IronKey Enterprise File Audit Admin Guide

Size: px
Start display at page:

Download "IronKey Enterprise File Audit Admin Guide"

Transcription

1 IronKey Enterprise File Audit Admin Guide Last Updated July 2015

2 Thank you for choosing IronKey Enterprise Management Service by Imation. Imation s Mobile Security Group is committed to creating and developing the best security technologies and making them simple-to-use and widely available. Years of research and millions of dollars of development have gone into bringing this technology to you. We are very open to user feedback and would appreciate hearing about your comments, suggestions, and experiences with this product. Feedback: securityfeedback@imation.com NOTE: Imation is not liable for technical or editorial errors and/or omissions contained herein; nor for incidental or consequential damages resulting from the furnishing or use of this material. The information provided herein is subject to change without notice. The information contained in this document represents the current view of Imation on the issue discussed as of the date of publication. Imation cannot guarantee the accuracy of any information presented after the date of publication. This document is for information purposes only. Imation makes no warranties, expressed or implied, in this document. Imation, the Imation logo, IronKey and the IronKey logo are trademarks of Imation Corp. and its subsidiaries. All other trademarks are the property of their respective owners Imation Corp. All rights reserved. IK-EMS-ADM PAGE 1

3 CONTENTS About File Audit...3 Requirements...3 Auditing work flow...4 Audit message details...5 File information....5 Event details....5 Configuring File Audit in Service...7 Configuring the Report server...8 File Audit syslog-ng message details...8 Modifying the syslog-ng configuration file...8 Defining a source...9 Defining destinations...10 Defining message filters...12 Defining message parsers...12 Defining log path statements...13 Analyzing audit data...14 PAGE 2

4 About File Audit Once purchased and enabled for your IronKey Enterprise Service account, the File Audit feature allows your organization to capture and report a list of the files and directories on the secure partition of managed devices. Devices report the audit data to a supported log server, or Report server. This guide is written for administrators and provides an overview of the File Audit feature and requirements. It also explains how to configure device policies in Service to use the File Audit feature and describes how to configure the Report server to receive audit data from IronKey devices. Requirements IronKey Enterprise Management Service File Audit is licensed as a separate feature in Service. Please contact Imation customer service for details on activating it for your account. Once purchased and enabled in Service, you can configure the device policy to enable the feature for supported devices. Report server This is the syslog-ng server to which the IronKey device will send file audit data. File Audit supports the following versions of syslog-ng: Open-source version: debian 7u2 version or higher. Other supported open source versions of syslog-ng may work but verification of these versions was beyond the scope of this release. Enterprise version: syslog-ng Premium Edition b or higher If you are sending audit data from syslog-ng to a back-end database, make sure that the PE version supports database access for the platform and database you are using. See, NOTE: Installing and setting up syslog-ng is outside the scope of this guide. For more information, consult the documentation for the syslog-ng distribution you are running. The examples cited in this guide configure syslog-ng to send audit data to a back-end database (MySQL). Configuring databases to work with syslog-ng is outside the scope of this guide. IronKey Enterprise storage device File Audit is available with S250 and D250 devices running version or higher. The secure partition requires a minimum of 75 MB of free space to store the file audit list before sending it to the Report server. PAGE 3

