User Guide. Hosted Web Security. Copyright CensorNet Limited,

Size: px
Start display at page:

Download "User Guide. Hosted Web Security. Copyright CensorNet Limited, 2007-2012"

Transcription

1 User Guide Hosted Web Security Copyright CensorNet Limited, This document is designed to provide information about the first time configuration and administrator use of the Hosted Web Security (cloud based web filtering). Every effort has been made to make this document as complete and accurate as possible, but no warranty or fitness is implied. CensorNet Ltd does not accept any liability for poorly designed or malfunctioning networks. 1

2 CONTENTS Basics... 3 Getting started with Cloud Link installation... 3 Getting started with web console functionality Home Account Custom Filters Policies Policy Schedule Users & Groups Reports Unblocks Status Technical support

3 BASICS Hosted Web Security is a web content filtering service hosted in the cloud that enables you to quickly and effectively centrally manage web access for fixed or mobile computers (and any windows based device). You are able to define rules which allow or deny web access based on conditions such as time, user, group, domain or category. Hosted Web Security is a SaaS (Software-as-a-Service) product. This method of delivery means there is no need to install hardware on the local network. The product is hosted in data centres on the Internet and the management of the product takes place by logging into Software Requirements: Windows XP, 2000 Windows Vista, Windows 7 32-bit or 64-bit Web Console: Internet Explorer 9 and above Firefox 10 and above Chrome 11 and above For more details about this product, please visit GETTING STARTED WITH CLOUD LINK INSTALLATION In order to use CensorNet Hosted Web Security, you will need to download Cloud Link. Cloud Link is a small piece of software that acts as a proxy on the local PC. It captures traffic and filters it. Why do you need Cloud Link? This enables 100% ICAP compliant communication between the client and service, which delivers optimal performance to the user. The client also provides a 'single-sign-on' style authentication system which is transparent to the end-user. The client is locked down so that only administrators can change the configuration, making it ideal for remote and mobile computers. IMPORTANT: You will need access credentials from CensorNet Ltd in order to configure Cloud Link correctly. Please make sure you have this information to hand. Note for Windows 7 / Vista: You should run the setup program with administrator privileges or have an administrator account to hand during installation. Double click the setup program that you downloaded or right click and choose "Run as Administrator" if using Vista or Windows 7. To find out which system your computer is using and its bit version, click Start, right click Computer and select Properties. 3

4 Go to: Select the relevant download for your computer from the list and click to run. The Setup Wizard will start up. Press Next to continue. You will be asked to choose a path where the Cloud Link files should be installed. Unless you have a specific reason, accepting the default is fine. Press Next. 4

5 The next screen will ask you what mode you wish to use. For Cloud Link with Hosted Web Security you should select ICAP Mode. Now press Next. You will now be asked to enter the settings for ICAP Mode. They are: ICAP host: icap.cloudwebfiltering.com for Europe or icap.us.cloudwebfiltering.com for the US. ICAP port:

6 Global/Admin Password: This is an administrator password that prevents the employee from configuring or removing Cloud Link from their PC. You should choose a secure password and keep it safe. If you are using Active Directory authentication, you must enter here the global password that you have configured in the web console under Account -> Global Settings -> Global Password. This password must be used when installing all Cloud Link clients on your network. Note: If you change the Global Password via the web console you must also change it in all of your Cloud Link installations otherwise users will receive a message stating Login Failed Due To Incorrect Credentials. This password also doubles up as the admin password for configuring Cloud Link after installation. You should choose a secure password and keep it safe. Do not forget this password! Intercepted ports: These are the ports that Cloud Link will intercept traffic on before forwarding it to the cloud. The only ports supported are 80 (HTTP) and 443 (HTTPS). You can intercept both, or just one, by specifying a comma separated list here. You can alter this later. Active Directory Authorization: If you are not planning to use Active Directory as a method of authentication or you have no address within Active Directory to use, untick this option to revert to the standard method of authentication (See AD PDF for further advise Fail Open Enabled: You can chose to leave this ticked so that in the unlikely event that Cloud Link cannot connect to the Cloud servers e.g. The ICAP port is blocked by a firewall, internet routing issue or the computer running Cloud Link is using a Hot Spot environment, open internet access will be provided. When Cloud Link can reconnect to the Cloud, filtering will resume. Cloud Link is now ready to be installed. Click Back if you need to alter any settings, otherwise click Next to start the installation. Click Install. 6

