McAfee Endpoint Encryption Reporting Tool

Size: px
Start display at page:

Download "McAfee Endpoint Encryption Reporting Tool"

Transcription

1 McAfee Endpoint Encryption Reporting Tool User Guide Version

2 McAfee, Inc. McAfee, Inc Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) For more information regarding local McAfee representatives please contact your local McAfee office, or visit: Document: Endpoint Encryption Reporting Tool User Guide Last updated: June 19, 2013 Copyright (c) McAfee, Inc., and/or its affiliates. All rights reserved. McAfee and/or other noted McAfee related products contained herein are registered trademarks or trademarks of McAfee, Inc., and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. Any other non-mcafee related products, registered and/or unregistered trademarks contained herein is only by reference and are the sole property of their respective owners.

3 Contents Preface... 4 Using this guide...4 Audience...4 Conventions...4 Contacting Technical Support...4 Endpoint Encryption Reporting... 5 Starting the Endpoint Encryption Reporting application...5 Endpoint Encryption Reports...5 Machines Assigned Users Report...5 Machines By Group Report...6 Machines Client Status Report...6 Machines Client Version Report...7 Machines Description Report...7 Machines Encryption Status Report...8 Machines Event Audit Report...9 Machines Failed Logon Report Machines Last Sync Date Report Machines Not Fully Encrypted Report Machines Recovery Events Report Orphaned Objects Report Users Admin Level Report Users Assigned To Machines Report Users By Group Report Users Event Audit Report Users Last Logon Date Report Users Not Assigned To Machines Report Users Recovery Events Report How to Create and Run Reports The Users Admin Level Report Generating the Users Admin Level Report The Machines Encryption Status Report The Machine Client Status Report The Machines by Group Report Scheduling a Report Run Scheduling a Report Run Viewing and Editing a Report Run Deleting a Report Run Further Reporting Options Creating Folders Editing a Report Configuration Renaming a Report Configuration Deleting a Report Configuration Viewing a Report Renaming a Report Deleting a Report... 40

4 Preface Preface Using this guide This guide describes how to create reports using the McAfee Endpoint Encryption Reporting Tool. Audience This guide is intended for anyone who will run reports using the Endpoint Encryption Reporting Tool. Conventions This guide uses the following conventions: Bold Condensed Courier Italic Blue Note Caution All words from the interface, including options, menus, buttons, and dialog box names. The path of a folder or program; text that represents something the user types exactly (for example, a command at the system prompt). Emphasis or introduction of a new term; names of product manuals. A web address (URL); a live link. Supplemental information; for example, an alternate method of executing the same command. Important advice to protect your computer system, enterprise, software installation, or data. Contacting Technical Support Please refer to for further information. 4

5 Endpoint Encryption Reporting Endpoint Encryption Reporting The Endpoint Encryption Reporting application allows administrators to quickly create and run a number of reports on Endpoint Encryption users, machines and encryption configurations. Each report can be produced in three different formats: a simple table, a graphical xml layout or a comma-separated file. See the How to Create and Run Reports section for examples of each format. The first step in creating a report is to specify a configuration. This is done via a set of wizard screens. The configuration determines what the report will contain and what format it will take. After setting the criteria for the report, the administrator can easily generate it and view the output. Starting the Endpoint Encryption Reporting application The Endpoint Encryption Reporting Tool is installed as part of the Management Center installation. It sits within the McAfee Endpoint Encryption Manager option on the Programs menu. 1. Click on Start Programs McAfee Endpoint Encryption Manager Endpoint Encryption Reporting to start the application. 2. Logon using the administration logon. The Endpoint Encryption Reports window will appear. Endpoint Encryption Reports Machines Assigned Users Report The Machines Assigned Users Report provides an overview of which users have access rights to which machines. This report can be generated by specifying all machine groups or just particular groups. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in a machine name, e.g. PC_P*, or, the question mark character (?) to match just one character, e.g. P?. 5

6 Endpoint Encryption Reporting Figure 1 A sample of the Machines Assigned Users Report in the simple table format Machines By Group Report The Machines by Group report lists the machine id, network name and machine network name of all machines contained within the specified group(s). This report can be generated on one or more machine groups or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in a machine or group name, e.g. Sale*, or, the question mark character (?) to match just one character, e.g. U?. Figure 2 A sample of the Machines by Group Report in the simple table format Machines Client Status Report The Machine Client Status report lists the Endpoint Encryption client status of specified machines, i.e. the status set by the Administrator for a machine, e.g. Enabled, Disabled, Remove + Reboot. The report includes the machine id, network name, description and status. 6

7 Endpoint Encryption Reporting This report can be generated on one or more machine groups or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in a machine or group name, e.g. Sale*, or, the question mark character (?) to match just one character, e.g. U?. Figure 3 A sample of the Machine Status Report in the simple table format Machines Client Version Report The Machines Client Version report provides an overview of the client software versions for specified machines within your environment. The report lists the Endpoint Encryption client version with respective machine name and group name (the group where the machine belongs). This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. Figure 4 A sample of the Machines Client Version Report in the simple table format Machines Description Report The Machines Description Report provides an overview of specified machines and their respective descriptions. It also includes the name of the group the machine belongs to. This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) 7

8 Endpoint Encryption Reporting to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. You can also use these wildcard characters to filter the contents of the Description field. This is useful, for example, if you have used the Description field to further categorize your machines, e.g. Sales Machine, London Sales Office, Board Computer. Figure 5 A sample of the Machines Description Report in the simple table format Machines Encryption Status Report The Machines Encryption Status report displays the encryption condition of specified Endpoint Encryption machines. The data displays by machine name and includes the encryption status, the expected encryption status and the encryption state summary. This report can be generated on one or more machine groups or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in a machine or group name, e.g. Sale*, or, the question mark character (?) to match just one character, e.g. U?. See section The Machines Encryption Status Report for further information on the reported crypt state, expected crypt state and crypt state summary. 8

9 Endpoint Encryption Reporting Figure 6 A sample of the Machines Encryption Status Report in the simple table format Machines Event Audit Report The Machines Event Audit Report provides an overview of specified machines and events of importance for a machine, e.g. power fail, password changed successfully, logon failed. It also lists the time and date of the corresponding event. This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. Figure 7 a sample of the Machines Event Audit Report in the simple table format 9

10 Endpoint Encryption Reporting Machines Failed Logon Report The Machines Failed Logon Report provides a listing of machines which have acquired a certain amount of failed logons. It includes the user name of the person who attempted the logon as well as the date and time of each try. This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. You can also stipulate a date range or build the data from a specified number of days prior to the present day s date. Figure 8 A sample of the Machines Failed Logon Report in the simple table format Machines Last Sync Date Report The Machines Last Sync Report contains a listing of machines with the date and time they last synchronized with the main database. This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. 10

11 Endpoint Encryption Reporting Figure 9 A sample of the Machines Last Sync Date Report in the simple table format Machines Not Fully Encrypted Report The Machines Not Fully Encrypted Report contains a listing of machines that have an Encrypted state. This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. Figure 10 A sample of the Machines Not Fully Encrypted Report Machines Recovery Events Report The Machines Recovery Events Report contains a listing of machines and their associated recovery event including the event date and time. This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. 11

