Security Reporter Startup Guide. Version 4.2 for Sidewinder G2 version and higher

Size: px
Start display at page:

Download "Security Reporter Startup Guide. Version 4.2 for Sidewinder G2 version 6.1.0.05 and higher"

Transcription

1 Security Reporter Startup Guide Version 4.2 for Sidewinder G2 version and higher

2

3 Copyright 2006 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Secure Computing Corporation. Trademarks Secure Computing, SafeWord, Sidewinder, Sidewinder G2, SmartFilter, Type Enforcement, SofToken, Enterprise Strong, Mobile Pass, G2 Firewall, PremierAccess, SecureSupport, SecureOS, Bess and Strikeback are trademarks of Secure Computing Corporation, registered in the U.S. Patent and Trademark Office and in other countries. G2 Enterprise Manager, SmartReporter, On-Box, Application Defenses, RemoteAccess, and Sentian are trademarks of Secure Computing Corporation. All other trademarks, tradenames, service marks, service names, product names, and images mentioned and/or used herein belong to their respective owners. Software License Agreement The following is a copy of the Software License Agreement as shown in the software: CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS BEFORE LOADING THE SOFTWARE. BY CLICKING I ACCEPT BELOW, OR BY INSTALLING, COPYING, OR OTHERWISE USING THE SOFTWARE, YOU ARE SIGNING THIS AGREEMENT, THEREBY BECOMING BOUND BY ITS TERMS. IF YOU DO NOT AGREE WITH THIS AGREEMENT, THEN CLICK I DO NOT ACCEPT BELOW AND RETURN ALL COPIES OF THE SOFTWARE AND DOCUMENTATION TO SECURE COMPUTING CORPORATION ( SECURE COMPUTING ) OR THE RESELLER FROM WHOM YOU OBTAINED THE SOFTWARE. If this Software is being installed by a third party (for example, a value-added reseller, consultant, employee, or agent), such third party represents that it has the authority to bind the person or entity for whom the Software is being installed, and that its acceptance of this Agreement in the manner set forth above does bind such person or entity. 1. Grant of License. Secure Computing grants to you, and you accept, a non-exclusive, and non-transferable license (without right to sub-license) to use the Software Products as defined herein on a single machine. 2. Software Products. Software Product(s) means (i) the machine-readable object-code versions of the Software of Secure Computing contained in the media (the Software ), (ii) the published user manuals and documentation that are made available for the Software (the Documentation ) and (iii) any updates or revisions of the Software or Documentation that you may receive (the Update ). Under no circumstances will you receive any source code of the Software. Software Products provided for use as backup in the event of failure of a primary unit may be used only to replace the primary unit after a failure in fact occurs. They may not be used to provide any capability in addition to the functioning primary system that they backup. 3. Limitation of Use. You may not: 1) copy, except to make one copy of the Software solely for back-up or archival purposes; 2) transfer, distribute, rent, lease or sublicense all or any portion of the Software Product to any third party; 3) translate, modify, adapt, decompile, disassemble, or reverse engineer any Software Product in whole or in part; or 4) modify or prepare derivative works of the Software Products. You agree to keep confidential and use your best efforts to prevent and protect the contents of the Software Product from unauthorized disclosure or use. Secure Computing reserves all rights that are not expressly granted to you. 4. Limited Warranty and Remedies. Secure Computing warrants that the medium/media on which its Software is recorded is/are free from defects in material and workmanship under normal use and service for a period of ninety (90) days from the date of shipment to you. Secure Computing does not warrant that the functions contained in the Software will meet your requirements or that operation of the program will be uninterrupted or error-free. The Software is furnished AS IS and without warranty as to the performance or results you may obtain by using the Software. The entire risk as to the results and performance of the Software is assumed by you. If you do not receive media which is free from defects in materials and workmanship during the 90-day warranty period, you will receive a refund for the amount paid for the Software Product returned. 5. Limitation Of Warranty And Remedies. THE WARRANTIES STATED HEREIN ARE IN LIEU OF ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, INCLUDING ANY WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES AND COUNTRIES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS WHICH VARY BY STATE OR COUNTRY. SECURE COMPUTING'S AND ITS LICENSORS ENTIRE LIABILITY UNDER, FOR BREACH OF, OR ARISING OUT OF THIS AGREEMENT, IS LIMITED TO A REFUND OF THE PURCHASE PRICE OF THE PRODUCT OR SERVICE THAT GAVE RISE TO THE CLAIM. IN NO EVENT SHALL SECURE COMPUTING OR ITS LICENSORS BE LIABLE FOR YOUR COST OF PROCURING SUBSTITUTE GOODS. IN NO EVENT WILL SECURE COMPUTING OR ITS LICENSORS BE i

4 LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL, EXEMPLARY, OR OTHER DAMAGES WHETHER OR NOT SECURE COMPUTING HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE. 6. Term and Termination. This license is effective until terminated. You may terminate it at any time by destroying the Software Product, including all computer programs and documentation, and erasing any copies residing on computer equipment. This Agreement also will automatically terminate if you do not comply with any terms or conditions of this Agreement. Upon such termination you agree to destroy the Software Product and erase all copies residing on computer equipment. 7. Ownership. This Software is licensed (not sold) to you. All intellectual property rights including trademarks, service marks, patents, copyrights, trade secrets, and other proprietary rights in or related to the Software Products are and will remain the property of Secure Computing or its licensors, whether or not specifically recognized or protected under local law. You will not remove any product identification, copyright notices, or other legends set forth on the Software Product. 8. Export Restrictions. You agree to comply with all applicable United States export control laws and regulations, including without limitation, the laws and regulations administered by the United States Department of Commerce and the United States Department of State. 9. U.S. Government Rights. Software Products furnished to the U.S. Government are provided on these commercial terms and conditions as set forth in DFARS (a). 10. Entire Agreement. This Agreement is our offer to license the Software Product to you exclusively on the terms set forth in this Agreement, and is subject to the condition that you accept these terms in their entirety. If you have submitted (or hereafter submit) different, additional, or other alternative terms to Secure Computing or any reseller or authorized dealer, whether through a purchase order or otherwise, we object to and reject those terms. Without limiting the generality of the foregoing, to the extent that you have submitted a purchase order for the Software Product, any shipment to you of the Software Product is not an acceptance of your purchase order, but rather is a counteroffer subject to your acceptance of this Agreement without any objections or modifications by you. To the extent that we are deemed to have formed a contract with you related to the Software Product prior to your acceptance of this Agreement, this Agreement shall govern and shall be deemed to be a modification of any prior terms in their entirety. 11. General. Any waiver of or modification to the terms of this Agreement will not be effective unless executed in writing and signed by Secure Computing. If any provision of this Agreement is held to be unenforceable, in whole or in part, such holding shall not affect the validity of the other provisions of this Agreement. You may not assign this License or any associated transactions without the written consent of Secure Computing. This License shall be governed by and construed in accordance with the laws of California, without regard to its conflicts of laws provisions. ii