7 Just before completion, or immediately after, you will most likely be prompted by Windows to allow "ProxyTray" to access the Internet through the firewall. Please accept this exception, by clicking "Allow Access". 7

8 The cloud link is now installed and running. Click Finish. After installation, you will need to enter the credentials for the user that is being filtered, unless using AD mode. User accounts are created on the web console. You will be provided with an administrator username and password for accessing the web console. If you have not received this, please contact CensorNet Ltd. Right click the Cloud Link icon in the bottom right hand corner of your screen and select Change Credentials. Enter the credentials of the user to be filtered and press OK. You will not need to enter these credentials again. 8

9 Note: To make sure the changes have taken effect, shut down your web browsers and restart them. Alternatively you can restart your computer which will achieve the same result. To test if Cloud Link is working, you should try and browse to a site that is normally blocked by our Default Policy e.g. a proxy anonymizer web site etc. If all is working, you should receive the standard blocked page. 9

10 GETTING STARTED WITH WEB CONSOLE FUNCTIONALITY Go to You will be prompted for administrator login details; these will be provided by CensorNet. Click login. HOME The Dashboard will now be displayed. This is an overview of web browsing activity that has taken place across all Cloud Link users. This will initially appear blank until Cloud Link is installed and you have user activity. Productivity Monitor (previous 3 hours) shows you the last 3 hours of browsing trends via a line graph. Green line: Sites that have been allowed. Amber line: Sites that have been visited with blocked and unblocked content. Red Line: Sites that have been blocked instantly by rules. Top 10 users by time online (previous 3 hours) show the of the users and how long they have been online in minutes. Top 10 sites by time online (previous 3 hours) show the top domains and amount of visits to them. Top 10 categories visited (previous 3 hours) uses a pie chart to break down the types of sites users have been accessing. Definitions of the graph can be found on our website: 10

11 At the bottom of the screen, you will see Message Logs and beneath that two tabs. Logs tab is an audit trail of administrator s activities on the system. News tab contains updates from CensorNet that are relevant to the product. 11

12 ACCOUNT Account has three tabs that sit within this page. Customer Details will show you your company information, the number of license purchased and authorised domain list. You are not able to edit these details yourself. To make changes please contact CensorNet. Global Settings allow you to view and change filtering options via policy and schedule. The Default Policy is a catch all for any user or group who does not have their own policy applied to them. Initially you will be set to Default Policy and Default Schedule no other options will appear. This can be changed once you have defined your own filtering policies and schedules. Then select your options from the drop down list and click Update. You may of course choose to keep the Default option. Schedule Time Zone. Making sure you set a Schedule Time Zone for your location, ensures that when you create a Policy Schedule, the policy is active according to your time zone. Global Password is used for authenticating all the cloud link clients automatically and transparently that were installed with Active Directory mode enabled. You should set the Global Password first and then set your administrator password for the Cloud Link client to match it. This will enable Active Directory to transparently authenticate users without them being asked for a username or password. Unblock Notifications. When a user accesses a page that is blocked and they request an unblock of that page, an notification will be sent to the address of the person specified here. 12

13 Note: Within Active Directory, the users profile must contain their address. That address has to match the user profile that has been set up within the web console. Cloud Link Client has been designed so that you can make changes to Ignored Apps and Bypassed Hosts for every user with Cloud Link client installed, from one central location. Ignored Apps adding applications to this section will mean that they are ignored in the filtering process. Cloud Link will intercept all HTTP or HTTPS traffic (depending on the Intercepted ports option) and filter it. Some applications use their own protocol over HTTP(s) and should not be filtered as it will cause degradation in performance. You can bypass these applications. Bypassed Hosts are domains or IP address that run web services that you do not want to filter. 13

