Mass Messaging. Product Manual and User Guide

Size: px
Start display at page:

Download "Mass Messaging. Product Manual and User Guide"

Transcription

1 Mass Messaging Product Manual and User Guide

2 TABLE OF CONTENTS EXECUTIVE SUMMARY...3 APPLICATION SECURITY...4 SSL SECURITY... 4 AUTHORIZATION BYPASS SECURITY... 4 CROSS SITE SCRIPTING (XSS) SECURITY... 4 CROSS SITE REQUEST FORGERY (CSRF) SECURITY... 4 SQL INJECTION SECURITY... 4 DATA SECURITY...5 OS- - - LEVEL FIREWALL... 5 UNIQUE SFTP ACCOUNT... 5 SYSTEM ARCHITECTURE...5 DATABASE INTEGRATION...6 SFTP ACCOUNT... 7 AUTOMATING THE PROCESS... 7 SAMPLE SCRIPTS... 7 SINGLE SIGN ON...8 SSO PROTOCOL... 8 SYSTEM FUNCTIONALITY...9 CREATE INITIAL GROUP(S)... 9 ADDING USERS TO REGROUP DESIGNATE ADMINS IN REGROUP POSTING A MESSAGE METHOD #1 VIA WEB INTERFACE METHOD #2 VIA METHOD #3 CALL REGROUP USE CASES... 20

3 EXECUTIVE SUMMARY Congratulations! You have just taken the first step toward great communication with members of your organization. Thank you for contacting Regroup as your Messaging provider of choice. We are extremely proud of our company s reputation, which dates back to the campus of Stanford University with the vision of solving the need that large organizations have for effective messaging across various mediums - we have since experienced tremendous growth and expansion into new markets. In the event of an emergency or other catastrophic event the most important issue at hand is the ease of use and confidence in your Emergency Notification System (ENS) to be able to deliver the message to all impacted parties. Regroup offers you a 100% Software as a Service (SaaS) platform with an extremely simple and intuitive interface. Regroup empowers you to reach out and notify small or large groups of people quickly, easily, and effectively. Whether you have access to a computer, an - or web-enabled smartphone, or simply a telephone Regroup makes communication possible in the event of almost any situation that may arise. The various means of connecting with your target audience include: Digital Signage SMS text messaging Alertus SMTP text messaging IPAWS Text-to-Speech (TTS) EAS Voice Broadcast calls Alert Beacons Embeds on your website Cable TV RSS Feeds PA Systems Social Media i.e. PBX networks Facebook, Twitter Custom Developments Regroup is Common Alerting Protocol Version 1.2 (CAP v1.2) compliant, which is an XMLbased data format for exchanging public warnings and emergencies between alerting technologies. Given the high level of XML coding used by Regroup, we are able to offer a wide variety of custom development items to our clients. Simply let us know what developments you require and a member of our implementation team will contact you regarding your request.

4 APPLICATION SECURITY Regroup places great importance on the security of our application and the data housed therein. We pass all network and website vulnerability tests. Regroup is protected with the following: SSL Security Authorization Bypass Security Cross Site Scripting (XSS) Security Cross Site Request Forgery (CSRF) Security SQL Injection Security Regroup uses 256-bit SSL (https) encryption site-wide. The connection uses TLS 1.0 protocol encrypted via AES_256_CBC, with SHA1 for message authentication and DHE_RSA as the key exchange mechanism. These security measures prevent stolen credentials, session hijacking, and access to sensitive information. Regroup is secure from Authorization Bypass vulnerabilities. Authorization Bypass vulnerabilities allow attackers to gain unauthorized access to resources by circumventing access controls. This can be accomplished by disabling certain scripts, modifying parameters in a request, or finding links to secured areas that are protected by obfuscation. Regroup is secure from Cross Site Scripting (XSS) vulnerabilities. XSS allows attackers to inject executable code into an unvalidated input that is then executed in a user s browser when the page is loaded. Through this, an attacker may gain complete control of a user s session, allowing him to alter page functionality to harvest data, phish for sensitive information, or steal user credentials and session information. Regroup is secure from Cross-Site Request Forgery (CSRF) vulnerabilities. CSRF vulnerabilities permit attackers to take advantage of a legitimate session established by a user to perform unauthorized actions on behalf of that user. Effectively anything the given user has permissions to do can be done without their knowledge by the attacker. These attacks can be very difficult to trace, as the activity appears to come from an authorized user. Regroup is secure from SQL injection vulnerabilities. SQL injection vulnerabilities happen when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL commands are thus injected from the web form into the database of an application (like queries) to change the database content or dump the database information to the attacker.

