Powershell Management for Defender

Size: px
Start display at page:

Download "Powershell Management for Defender"

Transcription

1 Powershell Management for Defender

2 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser's personal use without the written permission of Quest Software, Inc. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA USA Refer to our Web site for regional and international office information. TRADEMARKS Quest, Quest Software, the Quest Software logo, and Defender are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. For a complete list of Quest Software's trademarks, please see Other trademarks and registered trademarks are property of their respective owners. Disclaimer The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. Powershell Management for Defender Updated - Software Version

3 Contents INTRODUCTION USING POWERSHELL MANAGEMENT FOR DEFENDER INSTALLING AND OPENING POWERSHELL MANAGEMENT FOR DEFENDER INSTALLATION REQUIREMENTS INSTALLING MICROSOFT.NET FRAMEWORK INSTALLING MICROSOFT WINDOWS POWERSHELL INSTALLING POWERSHELL MANAGEMENT FOR DEFENDER OPENING POWERSHELL MANAGEMENT FOR DEFENDER GETTING HELP CMDLET NAMING CONVENTIONS TAB EXPANSION TO AUTO-COMPLETE NAMES PARAMETERS PARAMETER DETAILS POSITIONAL PARAMETERS SYNTAX CMDLETS CMDLET REFERENCE ADD-SOFTWARETOKENTOUSER ADD-TOKENTOUSER ADD-TOKENTOUSERBATCH FIND-DEFENDERTOKEN GET-DEFENDERLICENSE GET-DEFENDERTEMPORARYRESPONSES GET-DEFENDERUSERSLASTLOGON GET-TOKENSFORUSER GET-UNACTIVATEDSOFTWARETOKENS GET-USERSFORTOKEN REMOVE-ALLTOKENSFROMUSER REMOVE-DEFENDERPASSWORD REMOVE-PINFROMUSERTOKEN REMOVE-TEMPORARYRESPONSE REMOVE-TOKENFROMUSER REMOVE-TOKENFROMUSERBATCH RESET-DEFENDERTOKEN RESET-DEFENDERVIOLATIONCOUNT SET-DEFENDERPASSWORD SET-PINONUSERTOKEN SET-TEMPORARYRESPONSE TEST-DEFENDERTOKEN

4 Introduction PowerShell Management for Defender is implemented as a Windows PowerShell snap-in, providing an extension to the Windows PowerShell environment. To get acquainted with the basic features of Windows PowerShell, refer to the Windows PowerShell Getting Started Guide, which you can access at library/aa aspx. For more detailed information on Windows PowerShell, see the Windows PowerShell Primer document, which is included with the Windows PowerShell installation. As the commands provided by PowerShell Management for Defender conform to the Windows PowerShell standards, and are fully compatible with the default command-line tools that come with Windows PowerShell, the information found in Microsoft s PowerShell documentation is fully applicable. This document details how to install, configure and use PowerShell Management for Defender. If you require a visual application as an alternative to using a DOS style command line utility, please visit PowerShell Management for Defender provides a command-line management interface for administering Defender attributes within Active Directory. This document provides information on the basic concepts and features, and includes reference topics about the commands (cmdlets) that can be run. Using PowerShell Management for Defender PowerShell Management for Defender, built on Microsoft Windows PowerShell technology, provides a commandline interface that enables automation of Defender administrative tasks. With PowerShell Management for Defender, administrators can administer token related tasks such as assigning tokens to users, assigning a PIN or checking for expired tokens. The PowerShell Management for Defender command-line tools (cmdlets), like all the Windows PowerShell cmdlets, are designed to deal with objects structured information that is more than just a string of characters appearing on the screen. The cmdlets do not use text as the basis for interaction with the system, but use an object model that is based on the Microsoft.NET platform. In contrast to traditional, text-based commands, the cmdlets do not require the use of text-processing tools to extract specific information. Rather, you can access portions of the data directly by using standard Windows PowerShell object manipulation commands. Installing and Opening PowerShell Management for Defender Installation Requirements Before you install, ensure that your system has the following software installed: Windows 2003 Service Pack 1, or later versions of Windows Microsoft.NET Framework 3.5 Service Pack 1, or a later version of.net Framework Microsoft Windows PowerShell 1.0 or 2.0 If the Defender Admin Console is installed on the same server and the server is running an x64 operating system, then version or later of the Defender Admin Console is required. Installing Microsoft.NET Framework For information on how to download and install Microsoft.NET Framework, see.net Framework Developer Centre at 4

5 Installing Microsoft Windows PowerShell For information on how to download and install Microsoft Windows PowerShell 1.0, see Microsoft s Knowledge Base article , Windows PowerShell 1.0 English Language Installation Packages for Windows Server 2003 and for Windows XP, at If you are running Windows Server 2008, to install Windows PowerShell, perform the following steps: 1. Click Start, and then click Control Panel. 2. In Control Panel, double-click Administrative Tools. 3. In Administrative Tools, double-click Server Manager. 4. In Server Manager, in the console tree, click Features, and then in the details pane, click Add Features. 5. In the Add Features Wizard, select Windows PowerShell, and then complete the wizard. We recommend that you install Windows Management Framework, to upgrade your Windows PowerShell installation to version 2.0. For information on how to download and install Windows Management Framework, see Microsoft s Knowledge Base article , Windows Management Framework (Windows PowerShell 2.0, WinRM 2.0, and BITS 4.0), at Installing PowerShell Management for Defender To install: 1. Run either setup.exe or the correct msi installer, as detailed below, included with the PowerShell Management for Defender distribution package. 2. Follow the instructions on the installation wizard pages. x86 and x64 versions are available: x86 = PowerShell Management for Defender.msi x64 = PowerShell Management for Defender (x64).msi 5

6 Opening PowerShell Management for Defender You can open PowerShell Management for Defender by using either of the following procedures. Each procedure loads the snap-in into Windows PowerShell. If you do not load the PowerShell Management for Defender snap-in before you run a command (cmdlet) provided by that snap-in, you will receive an error. To open PowerShell Management for Defender from the Programs menu, select Start, All Programs, Quest Software, PowerShell Management for Defender. To add the PowerShell Management for Defender snap-in from Windows PowerShell: 1. Start Windows PowerShell. 2. Verify that the application is available to Microsoft PowerShell. To do this from PowerShell, run: Get-PSSnapin -registered The following text is displayed: Name PSVersion : 1.0 Description :Quest.Defender.AdminTools : This Windows PowerShell snap-in contains cmdlets to manage Quest Defender. 3. If PowerShell commands for Defender has not been added enter the following in the command prompt: Add-PSSnapin Quest.Defender.AdminTools 6

