Mass Messaging. Product Manual and User Guide
|
|
- Bartholomew Samson Marsh
- 8 years ago
- Views:
Transcription
1 Mass Messaging Product Manual and User Guide
2 TABLE OF CONTENTS EXECUTIVE SUMMARY...3 APPLICATION SECURITY...4 SSL SECURITY... 4 AUTHORIZATION BYPASS SECURITY... 4 CROSS SITE SCRIPTING (XSS) SECURITY... 4 CROSS SITE REQUEST FORGERY (CSRF) SECURITY... 4 SQL INJECTION SECURITY... 4 DATA SECURITY...5 OS- - - LEVEL FIREWALL... 5 UNIQUE SFTP ACCOUNT... 5 SYSTEM ARCHITECTURE...5 DATABASE INTEGRATION...6 SFTP ACCOUNT... 7 AUTOMATING THE PROCESS... 7 SAMPLE SCRIPTS... 7 SINGLE SIGN ON...8 SSO PROTOCOL... 8 SYSTEM FUNCTIONALITY...9 CREATE INITIAL GROUP(S)... 9 ADDING USERS TO REGROUP DESIGNATE ADMINS IN REGROUP POSTING A MESSAGE METHOD #1 VIA WEB INTERFACE METHOD #2 VIA METHOD #3 CALL REGROUP USE CASES... 20
3 EXECUTIVE SUMMARY Congratulations! You have just taken the first step toward great communication with members of your organization. Thank you for contacting Regroup as your Messaging provider of choice. We are extremely proud of our company s reputation, which dates back to the campus of Stanford University with the vision of solving the need that large organizations have for effective messaging across various mediums - we have since experienced tremendous growth and expansion into new markets. In the event of an emergency or other catastrophic event the most important issue at hand is the ease of use and confidence in your Emergency Notification System (ENS) to be able to deliver the message to all impacted parties. Regroup offers you a 100% Software as a Service (SaaS) platform with an extremely simple and intuitive interface. Regroup empowers you to reach out and notify small or large groups of people quickly, easily, and effectively. Whether you have access to a computer, an - or web-enabled smartphone, or simply a telephone Regroup makes communication possible in the event of almost any situation that may arise. The various means of connecting with your target audience include: Digital Signage SMS text messaging Alertus SMTP text messaging IPAWS Text-to-Speech (TTS) EAS Voice Broadcast calls Alert Beacons Embeds on your website Cable TV RSS Feeds PA Systems Social Media i.e. PBX networks Facebook, Twitter Custom Developments Regroup is Common Alerting Protocol Version 1.2 (CAP v1.2) compliant, which is an XMLbased data format for exchanging public warnings and emergencies between alerting technologies. Given the high level of XML coding used by Regroup, we are able to offer a wide variety of custom development items to our clients. Simply let us know what developments you require and a member of our implementation team will contact you regarding your request.
4 APPLICATION SECURITY Regroup places great importance on the security of our application and the data housed therein. We pass all network and website vulnerability tests. Regroup is protected with the following: SSL Security Authorization Bypass Security Cross Site Scripting (XSS) Security Cross Site Request Forgery (CSRF) Security SQL Injection Security Regroup uses 256-bit SSL (https) encryption site-wide. The connection uses TLS 1.0 protocol encrypted via AES_256_CBC, with SHA1 for message authentication and DHE_RSA as the key exchange mechanism. These security measures prevent stolen credentials, session hijacking, and access to sensitive information. Regroup is secure from Authorization Bypass vulnerabilities. Authorization Bypass vulnerabilities allow attackers to gain unauthorized access to resources by circumventing access controls. This can be accomplished by disabling certain scripts, modifying parameters in a request, or finding links to secured areas that are protected by obfuscation. Regroup is secure from Cross Site Scripting (XSS) vulnerabilities. XSS allows attackers to inject executable code into an unvalidated input that is then executed in a user s browser when the page is loaded. Through this, an attacker may gain complete control of a user s session, allowing him to alter page functionality to harvest data, phish for sensitive information, or steal user credentials and session information. Regroup is secure from Cross-Site Request Forgery (CSRF) vulnerabilities. CSRF vulnerabilities permit attackers to take advantage of a legitimate session established by a user to perform unauthorized actions on behalf of that user. Effectively anything the given user has permissions to do can be done without their knowledge by the attacker. These attacks can be very difficult to trace, as the activity appears to come from an authorized user. Regroup is secure from SQL injection vulnerabilities. SQL injection vulnerabilities happen when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL commands are thus injected from the web form into the database of an application (like queries) to change the database content or dump the database information to the attacker.