5 Technical Support information Secure Computing works closely with our reseller partners to offer the best worldwide Technical Support services. Your Secure Computing reseller is the first line of support when you have questions about our products and services; however, if you require additional assistance, contact us directly. To contact Secure Computing Technical Support directly, telephone or If you prefer, send an to To inquire about obtaining a support contract, refer to our Contact Secure Web page for the latest information at To use the Secure KnowledgeBase, go to Enter your company ID. Customer Advocate information To suggest enhancements in a product or service, or to request assistance in resolving a problem, please contact a Customer Advocate at If you prefer, send an to customer_advocate@securecomputing.com. Technical Publications information If you have comments or suggestions you would like to make regarding this document or any other Secure Computing document, please send an to techpubs@securecomputing.com. Printing history Date Part number Software release May A Sidewinder G2 Security Reporter, Version 4.2 August B Sidewinder G2 Security Reporter, Version and higher iii

6 iv

7 CONTENTS CHAPTER 1 About Sidewinder G2 Security Reporter Welcome to Sidewinder G2 Security Reporter G2SR overview Resources CHAPTER 2 Preparing for Installation Installation requirements G2SR requirements Syslog server requirements Preparing your installation responses Installation type Authentication method Web site installation type CHAPTER 3 Installing Sidewinder G2 Security Reporter Installing the software Download the Security Reporter software Install G2SR Install the syslog server Uninstalling the software CHAPTER 4 Configuring the Servers Configuring the syslog server General tab Advanced tab Configuring Sidewinder G Configure Sidewinder G2 to send data via syslog server Configure Sidewinder G2 to send data via FTP server CHAPTER 5 Licensing G2SR Activating the license Export the system identifier Import the license and signature keys Adding a device to the license Additional tasks iii

8 Table of Contents APPENDIX A Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Add an ISAPI filter Enable SSL ports on IIS Configure IIS 6.0 for G2SR to allow Web service extensions Configure IIS to allow all.cgi extensions Configure IIS to provide exception for MIME Type extensions Configure IIS to remove the application mapping for.ext files Enable ActiveX Controls and Plug-ins Configuring Windows XP computers Add program exceptions Add a port exception APPENDIX B Troubleshooting the Setup Checking G2SR Verify the device Verify Event Manager activity Other tests iv

9 1 CHAPTER About Sidewinder G2 Security Reporter In this chapter... Welcome to Sidewinder G2 Security Reporter...2 G2SR overview...3 Resources...4 1

10 Chapter 1: About Sidewinder G2 Security Reporter Welcome to Sidewinder G2 Security Reporter Welcome to Sidewinder G2 Security Reporter Use this startup guide to lead you through the tasks necessary to install and configure Sidewinder G2 Security Reporter (G2SR). This guide covers the following topics: Overview of G2SR (see G2SR overview on page 3) Pre-installation requirements and planning Downloading and installing the G2SR and syslog server software Configuring the syslog server and Sidewinder G2 to transfer audit data 2

11 Chapter 1: About Sidewinder G2 Security Reporter G2SR overview G2SR overview Sidewinder G2 Security Reporter (G2SR) is a security event analysis and reporting solution for the Sidewinder G2 Security Appliance. It converts syslog messages from Sidewinder G2s into reports telling you what is being kept out of your network, what is attacking your network, and what is being let into your network. How it works 1 Sidewinder G2 is configured to send its log files in the Sidewinder Export Format (SEF) to a syslog server. 2 The syslog server binds to the specified port and collects syslog data, which is streamed from single or multiple devices. (Sidewinder G2 uses only UDP port 514, which is selected by default.) You can use the Event Manager to view audit events in real time. 3 The syslog server transfers delta log files to the G2SR server in compressed format (GZIP files). These files are created depending on the delta frequency. For example, if the delta interval is set to 30 minutes, the G2SR syslog server creates a delta file every 30 minutes. A delta is an extract of an original log file that contains only data that has been logged since the last update. Once the data is added to the delta, it is removed from the original log. 4 G2SR converts the files into reports. Figure 1: Network architecture Profile Manager Reports Alert Manager Alerts Syslog server Event Manager Monitoring R Sidewinder G2 Security Reporter Syslog server 3

12 Chapter 1: About Sidewinder G2 Security Reporter Resources Resources This guide is intended for installation and initial configuration. Comprehensive documentation and support for G2SR are available from a number of sources: Resource Online help Description Extensive online help is available for all G2SR modules by clicking the question mark icon on the top right-hand corner of each screen. Technical Support Telephone: or support@securecomputing.com To inquire about obtaining a support contract, refer to our Contact Secure Web page for the latest information at Sidewinder G2 Administration Guide Knowledge Base For information about G2SR functioning with Sidewinder G2, see these sections of the Auditing and Reporting chapter: Logging application messages using syslog Generating reports using Sidewinder G2 Security Reporter Supplemental information, including helpful troubleshooting tips and commands. The Knowledge Base is located at 4

13 2 CHAPTER Preparing for Installation In this chapter... Installation requirements...6 G2SR requirements...6 Syslog server requirements...7 Preparing your installation responses...7 5

14 Chapter 2: Preparing for Installation Installation requirements Installation requirements This section lists the requirements for a successful G2SR and syslog server installation. G2SR requirements Listed below are the rights, system, and license requirements needed to install G2SR. Sidewinder G2 version Sidewinder G2 running at v or higher. Administrator rights You must have administrator rights on the machine to which you are installing G2SR. Minimum system requirements Processor Pentium gigahertz (GHz) Disk Space 10 gigabyte (GB) RAM 1GB Operating System Windows NT/2000/XP/2003 Java 2 Runtime Environment JRE v1.5_04 and above IIS, Netscape, or Apache Internet Explorer 6.0 or any DOM-compatible Web browser with Shockwave Flash plug-in Recommended system requirements Processor Pentium GHz or higher Disk Space 20 GB or higher RAM 2 GB or higher Operating System Windows Server 2000 or 2003 Java 2 Runtime Environment JRE v1.5_04 and above Fast IO Internet Explorer 6.0 with Shockwave Flash plug-in IIS (for increased security) License requirements When you purchased Sidewinder G2 Security Reporter, you were sent an activation certificate with instructions for activating your permanent license. If you need assistance with the activation process, contact service@securecomputing.com. Additional system requirements Pop-up blockers must be turned off to use G2SR. Microsoft Office must be installed before you try to generate reports in Word or Excel formats. Adobe Acrobat Reader must be installed to view reports in PDF format. 6