12 Endpoint Encryption Reporting You can filter the report further by selecting which recovery event(s) you wish to report on, e.g. Boot Once Recovery, Screen Saver Recovery or Recovery Failed. You can also stipulate a date range or build the data from a specified number of days prior to the present day s date. Figure 11 A sample of the Machines Recovery Events Report in the simple table format Orphaned Objects Report The Orphaned Objects Report contains a list of objects (users or machines) that have become orphaned (detached) from the machine group or user group which they belong. This report is generated by specifying either users or machines only. Figure 12 A sample of the Orphaned Objects Report in the simple table format Users Admin Level Report The Users Admin Level report lists the administration level of users. The report contains the Endpoint Encryption User ID, the user name and respective administration level. You can generate the report to include all users in your environment, or, select one or more individual users. 12

13 Endpoint Encryption Reporting During creation of the report, you will be prompted to select data for the X and Y-axis. This allows you to determine your preference for displaying the user name or administration levels in a vertical (Y) or horizontal (X) fashion. Note: This is only relevant to the XML graph report. Figure 13 A sample of the Users Admin Level Report in the simple table format Users Assigned To Machines Report The Users Assigned To Machines Report contains a listing of users and the machines they have been assigned to. This report can be generated on one or more groups and/or user names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, Sales*, or, the question mark character (?) to match just one character, e.g. P?. Figure 14 A sample of the Users Assigned To Machines Report in the simple table format 13

14 Endpoint Encryption Reporting Users By Group Report The Users By Group Report lists the user group names and users within those groups. This report can be generated on one or more groups and/or user names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, Sales*, or, the question mark character (?) to match just one character, e.g. P?. Figure 15 A Sample of the Users by Group Report in the simple table format Users Event Audit Report The Users Event Audit Report contains a listing of users and their associated recovery event including the event date and time. This report can be generated on one or more user groups and/or user names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. You can filter the report further by selecting which recovery event(s) you wish to report on, e.g. Login failed, Machine Configuration failed, Boot Completion or, if necessary, all Recovery events. See pic below. 14

15 Endpoint Encryption Reporting Figure 16 Select all or some of the events You can also stipulate a date range or build the data from a specified number of days prior to the present day s date. Figure 17 A sample of the Users Event Audit Report in the simple table format 15

16 Endpoint Encryption Reporting Users Last Logon Date Report The Users Last Logon Date Report lists the users who have not logged onto the database over a specified period of days (minimum). This report can be generated on one or more user groups and/or user names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. This report can be filtered further by specifying the minimum number of days. You can also tailor this report to list users who have not logged on since their audit log was last cleared. You can specify or include client logon events and/or database logon events. Figure 18 The Users Last Logon Report in the simple table format Figure 19 Choose the minimum number of days and type of event 16

17 Users Not Assigned To Machines Report Endpoint Encryption Reporting The Users Not Assigned To Machines Report contains a listing of users that are not assigned to a machine. This report can be generated on one or more groups and/or user names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, Sales*, or, the question mark character (?) to match just one character, e.g. P?. Figure 20 The Users Not Assigned to Machines Report in the simple table format Users Recovery Events Report The Users Recovery Events Report contains a listing of users and their associated recovery event including the event date and time. This report can be generated on one or more user groups and/or usernames. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. You can filter the report further by selecting which recovery event(s) you wish to report on, e.g. Password Reset, Lockout Recovery, Change Token Recovery or Recovery Failed. You can also stipulate a date range or build the data from a specified number of days prior to the present day s date. 17

18 Endpoint Encryption Reporting Figure 21 A sample of the Users Recovery Event Report in the simple table format 18

19 How to Create and Run Reports How to Create and Run Reports This chapter describes the process of creating and running reports using the Endpoint Encryption Reporting Tool. The procedures for creating and running a report are the same across the board. For certain reports, there are some minor variations, e.g. the addition of dates or the selection of particular events (Users Event Audit Report, Users Recovery Event Report, Machine Recovery Event Report). The first stage is to create the configuration to determine what data the report should contain and what format it should be in, e.g. Comma Separated Values, Simple Table or XML. When you have created the report configuration, the next step is to generate it. This chapter describes the steps to follow when creating and running a report. It uses the examples of the Users Admin Level Report, Machines Encryption Status Report, Machine Status Report and the Machines by Group report to demonstrate report configuration and generation. It also includes examples of the different output types that are available. The Users Admin Level Report The Users Admin Level report lists the administration level of all, or, a specified group of users. The data contains the Endpoint Encryption User ID and includes the user name and administration level. Creating the Report Configuration Before running this and any other report, you must first create a report configuration. This allows you to specify the criteria for the Users Admin Level report, e.g. the minimum-security level number, the user group, etc. 1. Click on Start Programs McAfee Endpoint Encryption Manager Endpoint Encryption Reporting to start the application. 2. Logon using the Endpoint Encryption Administration user name and password. The Endpoint Encryption Reports window will appear. 3. Right-click on the Users Admin Level Report option in the left hand pane. 4. Select the Create Report Configuration option. The Report Configuration wizard will start. 5. Enter a name for the report and a meaningful description. Click Next. 6. The next screen asks you to specify a set of named users, or, all users: 19

20 How to Create and Run Reports Specify user groups and/or individual groups This option allows you to specify a group of users, or, a selection of users within one or more groups. Click Add then select the group or individual(s) within a group. Generate Report over all users This option will report on all users depending on the security level you stipulate at the next step. 7. The next screen prompts you to enter the minimum security level to report on, e.g. if you choose 11, the finished report would list those users with a minimum security level of 11 and above (the highest being 32); it would ignore users with a security level below 11, i.e. those between 1 and 10. Click on the Next button when you have chosen the number. 8. This report contains a graph. This screen allows you to specify the vertical (Y) axis label, e.g. Number of Users and the horizontal (X) axis label, e.g. Administration Level. You can rename these if you need to. Click Next to proceed. 9. The final screen requires you to select the format the report will be rendered in, e.g. a comma separated values file, a simple table or an XML formatted table. Select the renderer and click Finish to complete the creation of the Configuration. Figure The report renderer options Generating the Users Admin Level Report Now that you have created your report configuration, the report is ready to run. 1. Expand the Users Admin Level Report option in the left hand pane of the Endpoint Encryption Reports screen. 20

21 How to Create and Run Reports 2. Right-click on the configuration report name. A pop-up menu will appear. Alternatively, click the button on the toolbar. 3. Select the Generate Report option. 4. Enter a name for the report when prompted and click Ok. After a few moments the report name will appear underneath the Configuration Report. 5. To view the report, double click on it, or, right-click for the pop-up menu options. The report will appear in the right hand pane of Endpoint Encryption Reports window. Note: If you chose the Comma Separated Values renderer, you will be presented with a file to download. This file can be imported to the application of your choice, e.g. Excel. The Users Administration Level Report The Users Administration Level report lists the Endpoint Encryption User ID, the user name and level of administration that has been assigned to each user specified in the report configuration. The report also displays a result code and result description; a result code of with a corresponding description of SUCCESS indicates the user id has been reported on successfully. For a full set of codes and errors, please refer to the Endpoint Encryption for PC Administrators Guide. The XML format of this report displays a graphical version of the data: you can chose from a column view, a line graph or a pie chart by selecting the respective button on the report. The final section of this chapter contains example reports with test data. Figure 23 - The Users' Admin Level Report - Simple Table Format 21