7 Getting Help PowerShell Management for Defender uses the Windows PowerShell help cmdlets to assist you in finding the appropriate information to accomplish your task. The following table provides some examples of how to use the Get-Help and Get-Command cmdlets to access the help information that is available for each cmdlet. Command Get-Help Get-Help <Cmdlet> Description When you use Get-Help without any parameters, you are presented with basic instructions on how to use the help system in Windows PowerShell. When you use Get-Help with the name of a cmdlet as an argument, you are presented with the help information for that cmdlet. For example, to retrieve the help information for Add-TokenToUser, use either of the following commands: Get-Help Add-TokenToUser Get-Help Add-TokenToUser -detailed Get-Help Add-TokenToUser -full Get-Command Get-Command <Cmdlet> Get-Command without any parameters lists all the cmdlets that are available to the shell. You can use the Get-Command cmdlet with the Format-List or Format-Table cmdlet to provide a more readable display. For example, use Get-Command Format-List to display the output in a list format. When you use Get-Command with the name of a cmdlet as an argument, you are presented with information about the parameters and other components of that cmdlet. The <Cmdlet> entry allows for wildcard character expansion. For example, to retrieve information about the cmdlets with the names ending in Batch, you can use the following command: Get-Command *Batch Get-Command -Noun <CmdletNoun> Get-Command -Noun <CmdletNoun> lists all the cmdlets with the names that include the specified noun. <CmdletNoun> allows for wildcard character expansion. Thus, you can use the following command to list all the cmdlets provided by PowerShell commands for Defender that include Token as part of the cmdlet: Get-Command -Noun Token* 7

8 Cmdlet Naming Conventions All cmdlets are presented in verb-noun pairs. The verb-noun pair is separated by a hyphen (-) without spaces, and the cmdlet nouns are always singular. The verb refers to the action that the cmdlet performs. The noun identifies the entity on which the action is performed. For example, in the Add-TokenToUser cmdlet name, the verb is Add and the noun is TokenToUser. You can use the following commands to list all cmdlets found in PowerShell Management for Defender: Get-Command Quest.Defender.AdminTools\* (PowerShell v1.0) Get-Command module Quest.Defender.AdminTools (PowerShell v2.0) Tab Expansion to Auto-Complete Names PowerShell Management for Defender provides a way to complete command and parameter names automatically, thus speeding up command entry. You can fill in cmdlet names and parameters by pressing the TAB key. To use tab expansion on a cmdlet name, type the entire first part of the name (the verb) and the hyphen that follows it, and then press TAB. The shell will complete the cmdlet name if a matching cmdlet is found. If multiple matching cmdlet names exist, repeatedly pressing TAB will cycle through all of the available choices. You can fill in more of the name for a partial match. The following example shows how you can use tab expansion when you enter a cmdlet name: Add-Token <TAB> As you press the TAB key in this example, the shell cycles through all the cmdlet names that begin with Add-Token and you will see: Add-TokenToUser Add-TokenToUserBatch You can also use tab expansion when you want the shell to complete the partial parameter name that you have entered. In this case, you must specify the full cmdlet name, either by typing it in directly or by using tab expansion. The following example shows how you can use tab expansion when you enter a parameter name: Add-TokenToUser -u <TAB> As you press the TAB key in this example, the shell completes the UserCommonName parameter on the Add- TokenToUser cmdlet. 8

9 Parameters Cmdlets use parameters to take information necessary for completing their tasks. Parameters are string elements that follow the name of a cmdlet, either identifying an object and its attributes to act upon, or controlling how the cmdlet performs its task. The name of the parameter is preceded by a hyphen (-) and followed by the value of the parameter as follows: Verb-Noun -ParameterName <ParameterValue> In this example, the hyphen in front of the parameter name indicates that the word immediately following the hyphen is a parameter passed to the cmdlet and the next separate string after the parameter name is the value of the parameter. In the examples included within the Cmdlets Reference section later in this document we have provided examples, omitting the parameter name where possible to simplify the command. Parameter Details The information displayed by the Get-Help cmdlet includes the Parameters section (also called metadata) on each parameter. The following example is an excerpt from the output of the Get-Help Add-TokenToUser -full command: Name Add-TokenToUser Synopsis Assigns a Defender token to a user. Add-TokenToUser [-UserCommonName] <string> [-TokenCommonName] <string> [- UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>] Detailed Description Assigns a Defender token to a user. For batch assignment of many users or tokens, the Add-TokenToUserBatch command will provide better performance than repeated running of the tool using assign. 9

10 -UserCommonName <string> Common name of the user to whom the token will be assigned. Required True Position 0 Default Accept pipeline input? Accept wildcard chara ters? False False -TokenCommonName <string> Common name of the token to be assigned. Required True Position 1 Default Value Accept pipeline input? Accept wildcard chara ters? False False -UserSearchBase <string> Optional parameter to specify base container from which to search for users. Required Position False Named Default Value Accept pipeline input? Accept wildcard characters? False False <CommonParameters> This cmdlet supports the common parameters: -Verbose, -Debug, -ErrorAction, -ErrorVariable, and -OutVariable. For more information, type, "get-help about_commonparameters". Input Type Return Type Related Links 10

11 Positional Parameters A positional parameter lets you specify the parameter s value without specifying the parameter s name. A positional parameter has the Position attribute set to an integer in the metadata. This integer indicates the position on the command line where the cmdlet can find the parameter s value. An example of a positional parameter is the UserCommonName parameter. This parameter is always in position 0 if it is available on a cmdlet. The following two commands perform the same task: listing the Defender tokens assigned to a user: Get-AllTokensForUser -UserCommonName "Bob Smith" Get-AllTokensForUser "Bob Smith" If a parameter is not a positional parameter, it is considered to be a named parameter. When you enter a command on the command line, you must type the parameter name for a named parameter. PowerShell Management for Defender follows the Windows PowerShell command conventions that help you understand what information is required or optional when you run a cmdlet and how you must present the parameters and their values. The following table lists these command conventions. Symbol Description - A hyphen indicates that the next word on the command line is a parameter. For more information about parameters, see Parameters earlier in this document. <> Angle brackets are used to indicate parameter values along with the parameter type setting. This setting specifies the form that the parameter's value should take, and refers to the.net type that determines the kind of value that is permitted as a parameter argument. For example, <Int32> indicates that the parameter argument must be an integer; <String> indicates that the argument must be in the form of a character string. If the string contains spaces, the value must be enclosed in quotation marks or the spaces must be preceded by the escape character (`). The angle brackets are only intended to help you understand how a command should be constructed. You do not type these brackets when you enter the command on the command line. [] Square brackets are used to indicate an optional parameter and its value. A parameter and its value that are not enclosed in square brackets are required. If you do not supply a required parameter on the command line, the shell prompts you for that parameter. The square brackets are only intended to help you understand how a command should be constructed. You do not type these brackets when you enter the command on the command line. In the documentation, all cmdlets display their associated parameters in parameter sets. These are groupings of parameters that can be used with each other. Although a cmdlet may have multiple parameter sets, most cmdlets have only one set of parameters. The following example displays the parameter set of the Add- TokenToUser cmdlet: Add-TokenToUser [-UserCommonName] <string> [-TokenCommonName] <string> [- UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>] In this example: the UserCommonName and TokenCommonName parameters are enclosed in square brackets to indicate that you can specify the string value for this parameter without typing -UserCommonName or -TokenCommonName (these are positional parameters, see Positional Parameters on page 10 of this document). the UserSearchBase and TokenSearchBase parameters along with their parameter values are enclosed in square brackets, to indicate that these are optional parameters, so each of these parameters along with their values can be omitted. 11

