Knowledge Base Articles

Size: px
Start display at page:

Download "Knowledge Base Articles"

Transcription

1 Knowledge Base Articles 2005 Jalasoft Corp. All rights reserved. TITLE: How to configure and use the Jalasoft Xian Syslog Server. REVISION: Revision : B001-SLR01 Date : 11/30/05 DESCRIPTION: Jalasoft has released Service Pack 2 for Xian Network Manager, which includes the Jalasoft Xian Syslog Server that receives and filters all the syslog messages generated by managed network devices and UNIX Servers. This new feature increases the functionality and monitoring power of Xian Network Manager by allowing it to asynchronously monitor devices and servers. A syslog message is a log message sent from certain device or machine to a syslog server. This message includes the facility or logical location of the log message, the severity level and the message itself. Please refer to the RFC 3164 documentation for more information. The Jalasoft Xian Syslog Server will receive all these syslog messages and after filtering them, it will immediately send the appropriate event messages to MOM. CONFIGURATION: There are 2 steps to follow in order to setup the Xian Syslog server: - Enable the Xian Syslog Server to receive the syslog messages. - Configure the managed network devices and UNIX servers to send their syslog messages to the Jalasoft Syslog Server. Enabling the Xian Syslog Server: The Syslog Server is part of the NSS service and it is disabled by default, so it is necessary to enable it and then configure its settings. Please follow these steps: 1. Open the Xian console. 2. Click on the Xian Servers tab located on the upper left tree window: 1

2 3. Access the Network Scan Server properties by double clicking on the server or by right clicking on it and then clicking on the Properties contextual menu option: You should view this properties window: 2

3 4. Click on the Syslog Server tab. You should see a properties window similar to the following one: 3

4 Please notice that the Server state is disabled. 5. Configure the UDP port that the server will use and then click on the Apply button 6. Click on the Syslog severities to Xian severities mapping button. 4

5 Configure the level of severity of the Xian events associated to the syslog message severities. In other words, you should configure the severity level that the Xian event should display in MOM when a syslog message with a certain severity level is processed. Click on the OK button after configuring these settings. 7. Once the port and the severities mapping is configured, click on the Enable button. You will see that the Syslog server goes to the Running status after a few seconds: If for some reason (i.e., ports already used, services not running properly or not enough permissions) the service can not be enabled, then the view last error button will be enabled. If you click on it, a window will be displayed indicating the error and the status of the server will remain in a disabled state. Configuring the Network Devices and UNIX Servers to send syslog messages to the Xian Syslog Server: Any network device or UNIX server that can send syslog messages can be configured to send this information to a syslog server. You should enable this service, configure the IP address of the server and configure also the message severities. For example if you would like to configure a Linux Syslog client, you should follow these steps: 5

6 - Add a new entry in the /etc/hosts file with the Syslog server information: <IP address> <fully qualified domain name> <host name> <nickname> For example: XianUser.DevLab.com XianUser loghost - Add this entry to your etc/syslog.conf file with the nickname given on the previous step: For example: - Restart the syslog Please review your device and server documentation for the necessary steps in order to send the syslog messages to the Xian Syslog Server. WORKING WITH THE SYSLOG MESSAGE FILTERS: Once you have the Xian Syslog Server, all the devices and UNIX servers enabled and have configured them to send their syslog messages to the Syslog Server, the next step is to add the filters that the Xian Syslog Server will apply to the arriving syslog messages in order to filter the desired messages and discard the undesired ones. Please note that there are 2 types of filters: - User defined filters. - Predefined syslog filters for Linux and Solaris servers. Adding and Configuring a User Defined Filter: For adding a new user defined filter, please follow these steps (in the example we will use a Linux Server): 1. Open the Xian console and click on the Syslog message filters tab. 2. Right click on the Syslog messages filters working area and click on the Add contextual menu option: 6

7 The following window will be displayed: 3. Enter a name for the filter or use the default one suggested. 4. Select the action that the filter will perform when a syslog message that matches this filter arrives: o The Accept action will receive and process a syslog message that matches the filter and raises an event in MOM. 7