22 How to Create and Run Reports TIP: You can view a line graph or a pie chart version of the report by selecting the respective button. You can also sort the results of your report by clicking on any of the column headings. Exporting/Opening the Comma Separated Value File The Reporting tool allows you to create a Comma Separated Value file (data.csv) from your report configuration. This file can be opened in Excel or saved to a specified location and imported into the application of your choice. 1. Follow the steps in the Users Admin Level Report Creating the Report Configuration section. Make sure, in the final step, you select the Comma Separated Value file option. 2. Follow the steps in Generating the Users Admin Level Report. 3. To view the report, double click on it, or, right-click for the pop-up menu options. The right hand pane of Endpoint Encryption Reports window will display this message: Click here to download the results as a CSV file. 4. Click the underlined here text. 5. Select the Open button if you wish to view the contents of the file. If you are using MS Office the default should be Excel. 6. Alternatively, you can select Save to save it to a specified location. 7. The data is now ready to use. The Machines Encryption Status Report The Encryption Status report displays the encryption condition of specified Endpoint Encryption machines. The data is displayed by machine name and includes the encryption status, the expected encryption status and the encryption state summary. An explanation of the encryption status is discussed in more detail later in this chapter. Creating the Report Configuration Before running this report you must first create a Report Configuration. The Report Configuration allows you to specify the criteria for the report, e.g. machines within a group or machine names. 1. Click on Start Programs McAfee Endpoint Encryption Manager Endpoint Encryption Reporting to start the application. 2. Logon using the administration logon. The Endpoint Encryption Reports window will appear. 22

23 How to Create and Run Reports 3. Right-click on the Encryption Status Report option in the left hand pane. Alternatively, click the button on the toolbar. 4. Select the Create Report Configuration option. The Report Configuration wizard will start. 5. Enter a name for the report and a meaningful description and click Next. 6. The next screen asks you to specify a set of machine groups and/or individual machines or you can generate a report for all machine groups. Choose one of the following options before proceeding to the next step: Specify a set of machine groups and/or individual machines 1. Click the Next button. 2. Choose the Add button to load the Select Machine or Groups window. 3. Select a machine group from the left hand pane or an individual machine(s) from the right hand pane. 4. Click Ok when you have selected your machines. Generate report over all machine groups This option will report on all machine groups. Note: the results of this report are dependent on whether or not you set a machine name filter at the next stage. 7. The next screen allows you to specify a filter for the machine name. The filter allows you to create a report based on specific machine names, e.g. your machines may contain a country name that determines where they are located, e.g. Sweden1, Sweden2, etc. As an example, if you enter swe* (using the * wildcard) into the Filter dialog box, the report will list all machines that have Sweden in the name. Alternatively, if you leave it blank, the report will list all machines as specified in the Select Machine or Groups stage earlier. 8. This report contains a graph. This screen allows you to specify the vertical (Y) axis label, e.g. Number of Machines and the horizontal (X) axis label, e.g. Crypt State Summary. You can rename these if you need to. Click Next to proceed. 9. The final screen requires you to select the format the report will be rendered in, e.g. a comma separated values file, a simple table or an XML formatted table. Select the renderer and click Finish to complete the creation of the Configuration. 23

24 How to Create and Run Reports Figure 24 - The report renderer options Generating the Encryption Status Report Now that you have created your report configuration, the report is ready to run. 1. Expand the Encryption Status Report option in the left hand pane of the Endpoint Encryption Reports screen. 2. Right-click on the configuration report name (See below). A pop-up menu will appear. Alternatively, click the button on the toolbar. 3. Select the Generate Report option. 4. Enter a name for the report when prompted and click Ok. After a few moments the report name will appear underneath the Configuration Report. 5. To view the report, double click on it, or, right-click for the pop-up menu options. The report will appear in the right hand pane of Endpoint Encryption Reports window. Note: If you choose the Comma Separated Values renderer, you will be presented with a file to download. This file can be imported to another application of your choice, e.g. Excel. The Machines Encryption Status Report The Encryption Status Report depicts three key states for each machine: The Reported Crypt State: This column contains the status of the client machine s encryption as reported by the client machine to the Endpoint Encryption Administration system, e.g. No Encryption, Encrypted. The Expected Crypt State: This column contains the encryption state for the client machine as specified by the administrator on the Endpoint Encryption Administration system, e.g. C:Partial (partial encryption of c: drive), C:Full (full encryption of C: drive). 24

25 How to Create and Run Reports The Crypt State Summary: This is the present state of encryption for the client machine, e.g. Encrypting, Decrypting, Decrypted (drive is in plain text), Transitioning (this is when an encrypted drive is in the process is changing encryption, e.g. partial to full or encryption of another drive). The report also displays a result code and result description against each machine name: a result code of with a corresponding description of SUCCESS indicates the machine name has been reported on successfully. For a full set of codes and errors, please refer to the Endpoint Encryption for PC Administrators Guide. The XML version of this report displays a graphical version of the data: you can chose from a column view, a line graph or a pie chart by selecting the respective button on the report. The final section of this chapter contains example reports with test data. Figure 25 - The Encryption Status Report - Simple Table format TIP: You can view a line graph or a pie chart version of the report by selecting the respective button. You can also sort the results of your report by clicking on any of the column headings Exporting/Opening the Comma Separated Value File The Reporting tool allows you to create a Comma Separated Value file (data.csv) from your report configuration. This file can be opened in Excel or saved to a specified location and imported into the application of your choice. 1. Follow the steps in the Creating the Report Configuration section. Make sure, in the final step, you select the Comma Separated Value file option. 2. Follow the steps in Generating the Encryption Status Report. 25

26 How to Create and Run Reports 3. To view the report, double click on it, or, right-click for the pop-up menu options. The right hand pane of Endpoint Encryption Reports window will display this message: Click here to download the results as a CSV file. 4. Click the underlined here text. 5. Select the Open button if you wish to view the contents of the file. If you are using MS Office the default should be Excel. 6. Alternatively, you can select Save to save it to a specified location. The data is now ready to use. The Machine Client Status Report The Machine Client Status report lists the details of specified Endpoint Encryption machines including the machine id, network name, description and Encryption status. Creating the Report Configuration Before running this report, you must first create a Report Configuration. The Report Configuration allows you to specify the criteria for the report, e.g. machines within a group or machine names. 1. Click on Start Programs McAfee Endpoint Encryption Manager Endpoint Encryption Reporting to start the application. 2. Logon using the administration logon. The Endpoint Encryption Reports window will appear. 3. Right-click on the Machine Client Status Report option in the left hand pane. 4. Select the Create Report Configuration option. The Report Configuration wizard will start. 5. Enter a name for the report and a meaningful description and click Next. 6. The next screen asks you to specify a set of machine groups and/or individual machines or you can generate a report for all machine groups. Choose one of the following options before proceeding to the next step: Specify a set of machine groups and/or individual machines 1. Click the Next button. 2. Choose the Add button to load the Select Machine or Groups window. 3. Select a machine group from the left hand pane or an individual machine(s) from the right hand pane. 26