5 DATA SECURITY OS-Level Firewall Regroup ensures that we are using top OS-level Firewalls to ensure the security and privacy of user data. We feel that the security of our data is equally as important as the functionality of our application. Unique SFTP Account Regroup uses SFTP for the transmission of user data in order to secure information from the initial point of generation through input into the database. SYSTEM ARCHITECTURE Group membership data ( details in data integration diagram) Data load process Mainframe.csv group membership Logon via custom Django front end for Regroup site Regroup Recipient client(s) RReeggrroouupp uusseerr Send via client Group Authentication person ID data

6 DATABASE INTEGRATION Regroup provides an easy to use solution to integrate with third-party databases such as Ellucian s Colleague, and Banner; Jenzabar, Peoplesoft, and more. Our system allows you to easily, and automatically, import user data to our system to be processed and uploaded into (or removed from) groups. Batch process(es) build datasets of STUDENT lists nightly Batch process(es) build datasets of EMPLOYEE lists nightly Administrative/ Outside areas GDS Read datasets and create dataset of all EID + group ID Group ID data Sort dataset Regroup SFTP Build CSV, retrieving name from and from Batch Jobgroup Dataset ID > Regroup Group ID table Mainframe Group IDs created by Regroup

7 SFTP Account For clients that opt for the Database Integration feature, we will create a unique SFTP account for your network. Using this framework admins can upload files extracted from their internal database and format the file per Regroup s requirements. Please see the below screenshot for an example of our required formatting, also, please review the relevant topic on our help site found here - Automating the Process Many of our existing clients opt to use automation process such as a Cron Job to run at regular intervals of their choosing. This allows the automatic extraction of a.csv file from your database, which is then converted into our preferred format shown above and uploaded to the Upload folder within your SFTP account. Sample Scripts Regroup has sample scripts for certain database providers. We are an official Datatel partner and provide sample scripts for the Colleague database. Our scripts work with many other SQL based databases, for more information please consult our help site here -

8 SINGLE SIGN-ON Shibboleth Example Browser Regroup website Regroup (SP) Single Sign On (IdP) IdP Attribute Authority Navigate to login page Redirected to SP Redirect to SP Redirected to IdP Redirect to IdP Authenticate Redirected to SP Redirect with Token to SP SP queries IdP for Account Details Return Account Details Redirect Browser to Regroup website Redirect with Token Obtain Account Details Return Results Access Granted Grant Access? SSO Protocol Regroup can integrate with your Single Sign-On system including LDAP, OpenLDAP, Active Directory(AD), ADFS 2.0, SAML, CAS, and Shibboleth. Regardless of the authentication protocol we require the following: 1) Whitelist Regroup IPs 2) Sample Entry from Client 3) Test User from Client 4) Single or multiple containers (i.e. staff, users)? 5) Does the method use a username or to authenticate

9 SYSTEM FUNCTIONALITY Create Initial Group(s) In order to begin using the Regroup System a Network Admin will first need to create a group or multiple groups, depending on whether this is only for testing purposes or setting up the network in its entirety. Method for Group Creation: 1) Log in to your network with the credentials provided during the implementation call. 2) From the Homepage select Create a Group as shown below. 3) Once in the Create a Group tab enter the name of the group NOTE: It is not possible to change the name of a group at a later date due to the associated address (discussed further in Method #2 for Posting a Message Via ) 4) Select how messages will be handled in this group please find descriptions below. a. Open Discussion Group i. Set up as an open forum where any user can post or reply to messages to be sent to all members of the group. b. Announcement Only i. Group or Network admins are the only users able to post or reply to messages. c. Moderated i. Much like Open Discussion Groups any user can post or reply to messages, however, this type of group notifies admins that there is a message awaiting approval.