5 Host operating system Devices must be able to connect to the Report server from the host computer in order to send audit data. File Audit is supported on the device with the following host operating systems: Windows 8.1 Windows 7 Windows Vista Windows XP (SP2+) Mac OS X (10.9, 10.10) Auditing work flow Supported devices are configured for File Audit through the device policy. Once devices receive the updated policy, a device will automatically perform an audit of the secure partition each time the user unlocks the device. The audit process runs in the background and does not require interaction or configuration by the user. The audit creates a listing of the files and directories on the device and saves this list to a local database log file. When the audit process finishes, the device connects to the Report server, for example syslog-ng, and uploads the data. Upon successful completion of the upload, the device deletes the local log data. When the Report server receives audit messages, it processes the messages and sends the data to a defined destination, such as a back-end database. Messages contain the file information from the audit as well as event data about the audit process. Once added to the database, administrators can create queries or analyze the data according to the auditing requirements of your organization. There may be situations where a device is unable to connect to the Report server or the audit process is unexpectedly interrupted. The following describes how File Audit will handle these situations. Device audit is complete but device cannot connect to Report server If the first attempt to connect to the Report server fails, the device will attempt to connect every 15 minutes for as long as the device remains unlocked. If the user locks the device before the device is able to connect, the data remains on the secure partition and will be uploaded the next time the device connects to the Report server. Not enough space on the secure partition If the device detects that the space on the secure partition is less than the minimum required amount (75 MB), the device will not perform the audit and an error will be reported in the event log. Drive is unlocked in Read-Only mode Read-Only mode protects devices from potential malware by preventing files from being edited on or written to the secure partition, including File Audit data. Users will typically unlock the PAGE 4

6 device in this mode (or Administrators may force this setting) when the device is unlocked on an untrusted or unknown computer. If the drive is unlocked in Read-Only mode, the device cannot save the audit information to the local database file on the secure partition. Audit interrupted before completion If the device is unplugged, locked, either automatically by the auto-lock feature or by the user, or updated during the audit process, the audit will stop and no data will be uploaded. Data that was captured by the audit before the interruption, will be uploaded the next time the device connects to the Report server. An error in the event message will indicate that the audit was interrupted. syslog-ng or database not receiving audit data For general issues regarding errors with syslog-ng or your database, consult the syslog-ng and/ or database log files. Audit message details The audit process collects two types of data: File Information and Event details. Both are stored on the secure partition until the device connects to the Report server to upload the data. Once uploaded, the audit data is deleted from the device. FILE INFORMATION The file information collected during an audit includes a list of the files and directories on the secure partition. The content of the files is not captured. The list includes system and hidden files, as well as files that are specific to the device, such as installed applications. The audit does not capture data for empty directories. File information is stored as a lightweight file-based database on the device until it is uploaded. If set in the device policy, the audit process will also report a file hash of each file, using the MD5 hash algorithm. The file information collected includes the following details: device serial number audit time stamp file name / path file size time/date created time/date modified time/date last accessed crytographic hash of file content (if specified in policy) PAGE 5

7 EVENT DETAILS During an audit, the device records event details, such as the time stamp when an audit starts and finishes and any errors that may have occurred. Event log messages are sent to the same Report server as the file information. The log file includes the following details: device serial number audit time stamp event type error code event detail The following table lists some common error codes that will be captured in the event messages when an unexpected scenario occurs during a device audit. File Audit Error Codes Error Description code 1 Unspecified error 2 Local database invalid format Database file on the device is corrupt. 8 Server connect failure 11 Audit interrupted by device lock, device unplug, or device update operation 12 Audit skipped due to insufficient space on secure volume 15 Server connection TLS not established. Note: possible that report server is not configured for TLS PAGE 6

8 Configuring File Audit in Service You must update your Enterprise account to license the File Audit feature before you can configure File Audit in IronKey Enterprise Service. Once purchased and enabled, the device policy controls whether the File Audit feature is turned on or off for devices. By default, the File Audit policy setting is Inactive. Once active and configured in the policy, the device will receive the policy update the next time it connects to the Service. The first file audit will start the next time the user unlocks the device after receiving the updated policy. The File Audit policy option includes the following parameters: Report Server Type Only syslog-ng is currently supported Report Server IP The address of the log server (IPv4) and port number. File Hash Default setting: Off. Uses the MD5 hash algorithm. When enabled, the audit process will create a hash of the files on the secure partition. This is included as part of the file information uploaded to the Report server. NOTE: Enabling the File Hash setting will significantly increase the time required for a device to complete an audit. To set the File Audit policy parameters 1. In the Admin Console, open the device policy (either a new or existing policy). 2. In the Device Audit section, under File Audit, click Inactive. The policy setting will change to Active. 3. For Report Server IP, type the IP address for the log server. This is the syslog-ng server to which devices will upload audit data. 4. For Port, type the port number for the Report server. 5. If you want to enable the File Hash option, select On from the File Hash list box. 6. Save the new policy settings. PAGE 7