5 DATA SECURITY OS-Level Firewall Regroup ensures that we are using top OS-level Firewalls to ensure the security and privacy of user data. We feel that the security of our data is equally as important as the functionality of our application. Unique SFTP Account Regroup uses SFTP for the transmission of user data in order to secure information from the initial point of generation through input into the database. SYSTEM ARCHITECTURE Group membership data ( details in data integration diagram) Data load process Mainframe.csv group membership Logon via custom Django front end for Regroup site Regroup Recipient client(s) RReeggrroouupp uusseerr Send via client Group Authentication person ID data
6 DATABASE INTEGRATION Regroup provides an easy to use solution to integrate with third-party databases such as Ellucian s Colleague, and Banner; Jenzabar, Peoplesoft, and more. Our system allows you to easily, and automatically, import user data to our system to be processed and uploaded into (or removed from) groups. Batch process(es) build datasets of STUDENT lists nightly Batch process(es) build datasets of EMPLOYEE lists nightly Administrative/ Outside areas GDS Read datasets and create dataset of all EID + group ID Group ID data Sort dataset Regroup SFTP Build CSV, retrieving name from and from Batch Jobgroup Dataset ID > Regroup Group ID table Mainframe Group IDs created by Regroup
7 SFTP Account For clients that opt for the Database Integration feature, we will create a unique SFTP account for your network. Using this framework admins can upload files extracted from their internal database and format the file per Regroup s requirements. Please see the below screenshot for an example of our required formatting, also, please review the relevant topic on our help site found here - Automating the Process Many of our existing clients opt to use automation process such as a Cron Job to run at regular intervals of their choosing. This allows the automatic extraction of a.csv file from your database, which is then converted into our preferred format shown above and uploaded to the Upload folder within your SFTP account. Sample Scripts Regroup has sample scripts for certain database providers. We are an official Datatel partner and provide sample scripts for the Colleague database. Our scripts work with many other SQL based databases, for more information please consult our help site here -
8 SINGLE SIGN-ON Shibboleth Example Browser Regroup website Regroup (SP) Single Sign On (IdP) IdP Attribute Authority Navigate to login page Redirected to SP Redirect to SP Redirected to IdP Redirect to IdP Authenticate Redirected to SP Redirect with Token to SP SP queries IdP for Account Details Return Account Details Redirect Browser to Regroup website Redirect with Token Obtain Account Details Return Results Access Granted Grant Access? SSO Protocol Regroup can integrate with your Single Sign-On system including LDAP, OpenLDAP, Active Directory(AD), ADFS 2.0, SAML, CAS, and Shibboleth. Regardless of the authentication protocol we require the following: 1) Whitelist Regroup IPs 2) Sample Entry from Client 3) Test User from Client 4) Single or multiple containers (i.e. staff, users)? 5) Does the method use a username or to authenticate
9 SYSTEM FUNCTIONALITY Create Initial Group(s) In order to begin using the Regroup System a Network Admin will first need to create a group or multiple groups, depending on whether this is only for testing purposes or setting up the network in its entirety. Method for Group Creation: 1) Log in to your network with the credentials provided during the implementation call. 2) From the Homepage select Create a Group as shown below. 3) Once in the Create a Group tab enter the name of the group NOTE: It is not possible to change the name of a group at a later date due to the associated address (discussed further in Method #2 for Posting a Message Via ) 4) Select how messages will be handled in this group please find descriptions below. a. Open Discussion Group i. Set up as an open forum where any user can post or reply to messages to be sent to all members of the group. b. Announcement Only i. Group or Network admins are the only users able to post or reply to messages. c. Moderated i. Much like Open Discussion Groups any user can post or reply to messages, however, this type of group notifies admins that there is a message awaiting approval.