10 5) Select what type of group this will be please find descriptions below a. Public i. Group is viewable and searchable by all users, whom may join by clicking the Join link beside the group name. b. Private i. Group is viewable and searchable by all users, whom may request membership by clicking Request Membership. c. Secret i. Group is not viewable or searchable by users aside from members of the group and Network Admins, invite only. 6) Select what category this group belongs in. 7) Enter a description for the group a. Description will display on the group homepage per below 8) Select additional optional features for the group some of the more relevant options are outlined below a. Options i. One of the most important options on this screen is whether or not users are able to unsubscribe from this group. b. Subject Prefix i. Defaults to the Group Name and will display in subject of messages unless removed or customized c. Replies i. How replies to messages will be handled d. Message Footer i. Default footer has unsubscribe link ii. Also includes tracking cookies to populate -reporting statistics

11 Adding Users to Regroup Regroup has a number of ways to add users into the system. This topic will cover adding members through the website for the initial testing. Adding all members of the network can be done through the SFTP client as outlined on our help site at the following link - Method for Adding Users: 1) Navigate to the Group Homepage 2) Select Add/Invite Members on the left panel 3) From the Add/Invite members screen enter the first name, last name and of the users to be added. 4) Select Send a welcome message and login info to new members from the bottom of this page in order to allow users to sign in to the system.

12 Designating Admins in Regroup Regroup has differing levels of admin rights. Network Admins have full control over all settings within the network, including Admin Settings Tab and are able to post to any group within the network. Group Admins are able to make changes and post messages to groups they administer and can even be restricted from viewing the contact details for users in their group(s). Method for Designating Network Admins: 1) Navigate to Admin Settings Tab 2) Select Users Tab

13 3) Select Make Network Admin 4) Success message will appear and user is now a network admin Method #1 for Designating Group Admins Bulk Editing: 1) Follow steps 1 and 2 above to get to Users Tab 2) Select View/Edit Groups 3) Within the drop down user can quickly be made an admin of multiple groups 4) A green success message will be displayed

14 Method #2 for Designating Group Admins Group Specific Editing: 1) Navigate to the Group Homepage 2) Select Group Members from the left pane 3) Select Make Admin beside the user in question 4) A green success message will be displayed

15 Posting a Message Being a messaging service provider Regroup understands that the primary concern is the ability to get messages to the relevant parties no matter what situation may arise. Given our commitment to reaching your user base, Regroup offers three methods whereby messages can be sent to members of your network. Method #1 for Posting a Message Via Web Interface: 1) Log in to the network at your unique subdomain - with provided credentials. 2) Navigate to the Post a Message Tab

16 3) Regroup offers three different protocols for sending out messages a. Standard Messaging Interface i. Website 1. Messages are posted to the network and your website embed, if applicable ii. 1. Sends an to all users in the group(s) selected iii. Text Message (Standard see also Premium Text Message Below) 1. Sent via SMTP protocol which utilizes an address associated with the phone number and carrier (i.e. a. NB: This protocol requires carrier information in order to function correctly. In order to send a message directly to a number without the requirement for carrier information please see Premium Text Message Below. iv. Text to Speech 1. Initiates a call to all phone numbers associated with users in the group(s), within which a digitized voice recites the body of the message. v. Messages can be saved as a template and be assigned to only the creator, or all admins vi. Messages can be scheduled to be sent at a later date and time with a recurring frequency of Daily, Weekly, Monthly or Yearly vii. Clicking Send Test to Myself will isolate the message just to the admin composing it. This is most often used to verify formatting when using HTML or other rich formats.