27 How to Create and Run Reports 4. Click Ok when you have selected your machines. Generate report over all machine groups This option will report on all machine groups. Note: the results of this report are dependent on whether or not you set a machine name filter at the next stage. The next screen allows you to specify a filter for the machine name. The filter allows you to create a report based on specific machine names, e.g. your machines may contain a name relating to the department they belong to, e.g. HR, Sales. As an example, if you enter HR* (using the * wildcard) into the Filter dialog box, the report will list all machines that have HR in the name. Alternatively, if you leave it blank, the report will list all machines as specified in the Select Machine or Groups stage earlier. The final screen requires you to select the format the report will be rendered in, e.g. a comma separated values file, a simple table or an XML formatted table. Select the renderer and click Finish to complete the creation of the configuration. Figure 26 - The report renderer options Generating the Machine Client Status Report Now that you have created your report configuration, the report is ready to run. 1. Expand the Machines by Group Report option in the left hand pane of the Endpoint Encryption Reports screen. 2. Right-click on the configuration report name. A pop-up menu will appear. Alternatively, click the button on the toolbar. 3. Select the Generate Report option. 27

28 How to Create and Run Reports 4. Enter a name for the report when prompted and click Ok. After a few moments the report name will appear underneath the Configuration Report. 5. To view the report, double click on it, or, right-click for the pop-up menu options. The report will appear in the right hand pane of Endpoint Encryption Reports window. Note: If you chose the Comma Separated Values renderer, you will be presented with a file to download. This file can be imported to the application of your choice. The Machine Status Report The Machine Status report lists machine details and respective Endpoint Encryption status for specified computers. Information is listed by Endpoint Encryption machine ID and contains the machine name, network name, description and Endpoint Encryption status, i.e. the status set by the Administrator for a machine, e.g. Enabled, Disabled, Remove + Reboot. The report also displays a result code and result description: a result code of with a corresponding description of SUCCESS indicates the machine has been reported on successfully. For a full set of codes and errors, please refer to the Endpoint Encryption for PC Administrators Guide. The XML format of this report displays a graphical version of the data: you can chose from a column view, a line graph or a pie chart by selecting the respective button on the report. The final section of this chapter contains example reports with test data. Figure 27 - The Machine Client Status Report - Simple Table 28

29 How to Create and Run Reports TIP: You can view a line graph or a pie chart version of the report by selecting the respective button. You can also sort the results of your report by clicking on any of the column headings. Exporting/Opening the Comma Separated Value File The Reporting tool allows you to create a Comma Separated Value file (data.csv) from your report configuration. This file can be opened in Excel or saved to a specified location and imported into the application of your choice. 1. Follow the steps in the Creating the Report Configuration. Make sure, in the final step, you select the Comma Separated Value file option. 2. Follow the steps in Generating the Machine Client Status Report. 3. To view the report, double click on it, or, right-click for the pop-up menu options. The right hand pane of Endpoint Encryption Reports window will display this message: Click here to download the results as a CSV file. 4. Click the underlined here text. 5. Select the Open button if you wish to view the contents of the file. If you are using MS Office the default should be Excel. 6. Alternatively, you can select Save to save it to a specified location. The data is now ready to use. The Machines by Group Report The Machines by Group report lists the details of specified Endpoint Encryption machines by Endpoint Encryption group name, e.g. machine id, network name and network name. Creating the Report Configuration Before running this report, you must first create a Report Configuration. The Report Configuration allows you to specify the criteria for the report, e.g. machines within a group or machine names. 1. Click on Start Programs McAfee Endpoint Encryption Manager Endpoint Encryption Reporting to start the application. 2. Logon using the administration logon. The Endpoint Encryption Reports window will appear. 3. Right-click on the Machines by Group Report option in the left hand pane. 4. Select the Create Report Configuration option. The Report Configuration wizard will start. 29

30 How to Create and Run Reports 5. Enter a name for the report and a meaningful description and click Next. 6. The next screen asks you to specify a set of machine groups and/or individual machines, or, you can generate a report for all machine groups. Choose one of the following options before proceeding to the next step: Specify a set of machine groups and/or individual machines 1. Click the Next button. 2. Choose the Add button to load the Select Machine or Groups window. 3. Select a machine group from the left hand pane or an individual machine(s) from the right hand pane. 4. Click Ok when you have selected your machines. Generate report over all machine groups This option will report on all machine groups. Note: the results of this report are dependent on whether or not you set a machine name filter at the next stage. The next screen allows you to specify a filter for the machine name. The filter allows you to create a report based on specific machine names, e.g. your machines may contain a job type that determines who uses them, e.g. Sales, Management, Technical. As an example, if you enter manage* (using the * wildcard) into the Filter dialog box, the report will list all machines that have management in the name. Alternatively, if you leave it blank, the report will list all machines as specified in the Select Machine or Groups stage earlier. The final screen requires you to select the format the report will be rendered in, e.g. a comma separated values file, a simple table or an XML formatted table. Select the renderer and click Finish to complete the creation of the Configuration. Figure 28 - The report renderer options 30

31 How to Create and Run Reports Generating the Machines by Group Report Now that you have created your report configuration, the report is ready to run. 1. Expand the Machines by Group Report option in the left hand pane of the Endpoint Encryption Reports screen. 2. Right-click on the configuration report name. A pop-up menu will appear. Alternatively, click the button on the toolbar. 3. Select the Generate Report option. 4. Enter a name for the report when prompted and click Ok. After a few moments the report name will appear underneath the Configuration Report. 5. To view the report, double click on it, or, right-click for the pop-up menu options. The report will appear in the right hand pane of Endpoint Encryption Reports window. Note: If you chose the Comma Separated Values renderer, you will be presented with a file to download. This file can be imported to the application of your choice. The Machines by Group Report The Machines by Group report lists machine groups and their various machine names, Endpoint Encryption IDs and network names. A machine group is created by the Endpoint Encryption Administrator and typically contains a set of machines that have something in common, for example, an organisation may want to group machines by department, e.g. Sales, Support; or machines may be grouped by location, e.g. city or country name. See the Endpoint Encryption for PC Administration Guide for further information on creating groups. The report also displays a result code and result description: a result code of with a corresponding description of SUCCESS indicates the machine has been reported on successfully. For a full set of codes and errors, please refer to the Endpoint Encryption for PC Administration Guide. The XML format of this report displays a graphical version of the data: you can chose from a column view, a line graph or a pie chart by selecting the respective button on the report. The final section of this chapter contains example reports with test data. 31

32 How to Create and Run Reports Figure 29 - Machines by Group Name - Simple Format TIP: You can view a line graph or a pie chart version of the report by selecting the respective button. You can also sort the results of your report by clicking on any of the column headings. Exporting/Opening the Comma Separated Value File The Reporting tool allows you to create a Comma Separated Value file (data.csv) from your report configuration. This file can be opened in Excel or saved to a specified location and imported into the application of your choice. 1. Follow the steps in the Creating the Report Configuration section. Make sure, in the final step, you select the Comma Separated Value file option. 2. Follow the steps in Generating the Machines by Group Report. 3. To view the report, double click on it, or, right-click for the pop-up menu options. The right hand pane of Endpoint Encryption Reports window will display this message: Click here to download the results as a CSV file. 4. Click the underlined here text. 5. Select the Open button if you wish to view the contents of the file. If you are using MS Office the default should be Excel. 6. Alternatively, you can select Save to save it to a specified location. The data is now ready to use. 32

