2013 Quest Software, Inc. ALL RIGHTS RESERVED.

Size: px
Start display at page:

Download "2013 Quest Software, Inc. ALL RIGHTS RESERVED."

Transcription

1 2.3 User Guide

2 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Quest Software, Inc. The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA legal@quest.com Refer to our Web site ( for regional and international office information. Patents Protected by U.S. Patent # 7,979,494 and 8,185,598. Additional patents pending. TRADEMARKS Quest, Quest Software, the Quest Software logo, Simplicity at Work are trademarks and registered trademarks of Quest Software, Inc. For a complete list of Quest Software's trademarks, please see Other trademarks and registered trademarks are property of their respective owners. InTrust for Syslog Version 2.3 Last updated February 21, 2013

3 Contents About This Guide... 4 Overview... 4 Conventions... 4 Introduction... 5 Why InTrust for Syslog?... 5 How It Works... 6 Working with InTrust for Syslog... 8 Installation Requirements... 8 Setting Up the Windows Part... 9 Initial Configuration of InTrust for Syslog... 9 Preparing Syslog Reconfiguring Solaris Syslog Reconfiguring Cisco Syslog Using InTrust for Syslog Manager Starting Quest InTrust for Syslog Manager Connecting to Another Computer Configuring the Quest InTrust for Syslog Service Setting Up the Quest InTrust for Syslog Service Properties Working with Chains Using the Syslog Knowledge Pack for InTrust Gathering Syslog Audit Data with InTrust Manager Viewing the Report in Quest Knowledge Portal Customizing Parsers Understanding Parsers Parser Programming Overview Generic Syslog Parser Appendix A: InTrust for Syslog Service Events Appendix B Appendix B-a: Message Facility Appendix B-b: Message Priority Appendix B-c: Message Logging Keywords and Levels (Cisco Routers) About Quest Software, Inc Contacting Quest Software Contacting Quest Support Third Party Contributions

4 About This Guide Overview This document explains how the Quest InTrust framework incorporates InTrust for Syslog and how to organize Syslog auditing and reporting. It is intended for InTrust administrators who work with Syslog audit data. Conventions In order to help you get the most out of this guide, we have used specific formatting conventions. These conventions apply to procedures, icons, keystrokes and crossreferences. ELEMENT Select Bolded text Italic text Bold Italic text Blue text CONVENTION This word refers to actions such as choosing or highlighting various interface elements, such as files and radio buttons. Interface elements that appear in Quest products, such as menus and commands. Used for comments. Introduces a series of procedures. Indicates a cross-reference. When viewed in Adobe Acrobat, this format can be used as a hyperlink. Used to highlight additional information pertinent to the process being described. Used to provide Best Practice information. A best practice details the recommended course of action for the best result. Used to highlight processes that should be performed with care. + A plus sign between two keystrokes means that you must press them at the same time. A pipe sign between elements means that you must select the elements in that particular sequence. 4

5 Introduction Why InTrust for Syslog? How It Works Why InTrust for Syslog? In a heterogeneous environment where InTrust is deployed, auditing and real-time monitoring capabilities are provided for Syslog. This is ensured by installing InTrust agents on audited computers. However, it is not always possible to install an agent on a Syslogenabled host or device for the following reasons: The agent package is not available for the platform. The platform is supported, but installation of the agent on the host is not approved. For example, there are no agent packages for Cisco routers, which use Syslog for auditing. On the other hand, the environment may have Solaris hosts running businesscritical services, and policies may prohibit installation of software such as the InTrust agent on those hosts. In these situations, two courses of action are possible: 1. Redirect Syslog messages from an agentless system to a Syslog-enabled host that has an InTrust agent. 2. Capture Syslog messages with the InTrust for Syslog solution. Regular redirection of messages among hosts is a proven method that requires only configuration changes. Using InTrust for Syslog also involves message redirection, but the target is not a true Syslog daemon. The InTrust for Syslog service is at the receiving end, running on a Windows computer and acting as a Syslog proxy. Incoming messages are converted to Windows events. The following table helps compare the two methods: METHOD PROS CONS Regular redirection of messages Production-proven Does not require additional software or hardware Uses message parsing, which brings additional load on the InTrust agent 5