17 viii. Preview brings up another screen, which shows how the message will appear in an client as well as allowing the viewing of a preview for the text message. b. Voice Alert Messaging Interface i. Allows admins to initiate a call with a voice recording that will play for all phone numbers associated with users in the group(s) ii. Messages can be added via two methods 1. Option 1: Record a. Enter your phone number and a title for the sound file and then select Click to Call i. The number entered above will be called and a message can then be recorded to be sent out right away or at a later time 2. Option 2: Upload a. Select Choose File which will allow admins to upload a file stored locally in either.wav or.mp3 format

18 c. Premium Text Messaging Interface i. Premium text messaging is based off an SMPP protocol, which allows a direct-to-number gateway to be established. 1. This method does not require any carrier information 2. Maximum character limit is 160, versus 140 on standard messaging Method #2 for Posting a Message Via Personal client Regroup site User authorized? Y Sends message to list N Moderator approves or denies 1) When any new group is created a unique address is also populated. 2) To find this address, navigate to the group homepage and look underneath the group name as shown below.

19 Regroup Product Manual and User Guide 3) To select how s into this group are handled, navigate to the Edit Group Settings tab in the left pane 4) Navigate to options and select the checkbox to expand the options. 5) Near the bottom of this dropdown we can select how s into this group are handled as shown below. 6) Once the optional features are selected an admin can send an to the group address from their address registered with Regroup and the message will be sent out via all selected medium.

20 Method #3 for Posting a Message Call Regroup: Regroup offers a 24 hour-a-day 7 day-a-week emergency hotline in order to allow messages to be sent out, no matter what situation may arise. In the event of an emergency where sending a message via the web interface or are not viable options, simply call us at (775) GRO- UP10 ( ). USE CASES Trigger Initial upload of dataset of group members Manual Regroup, Dataset provider, Database Administrator, SFTP Agent 1. ERPS manually initiates list generation process 2. List generation process consolidates datasets from Dataset providers 3. Resulting dataset is SFTPed to Regroup 4. Regroup processes dataset Trigger Upload updated dataset of group members Regularly scheduled process Regroup, Dataset provider, SFTP agent 1. Dataset provider creates dataset via nightly process 2. List generation process consolidates datasets from Dataset providers 3. Resulting dataset is SFTPed to Regroup 4. Regroup processes dataset Trigger Generate dataset of group members Regularly scheduled process; manual when creating a brand new list Dataset provider Dataset provider creates dataset Nightly scheduled process; manual when creating a brand new list Create new permanent list in Regroup Trigger Authorized user chooses create new group in system Regroup, List owner 1. User opts to create new group 2. User fills out group information 3. Regroup creates and saves group

21 Trigger Create new one- - - off list User defines a new group Regroup, Authorized user 1. User opts to create new group 2. User fills out group information 3. Regroup creates group Trigger Send basic via client User sends an to a Regroup address Regroup, Sender 1. Sender creates and sends to Regroup address 2. Regroup distributes mail to group members If sender is not already authorized to send to group: 2a. List owner (moderator) is notified of 2b. List owner (moderator) approves/denies Trigger Define type for basic via client User sends an to a Regroup address Regroup, Sender When creating , sender includes type in Subject Line Trigger Send basic via Regroup website User sends an via Regroup group page Regroup, Group member 1. User logs into Regroup 2. User selects group to send to from home page 3. User selects post a new message 4. User composes message 5. User hits Send 6. Regroup sends to address list for group

22 Trigger Define type for basic via Regroup website Trigger User sends an via Regroup group page Regroup, Group member User selects from available types when creating message Send HTML (with plain text version) via client User sends an HTML- - - formatted to a group address Regroup, Sender 1. Sender creates and sends to Regroup address 2. Regroup distributes mail to group members in HTML and plain text If sender is not already authorized to send to group: 2a. List owner (moderator) is notified of 2b. List owner (moderator) approves/denies Trigger Define type for HTML (with plain text version) via client User sends an HTML- - - formatted to a group address Regroup, Sender When creating , sender includes type in Subject Line Trigger Send HTML (with plain text version) via Regroup website User sends an HTML- - - formatted via Regroup group page Regroup, Group Member 1. User logs into Regroup 2. User selects group to send to from home page 3. User selects post a new message 4. User composes message 5. User hits Send 6. Regroup sends to address list for group in HTML and plain text