15 Chapter 2: Preparing for Installation Preparing your installation responses Syslog server requirements Listed below are the rights and system requirements needed to install the syslog server. Note: The syslog server software can be installed on the same machine as the G2SR software, or on any machine in the network. Administrator rights You must have administrator rights to the machine the syslog server is being installed on. Minimum system requirements Processor Pentium III Disk Space 10 MB RAM 128 MB Operating System Windows NT/2000/XP/2003 Preparing your installation responses This section helps you prepare the information you will need to install G2SR using the installation wizard. The installation wizard asks these questions when you run the program. Installation type You will be prompted to install G2SR in Standalone or Distributed mode. Distributed mode is not currently available for Sidewinder G2. Select Standalone. Authentication method You will be prompted to select one of three authentication methods: Sidewinder G2 Security Reporter user management Uses the G2SR user management system to log into G2SR. Windows system authentication Uses Windows authentication to log into G2SR. Active Directory/LDAP user management Uses an external LDAP-enabled directory to authenticate and authorize users on a per-group basis. 7

16 Chapter 2: Preparing for Installation Preparing your installation responses Web site installation type You will be prompted to install G2SR as a Web site or virtual directory on IIS, or on the G2SR Apache server. Note: Windows XP allows you to run only one Web site at a time. We recommend that you select Create a new virtual directory on IIS if you are already running a Web site. Create a new website on IIS This is the default option and recommended for increased security. G2SR is installed as a website on IIS and runs on port Create a new virtual directory on IIS Select this option if you have IIS on your machine but do not want to install G2SR as a Web site. A directory named Sidewinder G2 Security Reporter is created under the default Web site and the program runs as a virtual directory. Note: Windows XP allows you to run only one Web site at a time. We recommend that you select Create a new virtual directory on IIS if you are already running a Web site. Install Sidewinder G2 Security Reporter Apache Server This is the default option if IIS is not installed on your machine. The default port is

17 3 CHAPTER Installing Sidewinder G2 Security Reporter In this chapter... Installing the software...10 Download the Security Reporter software...10 Install G2SR...11 Install the syslog server...16 Uninstalling the software

18 Chapter 3: Installing Sidewinder G2 Security Reporter Installing the software Installing the software Perform these procedures to install Sidewinder G2 Security Reporter on your machine. G2SR is installed in two parts: 1 Download the software from the Secure Computing Web site. 2 Install the G2SR and syslog software on the appropriate machines. Download the Security Reporter software 1 Point a browser to 2 Right-click the appropriate installation platform and save the file: G2SR Server Software (G2SR including Syslog server) Use this platform if you are going to install the G2SR server software and the syslog server on the same machine. G2SR Syslog Server Software Use this platform if you are going to install the syslog server on a machine separate from the G2SR server software. 3 Double-click the downloaded file(s) to begin the installation procedure. See Install G2SR on page 11 for instructions. See Install the syslog server on page 16 for instructions. Note: The installation process can be stopped at any time by clicking the Cancel button. The installation directory and all files contained therein are automatically removed after you cancel the installation process. 10

19 Chapter 3: Installing Sidewinder G2 Security Reporter Installing the software Table 1: G2SR installation sequence Install G2SR G2SR installation sequence Actions The pre-installation checker verifies that the necessary components exist on your system. If you want to check the contents of the checker log file, click View Log. If you want to run the checker again, click Recheck. If the pre-installation check completes sucessfully, click Install. Click Next. If you are upgrading from a minor release of G2SR 4.2, the Upgrade to newer version window appears. Click Upgrade to upgrade to a newer version. Click Cancel to exit the setup program. More... 11

20 Chapter 3: Installing Sidewinder G2 Security Reporter Installing the software G2SR installation sequence Actions Select the License Agreement check box and click Next. 1 Select Standalone. Note: Distributed mode is not currently available for Sidewinder G2. 2 Click Next. Specify the location where you want G2SR installed. To accept the defaults, click Next. To choose a different location, type the directory path in the fields or click Change... and navigate to the desired directory, then click Next. More... 12

21 Chapter 3: Installing Sidewinder G2 Security Reporter Installing the software G2SR installation sequence Actions 1 Select an authentication method: Use Sidewinder G2 Security Reporter User Management Use Windows system authentication Use Active Directory/LDAP User Management 2 Click Next. If you selected G2SR User Management, the Security Reporter Authentication window appears. 1 Type the password you will use to access G2SR, then verify the password. 2 Click Next. If you selected Active Directory/LDAP User Management, the Active Directory Server Details window appears. 1 Enter the name of your Active Directory Server. The Base DN, User DN, and Group DN fields fill in automatically. 2 Click Create Groups. Enter the user name and password of the Active Directory administrator, then click OK. 3 Click Next. More... 13

22 Chapter 3: Installing Sidewinder G2 Security Reporter Installing the software G2SR installation sequence Actions 1 Select a Web site installation type: Note: Windows XP allows you to run only one Web site at a time. We recommend that you select Create a new virtual directory on IIS if you are already running a Web site. Create a new website on IIS This is the default option and recommended for increased security. A default name and port are automatically entered. If desired, type a new name and/or port in the fields. Create a new virtual directory on IIS Select this option if you have IIS on your machine but do not want to install G2SR as a Web site. Select a default Web site from the drop-down list. The directory name is automatically entered. If you want a different name, type it in the Directory Name field. Install Sidewinder G2 Security Reporter Apache Server This is the default option if IIS is not installed on your machine. If you want to change the default port number, type a new number in the Port field. 2 Click Next. If the following messages appear: Would you like setup to automatically modify the CGI timeout settings of IIS?: Click Yes. Click OK to view the instructions on how to configure your IIS: Click Cancel. After you have completed installation, configuration, and licensing tasks, see Appendix A, Configuration Settings for Windows 2003/XP, for instructions on configuring IIS. Review the Summary information to verify your installation settings. If you want to make changes, click Back. If you are satisfied with the settings, click Next. More... 14

23 Chapter 3: Installing Sidewinder G2 Security Reporter Installing the software G2SR installation sequence Actions Click Finish. If you are installing the syslog server on the same machine as the G2SR server software, a syslog server recommendation message appears. Click Yes to install the syslog server now, or click No and install the syslog server at another time. See Install the syslog server on page 16 for instructions. Note: If G2SR is installed on a Windows 2003 or Windows XP computer, you must perform additional configuration tasks for G2SR to work properly. See Appendix A, Configuration Settings for Windows 2003/XP. 15