12 Cmdlets The following cmdlets are available in PowerShell Management for Defender version 5.7: Add-SoftwareTokenToUser Add-TokenToUser Add-TokenToUserBatch Find-DefenderToken Get-DefenderLicense Get-DefenderTemporaryResponses Get-DefenderUsersLastLogon Get-TokensForUser Get-UnactivatedSoftwareTokens Get-UsersForToken Remove-AllTokensFromUser Remove-DefenderPassword Remove-PINFromUserToken Remove-TemporaryResponse Remove-TokenFromUser Remove-TokenFromUserBatch Reset-DefenderToken Reset-DefenderViolationCount Set-DefenderPassword Set-PINOnUserToken Set-TemporaryResponse Test-DefenderToken 12

13 Cmdlet Reference All Cmdlets are shown below in BOLD text. If the cmdlet requires any additional information, you can enter this on the command line. When you run the cmdlet, PowerShell Management for Defender will prompt for any missing information. For each cmdlet referenced below, the following Windows PowerShell Common Parameters are supported: Verbose, Debug, ErrorAction, ErrorVariable, WarningAction, WarningVariable, OutBuffer and OutVariable. For more information, type: get-help about_commonparameters 13

14 Add-SoftwareTokenToUser This command assigns a single Defender software token to a user within Active Directory. Add-SoftwareTokenToUser [-UserCommonName] <string> [-TokenType] <string> [[-TokenPIN] <string>] [-UserSearchBase <string>] [<CommonParameters>] Parameters UserCommonName Common name of the user to whom the token will be assigned. TokenType The type of the token added. This may be one of the following values: Windows Palm Blackberry WindowsPhone itoken Mobile Android OTP Java These types produce tokens for use on the following platforms: Windows - Windows operating systems Palm - Palm devices Blackberry - BlackBerry devices WindowsPhone - Devices running Windows mobile or Windows Phone operating systems itoken - iphone, ipad or ipod Touch devices Mobile - SMS token, where a text message containing one-time passwords is sent to the user's mobile phone Android - Devices running the Android operating system OTP - token, where an containing one-time passwords is sent to the user's mobile phone Java - Windows, Mac or Linux operating systems that support Java applications 14

15 TokenPin Optional parameter to specify PIN to assign to the user's token. PINs cannot be used when programming a Windows token. UserSearchBase Optional parameter to specify base container from which to search for users. EXAMPLE 1 Assign a software token to use with the Defender Desktop Token on Windows to a user with CN BSmith Add-SoftwareTokenToUser BSmith Windows EXAMPLE 2 Assign a token to use with the itoken on iphone, ipad or ipod Touch to a user with CN 'Bob Smith' specifying a PIN for the token and using a specific User Search Base Add-SoftwareTokenToUser "Bob Smith" itoken UserSearchBase "CN=Users,DC=MyDomain,DC=Local" EXAMPLE 3 Get-Content C:\Defender\NewTokens.txt ForEach-Object {$data = $_.S plit(","); Add-SoftwareTokenToUser $data[0] $data[1] $data[2] } Description Given a file C:\Defender\NewTokens.txt containing a list of comma-seperated lines containing user CN, token type and PIN assign a token to each user in the file. Example file contents: BSmith,Windows RJones,BlackBerry,1471 TBlack,iToken This file would assign a Windows token to BSmith, a BlackBerry token with PIN to RJones and an itoken to TBlack. 15

16 Add-TokenToUser This command assigns a single Defender token to a user within Active Directory. For batch assignment of many users or tokens, the Add-TokenToUserBatch command will provide better performance than repeated running of this cmdlet. Add-TokenToUser [-UserCommonName] <string> [-TokenCommonName] <string> [-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>] Parameters UserCommonName Common name of the user to whom the token will be assigned. TokenCommonName Common name of the token to be assigned. UserSearchBase Optional parameter to specify base container from which to search for users. TokenSearchBase Optional parameter to specify base container from which to search for tokens. Remarks To see the examples, type: "get-help Add-TokenToUser -examples" For more information, type: "get-help Add-TokenToUser -detailed" For technical information, type: Example 1 "get-help Add-TokenToUser -full" Assign a token with Common Name (CN) GO to a user with CN BSmith: Add-TokenToUser BSmith GO Example 2 Assign a token with CN GO to a user with CN 'Bob Smith' specifying a specific User Search Base: Add-TokenToUser "Bob Smith" GO UserSearchBase "CN=Users,DC=MyDomain,DC=Local" Example 3 Assign a token with CN GO to a user with CN "Bob Smith" specifying a specific User Search Base and Token Search Base: Add-TokenToUser "Bob Smith" GO UserSearchBase "CN=Users,DC=mydomain,DC=Local" -TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" Add-TokenToUserBatch This command assigns each user contained in a users file with the token from the corresponding line in a tokens file. Optionally, a file containing PINs can also be used to assign a PIN to each token. If the users file contains just one user, all tokens listed in the tokens file are assigned to that user. If the tokens file contains just one token, all users listed in the users file are assigned that token. Add-TokenToUserBatch [-UsersFile] <string> [-TokensFile] <string> [[-PINsFile] <string>] [-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>] 16

17 Parameters UsersFile Name and path of the file containing common names of the users to whom tokens will be assigned. TokensFile Name and path of the file containing common names of the tokens to be assigned. PINsFile Name and path of the file containing the PINs to be assigned to the tokens. UserSearchBase Optional parameter to specify base container from which to search for users. TokenSearchBase Optional parameter to specify base container from which to search for tokens. Remarks To see the examples, type: "get-help Add-TokenToUserBatch -examples" For more information, type: "get-help Add-TokenToUserBatch -detailed" For technical information, type: "get-help Add-TokenToUserBatch -full" 17

18 Example 1 Assign tokens from a file named 'Tokens.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender: Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt In this example the file format for the UsersFile is a list of users as shown below: Bob Smith Bill Owen Gill Summers and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO GO GO In this example: Example 2 Bob Smith will have token GO assigned to his account Bill Owen will have token GO assigned to his account Gill Summers will have token GO assigned to her account. Assign tokens from a file named 'Tokens.txt' and set PINs from a file named 'PINs.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender: Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt C:\Defender\PINs.txt In this example the file format for the UsersFile is a list of users as shown below: Bob Smith Bill Owen Gill Summers and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO GO GO and the file format for the PINsFile is a list of PINs as shown below: In this example: Example 3 Bob Smith will have token GO with PIN 1471 assigned to his account Bill Owen will have token GO with PIN 9090 assigned to his account Gill Summers will have token GO with PIN 6842 assigned to her account. Assign tokens from a file named 'Tokens.txt' and set PINs from a file named 'PINs.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender: Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt C:\Defender\PINs.txt 18