14 CUSTOM FILTERS Custom URL module allows you to maintain a list of your own website address to allow or block and can be used within Policies for individual users or groups, to override the core list of URL categories. Think of this as an index of your own categorised web content. A classification of the categories can be found on our website: Open up Custom Allowed Sites and Custom Blocked Sites to view your customised entries. You have the option to create unlimited new categories to store web domains in. Simply select New Category and enter a name. 14

15 Click New URL to add a website URL and select an option from the Category drop down list to choose what category to add the URL to. Please Note: When entering Custom URL entries into the Hosted Web Security web console, you will need to obey the following rules: You cannot enter a protocol header or e.g. This is not required. You cannot enter an asterisk (*) e.g. *bbc.co.uk. This is already implied by the system. You cannot start the URL with a period (.)e.g..bbc.co.uk. To allow or block a specific path within a website you should enter it in full e.g. bbc.co.uk/sport or To allow a particular sub-domain for domain.com, you must specify the sub domain explicitly e.g. To allow an entire domain (sub domain + path), add just the domain e.g bbc.co.uk The key to Custom URL is to be as specific as you can to avoid matching URL s that you did not intend to block or allow. your = Sub domain bbc = Domain co.uk = Top Level Domain /news = Path 15

16 POLICIES A policy is a set of rules that define a user s ability to access content on the web. Each user will have a policy assigned to them so that their access to content is within the scope of the rules applied to that policy. A policy can be set at default, group and individual user level. Note: A policy cannot be applied directly to the user or group and is instead applied through a schedule (see category on Schedule). Initially all users will have the Default Policy applied, which has been created by CensorNet. This policy is defined to block all malware, pornography, adult content and anonymizers. Everything else is set to ignore which means it will not try to filter or take any other steps after the block rule. The Default Policy is a catch all which means it is applied to any user that does not already have their own user policy or belong to a group which has a policy. You should modify the default policy to be the basic level of filtering that you want to apply to all users and then you can be more specific by defining group and user policies (see section on Groups). When you have highlighted a policy e.g. default policy, there are additional tabs to make changes. The General tab, shown above, lets you type the policy name and give a brief description of the policy. 16

17 Filter Mode is important and allows you to set the type of filtering action your policy will use. Filter Mode has four options: Filtered - A filtered policy has one or more filters applied. These filters determine the types of sites, or even specific URLs, which are allowed or blocked. A filtered policy is useful when you are setting up rules for general permitted surfing but where unwanted content, such as pornography, or adverts are blocked. Unfiltered - An unfiltered policy has no block rules and will allow a user to access to any site. Restricted - A restricted policy allows users to visit only the specific sites (or categorized sites of a certain type) that the administrator has set. Every other site will be completely blocked from the user. Blocked - A blocked policy is one that is totally closed. A user on this policy cannot surf to any site at all. Conflict Resolution - conflicts occur when accessed content belongs to more than one category. As a default this is set to Block Rules override Allow Rules. You should select the Conflict Resolution rule you would like applied when a conflict is detected e.g. A user tries to access a website that contains both pornographic content and news. The default policy the user is assigned to, is set to allow news and is also set to block pornography. At this point a conflict has occurred because the site belongs to both categories, how will the system react? The option you have select in Conflict Resolution will either Block Rules override Allow Rules (the blocked pornography category takes precedence over the allowed news category and access is denied to the user) or Allow Rules override Block Rules (the allowed news category takes precedence over the blocked pornography category and access is granted). Unknown Sites can either be set to Block and classify or Allow. When a user accesses content that has not been classified e.g. does not belong to a category, access to the page will be denied and you will see from the blocked page that it is noted as unclassified. If you set Unknown Sites to Allow, all unclassified sites can now be access by users who are assigned to this policy. Color is simply the color you choose to view that particular policy in from the main list and is used to identify the policy in Schedule. For any changes you make in this area, you will need to click the Update button. Please note that changes may take up to 5 minutes to take effect. 17