8 o The Reject action will discard any syslog message that matches this filter. 5. Enter an Event number: this number will be used by MOM to identify this event with predefined rules in the Xian plug-in SMP, or use custom rules to create alerts based on the event and then associate them to the appropriate KB Article. 6. Enter the Event source: in a similar way to the Event number, this field will be used by MOM to associate the event to some predefined or user rule that will associate the event to a KB Article. Please note that there are some reserved words used by Xian predefined filters and an error message like the following will be displayed if you try to use some of them: 7. Enter the Description for the filter. This field is not mandatory but will give you an idea of the filter and its purpose. 8. The next step is to configure the filtering of the severity levels of the messages and which severity levels will be considered and which ones will be discarded. To configure this feature, select the Severity check box and then select the severity levels for the filter. Please notice that if you click the Select All button, all the severity options will be selected as shown on the next figure: 8

9 9. The following step consists of selecting the syslog messages which will be filtered by contents. To do this, you will have to check the Contents check box and enter a valid regular expression that will be applied to the contents of the syslog message so that the filter will process all the messages that match this criteria only. If no regular expression was provided for this field, the following error message will be displayed when pressing the OK button: 10. The last step consists of configuring the devices or device groups that the filter will be applied to. You can select all the devices that belong to certain categories (e.g. Cisco switches) or select a specific discovered device or server only. To configure this setting, click on the Devices tab and click on the device category or expand certain categories for a list of discovered devices from a particular category and select the desired device or server. In the following figure, we are selecting the Linux Server category so that the syslog messages from the current device and the ones from the Linux servers, which will be added later, will be processed by this filter. 9

10 Please note that you can select several categories or devices to which this filter will be applied. You can select a specific device or server without having to select its category, if the filter will only monitor this particular machine. Finally, if you do not select any device or category, the following error message will be displayed when pressing the OK button: 11. Click on the OK button after finishing the configuration of this filter and the filter will be added to the list of filters that is displayed on the Syslog message filters tab on the Xian console main window. Now when a new syslog message that meets the filter criteria arrives, Xian will send an event to MOM containing the number, source and message description. Adding and Configuring a Predefined Syslog Filter for a Linux and/or Solaris Server: 10

11 The other types of filters that Xian Network Manager 2005 includes are the Linux and Solaris servers predefined filters that were created and configured to filter the most important syslog messages from these servers. These raise proper alert messages to MOM associated to the corresponding KB articles. To add this type of syslog filters, follow the next procedure (in the example we will add a syslog filter to a Linux server but the procedure is the same for a Solaris server): 1. Open the Xian console. 2. Click on the Syslog message filters tab located on the upper right pane. You should see the following window: 3. Expand the Linux Server tree and drag and drop the desired filter to the desired Linux Server: Please note that you can perform the same action by clicking on the Apply syslog filter device menu option, located on the left panel. When you click on the desired server the following window will be displayed: 11

12 You should select the filter that you want to apply to the server and then click on the OK button. 4. When the selected filter has been applied to the server, the next window will be displayed: 12

13 Please note that you will not be able to edit the Event number and the Event source fields since this kind of filters were configured with default values in order to match rules present in the Jalasoft SMPs. 5. Select the server or servers where this filter will be applied. You can also select the hole category. 6. Click on the Filter tab and configure the severity levels to filter: 13

14 Note that you can select all of the severity levels or just configure the filter to not consider this aspect by unselecting the Severity check box. Additionally, please note that unlike the user configured filters, the Content filter will not be available since the content of the filter is also predefined. 7. Click on the OK button in order to finish this filter configuration. Working with the Filter Order: When the Xian Syslog Server receives a new syslog message, it will try to match it to the first syslog filter that captures and processes the message. The Syslog server will compare this message with the first filter, and if it does not match then it will go to the second, and so on until it finds the filter that captures this message or just discards it if no filter for the message was found. Basically, you should consider that the most specific filters should be the first one to be compared and the most general one should go at the end. It is in this sense that the order of the filters is very important and you need to consider this aspect when adding a new filter, which should be located in the right position. To change the filter order, please follow these steps: 1. Open the Xian console 2. Go to the Syslog messages filters tab located at the bottom center pane on the console main window. 3. Verify that all the syslog filters are sorted by the Order column 14