23 Trigger Define type for HTML (with plain text version) via Regroup website User sends an HTML- - - formatted via Regroup group page Regroup, Group Member User selects from available types when creating message Not all options may be available for all users Trigger Send attachment via client User sends an with an attachment to a group address Regroup, Sender 1. Sender creates , attaches file, and sends to Regroup address 2. Regroup distributes mail to group members If sender is not already authorized to send to group: 2a. List owner (moderator) is notified of 2b. List owner (moderator) approves/denies Trigger Send attachment via Regroup website User sends an with an attachment via Regroup group page Regroup, Group Member 1. User logs in to Regroup 2. User fills out information on , with distribution list and type 3. User opts to attach file(s) to and is presented with upload options 4. User uploads file(s) to attach 5. User hits Send 6. Regroup sends to address list for group Review attachment Trigger recipient reviews an attachment sent to a group address Regroup, Recipient 1. Recipient receives with attachment 2. Recipient opens attachment

24 Trigger Opt- - - out of Informational messages User selects opt- - - out Regroup, Group member/recipient 1. User logs into System 2. User opts to update personal preferences 3. User selects Informational opt- - - out 4. Preference is saved on dataset providers files 5. Dataset provider refers to setting when creating Informational distribution lists Trigger Opt- - - out of Marketing messages User selects opt- - - out Regroup, Group member/recipient 1. User logs in 2. User opts to update personal preferences 3. User selects Marketing opt- - - out 4. Preference is saved on dataset providers files 5. Dataset provider refers to setting when creating Marketing distribution lists Trigger Trigger Authorize permanent sender List owner adds sender Regroup, List owner 1. List admin logs in to Regroup 2. List admin selects list to maintain 3. List admin adds sender to authorized permanent sender list Remove permanent sender List owner removes sender Regroup, List owner 1. List admin logs in to Regroup 2. List admin selects list to maintain 3. List admin removes sender from authorized permanent sender list

25 Approve message(s) for distribution Trigger Sender creates message and hits send Regroup, Admin, Sender 1. Regroup forwards the message awaiting moderation to list admin 2. List admin uses links in the message to approve 3. Regroup distributes to recipient list Admin moderates message via Regroup website: 2. Admin logs into Regroup 3. Admin is offered list of messages for approval 4. Admin reviews and approves message(s) 5. Regroup distributes (s) to recipient list OPTIONAL FEATURES Website Integration Regroup can be branded and customized to fit within an organization's own website and color scheme. For examples, please see enclosed screenshots on Database Integration Database integration enables an automated upload of contact data to our database so that your notification lists are always up to date. (This saves the manual work of uploading.csv files via the web interface by taking your contact records directly from your database and synching them regularly with Regroup). We have a secure ftp to which your database will post automatically-generated.csv files with contact information. This method of uploading users requires minimal setup to create a scheduled script to send the data to Regroup. Our system automatically recognizes any new files that you post to the ftp; so it can be set up to synch as often as wanted, for example weekly. Single Sign-On (e.g. LDAP) Regroup can integrate with your directory's username and password system. For example, at they've chosen to enable LDAP via Regroup so that constituents can log in with their OCCC username and password. Voice System Integration Regroup can integrate with disparate phone systems to have one, integrated means of sending voice messages across a diverse set of contacts and systems. Digital Signage, Siren and Desktop Alert Integration Regroup can also integrate with outdoor or indoor digital signage, sirens, and computer desktop alerts. We can also integrate with other public alert systems.