10 5) Select what type of group this will be please find descriptions below a. Public i. Group is viewable and searchable by all users, whom may join by clicking the Join link beside the group name. b. Private i. Group is viewable and searchable by all users, whom may request membership by clicking Request Membership. c. Secret i. Group is not viewable or searchable by users aside from members of the group and Network Admins, invite only. 6) Select what category this group belongs in. 7) Enter a description for the group a. Description will display on the group homepage per below 8) Select additional optional features for the group some of the more relevant options are outlined below a. Options i. One of the most important options on this screen is whether or not users are able to unsubscribe from this group. b. Subject Prefix i. Defaults to the Group Name and will display in subject of messages unless removed or customized c. Replies i. How replies to messages will be handled d. Message Footer i. Default footer has unsubscribe link ii. Also includes tracking cookies to populate -reporting statistics
11 Adding Users to Regroup Regroup has a number of ways to add users into the system. This topic will cover adding members through the website for the initial testing. Adding all members of the network can be done through the SFTP client as outlined on our help site at the following link - Method for Adding Users: 1) Navigate to the Group Homepage 2) Select Add/Invite Members on the left panel 3) From the Add/Invite members screen enter the first name, last name and of the users to be added. 4) Select Send a welcome message and login info to new members from the bottom of this page in order to allow users to sign in to the system.
12 Designating Admins in Regroup Regroup has differing levels of admin rights. Network Admins have full control over all settings within the network, including Admin Settings Tab and are able to post to any group within the network. Group Admins are able to make changes and post messages to groups they administer and can even be restricted from viewing the contact details for users in their group(s). Method for Designating Network Admins: 1) Navigate to Admin Settings Tab 2) Select Users Tab
13 3) Select Make Network Admin 4) Success message will appear and user is now a network admin Method #1 for Designating Group Admins Bulk Editing: 1) Follow steps 1 and 2 above to get to Users Tab 2) Select View/Edit Groups 3) Within the drop down user can quickly be made an admin of multiple groups 4) A green success message will be displayed
14 Method #2 for Designating Group Admins Group Specific Editing: 1) Navigate to the Group Homepage 2) Select Group Members from the left pane 3) Select Make Admin beside the user in question 4) A green success message will be displayed
15 Posting a Message Being a messaging service provider Regroup understands that the primary concern is the ability to get messages to the relevant parties no matter what situation may arise. Given our commitment to reaching your user base, Regroup offers three methods whereby messages can be sent to members of your network. Method #1 for Posting a Message Via Web Interface: 1) Log in to the network at your unique subdomain - with provided credentials. 2) Navigate to the Post a Message Tab
16 3) Regroup offers three different protocols for sending out messages a. Standard Messaging Interface i. Website 1. Messages are posted to the network and your website embed, if applicable ii. 1. Sends an to all users in the group(s) selected iii. Text Message (Standard see also Premium Text Message Below) 1. Sent via SMTP protocol which utilizes an address associated with the phone number and carrier (i.e. a. NB: This protocol requires carrier information in order to function correctly. In order to send a message directly to a number without the requirement for carrier information please see Premium Text Message Below. iv. Text to Speech 1. Initiates a call to all phone numbers associated with users in the group(s), within which a digitized voice recites the body of the message. v. Messages can be saved as a template and be assigned to only the creator, or all admins vi. Messages can be scheduled to be sent at a later date and time with a recurring frequency of Daily, Weekly, Monthly or Yearly vii. Clicking Send Test to Myself will isolate the message just to the admin composing it. This is most often used to verify formatting when using HTML or other rich formats.
17 viii. Preview brings up another screen, which shows how the message will appear in an client as well as allowing the viewing of a preview for the text message. b. Voice Alert Messaging Interface i. Allows admins to initiate a call with a voice recording that will play for all phone numbers associated with users in the group(s) ii. Messages can be added via two methods 1. Option 1: Record a. Enter your phone number and a title for the sound file and then select Click to Call i. The number entered above will be called and a message can then be recorded to be sent out right away or at a later time 2. Option 2: Upload a. Select Choose File which will allow admins to upload a file stored locally in either.wav or.mp3 format
18 c. Premium Text Messaging Interface i. Premium text messaging is based off an SMPP protocol, which allows a direct-to-number gateway to be established. 1. This method does not require any carrier information 2. Maximum character limit is 160, versus 140 on standard messaging Method #2 for Posting a Message Via Personal client Regroup site User authorized? Y Sends message to list N Moderator approves or denies 1) When any new group is created a unique address is also populated. 2) To find this address, navigate to the group homepage and look underneath the group name as shown below.