24 Chapter 3: Installing Sidewinder G2 Security Reporter Installing the software Table 2: Syslog server installation sequence Install the syslog server If you are installing the syslog server on a machine separate from the G2SR server software, start the installation by double-clicking the G2SRsyslog icon you downloaded from the Secure Computing Web site. Syslog server installation sequence Actions Click Next. 1 Type the name or IP address of the machine where G2SR is installed, or click the [...] button and browse to the machine. 2 Click Next. Review the connectivity check: If the check is successful, click Next. If the check is not successful, review the displayed list and correct the problem, then restart the installation. More... 16

25 Chapter 3: Installing Sidewinder G2 Security Reporter Installing the software Syslog server installation sequence Actions Select an installation location: To accept the default location, click Next. To choose a different location, type the directory path in the field or click the [...] button and browse to the desired directory, then click Next. Review the summary of installation options you selected. If you want to make changes, click Back. If you are satisfied with the options, click Finish. When the installation is complete, a message appears stating that a configuration dialog will now open. Click OK. See Configuring the syslog server on page 20 for instructions. 17

26 Chapter 3: Installing Sidewinder G2 Security Reporter Uninstalling the software Uninstalling the software If you need to remove the software from your computer, perform the following steps: 1 Click Start > Settings > Control Panel. 2 Open Add/Remove Programs. 3 Select the application you want to remove, then click Add/Remove: Sidewinder G2 Security Reporter v4.2 Sidewinder G2 Security Reporter Syslog Server You must select each of the applications from the list and uninstall them. 18

27 4 CHAPTER Configuring the Servers In this chapter... Configuring the syslog server...20 General tab...20 Advanced tab...21 Configuring Sidewinder G Configure Sidewinder G2 to send data via syslog server...22 Configure Sidewinder G2 to send data via FTP server

28 Chapter 4: Configuring the Servers Configuring the syslog server Configuring the syslog server The syslog server Configuration window appears after the syslog server installation is complete. Use the information below to configure the syslog server. Click OK when you are finished. (You can also access the Configuration window by clicking Start > Programs > Secure Computing > Sidewinder G2 Security Reporter v4.2 > Configure Syslog Server.) Note: This documentation is for Sidewinder G2 reporting. Additional features that appear in the GUI are not supported by Secure Computing. General tab Use this tab to customize target location and frequencies. Name/IP Type the name or IP address of the machine where G2SR is installed, or click the [...] button and browse to the machine. Enable Raw Logging Select this option to store log files collected by the G2SR syslog server. If you leave this check box clear, logs are not stored on the syslog server, but forwarded to the G2SR server. Delete raw log files Select this option to delete raw log files collected by the syslog server that are older than a specified time frame. Use the dropdown list to select from 2 days up to 3 years. Compress log files bigger than You can specify the size limit of the raw log file collected by the syslog server. All log files exceeding this size will be compressed into zip format. Figure 2: Syslog Server Configuration window: General tab 20

29 Chapter 4: Configuring the Servers Configuring the syslog server Advanced tab G2SR lets you use the Event Manager to monitor events streamed in real time. The Advanced tab s Enable Monitoring section allows you to select which events to stream based on priority. G2SR will display all the selected priority s event and all events with a higher priority. For example, selecting Critical would display emergency, alert, and critical events. Use the Enable Monitoring section to select the lowest priority that will be streamed to the Event Viewer: 1 Select Stream. 2 Select the appropriate event priority from the drop-down list. Figure 3: Syslog Server Configuration window: Advanced tab 21

30 Chapter 4: Configuring the Servers Configuring Sidewinder G2 Configuring Sidewinder G2 Sidewinder G2 must be configured to send audit data to G2SR via a syslog server or an FTP server. Instructions for both methods are below. Note: If you intend to view reports on SmartFilter activity, make sure that rules using the HTTP proxy have their audit level set to Informational. Configure Sidewinder G2 to send data via syslog server 1 Using a command line session, log into the Sidewinder G2 and type the following command to switch to the Admn role: srole 2 Specify what type of audit logging will be sent to the syslog server: a Use a file editor to open the /etc/sidewinder/auditd.conf file. b c Add the following line to the auditd.conf file: syslog (facility filters[ filter ] sef) where facility = information associated with a syslog message. You can use local0 through local7 as names for the facility; they are predefined in syslogd. In the next step, make sure to use the same facility you entered in this step. filter = name of sacap filter to use in the output. Output all audit information by using [ NULL ]. Save the changes and close the file. 3 Specify where the syslog server should send syslog messages: a b Use a file editor to open the /etc/syslog.conf file. Add the following line to the syslog.conf file, then save the changes: where facility matches the facility in step 2 and x.x.x.x is the syslog server s IP address. c Save the changes and close the file. 4 Look up syslog s process ID (PID) by entering the following command: pss syslog 5 Implement the changes by restarting the syslogd and audit processes, using the following commands: kill -HUP syslogpid cf server restart auditd The Sidewinder G2 will now send audit data to a syslog server. 22

31 Chapter 4: Configuring the Servers Configuring Sidewinder G2 Configure Sidewinder G2 to send data via FTP server Note: G2SR does not include an FTP server. The Windows server hosting G2SR must have an FTP server installed and enabled. 1 Using a command line session, log into the Sidewinder G2 and type the following command to switch to the Admn role: srole 2 To configure the export utility, enter the following command on one line: cf export add type=sef name=entry_name host=hostname user=username password=password targetdir=destination localfile=local_file_path where: entry_name = the name you want to apply to this configuration entry hostname = the host name or IP address to which you are exporting the files username = the user name that will be used for FTP authentication password = the password that will be used for FTP authentication to the destination host destination = the directory on the destination host on which you want the export files placed local_file_path = (generic files only) the location of the generic file 3 To export all files that are currently configured and ready to be exported, enter the following command: cf export ftp Tip: To export the current files and previously exported files, enter cf export all. 4 [Optional] To enable a cron job to automatically determine which configured export files need to be exported, and format and export those files once every 24 hours (at 2:20 a.m. in most cases), enter the following command: cf export enable To disable the automatic cron job process, enter the following command: cf export disable The file has now been converted and exported. 23

32 Chapter 4: Configuring the Servers Configuring Sidewinder G2 24

33 5 CHAPTER Licensing G2SR In this chapter... Activating the license...26 Export the system identifier...26 Import the license and signature keys...28 Adding a device to the license...29 Additional tasks

34 Chapter 5: Licensing G2SR Activating the license Activating the license Perform this procedure to activate your permanent license for G2SR. The license must be activated to continue using G2SR. Secure Computing mails you an activation certificate when you purchase your permanent G2SR license. Perform this procedure after you receive that certificate. This procedure must be performed on the computer that G2SR is installed on. If you move G2SR to a new computer or replace the network interface card used when licensing, you must re-license the new computer. When the licensing process is complete, all your trial-licensed devices migrate to the new permanent license. The licensing process is in two steps: 1 Export the system identifier. 2 Import the license and signature keys. Export the system identifier Note: Locate the serial number on a sticker at the bottom of the activation certificate. You will need the serial number for this procedure. The serial number format is REXX-XXXX-XXXX-XXXX. 1 Start G2SR and log in: Click Start > Programs > Secure Computing > Sidewinder G2 Security Reporter v4.2 > Browse Sidewinder G2 Security Reporter. 2 Click License Manager. 3 Click the Options tab. 4 Click Export Identifier. Figure 4: License Manager window - Options tab 5 Note where the system identifier file, G2SRSystemIdentifier.txt, is saved. 26