18 New Policy To create a new policy select New Policy from the bottom left of the pannel. You will be asked to fill out a policy name and description. You will need to select a filter mode, conflict resolution state, unknown site action and finally the colour to identify the policy. Once you have completed this, click Insert. You will now be able to see your created policy in the main list. Delete Policy click the policy you no longer need so that it is highlighted, now select Delete Policy from the bottom left of the screen. Take care to only highlight the policy you wish to remove. Clone - All of the settings you have applied to the original policy will be replicated into the new one. Once you have created the copy, you are free to edit to make the necessary changes, such as the name of the policy etc. 18

19 The Custom URL tab allows you to specify, which of your custom URL categories are set to allow or block in this policy. This action will override the setting in the Categories tab, which applies to the category the URL belongs to e.g. If facebook.com belongs to a Custom URL category that is set to Allow, this will override the social networking category that is set to Block in the Categories tab, just for the facebook.com domain, all other social networking sites will still be blocked. Allow - URL s in a category set to Allow will grant access to the web content and no further filtering will take place. Ignore will take no action on the web content and will instead pass the request to the next set of filtering rules. Block will instantly deny access to the content and the user will be shown the Access Denied screen. Click Update to save: Please note that changes may take up to 5 minutes to take effect. Categories - Content from the web is grouped into Categories. For a full list of definitions visit: 19

20 Categories - The rules that you apply here will determin what web content the users within the policy can access. In the screen shot above, Adult Offensive is set to Block, this is a Top level category. It is useful if you wish to blanket allow, block or ignore access for an entire category. If you expand a top level, you will see the categories within it. Although you may have blocked the Top level category, you are still able to change the action within this category to Allow, Block or Ignore e.g. you can block Adult Offensive, but allow Hate and block Violence, which sits within the same category. If you expand further, you can view the sub-categories, these contain the actual websites to be allowed or blocked. These appear in the reports and on the access denied pages. You can be granular in what you wish to allow, block or ignore e.g. Block category Hate but Allow sub category Hate Speech. If you are unsure what category a website belongs to, use the Quick Site Lookup tool. Simply type in the web address, click Lookup and it will provide you with the relevant category. Click Update to save: Please note that changes may take up to 5 minutes to take effect. 20

21 POLICY SCHEDULE A policy schedule enables you to define when one or more policies are active during a rolling 7 day week. A policy schedule must contain at least one policy. A policy schedule can be applied to individual users or groups. Schedules are used as a method to apply policies at different times of the day e.g. I want to Allow Social Networking web content only during lunchtime for the default policy on Fridays. When your account is created by CensorNet, it will contain a Default Schedule that applies the default policy 24x7. You can modify the Default Schedule or create your own. As shown above, the General tab lets you view the name and description of the selected schedule. If you wish to make changes to the policy schedules basic details, you can do so and then click Update. To create a new Policy Schedule, click New in the bottom left of the screen. Enter the name you wish your schedule to be called and put in a brief description as to its purpose. Click Insert, you will now be able to see your newly created Policy Schedule in the main list. Delete - If you wish to delete a schedule, highlight it and then select delete from the bottom left of the screen. Take care to only highlight the schedule you wish to remove. 21

22 Schedule Definition Allows you to specify the times of day when policies are active. From the drop down list in the top left hand corner, select the policy that you wish to add to the schedule. Down the left hand side you will see all the days in the week, followed by AM and PM. With your cursor, click on the selected time slots you wish the policy to be active on. The time slot will change to the colour of the policy, indicating that this has been made active. Above you can see a highlighted section where a chosen policy has been applied to Monday AM and Monday PM (as an example). Build the policy schedule that you need. Note: Time slots are defaulted to increments of 5 minutes but you can change this to increments of 15, 30 or 1 hour. Fill At the end of the row is an option Fill, if you wish to apply the selected policy to the whole day click Fill. Clone at the end of the row allows you to replicate a day schedule to every day in the week. This saves you having to recreate the same schedule for each day. 22