15 4. Right click on the syslog filter that you want to move. The following options will be displayed: The filter can be moved up or down one position or it can be placed at the first or last position. 5. Click on the move option that you choose for the filter. 6. Repeat this procedure for each of the filters until they are placed on the appropriate position. Editing and Removing the Syslog Filters: The last operation that you can perform over a certain syslog filter consists of editing its settings and/or removing it. To edit a syslog filter, please follow this procedure: - Open the Xian console. - Go to the Syslog message filters tab where the syslog filters are located. - Double click over the desired syslog filter or right click over it and click on the Edit contextual menu option. The Syslog message filter properties window will be opened for the filter and you will be able to edit it an click on the OK button for applying these modifications or click on the Cancel button for canceling the operation. To delete or remove certain filter, you should follow these steps: - Open the Xian console. - Go to the Syslog message filters tab where the syslog filters are located. - Right click over the filter that you want to remove and then click on the Remove contextual menu option. - The following dialog will be displayed asking you to confirm the operation: 15

16 You have to click on the Yes button for removing the filter or click on the No button if you don t want to delete it Working with the Syslog Messages using the Device Properties Window: Most of the operations described on this document can be also performed using the Device Properties window that will allow you to add, edit and remove the syslog filters for a particular device. To configure the syslog filters for a certain device, please follow these steps: 1. Open the Xian console 2. Double click on the device or server, or right click on it and click on the Properties contextual menu option. 3. Once the Properties window for the device has been opened, click on the Syslog message filters tab. The following window will be displayed: 16

17 This window displays all the filters that were applied to the device or server, the Add, Edit and Remove buttons that will let you configure the filters which will be applied to the device or server. In the case of the Linux server and the Solaris server plug-ins, the Predefined Syslog Filters List for the plugin will be displayed. 4. Now you should be able to perform any of the previously described operations. APPLIES TO: Xian Network Manager 2005 SP2 STATUS: Procedure provided. ADDITIONAL COMMENTS: At the time that this document was written, the Xian Syslog server was in a beta version and the following issues were present: - The Syslog Server can not detect if the port that this service uses is being used by another application, if so the service will not work properly. Please make sure that the default UDP 514 port or the one assigned when enabling this service is not being used by any other service or application. - After enabling the Syslog Server, some Xian events are recorded twice or appear duplicated in the System Event Viewer. To solve this problem, an additional step should be performed after enabling the Xian Syslog server: open the Services window and restart the Jalasoft Xian Network Scan Server service on the machine where this component was installed. 17

Integrating Trend Micro OfficeScan 10 EventTracker v7.x

Integrating Trend Micro OfficeScan 10 EventTracker v7.x Integrating Trend Micro OfficeScan 10 EventTracker v7.x Publication Date: August 26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help you in

More information

Topology Diagrams with Jalasoft Xian and Savision Live Maps

Topology Diagrams with Jalasoft Xian and Savision Live Maps Topology Diagrams with Jalasoft Xian and Savision Live Maps Extending System Center Operations Manager 2007 with Jalasoft and Savision Authors: Roberto Alcocer, Jalasoft Version: 1.0 March 2009 Some Rights

More information

System Administration and Log Management

System Administration and Log Management CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

BioWin Network Installation

BioWin Network Installation BioWin Network Installation Introduction This document outlines the procedures for installing the network version of BioWin. There are three parts to the network version installation: 1. The installation

More information

Syslog Monitoring Feature Pack

Syslog Monitoring Feature Pack AdventNet Web NMS Syslog Monitoring Feature Pack A dventnet, Inc. 5645 G ibraltar D rive Pleasanton, C A 94588 USA P ho ne: +1-925-924-9500 Fa x : +1-925-924-9600 Em ail:info@adventnet.com http://www.adventnet.com