6 METHOD PROS CONS InTrust for Syslog Better method for InTrust auditing and real-time monitoring Provides the advantages of event logs Requires a dedicated Windows computer for best results. How It Works The InTrust for Syslog Service receives Syslog messages forwarded to it, converts them to Windows events and writes them to the InTrust for Syslog event log locally. The resulting log can be processed by InTrust similarly to any other Windows event log: you can gather InTrust for Syslog events, monitor them in real time and make reports on them. The InTrust for Syslog solution is made up of two components: 1. InTrust for Syslog Service This service accepts forwarded Syslog messages, runs them through parsers and writes the result into the InTrust for Syslog event log. 2. InTrust for Syslog Manager This is an MMC snap-in that controls InTrust for Syslog activity. For best performance, install the InTrust for Syslog Service on a dedicated Windows computer. Deploy an InTrust agent on this computer to enable audit data gathering and real-time monitoring. For gathering, an agent is not a requirement InTrust also supports collections of audit data from Windows computers without agents. However, using agents is the recommended method with additional benefits, and agentless gathering will not be considered in this document. For real-time monitoring, agents are required. The InTrust for Syslog Manager snap-in can be installed on any Windows computer that can connect to the InTrust for Syslog Service. Installing it alongside the InTrust Manager snap-in helps control both InTrust for Syslog operation and the processing of InTrust for Syslog events. The following figure shows how InTrust for Syslog components fit into the InTrust framework: 6

7 7

8 Working with InTrust for Syslog Installation Requirements Setting Up the Windows Part Preparing Syslog Using InTrust for Syslog Manager Using the Syslog Knowledge Pack for InTrust Installation Requirements InTrust for Syslog Service PLATFORM OPERATING SYSTEM MEMORY HARD DISK SPACE Intel x86, EM64T Any of the following: Microsoft Windows NT 4.0 Service Pack 6 or higher Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 Min. 64Mbytes (128Mbytes recommended) Min. 4 Mbytes Quest InTrust for Syslog Manager PLATFORM OPERATING SYSTEM Intel x86, EM64T Any of the following: Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 8

9 MEMORY HARD DISK SPACE Min. 64Mbytes (128 Mbytes recommended) Min. 2 Mbytes InTrust for Syslog setup requires Windows Installer 2.0. Earlier versions of Windows Installer are automatically upgraded during installation, so you may have to reboot your computer after the installation is finished. Setting Up the Windows Part Installing the InTrust for Syslog Service and the InTrust for Syslog Manager console is the first step in InTrust for Syslog deployment. This is followed by configuring your Syslogenabled systems to forward messages to InTrust for Syslog. Run the installation program and select the component you want to install: InTrust for Syslog Service, InTrust for Syslog Manager, or both. To upgrade InTrust for Syslog, simply launch the installation program. If you are upgrading from EventAdmin Syslog Proxy 1.0 and install only InTrust for Syslog Manager, all your EventAdmin Syslog Proxy Service settings and parser chains will be lost. To avoid this, upgrade the EventAdmin Syslog Proxy Service as well. Initial Configuration of InTrust for Syslog After you have installed InTrust for Syslog Manager, start it by clicking Start Programs Quest Software InTrust for Syslog. When the program starts, it first checks if the InTrust for Syslog Service is installed locally. If not, connect to the computer where the service is installed by right-clicking the Quest InTrust for Syslog node in the left pane and selecting Connect to another computer. If use InTrust for Syslog Manager to connect to a remote InTrust for Syslog Service, and save the MMC settings, the next time you run InTrust for Syslog Manager it tries to reestablish the connection. This may take some time, especially if the connection attempts fail (for example, the remote computer is offline). Setting Up the Working Account The InTrust for Syslog Service runs under the LOCAL SYSTEM account by default. In most cases, this is optimal. However, if you want to use a different account for the service, you can change it in InTrust for Syslog Manager. To change the working account 1. In InTrust for Syslog Manager, connect to the InTrust for Syslog Service. 2. Right-click the Quest InTrust for Syslog node in the left pane and select Configure Service. 3. In the dialog box that opens, click Modify. 9