33 Scheduling a Report Run Scheduling a Report Run The scheduling option of the Endpoint Encryption Reporting Tool allows you to stipulate the date and time for a report run. A report can be set to run automatically at any time without user intervention. The scheduler also allows you to specify how often the report will run, e.g. daily, weekly, monthly. Scheduling a Report Run 1. Right-click on the report you wish to run and select the button. Alternatively, select the report name and click the on the toolbar. 2. Right-click on the report you wish to run and select the button. Alternatively, select the report name and click the on the toolbar. Figure 30 - The Report Scheduler output options 3. Specify the name of the report: Use date and time of generation for output name The Use date and time of generation for report name will name the report with the default date and time format, e.g. 05/07/ :11:53. Specify the output name Clicking this radio button will enable the Output name dialog box allowing you to enter a particular name for the report. The Append date and time option will add the date and time to your report name. Click Ok to proceed. The Report Schedule Properties window will appear. CAUTION: Leave the Run and the Start In fields as you find them. The information in the Run box is the command line that will runs the report. The Start In box is not relevant to running reports. 33

34 Scheduling a Report Run Figure 31 - The Report Schedule Properties 4. Ignore the Run and Start In options. See screen above. 5. Enter the Windows login (Windows username), in the Run as field. Note: This must be the Windows username of the administrator who will run the report. 6. Click the Set Password button and enter the password of the person who will run the report. 7. Select the Run only if logged on option if you require this report to run only when the Windows user name (specified in the previous step) is logged on. 8. The Enabled (scheduled task runs at specified time) option is checked as the default. Deselecting this option will stop the job running at the specified times. 9. Click on the Schedule tab. This will load the Schedule properties. 10. Click on the New button. This will enable the scheduler properties and allow you to set the date, time and frequency, etc. 34

35 Scheduling a Report Run Figure 32 Report Schedule: Daily Properties 11. Click on the Schedule Task drop-down menu. 12. Choose the frequency of the report run: Daily: Allows you to specify the daily run properties. See figure above. Weekly: The Weekly option allows you to specify all, or, a selection of days to run the report. Monthly: Allows you to specify the run day of the month as well as which months of the year. Once: The Once option allows you to set the job to run once at a specified time. At System Startup: Allows you to specify the report to run when the system starts up. At Logon: Allows you to specify the report to run when you logon. When Idle: Allows you to specify the report to run when the computer is idle. Each time you configure an option in the Report Schedule Properties, the field in the top part of the screen updates to reflect the changes. 35

36 Scheduling a Report Run Figure 33 - Report Schedule: Weekly Properties 13. If you need to be more specific with your timings, then click the Advanced button. This will load the Advanced Schedule Options screen. Figure 34 - The Advanced Schedule Options 14. Choose your required Start Date and the End Date; the drop-down arrow button will load the calendar. 15. The Repeat Task section of this window allows you to specify how often a report will run. You can also set the time for the report to stop running. Click Ok when you have set your parameters. 16. The Settings tab allows you to specify some further settings for the report run: Scheduled Task Complete: This section allows you to set the report run to delete automatically - if it is configured to run one time only. You can also make the report stop after a specified amount of time 36

37 Scheduling a Report Run Idle Time: This option allows you to set the report to run after a specified amount of computer idle time. Power Management: This option allows you to determine whether a report will run if the computer is running on batteries. When you are happy with the properties you have set, click Ok. The report schedule is now ready to run based on the criteria you have set and the time(s) specified. CAUTION: If the scheduled report runs while you are logged into the Endpoint Encryption Reporting Tool, then you must exit from the application and log back in to view the report. Scheduled reports will still run if you are logged out of the application. They can be viewed when you log back in. Viewing and Editing a Report Run Follow these steps if you wish to view or edit the report runs you have created. 1. Click on the icon the toolbar. This will load the Scheduled Reports window. 2. Select the scheduled job you wish to edit or view. 3. Click the Schedule button. This will load the Schedule Properties window and allow you to view and/or edit the report run properties. Note: The previous section can guide you through updating the details of the Schedule Properties window. 4. When you have viewed or updated your report run, click the Ok button. 5. If you wish to change the output parameters then click the Options button. This will load the Report Schedule Options screen allowing you to change the current settings. 6. You can view the report name, the format it is rendered in and a description by clicking on the Information button. 7. Click Ok to confirm Deleting a Report Run Follow these steps if you wish to delete the report runs you have created. 1. Click on the icon the toolbar. This will load the Scheduled Reports window. 37

38 Scheduling a Report Run 2. Select the scheduled job you wish delete. 3. Click the Remove button. 4. Click Close to exit the Scheduled Reports screen. 38

39 Further Reporting Options Further Reporting Options Creating Folders You can create folders within the report name hierarchy. This allows you the flexibility to keep your configurations and reports tidy. 1. Right-click on the report name, e.g. Users Admin Level Report and choose the button from the popup menu. Alternatively, select the report name and choose from the toolbar. 2. Enter the name of the folder and press the <return> key. 3. Right-click on the new folder to create a report configuration or a sub folder. Editing a Report Configuration 1. Right-click on the report configuration name and choose the button from the popup menu. Alternatively, select the report name and choose the toolbar. from Renaming a Report Configuration 1. Right-click on the report configuration name and choose the button from the popup menu. Alternatively, select the report name and choose the toolbar. from Deleting a Report Configuration 1. Right-click on the report configuration name and choose the button from the popup menu. Alternatively, select the report name and choose the toolbar. Confirm Yes or No to delete the report configuration. from Viewing a Report 1. Right-click on the report name and choose the button from the popup menu. Alternatively, select the report name and choose from the toolbar. Renaming a Report 1. Right-click on the report name and choose the button from the popup menu. Alternatively, select the report name and choose from the toolbar. 39

40 Further Reporting Options Deleting a Report 1. Right-click on the report name and choose the button from the popup menu. Alternatively, select the report name and choose Confirm Yes or No to delete the report configuration. from the toolbar. 40

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

Enterprise Asset Management System

Enterprise Asset Management System Enterprise Asset Management System in the Agile Enterprise Asset Management System AgileAssets Inc. Agile Enterprise Asset Management System EAM, Version 1.2, 10/16/09. 2008 AgileAssets Inc. Copyrighted

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

ProSystem fx Engagement

ProSystem fx Engagement ProSystem fx Engagement Admin Guide October 2009 Copyright 2009 CCH INCORPORATED. A Wolters Kluwer business. All Rights Reserved. Material in this publication may not be reproduced or transmitted, in any

More information

Education Solutions Development, Inc. APECS Navigation: Business Systems Getting Started Reference Guide

Education Solutions Development, Inc. APECS Navigation: Business Systems Getting Started Reference Guide Education Solutions Development, Inc. APECS Navigation: Business Systems Getting Started Reference Guide March 2013 Education Solutions Development, Inc. What s Inside The information in this reference

More information

Personal Call Manager User Guide. BCM Business Communications Manager

Personal Call Manager User Guide. BCM Business Communications Manager Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008

More information

EPM Performance Suite Profitability Administration & Security Guide

EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects

More information

Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval Copyright Texthelp Limited All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language, in any form, by any

More information

email-lead Grabber Business 2010 User Guide

email-lead Grabber Business 2010 User Guide email-lead Grabber Business 2010 User Guide Copyright and Trademark Information in this documentation is subject to change without notice. The software described in this manual is furnished under a license

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Customer admin guide. UC Management Centre

Customer admin guide. UC Management Centre Customer admin guide UC Management Centre June 2013 Contents 1. Introduction 1.1 Logging into the UC Management Centre 1.2 Language Options 1.3 Navigating Around the UC Management Centre 4 4 5 5 2. Customers

More information

BIG LOTS VENDOR COMPLIANCE WEB PORTAL USER GUIDE - VENDOR 300 PHILLIPI RD. COLUMBUS, OH 43228

BIG LOTS VENDOR COMPLIANCE WEB PORTAL USER GUIDE - VENDOR 300 PHILLIPI RD. COLUMBUS, OH 43228 BIG LOTS VENDOR COMPLIANCE WEB PORTAL USER GUIDE - VENDOR 300 PHILLIPI RD. COLUMBUS, OH 43228 Contents Getting Started...4 Tips for Using Actionable Intelligence... 4 Logging into Actionable Intelligence...