9 Configuring the Report server The audit data captured during a file audit is sent as syslog-ng messages from the device to the syslog-ng server address set in the device policy. The messages contain file information and event information. You must configure syslog-ng server to accept these messages from IronKey devices (or relay them as required). This section assumes a basic understanding of how to configure syslog-ng servers. The information in this chapter describes how to configure syslog-ng specifically for use with the File Audit feature. See the syslog-ng documentation for general information about syslog-ng, command syntax and so on. File Audit syslog-ng message details Messages are sent over a secure channel using TLS. The following values are defined in the fields of the syslog-ng File Audit message. The important fields to note are the PROGRAM and MSGID fields. These fields are referenced when you add File Audit parameters in the syslog-ng configuration file. PRI: Facility = user-level message; Severity = informational VERSION: 1 HOST: client ip address where the device is plugged in (not DNS resolved) PROGRAM: ironkey PROCID: NILVALUE ( - ) MSGID: fileinfo This is the file information gathered during the device audit of the secure partition. event This is the log message generated during a file audit. It contains information about the audit, such as start and end time and any errors encountered. PAGE 8

10 Modifying the syslog-ng configuration file You must configure the syslog-ng application for use with File Audit by editing the syslog-ng configuration file syslog-ng.conf. If you currently use syslog-ng for other logging requirements in your organization, you will modify this file to handle log messages received from devices that use File Audit. The syslog-ng.conf file is typically located in the following directory: Linux and UNIX systems /opt/syslog-ng/etc/ You must define the following settings in the configuration file: Source This is the location where syslog-ng receives log messages from File Audit. Destination This is the location where syslog-ng sends log messages after verifying that the filtering rules match. Message filter Filters are rules that you define to select only certain messages. For example, to receive syslog-ng messages from File Audit, you must create a filter to specify the File Audit program and to allow only messages with file information or event data. When you include the filter in the log path, syslog-ng sends only those messages that meet the criteria of the filter rule to the destination. Message parser Parsers help to process message data. They allow you to define rules to break down messages into named fields or columns. For a list of the columns available with File Audit for both file information and event messages, see Defining message parsers on page 12. Log path Connects sources to destinations. The log statement tells syslog-ng what to do with a message. syslog-ng sends messages that it receives from a defined source to all defined destinations included in the log path. You can also include filters and parsers in the log path. The File Audit feature requires that you define filters and parser statements to ensure that syslog-ng can receive file information and event messages and send it to the appropriate destinations. NOTE: For more information about the syslog-ng configuration file, see the documentation for syslog-ng server. DEFINING A SOURCE You must configure a source to receive messages sent from any host computer used by the IronKey device. The device must be able to connect to the syslog-ng server. The following code defines a network source s_net and uses TLS to ensure a secure communication channel. PAGE 9