10 For the account changes to take effect, restart the service using the Stop and Start buttons. Troubleshooting DCOM Security If you have problems connecting to the InTrust for Syslog Service, check your DCOM application permissions with the dcomcnfg utility. DCOM application permissions must always be configured for remote connections to the InTrust for Syslog Service. Changing permissions requires stopping Quest InTrust for Syslog Service and closing all Quest InTrust for Syslog consoles. Permissions Required for the User Account DCOM APPLICATION LAUNCH PERMISSION ACCESS PERMISSION WHERE TO SET Quest Unsecured Apartment Windows 2000: Allow launch Windows Server 2003, 2008, or Windows XP: Allow local launch No configuration necessary Computer with InTrust for Syslog Manager Quest InTrust for Syslog Configuration Windows 2000: Allow launch Windows Server 2003, 2008, or Windows XP: Allow local launch Windows 2000: Allow access Windows Server 2003, 2008, or Windows XP: Allow local access Computer with InTrust for Syslog Service Aelita ICC Library No configuration necessary Windows 2000: Allow access Windows Server 2003, 2008, or Windows XP: Allow local access Computer with InTrust for Syslog Service To configure DCOM application properties 1. Run dcomcnfg.exe: In Windows Server 2003, 2008, or Windows XP, the Component Services snap-in opens. Select the Component Services Computers My Computer DCOM Config node. In Windows 2000, the Distributed COM Configuration Properties dialog box opens. 2. Select the DCOM application you need and open its properties. 3. On the Security tab, configure launch and access permissions as required. To edit permissions, select Use custom access permissions (in Windows 2000) or Customize (in Windows Server 2003, 2008, or Windows XP) and click Edit. For details about how to manage InTrust for Syslog, see the Using InTrust for Syslog Manager section further in this document. 10

11 Preparing Syslog To make your Syslog-enabled hosts redirect messages to InTrust for Syslog, edit their local Syslog configuration files. The procedure varies from platform to platform, but this section describes two common scenarios: Reconfiguring Solaris Syslog Reconfiguring Cisco Syslog You should have no difficulty adapting them to your particular Syslog-enabled systems. Reconfiguring Solaris Syslog By default, Solaris servers log all messages locally. To specify a different location for syslog messages to be sent to, edit the syslog.conf file found in the /etc directory. The following is an example of a syslog.conf file: ################################################ # Syslog configuration file. # *.err;kern.notice;auth.notice /dev/console *.err;kern.debug;daemon.notice;mail.crit /var/adm/messages *.alert;kern.err;daemon.err operator *.alert root ################################################ In line 5 of the example all errors, kernel debug, all daemon notices and critical mail server information are written to the messages file in /var/adm/. To specify a different location for the syslog messages, replace /var/adm/messages Here is an example: - OR - To specify the types of messages to be sent to the remote host, tell the server what facility (Appendix B-a) to log and the priority of the message to log (Appendix B-b). The previous example will log to remote the following: All error messages from any facility (*.err) All Kernel debug messages (kern.debug) and anything more severe than debug, which is everything Daemon notices and anything more severe than notice (daemon.notice) Critical mail server messages (mail.crit), which also encompass ALERT and EMERG You can also specify to log just the critical mail messages by typing mail.=crit. 11

12 As a security measure, avoid sending AUTHPRIV information to a remote host. You can disable this by specifying authpriv.none in the syslog.conf file as follows: After modifying the syslog.conf file, you should have the syslogd daemon re-read the configuration, by supplying the following command: kill -HUP `cat /etc/syslog.pid` Only root can perform this command. Backquotes must be used. If the changes didn t take effect, reboot the host. Reconfiguring Cisco Syslog 1. Telnet to the router or connect via the console and enter enable mode. 2. Enter the following commands from the enable prompt on the router: config t[erminal] logging on logging Facility Local7 Or any other facility that syslogd is listening to. Some versions of Cisco IOS require the following command to produce the same results: logging Facility Local20. Local7 is the default. logging trap [Level0 Level7] Level 7 will log all events including debug. It is recommended that you use level 6 or lower. logging [IP Address or Hostname running InTrust for Syslog Service] The logging level will determine what types of events are logged by InTrust for Syslog. This is similar to the UNIX Syslog, but numbers are used instead of keywords. For example, if you specify Logging trap 3, all errors, critical, alerts and emergencies will be logged. Cisco Catalyst switches use the same method to enable logging but each line is preceded by the SET command. Cisco concentrators have a web interface to configure and enable remote logging. Using InTrust for Syslog Manager Starting Quest InTrust for Syslog Manager Connecting to Another Computer Configuring the Quest InTrust for Syslog Service Setting Up the Quest InTrust for Syslog Service Properties Working with Chains 12