More information

Network Load Balancing

Network Load Balancing Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account

More information

EventTracker: Integrating Imperva SecureSphere

EventTracker: Integrating Imperva SecureSphere EventTracker: Integrating Imperva SecureSphere Publication Date: June 14, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract This guide provides instructions

More information

Working with SQL Server Integration Services

Working with SQL Server Integration Services SQL Server Integration Services (SSIS) is a set of tools that let you transfer data to and from SQL Server 2005. In this lab, you ll work with the SQL Server Business Intelligence Development Studio to

More information

GETTING STARTED GUIDE 4.5. FileAudit VERSION. www.isdecisions.com

GETTING STARTED GUIDE 4.5. FileAudit VERSION. www.isdecisions.com GETTING STARTED GUIDE FileAudit 4.5 VERSION www.isdecisions.com Introduction FileAudit monitors access or access attempts to sensitive files and folders on Microsoft Windows servers. FileAudit allows you

More information

Integrate Astaro Security Gateway

Integrate Astaro Security Gateway Integrate Astaro Security Gateway EventTracker v7.x Publication Date: July 24, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions

More information

Tracking Network Changes Using Change Audit

Tracking Network Changes Using Change Audit CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and

More information

Managed Security Web Portal USER GUIDE

Managed Security Web Portal USER GUIDE Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1

More information

Configuring Network Load Balancing with Cerberus FTP Server

Configuring Network Load Balancing with Cerberus FTP Server Configuring Network Load Balancing with Cerberus FTP Server May 2016 Version 1.0 1 Introduction Purpose This guide will discuss how to install and configure Network Load Balancing on Windows Server 2012

More information

GETTING STARTED GUIDE. FileAudit VERSION. www.isdecisions.com

GETTING STARTED GUIDE. FileAudit VERSION. www.isdecisions.com GETTING STARTED GUIDE FileAudit 5 VERSION www.isdecisions.com Introduction FileAudit monitors access or access attempts to sensitive files and folders on Microsoft Windows servers. FileAudit allows you

More information

XStream Remote Control: Configuring DCOM Connectivity

XStream Remote Control: Configuring DCOM Connectivity XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011

More information

WhatsUp Event Alarm v10.x Listener Console User Guide

WhatsUp Event Alarm v10.x Listener Console User Guide WhatsUp Event Alarm v10.x Listener Console User Guide Contents WhatsUp Event Alarm Listener Console Overview Firewall Considerations... 6 Using the WhatsUp Event Alarm Listener Console... 7 Event Alarm

More information

Monitoring Inventory. Inventory Management. This chapter includes the following sections:

Monitoring Inventory. Inventory Management. This chapter includes the following sections: This chapter includes the following sections: Inventory Management, page 1 Overview to Global Logical Resources, page 2 Configuring Inventory Data Collection Schedule, page 3 Viewing Inventory Details,

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Eventia Log Parsing Editor 1.0 Administration Guide

Eventia Log Parsing Editor 1.0 Administration Guide Eventia Log Parsing Editor 1.0 Administration Guide Revised: November 28, 2007 In This Document Overview page 2 Installation and Supported Platforms page 4 Menus and Main Window page 5 Creating Parsing

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters

More information

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related

More information

ProperSync 1.3 User Manual. Rev 1.2

ProperSync 1.3 User Manual. Rev 1.2 ProperSync 1.3 User Manual Rev 1.2 Contents Overview of ProperSync... 3 What is ProperSync... 3 What s new in ProperSync 1.3... 3 Getting Started... 4 Installing ProperSync... 4 Activating ProperSync...

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

System Log Setup (RTA1025W Rev2)

System Log Setup (RTA1025W Rev2) System Log Setup (RTA1025W Rev2) System Log As shown on the web page, you can view the system log and configure system log whenever you want. To view the system log, you must configure system log first.