26 Geo Targeting and Map Mode For clients who require the ability to target contact lists ad-hoc by address, rather than by pregrouping them in this way, we can offer a Map Mode. This allows the sender to circle an area on the Map that will correlate with address data for contacts, and include contacts in that area as recipients of the message. support@regroup.com - (775)

27 Customer Service Platform Integration Regroup has implemented integrations with customer service platforms such as Parature. This enables customer support representatives to text message customers from within the service platform. An example of this integration is under Regroup s Parature Integration on YouTube. support@regroup.com - (775)

28 ADDITIONAL PRODUCT SCREENSHOTS Example of User Preferences page: and Telephone - (775)

29 Examples of Reporting: - (775)

30 - (775)

31 - (775)

32 Regroup can be accessed via web-enabled tables and phones: - (775)

33 Messages can also be shown through an External Client Webpage: - (775)

34 Contacts can be defaulted into the groups, or can join themselves via the relevant website: Thank you for using Regroup! Please contact us anytime for assistance. - (775)

Regroup Design Blueprint

Regroup Design Blueprint Prepared by Dory Weiss, ITS Last Edited September 28, 2012 November 15, 2012 Regroup Design Blueprint Executive Summary The functionality to send Informational, Operational, and Official messages via the

More information

Presented by: Introduction

Presented by: Introduction Presented by: Introduction With the rapid pace in which technology is advancing, even Emergency Notification Systems (ENS) implemented a few years ago can quickly become outdated and lead to an ENS failure.

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and

Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and later User Guide Rev: 2013-02-01 Web Forms for Marketers 2.3 for Sitecore CMS 6.5 and later User Guide A practical guide to creating and managing web

More information

Magento Security and Vulnerabilities. Roman Stepanov

Magento Security and Vulnerabilities. Roman Stepanov Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

Bitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions

Bitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions Bitrix Site Manager 4.0 Quick Start Guide to Newsletters and Subscriptions Contents PREFACE...3 CONFIGURING THE MODULE...4 SETTING UP FOR MANUAL SENDING E-MAIL MESSAGES...6 Creating a newsletter...6 Providing

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services

More information

T his feature is add-on service available to Enterprise accounts.

T his feature is add-on service available to Enterprise accounts. SAML Single Sign-On T his feature is add-on service available to Enterprise accounts. Are you already using an Identity Provider (IdP) to manage logins and access to the various systems your users need

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

IBM Unica emessage Version 8 Release 6 February 13, 2015. User's Guide

IBM Unica emessage Version 8 Release 6 February 13, 2015. User's Guide IBM Unica emessage Version 8 Release 6 February 13, 2015 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 403. This edition applies to

More information

BCSD WebMail Documentation

BCSD WebMail Documentation BCSD WebMail Documentation Outlook Web Access is available to all BCSD account holders! Outlook Web Access provides Webbased access to your e-mail, your calendar, your contacts, and the global address

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

Gateway Apps - Security Summary SECURITY SUMMARY

Gateway Apps - Security Summary SECURITY SUMMARY Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

RingCentral Office. Basic Start Guide FOR USERS

RingCentral Office. Basic Start Guide FOR USERS RingCentral Office Basic Start Guide FOR USERS Contents 3 Getting Started 4 How to access your account 5 The Overview Page 6 Messages 7 Activity Log 8 Contacts 9 Settings 10 Tools 11 Do Not Disturb (DND)

More information

EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT

EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT PLATFORM PEOPLE STRATEGY EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT Contents p1 E-Newsletter Overview p2 E-Newsletter Sample p3 Forward Article p4 p5 p6 p7 Print Article Read More Subscription

More information

Chapter 10 Encryption Service

Chapter 10 Encryption Service Chapter 10 Encryption Service The Encryption Service feature works in tandem with Dell SonicWALL Email Security as a Software-as-a-Service (SaaS), which provides secure data mail delivery solutions. The

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

Dashboard Admin Guide

Dashboard Admin Guide MadCap Software Dashboard Admin Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

AWEBDESK LIVE CHAT SOFTWARE

AWEBDESK LIVE CHAT SOFTWARE AWEBDESK LIVE CHAT SOFTWARE Version 6.1.0 AwebDesk Softwares Administrator Guide Edition 1.2 January 2014 Page 1 TABLE OF CONTENTS Introduction.......... 4 Sign In as Admin...5 Admin Dashboard Overview.