13 Starting Quest InTrust for Syslog Manager To start Quest InTrust for Syslog manager, click Start Quest Software InTrust for Syslog. The main window will appear. If you do not have the Quest InTrust for Syslog service running locally on the computer where you start the manager, you should either install and start the service on your current computer or connect to another machine running this service. For more information, refer to the related topics. Connecting to Another Computer To connect to another computer, right-click the Quest InTrust for Syslog node, and select Connect to another computer. 13

14 The Select Computer dialog box is displayed. Select the computer you want to connect to, and click OK when ready. Connecting to the Quest InTrust for Syslog service on the remote computers requires administrative rights. Configuring the Quest InTrust for Syslog Service You can configure the Quest InTrust for Syslog Service by launching Services from the Control Panel. 14

15 It is better, however, to access the service configuration directly from Quest InTrust for Syslog Manager. For that, right-click the Quest InTrust for Syslog node, and select Configure Service. The Configure Service dialog box is displayed. In this dialog box, only the essential configuration options for the Quest InTrust for Syslog Service are available, rather than all the configuration options Windows Service Properties dialog box. The Reload Configuration button is added to the standard options. It lets you apply the changes immediately. You can: Start, Stop, Pause or Resume the execution of the service. Use the Modify button to specify the user account to run the service. 15

16 Connecting to the Quest InTrust for Syslog Service on remote computers requires administrative rights. By default, the Quest InTrust for Syslog Service runs under the LocalSystem account. If you want to change this, launch the Configure Service dialog box, click Modify, and enter the new user name and password. The supplied account is immediately validated. If validation fails, you are prompted for credentials again. For the account changes to take effect, restart the service using the Stop and Start buttons. Setting Up the Quest InTrust for Syslog Service Properties To access the Quest InTrust for Syslog Service properties: Select the desired snap-in in the left pane of the console window. Click on the toolbar. You can also right-click the selected snap-in to bring up the shortcut menu and select Properties. In the Port # field you can specify the number of the port that the Quest InTrust for Syslog Service will listen to. By default, UDP port 514 is used. The Maximum buffer size option lets you specify the size of the buffer in which to keep the incoming Syslog messages. You also have to specify what should be done when the maximum buffer size is reached. Select the Overwrite as needed option to overwrite messages when the buffer is full. Select the Drop messages option to discard the incoming messages which do not fit into the buffer. 16

17 Working with Chains Chains help you quickly process Syslog messages by filtering out irrelevant addresses and organizing parser hierarchy. In other words, a chain determines which parsers to apply on which sources. Creating a New Chain To create a new chain, right-click the Quest InTrust for Syslog node and select New Chain. A new chain is created with the default name. Renaming a Chain You can rename a chain, if necessary. Select the chain you want to rename. Press the F2 key Enter the new name. You can also right-click the selected chain and select Rename. Duplicate names are not allowed. If a duplicate name is supplied, you will be prompted accordingly. It is a good idea to supply meaningful names and useful descriptions for your chains. Deleting a Chain Select the chain you want to delete. Press the DELETE key or click on the toolbar. You can also right-click the selected chain and select Delete. 17

18 Copying a Chain Select the chain you want to copy. Copy the chain to the clipboard. Paste the chain where you want. Using the Cut menu command instead of Copy allows you to remove the chain from the selected snap-in and place it to the Clipboard. Setting Up Chain Properties To access the properties of a chain, right-click the chain and select Properties. The properties dialog box opens; this dialog box has two tabs: General The General tab lets you supply a descriptive name for your chain and an optional description. You can also specify whether the Quest InTrust for Syslog Service should consider the selected chain when processing Syslog messages. When the Enabled check box is selected, the chain is active, and its parsers are applied to process Syslog messages. To temporarily bypass a chain, clear this option. Though a parser can process messages for all addresses, it is much quicker to filter out irrelevant sources at the chain level. 18