19 In this example the file format for the UsersFile is a list of users as shown below: Bob Smith Bill Owen Gill Summers and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO GO GO and the file format for the PINsFile is a list of PINs as shown below: 1471 expire 9090 expire 6842 expire In this example: Example 4 Bob Smith will have token GO with expired PIN 1471 assigned to his account Bill Owen will have token GO with expired PIN 9090 assigned to his account Gill Summers will have token GO with expired PIN 6842 assigned to her account. Assign tokens from a file named 'Tokens.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt In this example the file format for the UsersFile is a list of users as shown below: Bob Smith and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO PDAND PDIPN In this example: Bob Smith will have token GO , PDAND and PDIPN assigned to his account. 19

20 Example 5 Assign tokens from a file named 'Tokens.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt In this example the file format for the UsersFile is a list of users as shown below: Bob Smith Bill Owen Gill Summers and the file format for the TokensFile is a single token CN that exists in Active Directory, as shown below: GO In this example: Example 6 Bob Smith, Bill Owen and Gill Summers will have token GO assigned to their accounts. Assign tokens from a file named 'Tokens.txt' and set PINs from a file named 'PINs.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender. Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt C:\Defender\PINs.txt In this example the file format for the UsersFile is a list of users as shown below: Bob Smith Bill Owen Gill Summers and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO GO GO and the file format for the PINsFile is a list of PINs as shown below: In this example: Bob Smith will have token GO with PIN 1471 assigned to his account Bill Owen will have token GO with PIN 9090 assigned to his account Gill Summer will have token GO assigned to her account with no PIN. 20

21 Example 7 Assign tokens from a file named 'Tokens.txt' and set PINs from a file named 'PINs.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender: Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt C:\Defender\PINs.txt In this example the file format for the UsersFile is a list of users as shown below: Bob Smith Bill Owen Gill Summers and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO GO GO and the file format for the PINsFile is a list of PINs as shown below: 1471 In this example: Example 8 Bob Smith will have token GO with PIN 1471 assigned to his account Bill Owen will have token GO with PIN 1471 assigned to his account Gill Summer will have token GO with PIN 1471 assigned to her account. Assign tokens from a file named 'Tokens.txt' located in C:\Defender to users listed in the file 'Users.txt' located in C:\Defender using a specified User and Token Search Base: Add-TokenToUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt -UserSearchBase "CN=Users,DC=mydomain,DC=Local" -TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" 21

22 Find-DefenderToken This command will find Defender tokens matching a serial number or part of a serial number. Non-alphanumeric characters will be removed before searching. Find-DefenderToken [-TokenSerialNumber] <string> [-TokenSearchBase <string>] <CommonParameters>] Parameters TokenSerialNumber The serial number or part of the serial number to search for. Non alphanumeric characters will be removed before searching. TokenSearchBase Optional parameter to specify base container from which to search for tokens. Remarks To see the examples, type: "get-help Find-DefenderToken -examples" For more information, type: "get-help Find-DefenderToken -detailed" For technical information, type: "get-help Find-DefenderToken -full" Example 1 To list the common name of all Defender Blackberry Tokens that have been programmed and exist in AD: Find-DefenderToken BLB Example 2 To list all Defender Tokens that have '277' as part of the serial number: Find-DefenderToken 277 Example 3 To produce a list of tokens that have been programmed for the Android device using a specified Token Search Base: Find-DefenderToken PDAND -TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" 22

23 Get-DefenderLicense This command retrieves details of the current Defender user and token licenses. There are no additional parameters for this command. Get-DefenderLicense [<CommonParameters>] Remarks To see the examples, type: "get-help Get-DefenderLicense -examples" For more information, type: "get-help Get-DefenderLicense -detailed" For technical information, type: "get-help Get-DefenderLicense -full" Example 1 To retrieve the current Defender User License: Get-DefenderLicense 23

24 Get-DefenderTemporaryResponses Gets Defender tokens that have valid temporary responses assigned. Get-DefenderTemporaryResponses [-UserSearchBase <string>] [<CommonParameters>] Parameters UserSearchBase <string> Optional parameter to specify base container from which to search for users. EXAMPLE 1 Retrieve Defender tokens that have valid temporary responses assigned. Get-DefenderTemporaryResponses EXAMPLE 2 Retrieve Defender tokens that have valid temporary responses assigned for users with the specified User Search Base. Get-DefenderTemporaryResponses -UserSearchBase "CN=Users,DC=MyDomain,DC=Local" 24

25 Get-DefenderUsersLastLogon The cmdlet will list the name and last logon time for all users that have authenticated successfully to Defender. Get-DefenderUsersLastLogon [-UserSearchBase <string>] [<CommonParameters>] Parameters UserSearchBase <string> Optional parameter to specify base container from which to search for users. Remarks To see the examples, type: "get-help Get-DefenderUsersLastLogon -examples" For more information, type: "get-help Get-DefenderUsersLastLogon -detailed" For technical information, type: "get-help Get-DefenderUsersLastLogon -full" Example 1 To list the names and last logon times of all users who have authenticated to Defender: Get-DefenderUsersLastLogon Example 2 To list the names and last logon times of all users who have authenticated to Defender using a specified User Search Base: Get-DefenderUsersLastLogon -UserSearchBase "CN=Users,DC=MyDomain,DC=Local" Example 3 To list the names and last logon times of all users who have authenticated to Defender in the last 30 days: Get-DefenderUsersLastLogon Where-Object {$_.LastLogon -gt ((get-date).adddays(- 30))} Example 4 To list the names and last logon times of all users who have authenticated to Defender since 1st November 2010: Get-DefenderUsersLastLogon Where-Object {$_.LastLogon -gt (get-date -Date 01/11/ 2010)} 25

26 Get-TokensForUser This command will list the Defender tokens currently assigned to a user account returning the token type, common name, DN and whether the token has a PIN assigned: Get-TokensForUser [-UserCommonName] <string> [-UserSearchBase <string>] [<CommonParameters>] Parameters UserCommonName Common name of the user whose tokens will be listed. UserSearchBase Optional parameter to specify base container from which to search for users. Remarks To see the examples, type: "get-help Get-TokensForUser -examples" For more information, type: "get-help Get-TokensForUser -detailed" For technical information, type: "get-help Get-TokensForUser -full" 26

27 Example 1 To retrieve a list of the common names of all Defender Tokens assigned to a User account with a CN of 'Bob Smith': Get-TokensForUser "Bob Smith" The screen shot below shows an example of the results returned and how they are displayed when using the ' Format-List' or ' Format-Table' parameters: Example 2 To retrieve a list of the common names of all Defender Tokens assigned to a User account with a CN of 'Bob Smith' using a specified User Search Base: Get-TokensForUser "Bob Smith" -UserSearchBase "CN=Users,DC=mydomain,DC=Local" 27