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Getting Started with Tableau Server 6.1

Getting Started with Tableau Server 6.1 Getting Started with Tableau Server 6.1 Welcome to Tableau Server. This guide will walk you through the basic steps to install and configure Tableau Server. Then follow along using sample data and users

More information

RSA Authentication Manager

RSA Authentication Manager McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: RSA Authentication Manager February 26, 2015 RSA Authentication Manager Page 1 of 9 Important Note: The information contained

More information

Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server

Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server DCOM Configuration Introduction This document is intended to provide a check-list of

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

Microsoft Visual Studio Integration Guide

Microsoft Visual Studio Integration Guide Microsoft Visual Studio Integration Guide MKS provides a number of integrations for Integrated Development Environments (IDEs). IDE integrations allow you to access MKS Integrity s workflow and configuration

More information

How to Logon with Domain Credentials to a Server in a Workgroup

How to Logon with Domain Credentials to a Server in a Workgroup How to Logon with Domain Credentials to a Server in a Workgroup Johan Loos johan@accessdenied.be Version 1.0 Authentication Overview Basically when you logon to a Windows Server you can logon locally using

More information

Providing Patch Management With N-central. Version 7.2

Providing Patch Management With N-central. Version 7.2 Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central

More information

Setting up DCOM for Windows XP. Research

Setting up DCOM for Windows XP. Research Setting up DCOM for Windows XP Research 1- Setting up DCOM for Windows XP This document has been produced as a guide to configuring DCOM settings on machines with Windows XP SP2 installed. You must make

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Integrate Websense Web Security Gateway (WSG)

Integrate Websense Web Security Gateway (WSG) Integrate Websense Web Security Gateway (WSG) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions

More information

MyNetFone Virtual Fax. Virtual Fax Installation

MyNetFone Virtual Fax. Virtual Fax Installation Table of Contents MyNetFone Virtual Fax MyNetFone Virtual Fax Installation... 1 Changing the SIP endpoint details for the fax driver... 11 Uninstalling Virtual Fax... 13 Virtual Fax Installation Follow

More information

Providing Patch Management with N-central. Version 9.1

Providing Patch Management with N-central. Version 9.1 Providing Patch Management with N-central Version 9.1 Contents Patch Management 4 Introduction 4 Monitoring for Missing Patches 4 Setting up Patch Management in N-central 5 Adding a WSUS Server to N-central

More information

Lab 14A: Using Task Manager and Event Viewer

Lab 14A: Using Task Manager and Event Viewer Lab 14A: Using Task Manager and Event Viewer Objectives After completing this lab, you will be able to:!" Monitor application performance by using Task Manager.!" Shut down applications by using Task Manager.!"

More information

Viewing and Troubleshooting Perfmon Logs

Viewing and Troubleshooting Perfmon Logs CHAPTER 7 To view perfmon logs, you can download the logs or view them locally. This chapter contains information on the following topics: Viewing Perfmon Log Files, page 7-1 Working with Troubleshooting

More information

Rx Medical. SMD Utility. Task Scheduler Configuration

Rx Medical. SMD Utility. Task Scheduler Configuration Rx Medical SMD Utility Task Scheduler Configuration This document contains important information for all Rx Medical users. Please ensure this document is circulated amongst all your staff. We suggest these

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Course 2277: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services

Course 2277: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course 2277: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Managing and Monitoring Domain Name System To adjust the TTL value for a zone: 1. Log on with a non-administrative

More information

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server Configuration Guide Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server This document describes how to configure Apache HTTP Server

More information

Tenrox and Microsoft Dynamics CRM Integration Guide

Tenrox and Microsoft Dynamics CRM Integration Guide Tenrox Tenrox and Microsoft Dynamics CRM Integration Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide describes the procedures for setting up integration between Microsoft

More information

Shavlik Patch for Microsoft System Center

Shavlik Patch for Microsoft System Center Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This

More information

Managing Software Updates with System Center 2012 R2 Configuration Manager

Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Microsoft Updates with Configuration Manager 2012 R2 This document is for informational purposes only. MICROSOFT MAKES