11 # Source source s_net { # - Network tcp(ip( ) port(514) max-connections(200) flags(syslog-protocol) log_iw_size(50000) # - Certificates # IronKey devices use a secure connection therefore syslog-ng must be # configured to use a certificate and key. The certificate can be self-signed. tls (key_file( /etc/syslog-ng/cert/iksyslogng.key ) cert_file( /etc/syslog-ng/cert/iksyslogng.crt ) # - Client cert option peer-verify(optional-untrusted) ) ); }; DEFINING DESTINATIONS You must configure a destination to specify where syslog-ng will send or store messages that it receives from devices. The destinations that you define will be used when you define the log path statement. You can configure syslog-ng server to send messages to a back-end database, such as MySQL or Microsoft SQL. Messages are encoded in UTF-8 format. Therefore, you must configure your database table to handle UTF-8-encoded strings. This will typically affect only the filepath field for fileinfo messages, as it is the only field with extended characters. NOTE: MS SQL server does not have native support for UTF-8 character encoding. If using an MS SQL server, you should configure the database columns with extended characters, for example the filepath column, as varbinary. For more information about MS SQL and UTF-8, see The destination statements in the following examples, will send fileinfo messages and event messages to a MySQL database running on the host. The message data will be added to the ikaudit database. 1. Destination Statement for file messages The first destination statement, named d_mysql_fileinfo, sends fileinfo messages to the ikaudit database table. The table name includes the exact date when the messages were sent. If the user account that connects to the database has the necessary privileges, the syslogng application will automatically create (or add to) the table and columns. The following columns are available with fileinfo messages: datetime host deviceserialnumber audittimestamp filepath size created modified PAGE 10

12 accessed hash NOTE:The following sample destination statement includes the column format. With MySQL, column formats defined as (MAX) will not work. You must define specific values for the varchar parameter. # Destinations # MySQL destination d_mysql_fileinfo { sql( type(mysql) # The host address, username and password must match your database settings # and credentials set by your DBA host( ) username( user ) password( dbpassword ) database( ikaudit ) table( iklogfile_${r_year}${r_month}${r_day} ) columns( datetime varchar(32), host varchar(64), deviceserialnumber varchar(64), audittimestamp varchar(128), filepath varchar(64096), size varchar(128), created varchar(128), modified varchar(128), accessed varchar(128), hash varchar(256) ) values( $DATE, $HOST, $deviceserialnumber, $audittimestamp, $filepath, $size, $created, $modified, $accessed, $hash ) indexes( datetime, host, deviceserialnumber ) ); }; 2. Destination statement for event messages The second destination statement, named d_mysql_event, sends event messages to the iklogevnt database table. The table name includes the exact date when the messages were sent and when the audit was performed. If the user account that connects to the database has the necessary privileges, the syslog-ng application will automatically create (or add to) the table and columns. The following columns are available with event messages: datetime host deviceserialnumber audittimestamp event errorcode eventdetail NOTE: The sample destination statement includes the column format. With MySQL, column formats defined as (MAX) will not work. You must define specific values for the varchar parameter. PAGE 11

13 destination d_mysql_event { sql( type(mysql) host( ) username( user ) password( dbpassword ) database( ikaudit ) table( iklogevnt_${r_year}${r_month}${r_day} ) columns( datetime varchar(32), host varchar(64), deviceserialnumber varchar(64), audittimestamp varchar(128), event varchar(32), errorcode varchar(16), eventdetail varchar(64096) ) values( $DATE, $HOST, $deviceserialnumber, $audittimestamp, $event, $errorcode, $eventdetail ) indexes( datetime, host, deviceserialnumber ) ); }; DEFINING MESSAGE FILTERS You must create message filters to allow syslog-ng to receive fileinfo and event messages from the ironkey program on the device. The log statement must also include these filters to ensure that only data that meets the message filter criteria is sent to the destination. The following example creates two message filters: ikaudit_fileinfo and ikaudit_event. The filter looks at the MSGID of an incoming message from the program ironkey. The two valid MSGID values for these filters are: fileinfo and event. # Message Filters filter ikaudit_fileinfo { program(ironkey) and match( fileinfo value( MSGID )) }; filter ikaudit_event { program(ironkey) and match( event value( MSGID )) }; DEFINING MESSAGE PARSERS You must define two message parsers to segment the data from the incoming messages into the available columns for file information or event messages. The log path statement must include these two parsers to ensure that the message data is segmented properly. The following table lists the columns that are available for fileinfo and event messages. Columns for fileinfo deviceserialnumber audittimestamp filepath size created modified accessed hash Columns for event deviceserialnumber audittimestamp event errorcode eventdetail PAGE 12