19 Regroup Product Manual and User Guide 3) To select how s into this group are handled, navigate to the Edit Group Settings tab in the left pane 4) Navigate to options and select the checkbox to expand the options. 5) Near the bottom of this dropdown we can select how s into this group are handled as shown below. 6) Once the optional features are selected an admin can send an to the group address from their address registered with Regroup and the message will be sent out via all selected medium.
20 Method #3 for Posting a Message Call Regroup: Regroup offers a 24 hour-a-day 7 day-a-week emergency hotline in order to allow messages to be sent out, no matter what situation may arise. In the event of an emergency where sending a message via the web interface or are not viable options, simply call us at (775) GRO- UP10 ( ). USE CASES Trigger Initial upload of dataset of group members Manual Regroup, Dataset provider, Database Administrator, SFTP Agent 1. ERPS manually initiates list generation process 2. List generation process consolidates datasets from Dataset providers 3. Resulting dataset is SFTPed to Regroup 4. Regroup processes dataset Trigger Upload updated dataset of group members Regularly scheduled process Regroup, Dataset provider, SFTP agent 1. Dataset provider creates dataset via nightly process 2. List generation process consolidates datasets from Dataset providers 3. Resulting dataset is SFTPed to Regroup 4. Regroup processes dataset Trigger Generate dataset of group members Regularly scheduled process; manual when creating a brand new list Dataset provider Dataset provider creates dataset Nightly scheduled process; manual when creating a brand new list Create new permanent list in Regroup Trigger Authorized user chooses create new group in system Regroup, List owner 1. User opts to create new group 2. User fills out group information 3. Regroup creates and saves group
21 Trigger Create new one- - - off list User defines a new group Regroup, Authorized user 1. User opts to create new group 2. User fills out group information 3. Regroup creates group Trigger Send basic via client User sends an to a Regroup address Regroup, Sender 1. Sender creates and sends to Regroup address 2. Regroup distributes mail to group members If sender is not already authorized to send to group: 2a. List owner (moderator) is notified of 2b. List owner (moderator) approves/denies Trigger Define type for basic via client User sends an to a Regroup address Regroup, Sender When creating , sender includes type in Subject Line Trigger Send basic via Regroup website User sends an via Regroup group page Regroup, Group member 1. User logs into Regroup 2. User selects group to send to from home page 3. User selects post a new message 4. User composes message 5. User hits Send 6. Regroup sends to address list for group
22 Trigger Define type for basic via Regroup website Trigger User sends an via Regroup group page Regroup, Group member User selects from available types when creating message Send HTML (with plain text version) via client User sends an HTML- - - formatted to a group address Regroup, Sender 1. Sender creates and sends to Regroup address 2. Regroup distributes mail to group members in HTML and plain text If sender is not already authorized to send to group: 2a. List owner (moderator) is notified of 2b. List owner (moderator) approves/denies Trigger Define type for HTML (with plain text version) via client User sends an HTML- - - formatted to a group address Regroup, Sender When creating , sender includes type in Subject Line Trigger Send HTML (with plain text version) via Regroup website User sends an HTML- - - formatted via Regroup group page Regroup, Group Member 1. User logs into Regroup 2. User selects group to send to from home page 3. User selects post a new message 4. User composes message 5. User hits Send 6. Regroup sends to address list for group in HTML and plain text
23 Trigger Define type for HTML (with plain text version) via Regroup website User sends an HTML- - - formatted via Regroup group page Regroup, Group Member User selects from available types when creating message Not all options may be available for all users Trigger Send attachment via client User sends an with an attachment to a group address Regroup, Sender 1. Sender creates , attaches file, and sends to Regroup address 2. Regroup distributes mail to group members If sender is not already authorized to send to group: 2a. List owner (moderator) is notified of 2b. List owner (moderator) approves/denies Trigger Send attachment via Regroup website User sends an with an attachment via Regroup group page Regroup, Group Member 1. User logs in to Regroup 2. User fills out information on , with distribution list and type 3. User opts to attach file(s) to and is presented with upload options 4. User uploads file(s) to attach 5. User hits Send 6. Regroup sends to address list for group Review attachment Trigger recipient reviews an attachment sent to a group address Regroup, Recipient 1. Recipient receives with attachment 2. Recipient opens attachment