28 Get-UnactivatedSoftwareTokens This command will list software tokens that have not been activated. Get-UnactivatedSoftwareTokens [-ShowExpiredOnly [<SwitchParameter>]] [- TokenSearchBase <string>] [<CommonParameters>] Parameters ShowExpiredOnly Optional, if specified only Defender Software tokens that have expired activation codes are displayed. TokenSearchBase Optional parameter to specify base container from which to search for tokens. Remarks To see the examples, type: "get-help Get-UnactivatedSoftwareTokens -examples" For more information, type: "get-help Get-UnactivatedSoftwareTokens -detailed" For technical information, type: "get-help Get-UnactivatedSoftwareTokens -full" Example 1 To retrieve a list of Defender Software Tokens that have not been activated: Get-UnactivatedSoftwareTokens Example 2 To retrieve a list of Defender Software Tokens that have not been activated using a specified Token Search Base: Get-UnactivatedSoftwareTokens -TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" Example 3 To retrieve a list of Defender Software Tokens where the activation code has expired: Get-UnactivatedSoftwareTokens -ShowExpiredOnly Example 4 To retrieve a list of Defender Software Tokens where the activation code has expired using a specified Token Search Base: Get-UnactivatedSoftwareTokens -ShowExpiredOnly -TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" 28

29 Get-UsersForToken This command lists the users assigned to a Defender token. Get-UsersForToken [-TokenCommonName] <string> [-TokenSearchBase <string>] <CommonParameters>] Parameters TokenCommonName Common name of the token whose users will be listed. TokenSearchBase Optional parameter to specify base container from which to search for tokens. Remarks To see the examples, type: "get-help Get-UsersForToken -examples" For more information, type: "get-help Get-UsersForToken -detailed" For technical information, type: "get-help Get-UsersForToken -full" Example 1 To retrieve a list of user common names that have been assigned a token with CN GO : Get-UsersForToken GO Example 2 To retrieve a list of user common names that have been assigned a token with CN GO using a specified Token Search Base: Get-UsersForToken GO TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" 29

30 Remove-AllTokensFromUser This cmdlet can be used to remove or un-assign all Defender tokens from a user account. For batch unassignment of many users or tokens, the Remove-TokenFromUserBatch command will provide better performance than repeated running of this cmdlet. Remove-AllTokensFromUser [-UserCommonName] <string> [-DeleteSoftwareToken [<SwitchParameter>]] [-UserSearchBase <string>] [<CommonParameters>] Parameters UserCommonName Common name of the user whose tokens will be unassigned. DeleteSoftwareToken Optional, if specified then Defender Software tokens are removed from Active Directory as well as being unassigned from the user. UserSearchBase Optional parameter to specify base container from which to search for users. Remarks To see the examples, type: "get-help Remove-AllTokensFromUser -examples" For more information, type: "get-help Remove-AllTokensFromUser -detailed" For technical information, type: "get-help Remove-AllTokensFromUser -full" Example 1 To unassign all Defender tokens from a user with common name 'Bob Smith': Remove-AllTokensFromUser "Bob Smith" Example 2 To unassign all Defender tokens from a user with common name 'Bob Smith' using a specified User Search Base: Remove-AllTokensFromUser "Bob Smith" -UserSearchBase "CN=Users,DC=mydomain,DC=Local" Example 3 To unassign all Defender tokens from a user with common name 'Bob Smith' and remove any assigned Defender Software tokens from Active Directory: Remove-AllTokensFromUser "Bob Smith" -DeleteSoftwareToke 30

31 Remove-DefenderPassword This cmdlet deletes the Defender password for a user or all users in a group. Specify a user account name to delete the Defender password for a specific user. Specify a group name to delete the Defender passwords for all users in that group. Remove-DefenderPassword [-UserGroupCommonName] <string> [-UserSearchBase <string>] [<CommonParameters>] Parameters UserGroupCommonName Common name of the user or group of users from which the Defender Password will be removed. UserSearchBase Optional parameter to specify base container from which to search for users and groups. Remarks To see the examples, type: "get-help Remove-DefenderPassword -examples" For more information, type: "get-help Remove-DefenderPassword -detailed" For technical information, type: "get-help Remove-DefenderPassword -full" Example 1 To remove the Defender Password from a user with common name 'Bob Smith': Remove-DefenderPassword "Bob Smith" Example 2 To remove the Defender Password from all members of an Active Directory security group with common name 'Sales': Remove-DefenderPassword Sales Example 3 To remove the Defender Password from a user with common name 'Bob Smith' using a specified User Search Base: Remove-DefenderPassword "Bob Smith" -UserSearchBase "CN=Users,DC=mydomain,DC=Local" 31

32 Remove-PINFromUserToken This cmdlet will remove a PIN that has been assigned to a user's token. Remove-PINFromUserToken [-UserCommonName] <string> [-TokenCommonName] <string> [- UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>] Parameters UserCommonName Common name of the user from whom the PIN will be removed. TokenCommonName Common name of the token from which the PIN will be removed. UserSearchBase Optional parameter to specify base container from which to search for users. TokenSearchBase Optional parameter to specify base container from which to search for tokens. Remarks To see the examples, type: "get-help Remove-PINFromUserToken -examples For more information, type: "get-help Remove-PINFromUserToken -detailed" For technical information, type: "get-help Remove-PINFromUserToken -full" Example 1 To remove a PIN from a token with common name (CN) GO , which has been assigned to a user with CN "Bob Smith": Remove-PINFromUserToken "Bob Smith" GO Example 2 To remove a PIN from a token with common name (CN) GO , which has been assigned to a user with CN "Bob Smith" using a specified User and Token Search Base: Remove-PINFromUserToken "Bob Smith" GO UserSearchBase "CN=Users,DC=MyDomain,DC=Local" -TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" 32

33 Remove-TemporaryResponse This cmdlet will remove a temporary token response that has been assigned to a User's token. Remove-TemporaryResponse [-UserCommonName] <string> [-TokenCommonName] <string> [-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>] Parameters UserCommonName Common name of the user to whom the temporary response has been assigned. TokenCommonName Common name of the token to which the temporary response has been assigned. UserSearchBase Optional parameter to specify base container from which to search for users. TokenSearchBase Optional parameter to specify base container from which to search for tokens. Remarks To see the examples, type: "get-help Remove-TemporaryResponse -examples" For more information, type: "get-help Remove-TemporaryResponse -detailed" For technical information, type: "get-help Remove-TemporaryResponse -full" Example 1 To remove the temporary token response from a token with common name GO that is assigned to a user with common name 'Bob Smith': Remove-TemporaryResponse "Bob Smith" GO Example 2 To remove the temporary token response from a token with common name GO that is assigned to a user with common name 'Bob Smith' specifying a specific User Search Base: Remove-TemporaryResponse "Bob Smith" GO UserSearchBase "CN=Users,DC=MyDomain,DC=Local" Example 3 To remove the temporary token response from a token with common name GO that is assigned to a user with common name 'Bob Smith' specifying a User and Token Search Base: Remove-TemporaryResponse "Bob Smith" GO UserSearchBase "CN=Users,DC=MyDomain,DC=Local" -TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" 33