19 To do this, enable the Filter Addresses option. You can either Include or Exclude specific computers from which Syslog messages can arrive. Use the Add, Remove, and Edit buttons to work with the address filter. In place of computer names, you can supply IP addresses as well. Parsing The configuration options presented on this tab let you specify which parsers should be applied and how to invoke them. The Parsers, in order of use list displays all active parsers, which are activated one by one in the order defined here. To change the precedence, click the and buttons. You can add as many parsers as you want. Click New to display the Add Syslog Parser dialog box where you can supply a valid CLSID or a ProgID. Note that a parser must be registered as a COM object. To learn how to implement, register and unregister your own parsers, refer to the Customizing Parsers chapter. You can also click Browse to display the list of registered parsers so that you can choose the parser you want. Use Edit and Remove to change the selected parser CLSID or remove the selected parser from the list. 19

20 Using the Syslog Knowledge Pack for InTrust The Syslog Knowledge Pack for InTrust contains objects for working with audit data collected by InTrust for Syslog. After installation, the necessary objects are available in InTrust Manager. These objects let you do the following: Configure auditing and reporting workflows Monitor activity that goes into Syslog in real-time InTrust Objects in the Knowledge Pack The Knowledge Pack provides the following objects: InTrust for Syslog Log data source All ITFS hosts in the domain site All Syslog events gathering policy All Syslog events import policy Syslog: Scheduled log gathering task, containing a gathering job Report Pack The InTrust for Syslog report pack includes only the All Syslog Events report. After you have completed the InTrust installation, download the report pack from the Quest Software Web site at and install this report pack. Then the InTrust for Syslog reports appears in the new InTrust InTrust for Servers and Applications Syslog report set in Knowledge Portal. Gathering Syslog Audit Data with InTrust Manager The Syslog: Scheduled log gathering task is pre-configured for to collect Syslog data. You can use this task directly by configuring its schedule. However, it is recommended that you use a copy of this task. This gives you a configuration reference in case you inadvertently make undesirable changes to the task, and allows Quest to overwrite the object during upgrade in case the update to the object is needed. To configure gathering 1. Create a copy of the Syslog: Scheduled log gathering task. 2. Set the schedule for the new task as necessary, and enable the schedule. 3. If necessary, create a reporting job within the task and include the All Syslog Events report in it. For details about working with reporting jobs, see the InTrust User Guide. 4. Optionally, add a notification job that informs you of task completion. Detailed instructions on these steps follow: To schedule and activate the task 1. Open the properties of the task. 2. In the properties dialog box, click Modify. 20

21 3. In the dialog box that appears, change the schedule of the task. 4. Select Schedule enabled. 5. Click the Commit button on the InTrust Manager toolbar. To add a notification job InTrust for Syslog User Guide 1. With the task selected in the treeview, click in the right pane and select New Job. 2. In the New Job Wizard, select Notification on the Job Type step. 3. Complete the wizard. 4. Click the reporting job and drag a line from it to your new notification job. Alternatively, right-click your new job, select Dependencies and move the reporting job to the list of parent jobs. This makes the notification job start after the reporting job has completed. Now your report storage will contain a detailed report prepared automatically on schedule. Viewing the Report in Quest Knowledge Portal Check that the InTrust for Syslog report pack is installed. To make up the InTrust for Syslog report using Knowledge Portal, perform the following: 1. Click the Reports tab in the left tabbed pane in the Knowledge Portal console and select the InTrust InTrust for Servers and Applications Syslog report set. 2. Select the report you need from the treeview and configure the report setting in the right pane. 3. Then click the View Report option. For detailed information, see the InTrust Installation and Configuration Guide and Quest Knowledge Portal documentation. 21