24 Trigger Opt- - - out of Informational messages User selects opt- - - out Regroup, Group member/recipient 1. User logs into System 2. User opts to update personal preferences 3. User selects Informational opt- - - out 4. Preference is saved on dataset providers files 5. Dataset provider refers to setting when creating Informational distribution lists Trigger Opt- - - out of Marketing messages User selects opt- - - out Regroup, Group member/recipient 1. User logs in 2. User opts to update personal preferences 3. User selects Marketing opt- - - out 4. Preference is saved on dataset providers files 5. Dataset provider refers to setting when creating Marketing distribution lists Trigger Trigger Authorize permanent sender List owner adds sender Regroup, List owner 1. List admin logs in to Regroup 2. List admin selects list to maintain 3. List admin adds sender to authorized permanent sender list Remove permanent sender List owner removes sender Regroup, List owner 1. List admin logs in to Regroup 2. List admin selects list to maintain 3. List admin removes sender from authorized permanent sender list
25 Approve message(s) for distribution Trigger Sender creates message and hits send Regroup, Admin, Sender 1. Regroup forwards the message awaiting moderation to list admin 2. List admin uses links in the message to approve 3. Regroup distributes to recipient list Admin moderates message via Regroup website: 2. Admin logs into Regroup 3. Admin is offered list of messages for approval 4. Admin reviews and approves message(s) 5. Regroup distributes (s) to recipient list OPTIONAL FEATURES Website Integration Regroup can be branded and customized to fit within an organization's own website and color scheme. For examples, please see enclosed screenshots on Database Integration Database integration enables an automated upload of contact data to our database so that your notification lists are always up to date. (This saves the manual work of uploading.csv files via the web interface by taking your contact records directly from your database and synching them regularly with Regroup). We have a secure ftp to which your database will post automatically-generated.csv files with contact information. This method of uploading users requires minimal setup to create a scheduled script to send the data to Regroup. Our system automatically recognizes any new files that you post to the ftp; so it can be set up to synch as often as wanted, for example weekly. Single Sign-On (e.g. LDAP) Regroup can integrate with your directory's username and password system. For example, at they've chosen to enable LDAP via Regroup so that constituents can log in with their OCCC username and password. Voice System Integration Regroup can integrate with disparate phone systems to have one, integrated means of sending voice messages across a diverse set of contacts and systems. Digital Signage, Siren and Desktop Alert Integration Regroup can also integrate with outdoor or indoor digital signage, sirens, and computer desktop alerts. We can also integrate with other public alert systems.
26 Geo Targeting and Map Mode For clients who require the ability to target contact lists ad-hoc by address, rather than by pregrouping them in this way, we can offer a Map Mode. This allows the sender to circle an area on the Map that will correlate with address data for contacts, and include contacts in that area as recipients of the message. support@regroup.com - (775)
27 Customer Service Platform Integration Regroup has implemented integrations with customer service platforms such as Parature. This enables customer support representatives to text message customers from within the service platform. An example of this integration is under Regroup s Parature Integration on YouTube. support@regroup.com - (775)
28 ADDITIONAL PRODUCT SCREENSHOTS Example of User Preferences page: and Telephone - (775)
29 Examples of Reporting: - (775)
30 - (775)
31 - (775)
32 Regroup can be accessed via web-enabled tables and phones: - (775)
33 Messages can also be shown through an External Client Webpage: - (775)
34 Contacts can be defaulted into the groups, or can join themselves via the relevant website: Thank you for using Regroup! Please contact us anytime for assistance. - (775)
Regroup Design Blueprint
Prepared by Dory Weiss, ITS Last Edited September 28, 2012 November 15, 2012 Regroup Design Blueprint Executive Summary The functionality to send Informational, Operational, and Official messages via the
More informationPresented by: Introduction
Presented by: Introduction With the rapid pace in which technology is advancing, even Emergency Notification Systems (ENS) implemented a few years ago can quickly become outdated and lead to an ENS failure.
More informationContent Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
More informationABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationWeb Forms for Marketers 2.3 for Sitecore CMS 6.5 and
Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and later User Guide Rev: 2013-02-01 Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and later User Guide A practical guide to creating and managing web
More informationMagento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationSophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
More informationBitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions
Bitrix Site Manager 4.0 Quick Start Guide to Newsletters and Subscriptions Contents PREFACE...3 CONFIGURING THE MODULE...4 SETTING UP FOR MANUAL SENDING E-MAIL MESSAGES...6 Creating a newsletter...6 Providing
More informationAuthentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
More informationSophos UTM Web Application Firewall for Microsoft Exchange connectivity
How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services
More informationT his feature is add-on service available to Enterprise accounts.