34 Remove-TokenFromUser This command will unassign a Defender token from a user in Active Directory. For batch unassignment of many users or tokens, the Remove-TokenFromUserBatch command will provide better performance than repeated running of this cmdlet. Remove-TokenFromUser [-UserCommonName] <string> [-TokenCommonName] <string> [- DeleteSoftwareToken [<SwitchParameter>]] [-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>] Parameters UserCommonName Common name of the user from whom the token will be unassigned. TokenCommonName Common name of the token to be unassigned. DeleteSoftwareToken Optional, if specified for a Defender Software token, the token will be removed from Active Directory as well as being unassigned from the user account. UserSearchBase Optional parameter to specify base container from which to search for users. TokenSearchBase Optional parameter to specify base container from which to search for tokens. Remarks To see the examples, type: "get-help Remove-TokenFromUser -examples" For more information, type: "get-help Remove-TokenFromUser -detailed" For technical information, type: "get-help Remove-TokenFromUser -full" Example 1 Unassign a token with Common Name (CN) GO from a user with CN BSmith: Remove-TokenFromUser BSmith GO Example 2 Unassign a token with CN GO from a user with CN 'Bob Smith' specifying a specific User Search Base: Remove-TokenFromUser "Bob Smith" GO UserSearchBase "CN=Users,DC=MyDomain,DC=Local" Example 3 Unassign a token with CN GO from a user with CN 'Bob Smith' specifying a specific User Search Base and Token Search Base: Remove-TokenFromUser "Bob Smith" GO UserSearchBase "CN=Users,DC=MyDomain,DC=Local" -TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" Example 4 Unassign a Defender Software token with CN PDAND from a user with CN 'Bob Smith' and remove the token from Active Directory: Remove-TokenFromUser "Bob Smith" PDAND DeleteSoftwareToken 34

35 Remove-TokenFromUserBatch This command will unassign the tokens in the token file from the users on the corresponding line in the users file. If the users file contains just one user, all tokens listed in the tokens file are unassigned from that user. If the tokens file contains just one token, all users listed in the users file are unassigned that token. The word all may be specified on a line in the tokens file, in which case all tokens are unassigned from the corresponding user in the users file. These files use the same format as described for Add-TokenToUserBatch. Remove-TokenFromUserBatch [-UsersFile] <string> [-TokensFile] <string> [-DeleteSoftwareToken [<SwitchParameter>]] [-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>] Parameters UsersFile Name of file containing common names of the users from whom tokens will be unassigned. TokensFile Name of file containing common names of the tokens to be unassigned. DeleteSoftwareToken Optional, if specified then Defender Software tokens are removed from Active Directory as well as being removed from the user. UserSearchBase Optional parameter to specify base container from which to search for users. TokenSearchBase Optional parameter to specify base container from which to search for tokens. Remarks To see the examples, type: "get-help Remove-TokenFromUserBatch -examples" For more information, type: "get-help Remove-TokenFromUserBatch -detailed" For technical information, type: "get-help Remove-TokenFromUserBatch -full" 35

36 Example 1 Unassign tokens from a file named 'Tokens.txt' located in C:\Defender from users listed in the file 'Users.txt' located in C:\Defender: Remove-TokenFromUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt In this example the file format for the UsersFile is a list of users as shown below: Bob Smith Bill Owen Gill Summers and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO GO GO In this example: Example 2 Bob Smith will have token GO unassigned from his account Bill Owen will have token GO unassigned from his account Gill Summer will have token GO unassigned from her account. Unssign tokens from a file named 'Tokens.txt' located in C:\Defender from users listed in the file 'Users.txt' located in C:\Defender, where only a single user common name is specified: Remove-TokenFromUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt In this example the file format for the UsersFile is a list of users as shown below: Bob Smith and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO PDAND PDIPN In this example: Bob Smith will have token GO , PDAND and PDIPN unassigned from his account. 36

37 Example 3 Unssign tokens from a file named 'Tokens.txt' located in C:\Defender from users listed in the file 'Users.txt' located in C:\Defender, where only a single token common name is specified: Remove-TokenFromUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt In this example the file format for the UsersFile is a list of users as shown below: Bob Smith Bill Owen Gill Summers and the file format for the TokensFile is a single token CN that exists in Active Directory, as shown below: GO In this example: Example 4 Bob Smith, Bill Owen and Gill Summers will have token GO unassigned from their accounts. Unssign tokens from a file named 'Tokens.txt' located in C:\Defender from users listed in the file 'Users.txt' located in C:\Defender, using the \all\ parameter in the Tokens.txt file: Remove-TokenFromUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt In this example the file format for the UsersFile is a list of users as shown below: Bob Smith Bill Owen Gill Summers and the file format for the TokensFile is as shown below: GO all all In this example: Example 5 Bob Smith will have token GO unassigned from his account Bill Owen will have all Defender tokens unassigned from his account Gill Summer will have all Defender tokens unassigned from her account. Unassign tokens from a file named 'Tokens.txt' located in C:\Defender from users listed in the file 'Users.txt' located in C:\Defender using a specified User and Token Search Base: Remove-TokenFromUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt - UserSearchBase "CN=Users,DC=mydomain,DC=Local" -TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" 37

38 Example 6 Unassign tokens from a file named 'Tokens.txt' located in C:\Defender from users listed in the file 'Users.txt' located in C:\Defender, where only a single user common name is specified: Remove-TokenFromUserBatch C:\Defender\Users.txt C:\Defender\Tokens.txt - DeleteSoftwareToken In this example the file format for the UsersFile is a list of users as shown below: Bob Smith and the file format for the TokensFile is a list of token CN's that exist in Active Directory, as shown below: GO PDAND PDIPN In this example: Bob Smith will have token GO , PDAND and PDIPN unassigned from his account. Tokens PDAND and PDIPN will also be removed from Active Directory. 38

39 Reset-DefenderToken This cmdlet will reset a Defender token to aid authentication should the token become out of synchronization with the Defender Security Server. Reset-DefenderToken [-TokenCommonName] <string> [-TokenSearchBase <string>] [<CommonParameters>] Parameters TokenCommonName Common name of the token to reset. TokenSearchBase Optional parameter to specify base container from which to search for tokens. Remarks To see the examples, type: "get-help Reset-DefenderToken -examples" For more information, type: "get-help Reset-DefenderToken -detailed" For technical information, type: "get-help Reset-DefenderToken -full" Example 1 To reset the token with common name GO : Reset-DefenderToken GO Example 2 To reset the token with common name GO using a specified Token Search Base: Reset-DefenderToken GO TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" 39

40 Reset-DefenderViolationCount This cmdlet will reset a user's Defender violation count. Also allows the violation and reset counts to be viewed without resetting them. Reset-DefenderViolationCount [-UserCommonName] <string> [-ViewOnly [<SwitchParameter>]] [-UserSearchBase <string>] [<CommonParameters>] Parameters UserCommonName Common name of the user whose violation count is to be reset. ViewOnly Optional parameter, if specified then the violation count and reset count are returned but not adjusted. UserSearchBase Optional parameter to specify base container from which to search for users. Remarks To see the examples, type: "get-help Reset-DefenderViolationCount -examples" For more information, type: "get-help Reset-DefenderViolationCount -detailed" For technical information, type: "get-help Reset-DefenderViolationCount -full" Example 1 To reset the Defender Violation Count for a user with CN BSmith: Reset-DefenderViolationCount BSmith Example 2 To reset the Defender violation count for a user with CN "Bob Smith" specifying a specific User Search Base: Reset-DefenderViolationCount "Bob Smith" -UserSearchBase "CN=Users,DC=MyDomain,DC=Local" Example 3 To view the violation count and reset count information for a user with CN "Bob Smith": Reset-DefenderViolationCount "Bob Smith" -ViewOnly 40