22 Customizing Parsers Understanding Parsers Parser Programming Overview Generic Syslog Parser Understanding Parsers In InTrust for Syslog, parsers are building blocks of chains. They are found in the properties of chains on the Parsing tab. Outside the InTrust for Syslog Manager snap-in, they exist as COM objects registered with the system. A parser is where the InTrust for Syslog Service message processing functionality is implemented. Each parser defines what operations will be executed when a Syslog message is received. Typically, such operations include some analysis of the message contents and one or more sets of further message processing instructions. A specific set of operations that will be executed when a Syslog message arrives may depend on the contents of this specific message. That is, the function of a parser is to analyze the contents of the received message and possibly take specific actions based on the results. In complex heterogeneous environments, the messages that come from completely different systems are likely to contain different data that is sent in different formats and requires different actions upon receipt. To provide maximum flexibility in such environments, parsers are combined into ordered processing chains. For each individual chain, filters may be defined so that the chain is applied only to the messages received from specific source computers or devices on the network. A chain itself defines which parsers in what order will be used to process the Syslog messages that the chain receives. Each parser informs the InTrust for Syslog Service if the execution of the next parser in the chain is required for the current Syslog message or if no further processing is required. Clearly, the InTrust for Syslog Service cannot be designed to be aware of the Syslog messaging specifics in all environments. Instead, it knows how to pass the message to a parser, no matter which one is used. To provide for this, all parsers are designed as COM objects that provide a unified interface to the service. That is, once the parser COM object is properly registered in your system, your InTrust for Syslog Service can use it to process the Syslog messages, no matter what functionality is implemented in its code. The parsers that come with InTrust for Syslog are implemented as Windows Script Components using VBScript or JScript as the programming language. You can find these parsers in the Parsers subfolder of the InTrust for Syslog installation folder. If you are going to write your own parsers to handle some Syslog messages in a way that best 22

23 meets the specific needs of your IT system, you can do it in any programming language, interpreted or compiled, that supports COM programming. For details, see the following sections. Parser Programming Overview A parser COM object designed for use with the InTrust for Syslog Service can be implemented in any language suitable for COM programming. The COM object must be designed to support the following interface: [ uuid(64b13612-cb14-40c1-97fb-283d3bd30a1d), helpstring("dsyslogmessageparser Interface") ] dispinterface DSyslogMessageParser { properties: methods: [id(1), helpstring("parses syslog message")] ParseResult Parse( [in] BSTR message, [in] BSTR messagetime, [in] BSTR messagehost, [in] ISyslogServiceObject* psyslogserviceobject ); } The following data type is defined for the returned value: [ uuid(64b13614-cb14-40c1-97fb-283d3bd30a1d), helpstring("syslog message parsing result") ] typedef enum ParseResult { StopMessageParsing = 0, ContinueMessageParsing = 1 } ParseResult; In programming languages that do not support enumerated data types, the variables StopMessageParsing and ContinueMessageParsing of the short data type must be returned, with the value of 0 and 1 respectively assigned in the parser code. Below is a sample parser implemented in VBScript that illustrates the basics of writing InTrust for Syslog parsers. The code is commented so that you can better understand the parser implementation. Everything in bold must be replaced with actual data that is valid for your specific parser. <?xml version="1.0"?> <package> <component> <registration > progid="<syslog Parser ProgID>" classid="{<syslog Parser CLSID>}" version="<syslog Parser Version>" description="<syslog Parser Description>" remotable="true" 23

10.6. Auditing and Monitoring Quest ActiveRoles Server

10.6. Auditing and Monitoring Quest ActiveRoles Server 10.6 Auditing and Monitoring Quest ActiveRoles Server 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

Quick Connect Express for Active Directory

Quick Connect Express for Active Directory Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

7.5 7.5. Spotlight on Messaging. Evaluator s Guide

7.5 7.5. Spotlight on Messaging. Evaluator s Guide 7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Quest ChangeAuditor 4.8

Quest ChangeAuditor 4.8 Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide

More information

ChangeAuditor 6.0. Web Client User Guide

ChangeAuditor 6.0. Web Client User Guide ChangeAuditor 6.0 Web Client User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