35 Chapter 5: Licensing G2SR Activating the license 6 Copy the system identifier file to a location that is accessible to an client. 7 Send an to activation@securecomputing.com. Include the following information: Attachment G2SRSystemIdentifier.txt file Subject Sidewinder G2 Security Reporter Activation Request Product serial number (located on a sticker at the bottom of the activation certificate) Company name Contact name Address Phone You will receive an with your license and signature keys. If your is submitted during normal workweek hours, you should receive the reply the same day. When you receive your license and signature keys, proceed with Import the license and signature keys on page

36 Chapter 5: Licensing G2SR Activating the license Import the license and signature keys Perform this procedure after you have received an with your license and signature keys. 1 Start G2SR and log in: Click Start > Programs > Secure Computing > Sidewinder G2 Security Reporter v4.2 > Browse Sidewinder G2 Security Reporter. 2 Click License Manager. The License Manager window appears. 3 Click the Licenses tab. Figure 5: License Manager window - Licenses tab 4 Click Add. The Add License window appears. 5 Select Enter manually, and enter the license and signature keys in the appropriate fields. Figure 6: Add license window 6 Click Add. 7 Click Close. To add a device associated with this license, continue with Adding a device to the license on page

37 Chapter 5: Licensing G2SR Adding a device to the license Adding a device to the license Perform this procedure to add devices to the activated license. Note: If you had a trial license, any device associated with that trial license is migrated to the permanent license when the permanent license is activated. 1 Start G2SR and log in: Click Start > Programs > Secure Computing > Sidewinder G2 Security Reporter v4.2 > Browse Sidewinder G2 Security Reporter. 2 Click License Manager. The License Manager window appears. 3 Click the Licenses tab. Figure 7: License Manager window - Licenses tab 4 Click Manage. The Manage License window appears. Figure 8: Manage License window 5 Click Add Device. The Add Device window appears. 29

38 Chapter 5: Licensing G2SR Additional tasks Figure 9: Add Device window 6 Select the device(s) you want associated with this license. Sidewinder G2s that you configured earlier to send data via the syslog server appear under Unconfigured Devices. If you had trial-licensed devices, they migrated to the new permanent license when you activated that license. 7 Click Save. 8 Click Close, then click Close again. Additional tasks For more startup and usage tasks, see the following: Windows 2003/Windows XP configurations If G2SR is installed on a Windows 2003 or Windows XP computer, you must perform additional configuration tasks for G2SR to work properly. See Appendix A, Configuration Settings for Windows 2003/XP on page 31. Troubleshooting If G2SR is not receiving syslog data and generating reports after completing the startup tasks, verify that your G2SR and Sidewinder G2 have been configured correctly. See Appendix B, Troubleshooting the Setup on page 55. Additional G2SR setup This guide is intended for installation and initial configuration. See the G2SR online help for ways to customize and enhance G2SR for your environment. 30

39 A APPENDIX Configuration Settings for Windows 2003/XP In this appendix... Configuring Windows 2003 computers...32 Add an ISAPI filter...33 Enable SSL ports on IIS...34 Configure IIS 6.0 for G2SR to allow Web service extensions...44 Configure IIS to allow all.cgi extensions...46 Configure IIS to provide exception for MIME Type extensions..48 Configure IIS to remove the application mapping for.ext files..49 Enable ActiveX Controls and Plug-ins...50 Configuring Windows XP computers...52 Add program exceptions...52 Add a port exception

40 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Configuring Windows 2003 computers Perform these procedures if: You installed G2SR on a Windows 2003 computer, and During installation, you chose to create a new Web site on IIS. Internet Information Services (IIS) are software services that support Web site creation, configuration, and management, along with other Internet functions. You must make configuration changes in IIS to allow G2SR to work on your Windows 2003 computer. To configure IIS, open the IIS Manager: Click Start > Settings > Administrative Tools > IIS Manager. The Internet Information Services (IIS) Manager window appears. Figure 10: IIS Manager window Use the IIS Manager to perform each of the following procedures: 9 Add an ISAPI Filter 10 Enable SSL ports on IIS 11 Configure IIS 6.0 for G2SR to allow Web service extensions 12 Configure IIS to allow all.cgi extensions 13 Configure IIS to provide exception for MIME Type extensions 14 Configure IIS to remove the application mapping for.ext files 15 Enable ActiveX Controls and Plug-ins 32

41 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Add an ISAPI filter From the IIS Manager: 1 In the left pane, expand Web Sites. 2 In the left pane, right-click Sidewinder G2 Security Reporter and select Properties from the pop-up menu. The Properties window appears. 3 Click the ISAPI Filters tab. Figure 11: G2SR Properties window 4 Click Add. Figure 12: Add/Edit Filter Properties window 5 Complete the Add/Edit Filter Properties window: Filter name Type a name for the filter (example: ISAPI). Executable Click Browse... and navigate to the eiqisapi.dll file, or type the path in the field. 6 Click OK. 7 Click OK. 33

42 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Figure 13: G2SR Properties window - Directory Security tab Enable SSL ports on IIS Perform these procedures to create a certificate to allow secure communication between your server and a client. You will do the following: Request a certificate Move the certificate request and rename the text file Import and install the certificate Request the certificate From the IIS Manager: 1 In the left pane, expand Web Sites. 2 In the left pane, right-click Sidewinder G2 Security Reporter and select Properties from the pop-up menu. The Properties window appears. 3 Click the Directory Security tab. 4 Click Server Certificate... The Web Server Certificate Wizard Welcome window appears. Continue with Table 3, Web Server Certificate Wizard sequence, for details. 34

43 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Table 3: Web Server Certificate Wizard sequence Web Server Certificate Wizard sequence Actions Click Next. 1 Select Create a new certificate. 2 Click Next. 1 Select Prepare the request now, but send it later. 2 Click Next. More... 35

44 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Web Server Certificate Wizard sequence Actions 1 Type a name for the certificate. 2 Click Next. 1 Type your organization s name and unit. 2 Click Next. 1 Type the common name for your site. 2 Click Next. More... 36