More information

PHI Audit Us er Guide

PHI Audit Us er Guide PHI Audit Us er Guide Table Of Contents PHI Audit Overview... 1 Auditable Actions... 1 Navigating the PHI Audit Dashboard... 2 Access PHI Audit... 4 Create a Patient Audit... 6 Create a User Audit... 10

More information

Job Streaming User Guide

Job Streaming User Guide Job Streaming User Guide By TOPS Software, LLC Clearwater, Florida Document History Version Edition Date Document Software Trademark Copyright First Edition 08 2006 TOPS JS AA 3.2.1 The names of actual

More information

McAfee Endpoint Encryption 7.0 Users Guide and FAQ

McAfee Endpoint Encryption 7.0 Users Guide and FAQ McAfee Endpoint Encryption 7.0 Users Guide and FAQ Table of Contents Introduction... 1 Installation... 1 Boot-Up/Login... 1 Encryption Status... 3 Notes for Encryption... 4 Changing Your Password... 4

More information

PayPal Integration Guide

PayPal Integration Guide PayPal Integration Guide Table of Contents PayPal Integration Overview 2 Sage Accounts Setup 3 Obtaining API credentials from PayPal 4 Installing Tradebox Finance Manager 5 Creating a connection to PayPal

More information

USER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3]

USER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3] Pro-curo Software Ltd USER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3] CONTENTS Everyday use... 3 Logging on... 4 Main Screen... 5 Adding locations... 6 Working with locations... 7 Duplicate...

More information

Fairfield University Using Xythos for File Sharing

Fairfield University Using Xythos for File Sharing Fairfield University Using Xythos for File Sharing Version 7.0 Table of Contents I: Manage your Department Folder...2 Your Department Folder... 2 II: Sharing Folders and Files Inside of Fairfield U...3

More information

Training Manual. Version 6

Training Manual. Version 6 Training Manual TABLE OF CONTENTS A. E-MAIL... 4 A.1 INBOX... 8 A.1.1 Create New Message... 8 A.1.1.1 Add Attachments to an E-mail Message... 11 A.1.1.2 Insert Picture into an E-mail Message... 12 A.1.1.3

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

USER GUIDE. Unit 2: Synergy. Chapter 2: Using Schoolwires Synergy

USER GUIDE. Unit 2: Synergy. Chapter 2: Using Schoolwires Synergy USER GUIDE Unit 2: Synergy Chapter 2: Using Schoolwires Synergy Schoolwires Synergy & Assist Version 2.0 TABLE OF CONTENTS Introductions... 1 Audience... 1 Objectives... 1 Before You Begin... 1 Getting

More information

Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical

Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical These instructions describe the process for configuring a SAS Metadata server to work with JMP Clinical. Before You Configure

More information

Using an Edline Gradebook. EGP Teacher Guide

Using an Edline Gradebook. EGP Teacher Guide Using an Edline Gradebook EGP Teacher Guide Table of Contents Introduction...3 Setup...3 Get the Gradebook Web Plugin... 3 Using Your Web Gradebook... 4 Using the Web Gradebook on a Shared Computer...

More information

Avaya Network Configuration Manager User Guide

Avaya Network Configuration Manager User Guide Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

Using Delphi Data with Excel and Access

Using Delphi Data with Excel and Access $FDGHPLF&RPSXWLQJ &RPSXWHU 7UDLQLQJ 6XSSRUW 6HUYLFHV 1HWZRUNLQJ6HUYLFHV :HEHU%XLOGLQJ Using Delphi Data with Excel and Access Using Delphi Data The raw data used to create the CSU financial, human resource,

More information

TRUST Online u s e r g u i d e v e r s i o n 8. 4 O c t o b e r 2 0 1 3

TRUST Online u s e r g u i d e v e r s i o n 8. 4 O c t o b e r 2 0 1 3 TRUSTOnline u s e r g u i d e version 8.4 October 2013 TABLE of CONTENTS Access Trust Online... 1 Login to Trust Online... 1 Enhanced Authentication Login... 3 Select an Account... 5 Locate an Account...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

Build Your First Web-based Report Using the SAS 9.2 Business Intelligence Clients

Build Your First Web-based Report Using the SAS 9.2 Business Intelligence Clients Technical Paper Build Your First Web-based Report Using the SAS 9.2 Business Intelligence Clients A practical introduction to SAS Information Map Studio and SAS Web Report Studio for new and experienced

More information

Oracle Utilities Meter Data Management Business Intelligence

Oracle Utilities Meter Data Management Business Intelligence Oracle Utilities Meter Data Management Business Intelligence Metric Reference Guide Release 2.3.2 E22567-01 May 2011 Oracle Utilities Meter Data Management Business Intelligence Metric Reference Guide

More information

This web-based report provides information for single funds centers. The report can be run for one funds center or multiple single funds centers.

This web-based report provides information for single funds centers. The report can be run for one funds center or multiple single funds centers. Budget Status Report This web-based report provides information for single funds centers. The report can be run for one funds center or multiple single funds centers. The report includes the following

More information

ewebextra OfficeMate Integration User s Guide

ewebextra OfficeMate Integration User s Guide ewebextra OfficeMate Integration User s Guide September 2013 2013 Eyefinity, Inc. All rights reserved. Eyefinity, OfficeMate, ewebextra, and ExamWRITER are registered trademarks of Eyefinity, Inc. All

More information

Smart Web. User Guide. Amcom Software, Inc.

Smart Web. User Guide. Amcom Software, Inc. Smart Web User Guide Amcom Software, Inc. Copyright Version 4.0 Copyright 2003-2005 Amcom Software, Inc. All Rights Reserved. Information in this document is subject to change without notice. The software

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management AT&T Business Messaging Account Management Admin User Guide December 2015 1 Copyright 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein

More information

Sage Abra SQL HRMS Reports. User Guide

Sage Abra SQL HRMS Reports. User Guide Sage Abra SQL HRMS Reports User Guide 2010 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks

More information

How To Create A Document On A Pc Or Macbook

How To Create A Document On A Pc Or Macbook ApplicationXtender 6.5 Document Manager User Guide (version 1.0) CCS Computing and Communications Service June 2013 Table of Contents OVERVIEW... 3 Logging in to AppXtender Document Manager... 4 Changing

More information

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe

More information

BCSD WebMail Documentation

BCSD WebMail Documentation BCSD WebMail Documentation Outlook Web Access is available to all BCSD account holders! Outlook Web Access provides Webbased access to your e-mail, your calendar, your contacts, and the global address

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

ShoreTel Enterprise Contact Center Using Agent Toolbar

ShoreTel Enterprise Contact Center Using Agent Toolbar ShoreTel Enterprise Contact Center Using Agent Toolbar USER GUIDES RELEASE 7 Document and Software Copyrights Copyright 1998 2011 ShoreTel, Inc. All rights reserved. Printed in the United States of America.