DATA GOVERNANCE EDITION

DATA GOVERNANCE EDITION Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

8.7. Target Exchange 2010 Environment Preparation

8.7. Target Exchange 2010 Environment Preparation 8.7 Target Exchange 2010 Environment Preparation 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Quick Connect for Cloud Services

Quick Connect for Cloud Services Quick Connect for Cloud Services Version 3.5 Administrator Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide Foglight 1.0.0.0 Cartridge for Active Directory Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel l 10.3 1.0 Auditing Installation and and Monitoring Configuration Microsoft Guide IIS How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel 2010 Quest Software, Inc. ALL RIGHTS

More information

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Web Portal Installation Guide 5.0

Web Portal Installation Guide 5.0 Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

ActiveRoles 6.8. Web Interface User Guide

ActiveRoles 6.8. Web Interface User Guide ActiveRoles 6.8 Web Interface User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Enterprise Single Sign-On 8.0.3

Enterprise Single Sign-On 8.0.3 For Internal Use Only Enterprise Single Sign-On 8.0.3 Additional Dedicated Server Instance Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary

More information

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

6.7. Quick Start Guide

6.7. Quick Start Guide 6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel l 10.3 1.0 Installation Auditing and Configuration Microsoft ISA Server Guide How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel 2010 Quest Software, Inc. ALL RIGHTS RESERVED.

More information

Foglight. Managing Hyper-V Systems User and Reference Guide

Foglight. Managing Hyper-V Systems User and Reference Guide Foglight Managing Hyper-V Systems User and Reference Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,

More information

Dell InTrust 11.0. Real-Time Monitoring Guide

Dell InTrust 11.0. Real-Time Monitoring Guide Dell InTrust 11.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

Built-in Plug-ins User s Guide

Built-in Plug-ins User s Guide Quest NetVault Backup version 9.1 Built-in Plug-ins User s Guide Version: Product Number: NVG-129-9.1-EN-01 NVG-129-9.1-EN-01 05/10/13 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Troubleshooting Guide 5.1. Quest Workspace ChangeBASE

Troubleshooting Guide 5.1. Quest Workspace ChangeBASE Troubleshooting Guide 5.1 Quest Workspace ChangeBASE [Type text] 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

2011 Quest Software, Inc. ALL RIGHTS RESERVED.

2011 Quest Software, Inc. ALL RIGHTS RESERVED. 8.7 User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under a software

More information

Foglight. Dashboard Support Guide

Foglight. Dashboard Support Guide Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Quest Collaboration Services 3.6.1. How it Works Guide

Quest Collaboration Services 3.6.1. How it Works Guide Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide

Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Dedicated Directory Replication Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains

More information

8.10. Required Ports

8.10. Required Ports 8.10 Required Ports 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Quest Collaboration Services 3.5. How it Works Guide

Quest Collaboration Services 3.5. How it Works Guide Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide Foglight for Oracle Managing Oracle Database Systems Getting Started Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.5.2 Managing SQL Server Database Systems Getting Started Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

New Features and Enhancements

New Features and Enhancements Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements

More information

Dell Client Profile Updating Utility 5.5.6

Dell Client Profile Updating Utility 5.5.6 Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System

More information

Dell Spotlight on Active Directory 6.8.4. Deployment Guide

Dell Spotlight on Active Directory 6.8.4. Deployment Guide Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

ActiveRoles 6.9. Quick Start Guide

ActiveRoles 6.9. Quick Start Guide ActiveRoles 6.9 Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell NetVault Backup Plug-in for SQL Server 6.1

Dell NetVault Backup Plug-in for SQL Server 6.1 Dell NetVault Backup Plug-in for SQL Server 6.1 April 2014 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Enhancements Resolved issues Known

More information

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide Foglight Foglight for Virtualization, Enterprise Edition 7.2 Virtual Appliance Installation and Setup Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected

More information

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Dell NetVault Backup Plug-in for SQL Server 10.0.1

Dell NetVault Backup Plug-in for SQL Server 10.0.1 Dell NetVault Backup Plug-in for SQL Server 10.0.1, Revision 1 February 2015 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Dell NetVault Backup

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Foglight 5.5.5. Managing Microsoft Active Directory Installation Guide