23 USERS & GROUPS Users Initially the user list will only contain one user which is the administrator. This user is set up by CensorNet and there must always be at least one administrator. To apply filtering to members of your organization, you should add them as a user. The administrator will need the user s login credentials when they install the Cloud Link software onto a machine. After the first time login has been completed, authentication from this point on is transparent, the user will no longer be asked to log in as it will be automatic. From the main tree you will be able to see your user list and groups. To create a new user, click New User from the bottom left of your screen. You will be asked to enter an address and password. You should enter the address of the user. Please note the domain name must match a domain found in the Account information (see section on Accounts). You are however, required to enter a unique address for every user e.g. captain.kirk@enterprise.com / lieutenant.commander.spock@enterprise.com etc you should also specify a password. Click Insert to add the user. 23

24 From the main tree, highlight the user and view the details in the General tab. If you wish the user to be a member of a group e.g. The Marketing Team, from the Group drop down choose the group and click Update. In the main tree the user will now belong to the group The Marketing Team. There is an option to assign a Policy Schedule to this user. From the drop down list select the schedule you wish to apply and click Update. The chosen Policy Schedule will be applied to this user regardless of the Group Policy. If you do not need a separate policy schedule for this user, select the No Schedule option. Note: The user Policy Schedule will take precedence over the group policy, so be careful when applying these settings. The General tab lets you set whether your user is to be an Administrator or normal user. Click the box next to Administrator to set your user at Admin level. Ticking the Administrator box allows that person to view and use the Web Console. Leaving the box unticked means the user does not have access to the web console. 24

25 To Delete a user or reset their Password, select required option from within the General tab. You may right click on the user from the main tree and select either Delete or Reset Password according to your needs. Existing users can be dragged and dropped into a group using the cursor. CSV Uploader - If you wish to upload bulk users, rather than add them manually, you are able to upload a CSV file. Click Upload CSV (button located next to New Group and New user). The format for CSV is username,group,password. For more information visit Click the computer screen icon circled above and select your file. Now click Upload. 25

26 Groups Groups allow you to collate users so they are more manageable and so policies can be applied on Group basis. You can group by department, team, function, position etc From the main tree, if you expand a Group, below it you will find a list of the users you have assigned to that group. To create a new group, click New Group at the bottom of the main tree. Type the name you wish your Group to be called. Now select a Policy Schedule from the drop down list that you would like applied to that Group. If you do not wish to apply a Policy Schedule to the group, you can select No Schedule. Note: You should only use No Schedule if you want the Default Policy applied automatically or the individual users within the Group have their own policy. When you highlight the Group, you are able to view the name and Policy Schedule details now applied. 26

27 REPORTS Reports The reporting function has been designed to give the administrator full disclosure as to the web activities of any user with Cloud Link installed. Understanding the type of web browsing that takes place within your organization can lead to cost saving and greater efficiency. Within the Reports tab, you have various reporting tools available to you. Analyse The analyse tab allows you to set the type of criteria you wish to search for. You can request a search for one or multiple criteria based on Timespan, Username, Web Domain and Display action. Timespan is broken down into specific time increments of web activity. Starting at Previous 15 mins. Select the option for your search. 27

28 Timespan option Custom, allows you to set your own From and To timescale. This is ideal if you know the exact period you need information for. Username can be selected from the drop down list or typed in manually. You can type a partial username such as kirk, captain.kirk or the full username captain.kirk@enterprise.com the wildcard will do the rest of the work but being as specific as possible is always best for accuracy. Web Domain is the name of the website you wish to search for user activity on, for example bbc.co.uk or again the key is always to be as specific as possible for the best accuracy. Display allows you to filter the report based on action. The options are Only with Blocked which means only show results where the user has been blocked from accessing a site. Only with Allowed which means only show results where the user has been allowed to access a site. Allowed & Blocked which includes both. After you have selected all of your criteria, click Run Report All matching results will be displayed to you in the right hand pane of the screen. 28

29 The data provided by the report can be saved in two formats, PDF and CSV. To save the data as a CSV file, select CSV (located just above your Allow Hits column) shown above. A pop up box will inform you that the data will be sent to your address. Click OK. The subsequent you receive will have the subject header Your cloudwebfiltering.com report. Follow the same process to have the data sent in PDF format. Report tab (located next to analyse), is a list of pre defined reports that you can view. You have the option to select a report for 5 minutes, 1 hour, 3 hours, 1 day, 1 week, 1 month or 1 year ago. 29