SAML Single Sign-On T his feature is add-on service available to Enterprise accounts. Are you already using an Identity Provider (IdP) to manage logins and access to the various systems your users need
More informationUser Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationIBM Unica emessage Version 8 Release 6 February 13, 2015. User's Guide
IBM Unica emessage Version 8 Release 6 February 13, 2015 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 403. This edition applies to
More informationBCSD WebMail Documentation
BCSD WebMail Documentation Outlook Web Access is available to all BCSD account holders! Outlook Web Access provides Webbased access to your e-mail, your calendar, your contacts, and the global address
More informationUser's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
More informationGateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
More informationPlesk 11 Manual. Fasthosts Customer Support
Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...
More informationRingCentral Office. Basic Start Guide FOR USERS
RingCentral Office Basic Start Guide FOR USERS Contents 3 Getting Started 4 How to access your account 5 The Overview Page 6 Messages 7 Activity Log 8 Contacts 9 Settings 10 Tools 11 Do Not Disturb (DND)
More informationEMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT
PLATFORM PEOPLE STRATEGY EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT Contents p1 E-Newsletter Overview p2 E-Newsletter Sample p3 Forward Article p4 p5 p6 p7 Print Article Read More Subscription
More informationChapter 10 Encryption Service
Chapter 10 Encryption Service The Encryption Service feature works in tandem with Dell SonicWALL Email Security as a Software-as-a-Service (SaaS), which provides secure data mail delivery solutions. The
More informationIntroduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
More informationDashboard Admin Guide
MadCap Software Dashboard Admin Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document
More informationAWEBDESK LIVE CHAT SOFTWARE
AWEBDESK LIVE CHAT SOFTWARE Version 6.1.0 AwebDesk Softwares Administrator Guide Edition 1.2 January 2014 Page 1 TABLE OF CONTENTS Introduction.......... 4 Sign In as Admin...5 Admin Dashboard Overview.
More informationWebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationDomains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section
More informationSophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
More informationIBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
More informationWebmail User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header. Printing an Email. Composing a New Email
Webmail User Guide Rev: November, 2012 Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox 2,
More informationWebmail Instruction Guide
Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with
More informationMy LMS. Learning Management System Guide for Students
My LMS Learning Management System Guide for Students Revision Date: October 17, 2014 Table of Contents Learning Management System (LMS) Overview... 2 Accessing My LMS... 2 General Navigation... 5 Your
More informationOkta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
More informationHow To Set Up A Xerox Econcierge Powered By Xerx Account
Xerox econcierge Account Setup Guide Xerox econcierge Account Setup Guide The free Xerox econcierge service provides the quickest, easiest way for your customers to order printer supplies for all their
More informationAuthentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
More informationWhere every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
More informationParallels Plesk Control Panel
Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,
More informationABB solar inverters. User s manual ABB Remote monitoring portal
ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904
More informationBridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process
USER MANUAL DATAMOTION SECUREMAIL SERVER Bridging People and Process APPLICATION VERSION 1.1 Bridging People and Process Bridging People and Process Bridging People and Process Published By: DataMotion,
More informationInstallation and Configuration Manual
Beacon Office Installation and Configuration Manual Version - 2.5(1) Radianta Inc. September 2008 Radianta, Inc. Beacon Office Page 2 Table of Contents Introduction... 4 What is Beacon Office... 4 How
More informationSmart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
More informationWorkday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
More informationHow To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
More informationSophos Mobile Control Installation guide
Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationGetting Started - The Control Panel
Table of Contents 1. Getting Started - the Control Panel Login Navigation Bar Domain Limits Domain User Account Properties Session Management 2. FTP Management Creating and Editing Users Accessing FTP
More informationKaseya 2. User Guide. Version 1.1
Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
More informationPlesk for Windows Copyright Notice
2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationenicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
More informationManage. Help Documentation. This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Manage Email Users An email user account represents a person's
More informationIpswitch Client Installation Guide
IPSWITCH TECHNICAL BRIEF Ipswitch Client Installation Guide In This Document Installing on a Single Computer... 1 Installing to Multiple End User Computers... 5 Silent Install... 5 Active Directory Group
More informationSHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
More informationCloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
More informationTenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
More informationECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7
ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...