Foglight 5.5.5. Managing Microsoft Active Directory Installation Guide Foglight 5.5.5 Managing Microsoft Active Directory 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell Recovery Manager for Active Directory 8.6.0

Dell Recovery Manager for Active Directory 8.6.0 Dell Recovery Manager for Active Directory 8.6.0 April, 2014 These release notes provide information about the Recovery Manager for Active Directory release. About Recovery Manager for Active Directory

More information

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide Dell NetVault Backup Plug-in for 1.3 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

ActiveRoles 6.9. Replication: Best Practices and Troubleshooting

ActiveRoles 6.9. Replication: Best Practices and Troubleshooting ActiveRoles 6.9 Replication: Best Practices and Troubleshooting 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

formerly Help Desk Authority 9.1.3 HDAccess User Manual

formerly Help Desk Authority 9.1.3 HDAccess User Manual formerly Help Desk Authority 9.1.3 HDAccess User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA

More information

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Big Brother Professional Edition Windows Client Getting Started Guide. Version 4.60

Big Brother Professional Edition Windows Client Getting Started Guide. Version 4.60 Big Brother Professional Edition Windows Client Getting Started Guide Version 4.60 Copyright Quest Software, Inc. 2002 2011. All rights reserved. This guide contains proprietary information, which is protected

More information

2011 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS DISCLAIMER

2011 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS DISCLAIMER 8.8 Upgrade Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under a software

More information

NetVault LiteSpeed for SQL Server version 7.5.0. Integration with TSM

NetVault LiteSpeed for SQL Server version 7.5.0. Integration with TSM NetVault LiteSpeed for SQL Server version 7.5.0 Integration with TSM 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

System Requirements and Platform Support Guide

System Requirements and Platform Support Guide Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Dell Recovery Manager for Active Directory 8.6.3

Dell Recovery Manager for Active Directory 8.6.3 Dell Recovery Manager for Active Directory 8.6.3 May 15, 2015 These release notes provide information about the Dell Recovery Manager for Active Directory release. Resolved Issues Known Issues System Requirements

More information

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Quest vworkspace Virtual Desktop Extensions for Linux

Quest vworkspace Virtual Desktop Extensions for Linux Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.

More information

6.9. Administrator Guide

6.9. Administrator Guide 6.9 Administrator Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Network Monitoring. SAN Discovery and Topology Mapping. Device Discovery. Topology Mapping. Send documentation comments to mdsfeedback-doc@cisco.com.

Network Monitoring. SAN Discovery and Topology Mapping. Device Discovery. Topology Mapping. Send documentation comments to mdsfeedback-doc@cisco.com. 32 CHAPTER The primary purpose of Fabric Manager is to manage the network. In particular, SAN discovery and network monitoring are two of its key network management capabilities. This chapter contains

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell One Identity Quick Connect for Cloud Services 3.6.0

Dell One Identity Quick Connect for Cloud Services 3.6.0 Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

Introduction to Version Control in

Introduction to Version Control in Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any

More information

System Message Logging

System Message Logging System Message Logging This module describes how to configure system message logging on your wireless device in the following sections: Understanding System Message Logging, page 1 Configuring System Message

More information

8.0. Quick Start Guide

8.0. Quick Start Guide 8.0 Quick Start Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Dell InTrust 11.0 Best Practices Report Pack

Dell InTrust 11.0 Best Practices Report Pack Complete Product Name with Trademarks Version Dell InTrust 11.0 Best Practices Report Pack November 2014 Contents About this Document Auditing Domain Controllers Auditing Exchange Servers Auditing File

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

6.7. Replication: Best Practices and Troubleshooting

6.7. Replication: Best Practices and Troubleshooting 6.7 Replication: Best Practices and Troubleshooting 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

Desktop Authority vs. Group Policy Preferences

Desktop Authority vs. Group Policy Preferences Desktop Authority vs. Group Policy Preferences A Comparison of Desktop Lifecycle Management Features Introduction Group Policy Preferences In Windows Server 2008 and Windows Vista Service Pack 1, Microsoft

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Tracking Network Changes Using Change Audit

Tracking Network Changes Using Change Audit CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and

More information

Enterprise Reporter Report Library

Enterprise Reporter Report Library Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports

More information