More information

Changing Your Cameleon Server IP

Changing Your Cameleon Server IP 1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook

More information

Central and Remote Users Guide

Central and Remote Users Guide Central and Remote Users Guide Proprietary Rights Notice 1985-2006 IDEXX Laboratories, Inc. All rights reserved. Information in this document is subject to change without notice. Practice names, doctors,

More information

ShoreTel Contact Center Using ShoreWare Agent Toolbar

ShoreTel Contact Center Using ShoreWare Agent Toolbar ShoreTel Contact Center Using ShoreWare Agent Toolbar USER GUIDES RELEASE 6 Document and Software Copyrights Copyright 1998 2010 ShoreTel, Inc. All rights reserved. Printed in the United States of America.

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2010 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

Customize tab; click the Accounts category; drag the satellite dish icon to your toolbar.

Customize tab; click the Accounts category; drag the satellite dish icon to your toolbar. The Tech/Media Department will install and configure GroupWise for you on your classroom Mac OS X or PC computer. If GroupWise is not currently installed and you would like to begin using it, please submit

More information

Statgraphics Getting started

Statgraphics Getting started Statgraphics Getting started The aim of this exercise is to introduce you to some of the basic features of the Statgraphics software. Starting Statgraphics 1. Log in to your PC, using the usual procedure

More information

Welcome to MaxMobile. Introduction. System Requirements. MaxMobile 10.5 for Windows Mobile Pocket PC

Welcome to MaxMobile. Introduction. System Requirements. MaxMobile 10.5 for Windows Mobile Pocket PC MaxMobile 10.5 for Windows Mobile Pocket PC Welcome to MaxMobile Introduction MaxMobile 10.5 for Windows Mobile Pocket PC provides you with a way to take your customer information on the road. You can

More information

SAP Business Intelligence ( BI ) Financial and Budget Reporting. 7.0 Edition. (Best Seller At Least 43 copies Sold)

SAP Business Intelligence ( BI ) Financial and Budget Reporting. 7.0 Edition. (Best Seller At Least 43 copies Sold) SAP Business Intelligence ( BI ) Financial and Budget Reporting 7.0 Edition (Best Seller At Least 43 copies Sold) November 2011 Table of Contents Log In... 3 Initial Variable Screen... 5 Multiple / Single

More information

Data Center Connector 3.0.0 for OpenStack

Data Center Connector 3.0.0 for OpenStack Product Guide Data Center Connector 3.0.0 for OpenStack For use with epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

AT&T Connect myat&t User Guide Integrated Edition Version 9.0 January 2011

AT&T Connect myat&t User Guide Integrated Edition Version 9.0 January 2011 AT&T Connect myat&t User Guide Integrated Edition Version 9.0 January 2011 2009-2011 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks

More information

Human Resources Installation Guide

Human Resources Installation Guide Human Resources Installation Guide Installing HR i Index Copyright 2001 Jenzabar, Inc. You may print any part or the whole of this documentation to support installations of Jenzabar software. Where the

More information

ewebextra OfficeMate Integration User s Guide

ewebextra OfficeMate Integration User s Guide ewebextra OfficeMate Integration User s Guide April 2014 2014 Eyefinity, Inc. All rights reserved. Eyefinity, OfficeMate, ewebextra, and ExamWRITER are registered trademarks of Eyefinity, Inc. All other

More information

Results CRM 2012 User Manual

Results CRM 2012 User Manual Results CRM 2012 User Manual A Guide to Using Results CRM Standard, Results CRM Plus, & Results CRM Business Suite Table of Contents Installation Instructions... 1 Single User & Evaluation Installation

More information

Business Portal for Microsoft Dynamics GP 2010. User s Guide Release 5.1

Business Portal for Microsoft Dynamics GP 2010. User s Guide Release 5.1 Business Portal for Microsoft Dynamics GP 2010 User s Guide Release 5.1 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and

More information

How to Guide Outlook Web Access 2010

How to Guide Outlook Web Access 2010 How to Guide Outlook Web Access 2010 If you have questions about any of the items in this guide, contact the IS Service Desk at 85-2400 or 414-326-2400. Outlook Web Access (OWA) provides Web-based email

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

WS_FTP Professional 12

WS_FTP Professional 12 WS_FTP Professional 12 Tools Guide Contents CHAPTER 1 Introduction Ways to Automate Regular File Transfers...5 Check Transfer Status and Logs...6 Building a List of Files for Transfer...6 Transfer Files

More information

Web Intelligence User Guide

Web Intelligence User Guide Web Intelligence User Guide Office of Financial Management - Enterprise Reporting Services 4/11/2011 Table of Contents Chapter 1 - Overview... 1 Purpose... 1 Chapter 2 Logon Procedure... 3 Web Intelligence

More information

Qlik REST Connector Installation and User Guide

Qlik REST Connector Installation and User Guide Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All

More information

McAfee GTI Proxy 1.0.0 Administration Guide

McAfee GTI Proxy 1.0.0 Administration Guide McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Retention Policy Module Admin and User Guide

Retention Policy Module Admin and User Guide Retention Policy Module Admin and User Guide For Document Manager 24 June 2013 Trademarks Document Manager and Document Manager Administration are trademarks of Document Logistix Ltd. TokOpen, TokAdmin,

More information

for Sage 100 ERP Business Insights Overview Document

for Sage 100 ERP Business Insights Overview Document for Sage 100 ERP Business Insights Document 2012 Sage Software, Inc. All rights reserved. Sage Software, Sage Software logos, and the Sage Software product and service names mentioned herein are registered

More information

ORACLE BUSINESS INTELLIGENCE WORKSHOP

ORACLE BUSINESS INTELLIGENCE WORKSHOP ORACLE BUSINESS INTELLIGENCE WORKSHOP Creating Interactive Dashboards and Using Oracle Business Intelligence Answers Purpose This tutorial shows you how to build, format, and customize Oracle Business

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Business Objects Version 5 : Introduction

Business Objects Version 5 : Introduction Business Objects Version 5 : Introduction Page 1 TABLE OF CONTENTS Introduction About Business Objects Changing Your Password Retrieving Pre-Defined Reports Formatting Your Report Using the Slice and Dice

More information

SQL Server 2005: Report Builder

SQL Server 2005: Report Builder SQL Server 2005: Report Builder Table of Contents SQL Server 2005: Report Builder...3 Lab Setup...4 Exercise 1 Report Model Projects...5 Exercise 2 Create a Report using Report Builder...9 SQL Server 2005:

More information

Quest Web Parts for SharePoint

Quest Web Parts for SharePoint Quest Web Parts for SharePoint Quest Web Parts for SharePoint enables you to build line-of-business applications on the SharePoint Platform while overcoming the limitations of SharePoint forms, lists,

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

Patrol Master Software

Patrol Master Software Handheld Guard Tracking System PATROL Patrol Master Software Software version : 3.1.16 Document version: Rev. C Contents 1. Introduction... 3 1.1 Purpose and main features... 3 1.2. Requirements... 3 1.3.