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

User's Guide - Beta 1 Draft

User's Guide - Beta 1 Draft IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent vnext User's Guide - Beta 1 Draft SC27-2319-05 IBM Tivoli Composite Application Manager for Microsoft

More information

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Setting up Hyper-V for 2X VirtualDesktopServer Manual Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein

More information

Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical

Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical These instructions describe the process for configuring a SAS Metadata server to work with JMP Clinical. Before You Configure

More information

PRINT CONFIGURATION. 1. Printer Configuration

PRINT CONFIGURATION. 1. Printer Configuration PRINT CONFIGURATION Red Flag Server5 has improved the designs of the printer configuration tool to facilitate you to conduct print configuration and print tasks management in a more convenient and familiar

More information

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email

More information

Having Fun with QNAP and your Home Automation

Having Fun with QNAP and your Home Automation Having Fun with QNAP and your Home Automation The popularity of home automation has been increasing greatly in recent years due to much higher affordability and greater simplicity via smartphone and tablet

More information

WebSphere Business Monitor V6.2 KPI history and prediction lab

WebSphere Business Monitor V6.2 KPI history and prediction lab Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...

More information

Chapter 8 Monitoring and Logging

Chapter 8 Monitoring and Logging Chapter 8 Monitoring and Logging This chapter describes the SSL VPN Concentrator status information, logging, alerting and reporting features. It describes: SSL VPN Concentrator Status Active Users Event

More information

1 Installation. Note: In Windows operating systems, you must be logged in with administrator rights to install the printer driver.

1 Installation. Note: In Windows operating systems, you must be logged in with administrator rights to install the printer driver. Installation A printer driver is an application that manages communication between a printer and your computer. Once installed, the printer driver settings must be configured in the printer Properties

More information

Monitoring ESX/ESXi servers with Verax NMS & APM

Monitoring ESX/ESXi servers with Verax NMS & APM Monitoring ESX/ESXi servers with Verax NMS & APM Table of contents Abstract... 3 Preparing VMware server for monitoring... 3 1. Adding a VMware ESX/ESXi server to device inventory... 4 2. Adding sensors

More information

Autodesk Inventory Advisor Quick Start Guide

Autodesk Inventory Advisor Quick Start Guide Autodesk Inventory Advisor Quick Start Guide 30- Mar- 12 i Contents Overview... 3 Installation... 3 Install AIA... 3 Enter unlock code... 4 Initial configuration... 5 Selecting a scan option... 6 Import

More information

4-441-095-12 (1) Network Camera

4-441-095-12 (1) Network Camera 4-441-095-12 (1) Network Camera SNC easy IP setup Guide Software Version 1.0 Before operating the unit, please read this manual thoroughly and retain it for future reference. 2012 Sony Corporation Table

More information

How to integrate Verax NMS & APM with Verax Service Desk

How to integrate Verax NMS & APM with Verax Service Desk How to integrate Verax NMS & APM with Verax Service Desk Table of contents Abstract... 3 1. Configuring Service Desk notification profile in Verax Administrator Console... 4 2. Configuring incident categories

More information

Ecora Enterprise Auditor Instructional Whitepaper. Who Made Change

Ecora Enterprise Auditor Instructional Whitepaper. Who Made Change Ecora Enterprise Auditor Instructional Whitepaper Who Made Change Ecora Enterprise Auditor Who Made Change Instructional Whitepaper Introduction... 3 Purpose... 3 Step 1 - Enabling audit in Windows...

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

CNW Re-Tooling Exercises

CNW Re-Tooling Exercises CNW Re-Tooling Exercises I Exercise 1: VPN... 1 Scenario... 1 Detail Steps to perform exercise:... 1 Exercise 2: Install and Configure a Certificate to Web Server... 4 Scenario... 4 Detail Steps to perform

More information

Multi-factor Authentication using Radius

Multi-factor Authentication using Radius Multi-factor Authentication using Radius Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data between two or more computers over

More information

Applicant Tracking System Job Aids. Prepared by:

Applicant Tracking System Job Aids. Prepared by: Applicant Tracking System Job Aids Prepared by: Contents System Navigation and My Setup Information for Users... 1 Creating Requisitions... 4 Duplicating Requisitions... 6 Requesting an Approval... 7 Viewing

More information

138 Configuration Wizards

138 Configuration Wizards 9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Best Practices. Understanding BeyondTrust Patch Management

Best Practices. Understanding BeyondTrust Patch Management Best Practices Understanding BeyondTrust Patch Management February 2014 Contents Overview... 3 1 - Configure Retina CS... 4 2 - Enable Patch Management for Smart Groups... 6 3 Identify and Approve Patches...