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

Webmail User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header. Printing an Email. Composing a New Email

Webmail User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header. Printing an Email. Composing a New Email Webmail User Guide Rev: November, 2012 Webmail is supported in the following browsers: Windows Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox 3 Mac OSX Safari 2, Safari 3, Firefox 2,

More information

Webmail Instruction Guide

Webmail Instruction Guide Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with

More information

My LMS. Learning Management System Guide for Students

My LMS. Learning Management System Guide for Students My LMS Learning Management System Guide for Students Revision Date: October 17, 2014 Table of Contents Learning Management System (LMS) Overview... 2 Accessing My LMS... 2 General Navigation... 5 Your

More information

Okta/Dropbox Active Directory Integration Guide

Okta/Dropbox Active Directory Integration Guide Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for

More information

How To Set Up A Xerox Econcierge Powered By Xerx Account

How To Set Up A Xerox Econcierge Powered By Xerx Account Xerox econcierge Account Setup Guide Xerox econcierge Account Setup Guide The free Xerox econcierge service provides the quickest, easiest way for your customers to order printer supplies for all their

More information

Authentication and Single Sign On

Authentication and Single Sign On Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Parallels Plesk Control Panel

Parallels Plesk Control Panel Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,

More information

ABB solar inverters. User s manual ABB Remote monitoring portal

ABB solar inverters. User s manual ABB Remote monitoring portal ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904

More information

Bridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process

Bridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process USER MANUAL DATAMOTION SECUREMAIL SERVER Bridging People and Process APPLICATION VERSION 1.1 Bridging People and Process Bridging People and Process Bridging People and Process Published By: DataMotion,

More information

Installation and Configuration Manual

Installation and Configuration Manual Beacon Office Installation and Configuration Manual Version - 2.5(1) Radianta Inc. September 2008 Radianta, Inc. Beacon Office Page 2 Table of Contents Introduction... 4 What is Beacon Office... 4 How

More information

Smart Card Authentication. Administrator's Guide

Smart Card Authentication. Administrator's Guide Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5

More information

Workday Mobile Security FAQ

Workday Mobile Security FAQ Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy

More information

How To Use Saml 2.0 Single Sign On With Qualysguard

How To Use Saml 2.0 Single Sign On With Qualysguard QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,

More information

Sophos Mobile Control Installation guide

Sophos Mobile Control Installation guide Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Getting Started - The Control Panel

Getting Started - The Control Panel Table of Contents 1. Getting Started - the Control Panel Login Navigation Bar Domain Limits Domain User Account Properties Session Management 2. FTP Management Creating and Editing Users Accessing FTP

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Plesk for Windows Copyright Notice

Plesk for Windows Copyright Notice 2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Manage. Help Documentation. This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.

Manage. Help Documentation. This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Manage Email Users An email user account represents a person's

More information

Ipswitch Client Installation Guide

Ipswitch Client Installation Guide IPSWITCH TECHNICAL BRIEF Ipswitch Client Installation Guide In This Document Installing on a Single Computer... 1 Installing to Multiple End User Computers... 5 Silent Install... 5 Active Directory Group

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7 ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...

More information

Single Sign On for ShareFile with NetScaler. Deployment Guide

Single Sign On for ShareFile with NetScaler. Deployment Guide Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Web Application Security

Web Application Security Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching

More information

SECURE MESSAGING PLATFORM

SECURE MESSAGING PLATFORM SECURE MESSAGING PLATFORM WEB ADMIN CONSOLE ADMIN USER GUIDE Introduction... 2 Customer Management... 3 Dashboard... 3 User Account... 5 General & Feature Settings... 7 Secure Message Disclaimers... 9

More information

Copyright: WhosOnLocation Limited

Copyright: WhosOnLocation Limited How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and

More information

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Identity Implementation Guide

Identity Implementation Guide Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

System Configuration and Deployment Guide

System Configuration and Deployment Guide System Configuration and Deployment Guide This guide provides information on...... Configuring an Organization using the Organization Wizard... Setting a default Policy Suite using the Organization Wizard...