More information

Cloudfinder for Office 365 User Guide. November 2013

Cloudfinder for Office 365 User Guide. November 2013 1 Contents Getting started with Cloudfinder for Office 365 1... 3 Sign up New Cloudfinder user... 3 Sign up Existing Cloudfinder user... 4 Setting the Admin Impersonation... 4 Initial backup... 7 Inside

More information

NDA-30141 ISSUE 1 STOCK # 200893. CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000. NEC America, Inc.

NDA-30141 ISSUE 1 STOCK # 200893. CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000. NEC America, Inc. NDA-30141 ISSUE 1 STOCK # 200893 CallCenterWorX-Enterprise IMX MAT Quick Reference Guide MAY, 2000 NEC America, Inc. LIABILITY DISCLAIMER NEC America, Inc. reserves the right to change the specifications,

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

OECD.Stat Web Browser User Guide

OECD.Stat Web Browser User Guide OECD.Stat Web Browser User Guide May 2013 May 2013 1 p.10 Search by keyword across themes and datasets p.31 View and save combined queries p.11 Customise dimensions: select variables, change table layout;

More information

McAfee SaaS Email Archiving

McAfee SaaS Email Archiving User Guide McAfee SaaS Email Archiving COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee

More information

Empower AutoArchive Software

Empower AutoArchive Software Empower AutoArchive Software Installation and Configuration Guide 34 Maple Street Milford, MA 01757 71500044207, Revision A NOTICE The information in this document is subject to change without notice and

More information

User Documentation. Administrator Manual. www.proposalsoftware.com

User Documentation. Administrator Manual. www.proposalsoftware.com User Documentation Administrator Manual Proposal Software 1140 US Highway 287, Suite 400-102 Broomfield, CO 80020 USA Tel: 203.604.6597 www.proposalsoftware.com Table of Contents Open the WebPro Viewer...

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

MS Outlook 2002/2003. V1.0 BullsEye Telecom Email

MS Outlook 2002/2003. V1.0 BullsEye Telecom Email IMAP Settings Manual Our application allows you to access your email in many different ways. For those of you who do not wish to use the Webmail interface, you may also manage your email and custom folder

More information

NearPoint for Microsoft Exchange Server

NearPoint for Microsoft Exchange Server Information Immediacy, Discovery, & Continuity 4.2 NearPoint for Microsoft Exchange Server Archive Self-Service Retrieve (SSR) Client User s Guide 4.2 Copyright 2003-2010, Mimosa Systems, Inc. All Rights

More information

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface...

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface... 2 CONTENTS Module One: Getting Started... 6 Opening Outlook... 6 Setting Up Outlook for the First Time... 7 Understanding the Interface...12 Using Backstage View...14 Viewing Your Inbox...15 Closing Outlook...17

More information

Manual. 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0

Manual. 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0 Manual 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0 Copyright 2006-2009, 3CX ltd. http:// E-mail: info@3cx.com Information in this document is subject to change without

More information

Hamline University Administrative Computing Page 1

Hamline University Administrative Computing Page 1 User Guide Banner Handout: BUSINESS OBJECTS ENTERPRISE (InfoView) Document: boxi31sp3-infoview.docx Created: 5/11/2011 1:24 PM by Chris Berry; Last Modified: 8/31/2011 1:53 PM Purpose:... 2 Introduction:...

More information

Entrust Certificate Services for Adobe CDS

Entrust Certificate Services for Adobe CDS Entrust Certificate Services Entrust Certificate Services for Adobe CDS Getting Started Guide Entrust SafeNet Authentication Client: 8.3 Date of issue: July 2015 Document issue: 3.0 Revisions Issue and

More information

ITS Training Class Charts and PivotTables Using Excel 2007

ITS Training Class Charts and PivotTables Using Excel 2007 When you have a large amount of data and you need to get summary information and graph it, the PivotTable and PivotChart tools in Microsoft Excel will be the answer. The data does not need to be in one

More information

CITS. Windows & Macintosh Zimbra Calendar 5.0. Computing and Information Technology Services. Revised 8/21/2008

CITS. Windows & Macintosh Zimbra Calendar 5.0. Computing and Information Technology Services. Revised 8/21/2008 Windows & Macintosh Zimbra Calendar 5.0 CITS Computing and Information Technology Services Sunday Monday Tuesday Wednesday Thursday Friday Saturday 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21

More information

SmartLink for Outlook User Guide

SmartLink for Outlook User Guide SmartLink for Outlook User Guide Copyright 1998-2006 E-Z Data, Inc. All Rights Reserved No part of this documentation may be copied, reproduced, or translated in any form without the prior written consent

More information

Suite. How to Use GrandMaster Suite. Exporting with ODBC

Suite. How to Use GrandMaster Suite. Exporting with ODBC Suite How to Use GrandMaster Suite Exporting with ODBC This page intentionally left blank ODBC Export 3 Table of Contents: HOW TO USE GRANDMASTER SUITE - EXPORTING WITH ODBC...4 OVERVIEW...4 WHAT IS ODBC?...

More information

Admin Guide Hosting Control Panel Active Directory (AD) Synchronization

Admin Guide Hosting Control Panel Active Directory (AD) Synchronization Admin Guide Hosting Control Panel Active Directory (AD) Synchronization DOCUMENT REVISION DATE: February, 2010 Active Directory (AD) Sync Hosting CP / Table of Contents Page 2 of 16 Table of Contents QUICK

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

How to use FTP Commander

How to use FTP Commander FTP (File Transfer Protocol) software can be used to upload files and complete folders to your web server. On the web, there are a number of free FTP programs that can be downloaded and installed onto

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

Content Author's Reference and Cookbook

Content Author's Reference and Cookbook Sitecore CMS 6.5 Content Author's Reference and Cookbook Rev. 110621 Sitecore CMS 6.5 Content Author's Reference and Cookbook A Conceptual Overview and Practical Guide to Using Sitecore Table of Contents

More information

SmartLink for Lotus Notes User Guide

SmartLink for Lotus Notes User Guide SmartLink for Lotus Notes User Guide Copyright 1998-2006 E-Z Data, Inc. All Rights Reserved No part of this documentation may be copied, reproduced, or translated in any form without the prior written

More information

TxDMV RTS Training Guide for Working with Cognos Reports

TxDMV RTS Training Guide for Working with Cognos Reports TxDMV RTS Training Guide for Working with Cognos Reports April, 2015 About This Guide This Training Guide introduces the implementation of the Cognos enterprise reporting tool for the TxDMV Registration

More information

DI SHAREPOINT PORTAL. User Guide

DI SHAREPOINT PORTAL. User Guide DI SHAREPOINT PORTAL User Guide -1- TABLE OF CONTENTS PREFACE... 3 SECTION 1: DI PORTAL ACCESS... 4 REQUEST USER ACCESS... 4 To register... 4 SIGNING IN TO THE PORTAL... 8 To sign in to the DI Portal...

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Mulberry Internet Email/Calendar Client Version 4.0 Cyrus Daboo Pittsburgh PA USA mailto:mulberry@mulberrymail.com http://www.mulberrymail.com/ Information in this document is subject

More information