45 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Web Server Certificate Wizard sequence Actions 1 Select and type the appropriate geographical information. 2 Click Next. 1 Click Browse... and navigate C:\Program Files\Secure Computing\Sidewinder G2 Security Reporter 4.2\G2SR\. 2 Name the file G2SR.cer. 3 Click Save. 4 Click Next. 1 Review the summary information. If you want to change something, click Back and navigate to the appropriate wizard window. 2 When you are satisfied with the information, click Next. 3 Click Finish. 37

46 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Generate the certificate Table 4: Create SSL Certificate Wizard sequence 1 Click Start > Programs > Secure Computing > Sidewinder G2 Security Reporter v4.2 > Create SSL Certificate. Continue with Table 4, Create SSL Certificate Wizard sequence, for details. SSL Certificate Wizard sequence Actions Click Next. 1 Type a password that will be used to generate the certificate. 2 Click Next. More... 38

47 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers SSL Certificate Wizard sequence Actions Click Next. Type y to answer each question. Click Next. More... 39

48 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers SSL Certificate Wizard sequence Actions Click Next. Click Finish. 40

49 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Import the certificate From the IIS Manager: 1 In the left pane, expand Web Sites. 2 In the left pane, right-click Sidewinder G2 Security Reporter and select Properties from the pop-up menu. The Properties window appears. 3 Click the Directory Security tab. Figure 14: G2SR Properties window - Directory Security tab 4 Click Server Certificate... The Web Server Certificate Wizard Welcome window appears. Continue with Table 5, Web Server Certificate Wizard - Pending request sequence, for details. 41

50 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Table 5: Web Server Certificate Wizard - Pending request sequence Certificate Wizard sequence Actions 1 Select Process the pending request and install the certificate. 2 Click Next. 1 Click Browse... and navigate to the G2SR.cer file. Select the file and click Open. 2 Click Next. 1 Review the summary information. If you want to change something, click Back and navigate to the appropriate wizard window. 2 When you are satisfied with the information, click Next. More... 42

51 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Certificate Wizard sequence Actions Click Finish. 43

52 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Figure 15: G2SR Properties window - Directory Security tab Configure IIS 6.0 for G2SR to allow Web service extensions From the IIS Manager: 1 In the left pane, expand Web Sites. 2 In the left pane, right-click Sidewinder G2 Security Reporter and select Properties from the pop-up menu. The Properties window appears. 3 Click the Directory Security tab. 4 In the Authentication and access control section, click Edit... The Authentication Methods window appears. 44

53 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Figure 16: Authentication Methods window 5 Enter or select the following information: Select Enable anonymous access. User name To fill in the IUSR machine name, click Browse..., type IUSR, then click Check Names and click OK. This should complete the name of the current machine. Password This field is populated automatically with the IUSR machine password when you click OK. 6 Click OK. 7 Click OK. You return to the IIS Manager window. Figure 17: IIS Manager window 8 In the left pane, select Web Service Extensions. In the right pane, click Add a new Web service extension... The New Web Service Extension window appears. 45

54 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Figure 18: New Web Service Extension window 9 Enter or select the following information: Extension name G2SR Required files Click Add... In the Add File window, click Browse... and navigate to C:\Program Files\Secure Computing\Sidewinder G2 Security Reporter\G2SR. Select perl.exe, then click OK. Make sure the view is *.*. Note: This is the default. If you installed G2SR in a different directory, navigate to that directory. Select Set extension status to Allowed. 10 Click OK. Configure IIS to allow all.cgi extensions If you are installing Security Reporter on a Windows 2003 machine, make sure that all unknown.cgi extensions are allowed. From the IIS Manager: 1 In the left pane, expand Web Sites, then select Web Service Extensions. In the right pane, select All Unknown CGI Extensions. 46

55 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Figure 19: IIS Manager window 2 Click Allow. At the confirmation message, click Yes. 47

56 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Figure 20: G2SR Properties window - HTTP Headers tab Configure IIS to provide exception for MIME Type extensions From the IIS Manager: 1 In the left pane, expand Web Sites. 2 In the left pane, right-click Sidewinder G2 Security Reporter and select Properties from the pop-up menu. The Properties window appears. 3 Click the HTTP Headers tab. Figure 21: New MIME Type window 4 Click MIME Types... The MIME Types window appears. 5 Click New... 6 Enter the following information: Extension.ext MIME type text\plain 7 Click OK. 8 Click OK to close the windows. 48

57 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Configure IIS to remove the application mapping for.ext files 1 Open IIS: a b c Click Start > Settings > Control Panel. Double-click Administrative Tools. Double-click IIS Manager. The IIS Manager window appears. 2 In the left pane, expand the tree and select the appropriate application. In the right pane, right-click Sidewinder G2 Security Reporter and select Properties from the pop-up menu. The Properties window appears. 3 Click the appropriate tab that appears for your setup: Home Directory Virtual Directory Directory 4 In the Application settings section, click Configuration. 5 Click the Mappings tab. 6 Click Remove. 7 Click OK. 8 Click OK. 49

58 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers Figure 22: Internet Options window - Security tab Enable ActiveX Controls and Plug-ins An enhanced security feature on Windows 2003 computers can prevent the proper display of some Web sites. Perform this procedure to resolve this issue. 1 Start Internet Explorer. 2 From the Tools menu, select Internet Options... The Internet Options window appears. 3 Click the Security tab. 4 Select Trusted sites, then click Sites... 50

59 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows 2003 computers 5 In the Add this Web site to the zone field, enter the following sites. Click Add after each entry Figure 23: Trusted sites window 6 Click Close. 7 Click OK. 51

60 Chapter A: Configuration Settings for Windows 2003/XP Configuring Windows XP computers Configuring Windows XP computers Perform these procedures if you use Windows Firewall with Service Pack 2 on a Windows XP computer. Stricter Firewall rules block external applications, and you must change the Firewall settings to allow applications necessary to run G2SR. Add program exceptions Perform this procedure to allow communication with the Apache server and syslog server. Note: You should also perform this procedure for other related executable files that relate to your setup. 1 Open the Windows Firewall window: a Click Start > Settings > Network Connections. The Network Connections window appears. b In the left pane, click Change Windows Firewall settings. The Windows Firewall window appears. 2 Click the Exceptions tab. 3 Click Add Program... The Add a Program window appears. 4 Click Browse... and navigate to: C:\Programs\Secure Computing\Sidewinder G2 Security Reporter 4.2\G2SR 5 Select ApacheServer.exe, then click Open. 6 Click OK. The Apache server appears on Exceptions tab list. Verify that it is checked. 7 Click Add Program... The Add a Program window appears. 8 Click Browse... and navigate to: C:\Programs\Secure Computing\G2SRsyslog\Syslog 9 Select syslogserver.exe, then click Open. 10 Click OK. The syslog server appears on Exceptions tab list. Verify that it is checked. Continue with Add a port exception on page

Administration Guide. SafeWord for Internet Authentication Service (IAS) Agent Version 2.0

Administration Guide. SafeWord for Internet Authentication Service (IAS) Agent Version 2.0 Administration Guide SafeWord for Internet Authentication Service (IAS) Agent Version 2.0 Copyright 2004 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced,

More information

Product Guide Addendum. SafeWord Check Point User Management Console Version 2.1

Product Guide Addendum. SafeWord Check Point User Management Console Version 2.1 Product Guide Addendum SafeWord Check Point User Management Console Version 2.1 Copyright 2005 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted,

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

ISA Server Plugins Setup Guide

ISA Server Plugins Setup Guide ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

CA VPN Client. User Guide for Windows 1.0.2.2

CA VPN Client. User Guide for Windows 1.0.2.2 CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

Mobility Services Platform 3.1.1 Software Installation Guide

Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide 72E-100159-04 Revision D January 2008 2007 by Motorola, Inc. All rights reserved.