More information

RingCentral for Google. User Guide

RingCentral for Google. User Guide RingCentral for Google User Guide RingCentral for Google User Guide Contents 2 Contents Introduction............................................................... 4 About RingCentral for Google..........................................................

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

Service Provider Guide

Service Provider Guide Service Provider Guide For the latest version of this document please go to: http://www.exchangedefender.com/docs v 1.0 May 16,2011 Audience: Staff Table of Contents ExchangeDefender Overview 3 ExchangeDefender

More information

REDCap General Security Overview

REDCap General Security Overview REDCap General Security Overview Introduction REDCap is a web application for building and managing online surveys and databases, and thus proper security practices must instituted on the network and server(s)

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

GETTING STARTED CREATE A NEW EMAIL. 1 P age

GETTING STARTED CREATE A NEW EMAIL. 1 P age How To: Create an Email from a Template (One Time Custom Email & Recurring Custom Email) This documentation is designed to walk through the necessary steps to create a new One Time Custom Email and a Recurring

More information

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

Site Store Pro. INSTALLATION GUIDE WPCartPro Wordpress Plugin Version

Site Store Pro. INSTALLATION GUIDE WPCartPro Wordpress Plugin Version Site Store Pro INSTALLATION GUIDE WPCartPro Wordpress Plugin Version WPCARTPRO INTRODUCTION 2 SYSTEM REQUIREMENTS 4 DOWNLOAD YOUR WPCARTPRO VERSION 5 EXTRACT THE FOLDERS FROM THE ZIP FILE TO A DIRECTORY

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header. Using Webmail Technical Manual: User Guide The Webmail Window To save an attachment: 1. Click once on the attachment name. Or, if there are multiple attachments, click the Save icon to save all attachments

More information

MRED Guide to: Managing Your PREMIUM Goomzee Account

MRED Guide to: Managing Your PREMIUM Goomzee Account Goomzee- User s Guide MRED Guide to: Managing Your PREMIUM Goomzee Account Promote Your Properties In Minutes Goomzee is a comprehensive mobile marketing and lead generation system for real estate professionals.

More information

TIB 2.0 Administration Functions Overview

TIB 2.0 Administration Functions Overview TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR

More information

Web Hosting Getting Started Guide

Web Hosting Getting Started Guide Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload

More information

ADMINISTRATOR GUIDE VERSION

ADMINISTRATOR GUIDE VERSION ADMINISTRATOR GUIDE VERSION 4.0 2014 Copyright 2008 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical, for any purpose

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Secure Messaging Quick Reference Guide

Secure Messaging Quick Reference Guide Secure Messaging Quick Reference Guide Overview The SHARE Secure Messaging feature allows a SHARE registered user to securely send health information to another SHARE registered user. The Secure Messaging

More information

An Introduction to Box.com

An Introduction to Box.com An Introduction to Box.com Box is an online file sharing and cloud content management service and it provides features such as: Security controls Space Mobility Online collaboration Mobile access Version

More information

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not

More information

E21 Mobile Users Guide

E21 Mobile Users Guide E21 Mobile Users Guide E21 Mobile is the Mobile CRM companion to TGI s Enterprise 21 ERP software. Designed with the mobile sales force in mind, E21 Mobile provides real-time access to numerous functions

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies

More information

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods: ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

Connect 9.2 Notes + Documentation August 2010 1

Connect 9.2 Notes + Documentation August 2010 1 Connect 9.2 Notes + Documentation August 2010 1 Introduction Connect 9.2 offers a number of great tools to reduce the time necessary to manage a large community of users, including improved methods to

More information

Using Avaya Aura Messaging

Using Avaya Aura Messaging Using Avaya Aura Messaging Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting Started... 4 Messaging overview... 4 Prerequisites... 4 Accessing your mailbox from any phone... 4 Accessing the

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information