14 The following example creates two message parsers, one for file information messages (p_ikaudit_fileinfo) and the other for event messages (p_ikaudit_event). # Message Parsers parser p_ikaudit_fileinfo { cvs-parser( columns( deviceserialnumber, audittimestamp, filepath, size, created, modified, accessed, hash ), delimiters(, ), quote-pairs( ) ); }; parser p_ikaudit_event { cvs-parser( columns( deviceserialnumber, audittimestamp, event, errorcode, eventdetail ), delimiters(, ) ); }; DEFINING LOG PATH STATEMENTS Log paths determine what syslog-ng will do with incoming log messages. The path is defined by a log statement that must include a message source and destination as well as any filters or parsers relative to the message. syslog-ng processes log statements in the order in which they are listed in the configuration file. You must create two log statements to define a log path for both fileinfo messages and event messages. The statements must include the s_net source, the fileinfo and event destinations as well as the filters (ikaudit_fileinfo and ikaudit_event) and parsers (p_ikaudit_fileinfo and p_ikaudit_event) that were defined for each message. Log path statement for fileinfo messages This log statement filters fileinfo messages received by syslog-ng and parses and sends the data to d_mysql_fileinfo destination in MySQL. # Log Actions log { source(s_net); filter(ikaudit_fileinfo); parser(p_ikaudit_fileinfo); destination(d_mysql_fileinfo); }; The second statement filters event messages received by syslog-ng and parses and sends the data to d_mysql_event destination in MySQL. PAGE 13

15 log { source(s_net); filter(ikaudit_event); parser(p_ikaudit_event); destination(d_mysql_event); }; Analyzing audit data The syslog-ng setup that is described in this chapter was configured to send audit data to database tables in a MySQL database. Once you set up your syslog-ng configuration to receive audit information and send it to a specified destination or database, administrators can perform queries or reports of the data according to your organization s requirements. For example, a user lets his manager know that his Ironkey device has been stolen while he was travelling on business. The database administrator can query the database to view the most recent audit information that was captured for stolen device. The resulting data is sent to the manager to review and identify any critical files that were stored on the secure partition. The following screen image shows the most recent file audit data in the database for the stolen device (serial number ). PAGE 14

Password Reset Feature Quick Start Guide

Password Reset Feature Quick Start Guide Password Reset Feature Quick Start Guide Last Updated October 2015 NOTE: Imation is not liable for technical or editorial errors and/or omissions contained herein; nor for incidental or consequential damages

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 FTP Server Configuration Table of contents Overview... 2 IIS FTP server configuration... 2 Installing FTP v7.5 for IIS... 2 Creating an FTP site with basic authentication...

More information

RealPresence Platform Director

RealPresence Platform Director RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director

More information

MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER

MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER MIGRATING TO AVALANCHE 5.0 WITH MS SQL SERVER This document provides instructions for migrating to Avalanche 5.0 from an installation of Avalanche MC 4.6 or newer using MS SQL Server 2005. You can continue

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

IronKey Enterprise Server 6.1 Quick Start Guide

IronKey Enterprise Server 6.1 Quick Start Guide IronKey Enterprise Server 6.1 Quick Start Guide Last Updated September 2015 System Requirements Requirement Description Database Microsoft SQL Server 2005, Microsoft SQL Server 2008, or Microsoft SQL Server

More information

FireSIGHT User Agent Configuration Guide

FireSIGHT User Agent Configuration Guide Version 2.2 August 20, 2015 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL

More information

etrust Audit Using the Recorder for Check Point FireWall-1 1.5

etrust Audit Using the Recorder for Check Point FireWall-1 1.5 etrust Audit Using the Recorder for Check Point FireWall-1 1.5 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational

More information

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.