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

AIMS Installation and Licensing Guide

AIMS Installation and Licensing Guide AIMS Installation and Licensing Guide Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Toll Free: 800-609-8610 Direct: 925-217-5170 FAX: 925-217-0853 Email: support@avatier.com Limited Warranty

More information

QUICK INSTALLATION GUIDE

QUICK INSTALLATION GUIDE QUICK INSTALLATION GUIDE SnapGear Network Gateway Security SG300 SG560 SG565 SG580 Desktop Appliance www.securecomputing.com Copyright 2007 Secure Computing Corporation. All rights reserved. No part of

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

DME-N Network Driver Installation Guide for LS9

DME-N Network Driver Installation Guide for LS9 DME-N Network Driver Installation Guide for LS9 ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED

More information

DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D

DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY

More information

RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE

RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE Installation and Administration Guide RSM Web Client and RSM Web Gateway 17 August, 2004 Page 1 Copyright Notice 2004 Sony Corporation.

More information

TotalShredder USB. User s Guide

TotalShredder USB. User s Guide TotalShredder USB User s Guide Copyright Notice No part of this publication may be copied, transmitted, stored in a retrieval system or translated into any language in any form or by any means without

More information

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING

More information

Studio 5.0 User s Guide

Studio 5.0 User s Guide Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

Crestron VMK-WIN TouchPoint Virtual Mouse & Keyboard Software for Windows Installation Guide

Crestron VMK-WIN TouchPoint Virtual Mouse & Keyboard Software for Windows Installation Guide Crestron VMK-WIN TouchPoint Virtual Mouse & Keyboard Software for Windows Installation Guide This document was prepared and written by the Technical Documentation department at: Crestron Electronics, Inc.

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

Adaptec Event Monitor Utility. User s Guide

Adaptec Event Monitor Utility. User s Guide Adaptec Event Monitor Utility User s Guide 2 Copyright Copyright 2013 PMC-Sierra, Inc. All rights reserved. The information in this document is proprietary and confidential to PMC-Sierra, Inc., and for

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

INSTALLATION GUIDE. AXIS Camera Station

INSTALLATION GUIDE. AXIS Camera Station INSTALLATION GUIDE AXIS Camera Station About this Guide This guide is intended for administrators and users of the AXIS Camera Station, and is applicable for software release 3.50 and later. It covers

More information

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide 026-1010 Rev 7 06-OCT-2011 Site Manager Installation Guide Retail Solutions 3240 Town Point Drive NW, Suite 100 Kennesaw, GA 30144, USA Phone: 770-425-2724 Fax: 770-425-9319 Table of Contents 1 SERVER

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

Copy Tool For Dynamics CRM 2013

Copy Tool For Dynamics CRM 2013 Copy Tool For Dynamics CRM 2013 Page 1 of 15 Copy Tool 2013 Copyright Warranty disclaimer Limitation of liability License agreement Copyright 2013 Dynamics Professional Solutions. All rights reserved.

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1 Users Help Manual Lepide Event Log Manager Lepide Software Private Limited. Page 1 Users Help Manual for Lepide Event Log Manager Lepide Software Private Limited, All Rights Reserved This User Guide and

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

CompleteView Pop Up Monitor User s Manual. Version 3.8

CompleteView Pop Up Monitor User s Manual. Version 3.8 CompleteView Pop Up Monitor User s Manual Version 3.8 Table of Contents Introduction... 3 End User License Agreement... 4 System Requirements... 5 Installation... 6 Operating the Pop Up Monitor... 11 Normal

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS

BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS IMPORTANT: READ THIS CAREFULLY BEFORE INSTALLING, USING OR ELECTRONICALLY

More information

FME SOFTWARE LICENSE AGREEMENT

FME SOFTWARE LICENSE AGREEMENT FME SOFTWARE LICENSE AGREEMENT IMPORTANT READ CAREFULLY: This FME Software License Agreement ("Agreement") is a legal agreement between You (either an individual or a single legal entity) and Safe Software

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Remote Management System

Remote Management System RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED

More information

/ WMS / LITE INDUSTRIAL)

/ WMS / LITE INDUSTRIAL) Acknowledgements Trademark Information COREflex Software Microsoft, Windows, Windows NT/ 2000/ XP, and Access are registered trademarks of Microsoft Corporation. Quickbooks is a registered trademark of

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Remote Programming Software (RPS)

Remote Programming Software (RPS) Remote Programming Software (RPS) D5500CU en Installation Guide Remote Programming Software (RPS) Table of Contents en 3 Table of contents 1 Introduction 4 1.1 About documentation 4 1.2 Software license

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Intel Device View. User Guide

Intel Device View. User Guide Intel Device View User Guide Year 2000 Capable An Intel product, when used in accordance with its associated documentation, is Year 2000 Capable when, upon installation, it accurately stores, displays,

More information

Integrated Citrix Servers

Integrated Citrix Servers Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

CA SiteMinder. Web Agent Installation Guide for IIS. r12.5

CA SiteMinder. Web Agent Installation Guide for IIS. r12.5 CA SiteMinder Web Agent Installation Guide for IIS r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

END USER LICENSE AGREEMENT ( EULA )

END USER LICENSE AGREEMENT ( EULA ) END USER LICENSE AGREEMENT ( EULA ) PLEASE READ CAREFULLY THIS EULA IS A LEGAL AGREEMENT BETWEEN YOU, EITHER AS AN INDIVIDUAL, COMPANY OR OTHER LEGAL ENTITY (IN ANY CAPACITY REFERRED TO HEREIN AS END USER,

More information

Mobility Services Platform 3.1 Software Installation Guide

Mobility Services Platform 3.1 Software Installation Guide Mobility Services Platform 3.1 Software Installation Guide Mobility Services Platform 3.1 Software Installation Guide 72E-100159-03 Revision A September 2007 2007 by Motorola, Inc. All rights reserved.

