Copyright 2007 by Eurekify Ltd., 8 Hasadna Street Raanana 43651, ISRAEL. All Rights Reserved. This document maybe used in its complete form only and
More informationInstallation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
More informationTable of Contents INTRODUCTION...2 HOME PAGE...3. Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...
Table of Contents INTRODUCTION...2 HOME PAGE...3 Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...12 REQUEST...14 Request List View... 15 Creating a New Incident...
More informationAspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
More informationAstaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationTRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE
TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks
More informationVPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
More informationConfiguration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationVMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More information