More information

HP IMC User Behavior Auditor

HP IMC User Behavior Auditor HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Symantec Endpoint Encryption Full Disk

Symantec Endpoint Encryption Full Disk Symantec Endpoint Encryption Full Disk Policy Administrator Guide Version 8.0.1 Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Nexio Insight LDAP Synchronization Service

Nexio Insight LDAP Synchronization Service Nexio Insight LDAP Synchronization Service 15-May-2015 Revision: Release Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

Netop Remote Control Security Server

Netop Remote Control Security Server A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Installation Manuals Installation and Setup Guide Health Check Legal Notices Warranty The only warranties for HP products and services are set forth in the express

More information

ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07

ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07 ACTi NVR Config Converter User s Manual Version 1.0.0.17 2012/06/07 Legal Notice Disclaimer The information contained in this document is intended for general information purposes. ACTi Corporation shall

More information

Polar Help Desk Installation Guide

Polar Help Desk Installation Guide Polar Help Desk Installation Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or

More information

Dell Recovery Manager for Active Directory 8.6.0

Dell Recovery Manager for Active Directory 8.6.0 Dell Recovery Manager for Active Directory 8.6.0 April, 2014 These release notes provide information about the Recovery Manager for Active Directory release. About Recovery Manager for Active Directory

More information

Symantec Mobile Management for Configuration Manager

Symantec Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software

More information

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server TelePresence Migrating TelePresence Management Suite (TMS) to a New Server THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

Microsoft SQL Server 2014. Installation Guide

Microsoft SQL Server 2014. Installation Guide Microsoft SQL Server 2014 Installation Guide Notices 2015 XMPie Inc. All rights reserved. U.S. Patents 6948115, 7406194, 7548338, 7757169 and pending patents. JP Patent 4406364B and pending patents. Microsoft

More information

Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3

Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3 Contents Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3 Introduction... 3 How to Register a UNIX Host in a One-Way Trust Domain Environment... 4 Creating a Windows Agentless

More information

LDAP Synchronization Agent Configuration Guide for

LDAP Synchronization Agent Configuration Guide for LDAP Synchronization Agent Configuration Guide for Powerful Authentication Management for Service Providers and Enterprises Version 3.x Authentication Service Delivery Made EASY LDAP Synchronization Agent

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

FileMaker 12. ODBC and JDBC Guide

FileMaker 12. ODBC and JDBC Guide FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

HP Device Manager 4.7

HP Device Manager 4.7 Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...

More information

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations Projetex 9 Workstation Setup Quick Start Guide 1 Projetex 9 Help Table of Contents Disclaimer 2 System Requirements 2 Registration/Upgrade 3 Projetex Workstation Setup 5 User Login to Projetex Workstation

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

AST2150 IPMI Configuration Guide

AST2150 IPMI Configuration Guide AST2150 IPMI Configuration Guide Version 1.1 Copyright Copyright 2011 MiTAC International Corporation. All rights reserved. No part of this manual may be reproduced or translated without prior written

More information

Remark FTP Utility. For Remark Office OMR. User s Guide

Remark FTP Utility. For Remark Office OMR. User s Guide Remark FTP Utility For Remark Office OMR User s Guide Remark Products Group 301 Lindenwood Drive, Suite 100 Malvern, PA 19355-1772 USA www.gravic.com Disclaimer The information contained in this document

More information

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe

More information

IronKey Enterprise Management Service Admin Guide

IronKey Enterprise Management Service Admin Guide IronKey Enterprise Management Service Admin Guide Last Updated May 2015 Thank you for choosing IronKey Enterprise Management Service by Imation. Imation s Mobile Security Group is committed to creating

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes The software described in this book is furnished

More information

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4 Digital Signatures User Guide Revision 1.2 build 1, Document Revision 1.12 Published 31. Octover 2011 ii Contents Copyright Disclaimer iii iii Introduction 1 System Requirements... 3 Installing the software

More information

Netwrix Auditor for Windows Server

Netwrix Auditor for Windows Server Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

Plug-In for Informatica Guide

Plug-In for Informatica Guide HP Vertica Analytic Database Software Version: 7.0.x Document Release Date: 2/20/2015 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements

More information

Installing The SysAidTM Server Locally

Installing The SysAidTM Server Locally Installing The SysAidTM Server Locally Document Updated: 17 October 2010 Introduction SysAid is available in two editions: a fully on-demand ASP solution and an installed, in-house solution for your server.