41 Set-DefenderPassword This cmdlet sets the Defender password for a user or all users in a group. Specify the user account name to set the Defender password for that user. Specify the group name to assign the Defender password to all users in the group. Set-DefenderPassword [-UserGroupCommonName] <string> [-Password] <string> [-Expire [<SwitchParameter>]] [-Overwrite [<SwitchParameter>]] [-UserSearchBase <string>] [<CommonParameters>] Parameters UserGroupCommonName Common name of the user or group of users to which the Defender Password will be added. Password The Defender Password to set. -Expire Sets the Defender Password to be expired. -Overwrite Overwrites an existing Defender Password, by default existing Defender Password are not overwritten. UserSearchBase Optional parameter to specify base container from which to search for users and groups. Remarks To see the examples, type: "get-help Set-DefenderPassword -examples" For more information, type: "get-help Set-DefenderPassword -detailed" For technical information, type: "get-help Set-DefenderPassword -full" Example 1 Assign a Defender Password 'MyPassword' to a user account with Common Name (CN) "Bob Smith": Set-DefenderPassword "Bob Smith" MyPassword Example 2 Assign a Defender Password 'MyPassword' to a user account with Common Name (CN) "Bob Smith" and configure the password to expire so that the user is prompted to change the Defender Password on first use: Set-DefenderPassword "Bob Smith" MyPassword -expire Example 3 Assign a Defender Password 'MyNewPassword' to a user account with Common Name (CN) "Bob Smith" and configure the password to expire so that the user is prompted to change the Defender Password on first use and overwrite an existing Defender Password: Set-DefenderPassword "Bob Smith" MyNewPassword -expire -overwrite Example 4 Assign a Defender Password 'MyPassword' to all user accounts contained in a security group 'Sales' using a specified User Search Base: Set-DefenderPassword Sales MyPassword -UserSearchBase "CN=Users,DC=mydomain,DC=Local" 41

42 Set-PINOnUserToken This cmdlet sets a PIN on a token that has been assigned to a user. Set-PINOnUserToken [-UserCommonName] <string> [-TokenCommonName] <string> [-TokenPIN] <string> [-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>] Parameters UserCommonName Common name of the user to whom the PIN will be assigned. TokenCommonName Common name of the token to which the PIN will be assigned. TokenPIN The PIN to assign. UserSearchBase Optional parameter to specify base container from which to search for users. TokenSearchBase Optional parameter to specify base container from which to search for tokens. Remarks To see the examples, type: "get-help Set-PINOnUserToken -examples" For more information, type: "get-help Set-PINOnUserToken -detailed" For technical information, type: "get-help Set-PINOnUserToken -full" Example 1 To set a PIN of '1234' on a token with common name (CN) GO , which has been assigned to a user with CN "Bob Smith": Set-PINOnUserToken "Bob Smith" GO Example 2 To set a PIN of '1234' on a token with common name (CN) GO , which has been assigned to a user with CN "Bob Smith" using a specified User and Token Search Base: Set-PINOnUserToken "Bob Smith" GO UserSearchBase "CN=Users,DC=mydomain,DC=Local" -TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" 42

43 Set-TemporaryResponse To set a temporary token response on a token that has been assigned to a user account and specify the expiry date and whether the temporary token response can be used once only or multiple times. If the token assigned to the user has a PIN assigned then the PIN must be used with the temporary token response. Set-TemporaryResponse [-UserCommonName] <string> [-TokenCommonName] <string> [-ExpiryTimeMinutes] <string> [-MultipleUse] [-UserSearchBase <string>] [-TokenSearchBase <string>] [<CommonParameters>] Parameters UserCommonName Common name of the user to whom the temporary response will be assigned. TokenCommonName Common name of the token to which the temporary response wil be assigned. ExpiryTimeMinutes The time, in minutes, for which the temporary response is valid. MultipleUse Optional parameter, if specified then temporary response can be used multiple times. UserSearchBase Optional parameter to specify base container from which to search for users. TokenSearchBase Optional parameter to specify base container from which to search for tokens. Remarks To see the examples, type: "get-help Set-TemporaryResponse -examples" For more information, type: "get-help Set-TemporaryResponse -detailed" For technical information, type: "get-help Set-TemporaryResponse -full" 43

44 Example 1 To set a temporary token response on a token with common name (CN) GO , which has been assigned to a user with CN "Bob Smith" that will expire in 1 day and can only be used once: Set-TemporaryResponse "Bob Smith" GO When the above cmdlet is used the temporary token response and expiry date / time will be listed as in the example below: User "Bob Smith" can then use a temporary token response of '600202' once within the next 1440 minutes (1 day). Example 2 To set a temporary token response on a token with common name (CN) GO , which has been assigned to a user with CN "Bob Smith" that will expire in 7 days and can be used multiple times: Set-TemporaryResponse "Bob Smith" GO MultipleUse When the above cmdlet is used the temporary token response and expiry date / time will be listed as in the example below: User "Bob Smith" can then use a temporary token response of '800750' multiple times within the next minutes (7 days). Example 3 To set a temporary token response on a token with common name (CN) GO , which has been assigned to a user with CN "Bob Smith" that will expire in 7 days and can be used multiple times specifying a User and Token Search Base: Set-TemporaryResponse "Bob Smith" GO MultipleUse -UserSearchBase "CN=Users,DC=mydomain,DC=Local" -TokenSearchBase "OU=Tokens,OU=Defender,DC=MyDomain,DC=Local" 44

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Quick Connect Express for Active Directory

Quick Connect Express for Active Directory Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

ActiveRoles Management Shell for Active Directory

ActiveRoles Management Shell for Active Directory ActiveRoles Management Shell for Active Directory Version 1.5 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Object Level Authentication

Object Level Authentication Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott

More information

Quest vworkspace Virtual Desktop Extensions for Linux

Quest vworkspace Virtual Desktop Extensions for Linux Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.