More informationSingle Sign On for ShareFile with NetScaler. Deployment Guide
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
More informationSysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
More informationWeb Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
More informationSECURE MESSAGING PLATFORM
SECURE MESSAGING PLATFORM WEB ADMIN CONSOLE ADMIN USER GUIDE Introduction... 2 Customer Management... 3 Dashboard... 3 User Account... 5 General & Feature Settings... 7 Secure Message Disclaimers... 9
More informationCopyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
More informationWEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationSteps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
More informationLepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationIdentity Implementation Guide
Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
More informationSystem Configuration and Deployment Guide
System Configuration and Deployment Guide This guide provides information on...... Configuring an Organization using the Organization Wizard... Setting a default Policy Suite using the Organization Wizard...
More informationRingCentral for Google. User Guide
RingCentral for Google User Guide RingCentral for Google User Guide Contents 2 Contents Introduction............................................................... 4 About RingCentral for Google..........................................................
More informationConfiguration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
More informationSonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
More informationService Provider Guide
Service Provider Guide For the latest version of this document please go to: http://www.exchangedefender.com/docs v 1.0 May 16,2011 Audience: Staff Table of Contents ExchangeDefender Overview 3 ExchangeDefender
More informationREDCap General Security Overview
REDCap General Security Overview Introduction REDCap is a web application for building and managing online surveys and databases, and thus proper security practices must instituted on the network and server(s)
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationGETTING STARTED CREATE A NEW EMAIL. 1 P age
How To: Create an Email from a Template (One Time Custom Email & Recurring Custom Email) This documentation is designed to walk through the necessary steps to create a new One Time Custom Email and a Recurring
More informationIBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
More informationSage 200 Web Time & Expenses Guide
Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than
More informationSite Store Pro. INSTALLATION GUIDE WPCartPro Wordpress Plugin Version
Site Store Pro INSTALLATION GUIDE WPCartPro Wordpress Plugin Version WPCARTPRO INTRODUCTION 2 SYSTEM REQUIREMENTS 4 DOWNLOAD YOUR WPCARTPRO VERSION 5 EXTRACT THE FOLDERS FROM THE ZIP FILE TO A DIRECTORY
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationUsing Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.
Using Webmail Technical Manual: User Guide The Webmail Window To save an attachment: 1. Click once on the attachment name. Or, if there are multiple attachments, click the Save icon to save all attachments
More informationMRED Guide to: Managing Your PREMIUM Goomzee Account
Goomzee- User s Guide MRED Guide to: Managing Your PREMIUM Goomzee Account Promote Your Properties In Minutes Goomzee is a comprehensive mobile marketing and lead generation system for real estate professionals.
More informationTIB 2.0 Administration Functions Overview
TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR
More informationWeb Hosting Getting Started Guide
Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload
More informationADMINISTRATOR GUIDE VERSION
ADMINISTRATOR GUIDE VERSION 4.0 2014 Copyright 2008 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical, for any purpose
More informationManagement, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
More informationSecure Messaging Quick Reference Guide
Secure Messaging Quick Reference Guide Overview The SHARE Secure Messaging feature allows a SHARE registered user to securely send health information to another SHARE registered user. The Secure Messaging
More informationAn Introduction to Box.com
An Introduction to Box.com Box is an online file sharing and cloud content management service and it provides features such as: Security controls Space Mobility Online collaboration Mobile access Version
More informationIs Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
More informationE21 Mobile Users Guide
E21 Mobile Users Guide E21 Mobile is the Mobile CRM companion to TGI s Enterprise 21 ERP software. Designed with the mobile sales force in mind, E21 Mobile provides real-time access to numerous functions
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationStep-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
More informationIf you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:
ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This
More informationCox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0
Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE
More informationConnect 9.2 Notes + Documentation August 2010 1
Connect 9.2 Notes + Documentation August 2010 1 Introduction Connect 9.2 offers a number of great tools to reduce the time necessary to manage a large community of users, including improved methods to
More informationUsing Avaya Aura Messaging
Using Avaya Aura Messaging Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting Started... 4 Messaging overview... 4 Prerequisites... 4 Accessing your mailbox from any phone... 4 Accessing the
More informationAuthentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
More information