30 UNBLOCKS Unblocks If a user tries to access web content that is blocked, they may genuinely require access, when this happens; they are given the opportunity to request access to that website. The Unblock tab allows you to review these requests. This is Unblock home screen. You will be presented with a list of all the requests that have been made by users to access web content. When a user tries to access a web page that is blocked, they will be shown the Access to this page has been denied screen. On the same screen there is a Request access to this site button which they can click to request unblock. They can optionally supply a reason for access to the site. They will now need to enter their Cloud link password and then click Request Unblock. This will send an to the Technical Contact (specified in Accounts tab) to notify them of the request. 30

31 Unblock requests are available to view in the console by clicking the Unblocks tab. You can select a request by clicking the check box next to it. This will highlight the whole line. You will now be given the option to add the website to a custom URL category or your own created category. Select an option from the drop down list and click Add to category to allow or deny. The web site will now be Allowed/Blocked depending on how the category is configured in Policy. If you wish to delete a request from the list, tick the box next to it so that it appears highlighted and then click Dismiss selected. That entry will now be removed. There is an option for you to send a message to the requesting user. Tick the box next to the request to highlight it, tick the box for Send a message back, type your message and when you click either, Add to category or Dismiss selected, your message will be sent to the end user automatically. 31

32 STATUS Status gives you full visibility of the performance of our service to you. HAproxy Is a load balancer and will choose which server to assign requests to, based on their current workload. icap001 Is a server that handles the filtering. icap002 - Is a server that handles the filtering. Portal Is a web server running the user interface console. Portal SSL Is an encrypted version of Portal. Please note: These details are liable to change over time or more details may be added. LEGEND Service is operating normally 99.90% uptime or better (less than 2 minutes of downtime). Service disruption 99.98/98.00% uptime (between 2 minutes to 29 minutes of downtime). Service outage Less than 98.00% uptime (more than 29 minutes of downtime). No data available Unmonitored. 32

33 By clicking on a server name e.g. HAproxy, you will be shown details specific to the server. You are able to change the server you wish to view from the drop down box at the top of the screen, shown above. Alternatively, you can go back to the main status page and select the next server you wish to see information on. TECHNICAL SUPPORT Telephone +44 (0) Live Support Desk Knowledge Base support@censornet.com

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

User Guide. Cloud Gateway Software Device

User Guide. Cloud Gateway Software Device User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).

More information

SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer

SSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer SSL Intercept Mode Certificate Installation Guide Revision 1.0.0 Warning and Disclaimer This document is designed to provide information about the configuration of CensorNet Professional. Every effort

More information

Getting Started Guide

Getting Started Guide Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional

More information

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11 Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet

More information

Manual POLICY PATROL SECURE FILE TRANSFER

Manual POLICY PATROL SECURE FILE TRANSFER Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Evoko Room Manager. System Administrator s Guide and Manual

Evoko Room Manager. System Administrator s Guide and Manual Evoko Room Manager System Administrator s Guide and Manual 1 1. Contents 1. Contents... 2 2. Read this first! Introduction to this Guide... 6 3. User Guide... 6 4. System Architecture Overview... 8 ----

More information

POLICY PATROL MFT. Manual

POLICY PATROL MFT. Manual POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated

More information

Test Case 3 Active Directory Integration

Test Case 3 Active Directory Integration April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Burst Technology. bt-webfilter User Guide

Burst Technology. bt-webfilter User Guide Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Sonian Getting Started Guide October 2008

Sonian Getting Started Guide October 2008 Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG...

Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... Table of Contents INTRODUCTION... 2 HOME PAGE... 3 Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... 11 Raising a Service Request... 12 Edit the Service Request...

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Version 1 Revised 11/29/2007 Table of Contents Java Installation:...4 Browser Configuration:...4 Citrix Client Installation:...8 Attempting

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Administrators Help Manual

Administrators Help Manual Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

Installation and Setup Guide

Installation and Setup Guide Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.