More information

8.7. Target Exchange 2010 Environment Preparation

8.7. Target Exchange 2010 Environment Preparation 8.7 Target Exchange 2010 Environment Preparation 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document

More information

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Dell One Identity Quick Connect for Cloud Services 3.6.0

Dell One Identity Quick Connect for Cloud Services 3.6.0 Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell One Identity Quick Connect for Cloud Services 3.6.1

Dell One Identity Quick Connect for Cloud Services 3.6.1 Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.5.2 Managing SQL Server Database Systems Getting Started Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

6.7. Quick Start Guide

6.7. Quick Start Guide 6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Introduction to Version Control in

Introduction to Version Control in Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

Enterprise Self Service Quick start Guide

Enterprise Self Service Quick start Guide Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide Foglight for Oracle Managing Oracle Database Systems Getting Started Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Quick Connect for Cloud Services

Quick Connect for Cloud Services Quick Connect for Cloud Services Version 3.5 Administrator Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Web Portal Installation Guide 5.0

Web Portal Installation Guide 5.0 Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

7.5 7.5. Spotlight on Messaging. Evaluator s Guide

7.5 7.5. Spotlight on Messaging. Evaluator s Guide 7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

New Features and Enhancements

New Features and Enhancements Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements

More information

Quest ChangeAuditor 4.8

Quest ChangeAuditor 4.8 Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Quest Collaboration Services 3.6.1. How it Works Guide

Quest Collaboration Services 3.6.1. How it Works Guide Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Foglight. Managing Hyper-V Systems User and Reference Guide

Foglight. Managing Hyper-V Systems User and Reference Guide Foglight Managing Hyper-V Systems User and Reference Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Foglight. Dashboard Support Guide

Foglight. Dashboard Support Guide Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

formerly Help Desk Authority 9.1.3 HDAccess User Manual

formerly Help Desk Authority 9.1.3 HDAccess User Manual formerly Help Desk Authority 9.1.3 HDAccess User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell One Identity Manager 7.0. Help Desk Module Administration Guide

Dell One Identity Manager 7.0. Help Desk Module Administration Guide Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations

More information

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

NetVault LiteSpeed for SQL Server version 7.5.0. Integration with TSM

NetVault LiteSpeed for SQL Server version 7.5.0. Integration with TSM NetVault LiteSpeed for SQL Server version 7.5.0 Integration with TSM 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

DATA GOVERNANCE EDITION

DATA GOVERNANCE EDITION Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

FOR SHAREPOINT. Quick Start Guide

FOR SHAREPOINT. Quick Start Guide Quick Apps v6.2 FOR SHAREPOINT Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide Foglight Foglight for Virtualization, Enterprise Edition 7.2 Virtual Appliance Installation and Setup Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected

More information

Quest vworkspace. System Requirements. Version 7.2 MR1

Quest vworkspace. System Requirements. Version 7.2 MR1 Quest vworkspace System Requirements Version 7.2 MR1 2011 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright. The software described

More information

Quest Collaboration Services 3.5. How it Works Guide

Quest Collaboration Services 3.5. How it Works Guide Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

ActiveRoles 6.8. Web Interface User Guide

ActiveRoles 6.8. Web Interface User Guide ActiveRoles 6.8 Web Interface User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell Active Administrator 7.5. User Guide

Dell Active Administrator 7.5. User Guide Dell Active Administrator 7.5 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014

Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014 June 2014 These release notes provide information about Dell. About New features s Known issues System requirements Product licensing Getting started with Security Explorer Globalization About Dell About

More information

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell Client Profile Updating Utility 5.5.6

Dell Client Profile Updating Utility 5.5.6 Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System

More information

Dell NetVault Backup Plug-in for SQL Server 10.0.1

Dell NetVault Backup Plug-in for SQL Server 10.0.1 Dell NetVault Backup Plug-in for SQL Server 10.0.1, Revision 1 February 2015 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Dell NetVault Backup

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

Troubleshooting Guide 5.1. Quest Workspace ChangeBASE

Troubleshooting Guide 5.1. Quest Workspace ChangeBASE Troubleshooting Guide 5.1 Quest Workspace ChangeBASE [Type text] 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide Foglight Managing Java EE Systems Supported Platforms and Servers Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

System Requirements and Platform Support Guide

System Requirements and Platform Support Guide Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Dell NetVault Backup Plug-in for SQL Server 6.1

Dell NetVault Backup Plug-in for SQL Server 6.1 Dell NetVault Backup Plug-in for SQL Server 6.1 April 2014 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Enhancements Resolved issues Known

More information

ActiveRoles 6.9. Quick Start Guide

ActiveRoles 6.9. Quick Start Guide ActiveRoles 6.9 Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated MMES - What Can and Cannot Be Migrated First Release - April 2015 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

More information

Adobe Acrobat 9 Deployment on Microsoft Systems Management

Adobe Acrobat 9 Deployment on Microsoft Systems Management Adobe Acrobat 9 Deployment on Microsoft Systems Management Server white paper TABLE OF CONTENTS 1. Document overview......... 1 2. References............. 1 3. Product overview.......... 1 4. Installing

More information

ChangeAuditor 6.0. Web Client User Guide

ChangeAuditor 6.0. Web Client User Guide ChangeAuditor 6.0 Web Client User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

How to Deploy Models using Statistica SVB Nodes

How to Deploy Models using Statistica SVB Nodes How to Deploy Models using Statistica SVB Nodes Abstract Dell Statistica is an analytics software package that offers data preparation, statistics, data mining and predictive analytics, machine learning,

More information

Dell NetVault Backup Plug-in for Hyper-V 10.0.1. User s Guide

Dell NetVault Backup Plug-in for Hyper-V 10.0.1. User s Guide Dell NetVault Backup Plug-in for Hyper-V 10.0.1 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Cloud Identity Management Tool Quick Start Guide

Cloud Identity Management Tool Quick Start Guide Cloud Identity Management Tool Quick Start Guide Software version 2.0.0 October 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2013 CionSystems Inc., All

More information

Foglight 5.6.5. Managing SQL Server Database Systems Permissions Guide. for SQL Server

Foglight 5.6.5. Managing SQL Server Database Systems Permissions Guide. for SQL Server Foglight for SQL Server 5.6.5 Managing SQL Server Database Systems Permissions Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The

More information

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide Foglight 1.0.0.0 Cartridge for Active Directory Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide Dell NetVault Backup Plug-in for 1.3 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Dell Spotlight on Active Directory 6.8.4. Deployment Guide

Dell Spotlight on Active Directory 6.8.4. Deployment Guide Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell InTrust 11.0. Real-Time Monitoring Guide

Dell InTrust 11.0. Real-Time Monitoring Guide Dell InTrust 11.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

Dell One Identity Cloud Access Manager How to Configure as an Identity Provider

Dell One Identity Cloud Access Manager How to Configure as an Identity Provider Dell One Identity Cloud Access Manager 8.1.1 - How to Configure as an Identity Provider January 2016 To provide end-users located on another network with access to your applications, you can configure

More information

Top 10 Most Popular Reports in Enterprise Reporter

Top 10 Most Popular Reports in Enterprise Reporter Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software

More information

Lab Answer Key for Module 1: Installing and Configuring Windows Server 2008. Table of Contents Lab 1: Configuring Windows Server 2008 1

Lab Answer Key for Module 1: Installing and Configuring Windows Server 2008. Table of Contents Lab 1: Configuring Windows Server 2008 1 Lab Answer Key for Module 1: Installing and Configuring Windows Server 2008 Table of Contents Lab 1: Configuring Windows Server 2008 1 Information in this document, including URL and other Internet Web

More information

Quest vworkspace Connector for Android. User Guide Version 1.1.1

Quest vworkspace Connector for Android. User Guide Version 1.1.1 Quest vworkspace Connector for Android User Guide Version 1.1.1 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide

Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Dedicated Directory Replication Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains

More information