More information

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net All rights reserved. Redistribution

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

PC System Recovery. Guide

PC System Recovery. Guide PC System Recovery Guide Copyright Notice No part of this publication may be copied, transmitted, stored in a retrieval system or translated into any language in any form or by any means without the expressed

More information

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide The software described in this book is furnished under

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

Archive Attender Version 3.5

Archive Attender Version 3.5 Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,

More information

CA Spectrum and CA Service Desk

CA Spectrum and CA Service Desk CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

LUDLUM MODEL 375 WEBPAGE AND SUPERVISOR SERVICE SOFTWARE MANUAL. April 2014 Version 1.6.9

LUDLUM MODEL 375 WEBPAGE AND SUPERVISOR SERVICE SOFTWARE MANUAL. April 2014 Version 1.6.9 LUDLUM MODEL 375 WEBPAGE AND SUPERVISOR SERVICE SOFTWARE MANUAL April 2014 Version 1.6.9 LUDLUM MODEL 375 WEBPAGE AND SUPERVISOR SERVICE SOFTWARE MANUAL April 2014 Version 1.6.9 LUDLUM MEASUREMENTS, INC.

More information

OrgPublisher EChart Server Setup Guide

OrgPublisher EChart Server Setup Guide Table of Contents Table of Contents Introduction... 3 Role Requirements for Installation... 3 Prerequisites for Installation... 3 About OrgPublisher ECharts... 3 About EChart Rich Client Publishing...

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Table of Content. Introduction. Software Install and Uninstall. Software Features and GUI. Quick Getting Started Guide. Frequently Asked Questions

Table of Content. Introduction. Software Install and Uninstall. Software Features and GUI. Quick Getting Started Guide. Frequently Asked Questions Table of Content Introduction Overview System Requirements Software Install and Uninstall Install Uninstall Software Features and GUI Software Menu Options Software Navigation Quick Getting Started Guide

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Installation Instructions Release Version 15.0 January 30 th, 2011

Installation Instructions Release Version 15.0 January 30 th, 2011 Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

CompleteView Alarm Client User Manual. CompleteView Version 4.3

CompleteView Alarm Client User Manual. CompleteView Version 4.3 CompleteView Alarm Client User Manual CompleteView Version 4.3 Table of Contents Introduction...1 Overview... 2 System Requirements... 2 Configuration...3 Starting the Alarm Client... 3 Menus... 3 File

More information

Installation and Deployment

Installation and Deployment Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

CompleteView Alarm Client User s Manual. Version 3.8

CompleteView Alarm Client User s Manual. Version 3.8 CompleteView Alarm Client User s Manual Version 3.8 Table Of Contents Introduction... 1 Overview... 2 System Requirements... 2 Configuration... 3 Starting the Alarm Client... 3 Menus... 3 File Menu...

More information

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252

More information

SMTP Express Installation Manual

SMTP Express Installation Manual SMTP Express Installation Manual Revision: July 28, 2005 For SMTP Express Software Version 1.03 Lieberman Software Corporation - 1900 Ave of the Stars, Suite 425, Los Angeles, CA 90067 Voice: 800.829.6263

More information

CA SiteMinder. Web Agent Installation Guide for IIS 12.51

CA SiteMinder. Web Agent Installation Guide for IIS 12.51 CA SiteMinder Web Agent Installation Guide for IIS 12.51 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation

More information

FILEMAKER PRO ADVANCED SOFTWARE LICENSE

FILEMAKER PRO ADVANCED SOFTWARE LICENSE FILEMAKER PRO ADVANCED SOFTWARE LICENSE IMPORTANT -- READ CAREFULLY: BY INSTALLING, COPYING, DOWNLOADING, ACCESSING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE.

More information

Scanner Wedge for Windows Software User Guide

Scanner Wedge for Windows Software User Guide Scanner Wedge for Windows Software User Guide Contents INSTALLING THE SCANNER WEDGE SOFTWARE 2 ACTIVATING THE SCANNER CONNECTION 3 TRACING SCANNER OUTPUT 7 FORMATTING OUTPUT 9 SELECTING START-UP OPTIONS

More information

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Quest ChangeAuditor 4.8

Quest ChangeAuditor 4.8 Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide

More information

VRC 7900/8900 Avalanche Enabler User s Manual

VRC 7900/8900 Avalanche Enabler User s Manual VRC 7900/8900 Avalanche Enabler User s Manual WLE-VRC-20030702-02 Revised 7/2/03 ii Copyright 2003 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

Nimsoft Monitor. dns_response Guide. v1.6 series

Nimsoft Monitor. dns_response Guide. v1.6 series Nimsoft Monitor dns_response Guide v1.6 series CA Nimsoft Monitor Copyright Notice This online help system (the "System") is for your informational purposes only and is subject to change or withdrawal

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Sage 300 ERP 2012. Sage CRM 7.1 Integration Guide

Sage 300 ERP 2012. Sage CRM 7.1 Integration Guide Sage 300 ERP 2012 Sage CRM 7.1 Integration Guide This is a publication of Sage Software, Inc. Version 2012 Copyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product

More information

Installation and Program Essentials

Installation and Program Essentials CS PROFESSIONAL SUITE ACCOUNTING PRODUCTS Installation and Program Essentials version 2015.x.x TL 28970 3/26/2015 Copyright Information Text copyright 1998 2015 by Thomson Reuters. All rights reserved.

More information

Reporting Installation Guide

Reporting Installation Guide Reporting Installation Guide Websense Enterprise Websense Web Security Suite TM v6.3.1 1996 2007, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published April

More information

Upgrading from Call Center Reporting to Reporting for Contact Center. BCM Contact Center

Upgrading from Call Center Reporting to Reporting for Contact Center. BCM Contact Center Upgrading from Call Center Reporting to Reporting for Contact Center BCM Contact Center Document Number: NN40010-400 Document Status: Standard Document Version: 02.00 Date: June 2006 Copyright Nortel Networks

More information

BrightStor ARCserve Backup for Windows

BrightStor ARCserve Backup for Windows BrightStor ARCserve Backup for Windows Serverless Backup Option Guide r11.5 D01182-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Configuration Guide for Email Gateway emailgtw v2.7 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

User Guide for Paros v2.x

User Guide for Paros v2.x Table of Contents 1 Introduction...1 1.1 Paros Overview...1 1.2 History...1 2 Copyright...2 3 Installation...3 4 Configuration...4 5 Functions...6 5.1 Spider...6 5.2 Scanner...6 5.3 Filter...7 5.4 Trapping

More information

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual TIBCO Spotfire Automation Services 6.5 Installation and Deployment Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information