More information

Admin Guide for Web Security Service

Admin Guide for Web Security Service Admin Guide for Web Security Service Copyright Web Security Service Admin Guide July, 2013; version 4.4 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

ShadowControl ShadowStream

ShadowControl ShadowStream ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...

More information

SchoolBooking SSO Integration Guide

SchoolBooking SSO Integration Guide SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

USER GUIDE WWPass Security for Windows Logon

USER GUIDE WWPass Security for Windows Logon USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

(Installation through ADSelfService Plus web portal and Manual Installation)

(Installation through ADSelfService Plus web portal and Manual Installation) ADSelfService Plus Client Software Installation Guide (Installation through ADSelfService Plus web portal and Manual Installation) 1 Table of Contents Introduction:... 3 ADSelfService Plus Client software:...

More information

Cloud Services. Mozy Backup. User Guide

Cloud Services. Mozy Backup. User Guide Cloud Services Mozy Backup User Guide 10/21/2014 CONTENTS Overview... 2 Installing Mozy... 3 Using the Settings Window... 4 Select Files to Back Up with the File System Tab... 10 Seeing How Much of Your

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Talk-101 User Guides Web Content Filter Administration

Talk-101 User Guides Web Content Filter Administration Talk-101 User Guides Web Content Filter Administration Contents Contents... 2 Accessing the Control Panel... 3 Proxy User Management... 4 Adding a new Proxy User... 5 Modifying an existing Proxy User...

More information

HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1. Revision Date: July 2011

HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1. Revision Date: July 2011 HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1 Revision Date: July 2011 Summary of Contents Summary of Contents... 2 Pre Installation Checklist... 4 Prerequisites...

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10

Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10 Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

ECA IIS Instructions. January 2005

ECA IIS Instructions. January 2005 ECA IIS Instructions January 2005 THIS PAGE INTENTIONALLY BLANK ECA IIS Instructions ii July 22, 2005 Table of Contents 1. Install Certificate in IIS 5.0... 1 2. Obtain and Install the ECA Root Certificate

More information

Introduction to Google Apps for Business Integration

Introduction to Google Apps for Business Integration Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

Easy Manage Helpdesk Guide version 5.4

Easy Manage Helpdesk Guide version 5.4 Easy Manage Helpdesk Guide version 5.4 Restricted Rights Legend COPYRIGHT Copyright 2011 by EZManage B.V. All rights reserved. No part of this publication or software may be reproduced, transmitted, stored

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

XIA Configuration Server

XIA Configuration Server XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright

More information

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips dc07cc0432 October 19, 2007 This document applies to these Xerox products: X WC 7328/7335/7345 for the user Xerox Network Scanning TWAIN Configuration for the

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Configuring your email client to connect to your Exchange mailbox

Configuring your email client to connect to your Exchange mailbox Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

ADSelfService Plus Client Software Installation Guide

ADSelfService Plus Client Software Installation Guide ADSelfService Plus Client Software Installation Guide ( I n s t a l l a t io n t h r o u g h A DS e l f S e r v ic e P l u s w e b p o r t a l a n d M a n u a l I n s t a l l a t io n ) 1 Table of Contents

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Enterprise Self Service Quick start Guide

Enterprise Self Service Quick start Guide Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap ( WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

Installation Guide. Research Computing Team V1.9 RESTRICTED

Installation Guide. Research Computing Team V1.9 RESTRICTED Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Administration and Business Collaboration. User Manual

Administration and Business Collaboration. User Manual Administration and Business Collaboration User Manual Copyright 2007 by Eurekify Ltd., 8 Hasadna Street Raanana 43651, ISRAEL. All Rights Reserved. This document maybe used in its complete form only and

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Table of Contents INTRODUCTION...2 HOME PAGE...3. Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...

Table of Contents INTRODUCTION...2 HOME PAGE...3. Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG... Table of Contents INTRODUCTION...2 HOME PAGE...3 Announcements... 6 Personalize... 7 Reminders... 9 Recent Items... 11 SERVICE CATALOG...12 REQUEST...14 Request List View... 15 Creating a New Incident...

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS) SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information