More information

INSTALLATION GUIDE. Assign an IP Address and Access the Video Stream

INSTALLATION GUIDE. Assign an IP Address and Access the Video Stream INSTALLATION GUIDE Assign an IP Address and Access the Video Stream Liability Every care has been taken in the preparation of this document. Please inform your local Axis office of any inaccuracies or

More information

Disaster Recovery. Websense Web Security Web Security Gateway. v7.6

Disaster Recovery. Websense Web Security Web Security Gateway. v7.6 Disaster Recovery Websense Web Security Web Security Gateway v7.6 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2011 The products and/or methods

More information

Imation LOCK User Manual

Imation LOCK User Manual Page: - 0 - Imation LOCK User Manual Security Application Program V2.0 - D Page: - 1 - Table of Contents A. Introduction... 2 B. General Description... 2 C. Features... 2 D. Before Using the Security Application

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

FTP Server Configuration

FTP Server Configuration FTP Server Configuration For HP customers who need to configure an IIS or FileZilla FTP server before using HP Device Manager Technical white paper 2 Copyright 2012 Hewlett-Packard Development Company,

More information

Version 4.61 or Later. Copyright 2013 Interactive Financial Solutions, Inc. All Rights Reserved. ProviderPro Network Administration Guide.

Version 4.61 or Later. Copyright 2013 Interactive Financial Solutions, Inc. All Rights Reserved. ProviderPro Network Administration Guide. Version 4.61 or Later Copyright 2013 Interactive Financial Solutions, Inc. All Rights Reserved. ProviderPro Network Administration Guide. This manual, as well as the software described in it, is furnished

More information

Sample Configuration: Cisco UCS, LDAP and Active Directory

Sample Configuration: Cisco UCS, LDAP and Active Directory First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

Matisse Installation Guide for MS Windows. 10th Edition

Matisse Installation Guide for MS Windows. 10th Edition Matisse Installation Guide for MS Windows 10th Edition April 2004 Matisse Installation Guide for MS Windows Copyright 1992 2004 Matisse Software Inc. All Rights Reserved. Matisse Software Inc. 433 Airport

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

Strong Authentication for Cisco ASA 5500 Series

Strong Authentication for Cisco ASA 5500 Series Strong Authentication for Cisco ASA 5500 Series with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Configuring and Integrating Oracle

Configuring and Integrating Oracle Configuring and Integrating Oracle The Basics of Oracle 3 Configuring SAM to Monitor an Oracle Database Server 4 This document includes basic information about Oracle and its role with SolarWinds SAM Adding

More information

FileMaker 13. ODBC and JDBC Guide

FileMaker 13. ODBC and JDBC Guide FileMaker 13 ODBC and JDBC Guide 2004 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Discovery Guide. Secret Server. Table of Contents

Discovery Guide. Secret Server. Table of Contents Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...

More information

CA Nimsoft Unified Management Portal

CA Nimsoft Unified Management Portal CA Nimsoft Unified Management Portal HTTPS Implementation Guide 7.6 Document Revision History Document Version Date Changes 1.0 June 2014 Initial version for UMP 7.6. CA Nimsoft Monitor Copyright Notice

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

CimTrak Integrity & Compliance Suite 2.0.6.19

CimTrak Integrity & Compliance Suite 2.0.6.19 CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console App Server File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

Dell Recovery Manager for Active Directory 8.6.3

Dell Recovery Manager for Active Directory 8.6.3 Dell Recovery Manager for Active Directory 8.6.3 May 15, 2015 These release notes provide information about the Dell Recovery Manager for Active Directory release. Resolved Issues Known Issues System Requirements

More information

Imaging License Server User Guide

Imaging License Server User Guide IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics Event Source Log Configuration Guide Microsoft SQL Server Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event Source: SQL Server Versions:

More information

Installing, Uninstalling, and Upgrading Service Monitor

Installing, Uninstalling, and Upgrading Service Monitor CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page

More information

Synchronization Tool. Administrator Guide

Synchronization Tool. Administrator Guide Synchronization Tool Administrator Guide Synchronization Tool Administrator Guide Documentation version: 1.5 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual

5-Bay Raid Sub-System Smart Removable 3.5 SATA Multiple Bay Data Storage Device User's Manual 5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual www.vipower.com Table of Contents 1. How the SteelVine (VPMP-75511R/VPMA-75511R) Operates... 1 1-1 SteelVine

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

Active Directory 2008 Operations

Active Directory 2008 Operations The Essentials Series Active Directory 2008 Operations sponsored by by Greg Shields Understanding Active Directory Recovery in Windows Server 2008...1 Backing Up AD...1 Full Server Recovery of a Domain

More information

Cisco TelePresence Management Suite Provisioning

Cisco TelePresence Management Suite Provisioning Cisco TelePresence Management Suite Provisioning Troubleshooting guide D14427.03 December 2010 Introduction Table of Contents Introduction... 3 Provisioning logs... 4 Cisco TMS provisioning directory logs...

More information

NetWrix USB Blocker Version 3.6 Quick Start Guide

NetWrix USB Blocker Version 3.6 Quick Start Guide NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.

More information

How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide

How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide SAP How-to Guide Mobile Device Management SAP Afaria How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide Applicable Releases: SAP Afaria 7 SP3 HotFix 06, SAP Afaria

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves

More information

Microsoft SQL Server 2008 R2 Express Edition with Advanced Services Installation Guide

Microsoft SQL Server 2008 R2 Express Edition with Advanced Services Installation Guide Microsoft SQL Server 2008 R2 Express Edition with Advanced Services Installation Guide Notices 2010 XMPie Inc. All rights reserved. U.S. Patents 6948115, 7406194, 7548338, 7757169 and pending patents.

More information

Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide

Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Verax Service Desk Installation Guide for UNIX and Windows

Verax Service Desk Installation Guide for UNIX and Windows Verax Service Desk Installation Guide for UNIX and Windows March 2015 Version 1.8.7 and higher Verax Service Desk Installation Guide 2 Contact Information: E-mail: sales@veraxsystems.com Internet: http://www.veraxsystems.com/

More information

How To Set Up A Xerox Econcierge Powered By Xerx Account

How To Set Up A Xerox Econcierge Powered By Xerx Account Xerox econcierge Account Setup Guide Xerox econcierge Account Setup Guide The free Xerox econcierge service provides the quickest, easiest way for your customers to order printer supplies for all their

More information

Polycom CMA System Upgrade Guide

Polycom CMA System Upgrade Guide Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or

More information

Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server.

Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server. LEPIDE SOFTWARE Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server. LepideAuditor Suite Lepide Software Private Limited, All

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

HP 3PAR Recovery Manager 4.5.0 Software for Microsoft Exchange Server 2007, 2010, and 2013

HP 3PAR Recovery Manager 4.5.0 Software for Microsoft Exchange Server 2007, 2010, and 2013 HP 3PAR Recovery Manager 4.5.0 Software for Microsoft Exchange Server 2007, 2010, and 2013 Release Notes Abstract This release notes document is for HP 3PAR Recovery Manager 4.5.0 Software for Microsoft

More information

PC-Duo Web Console Installation Guide

PC-Duo Web Console Installation Guide PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks

More information

Importing data from Linux LDAP server to HA3969U

Importing data from Linux LDAP server to HA3969U Importing data from Linux LDAP server to HA3969U Application Notes Abstract: This document describes how to import data and records from Linux LDAP servers to Storageflex HA3969U systems, and by doing

More information