More information

How to Configure Windows Firewall on a Single Computer

How to Configure Windows Firewall on a Single Computer Security How to Configure Windows Firewall on a Single Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and

More information

ANDROID RECOVERY STICK QUICK START GUIDE

ANDROID RECOVERY STICK QUICK START GUIDE Before you get started do the following: Open, and read through http://sticks.paraben.com/phone-recovery-faq.htmlhttp:// sticks.paraben.com/phone-recovery-faq.html this will help you with any questions

More information

Cloud Portal User Guide

Cloud Portal User Guide Cloud Portal User Guide Table of Contents Access to the User Portal... 3 Account Homepage... 4 Catalogue... 5 IaaS details and service setup... 6 PaaS - details and service setup... 10 Requests review...

More information

Apple Mail... 36 Outlook Web Access (OWA)... 38 Logging In... 38 Changing Passwords... 39 Mobile Devices... 40 Blackberry...

Apple Mail... 36 Outlook Web Access (OWA)... 38 Logging In... 38 Changing Passwords... 39 Mobile Devices... 40 Blackberry... Contents Email Accounts... 3 Adding accounts... 3 Account Modifications... 6 Adding Aliases... 7 Primary E-mail Addresses... 10 Mailbox Quotas... 12 Removing accounts... 13 Mail Forwarding and Distribution

More information

Altaro Hyper-V Backup - Getting Started

Altaro Hyper-V Backup - Getting Started Altaro Hyper-V Backup - Getting Started System Requirements Supported Host Operating Systems: Altaro Hyper-V Backup: o Windows 2008 R2 (all editions) o Windows 2008 R2 SP1 o Windows Hyper-V Server 2008

More information

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099 Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

ActiveImage Protector 3.5 for Hyper-V with SHR. User Guide - Back up Hyper-V Server 2012 R2 host and

ActiveImage Protector 3.5 for Hyper-V with SHR. User Guide - Back up Hyper-V Server 2012 R2 host and ActiveImage Protector 3.5 for Hyper-V with SHR User Guide - Back up Hyper-V Server 2012 R2 host and restore individual virtual machines 2 nd Edition July 7, 2014 Copyright NetJapan, Inc. All Rights Reserved.

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

MICROSOFT OUTLOOK 2011 READ, SEARCH AND PRINT E-MAILS

MICROSOFT OUTLOOK 2011 READ, SEARCH AND PRINT E-MAILS MICROSOFT OUTLOOK 2011 READ, SEARCH AND PRINT E-MAILS Lasted Edited: 2012-07-10 1 Find the Inbox... 3 Check for New Mail... 4 Manually check for new messages... 4 Change new incoming e-mail schedule options...

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

Integrating Juniper Netscreen (ScreenOS)

Integrating Juniper Netscreen (ScreenOS) Integrating Juniper Netscreen (ScreenOS) EventTracker Enterprise Publication Date: Jan. 5, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide helps you

More information

Installing GFI Network Server Monitor

Installing GFI Network Server Monitor Installing GFI Network Server Monitor System Requirements Machines running GFI Network Server Monitor require: Windows 2000 (SP1 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5

More information

The purpose of this document is to describe how to connect Crystal Reports with BMC Remedy AR System using ODBC.

The purpose of this document is to describe how to connect Crystal Reports with BMC Remedy AR System using ODBC. UCL INFORMATION SERVICES DIVISION CRYSTAL REPORTS INTEGRATING WITH REMEDY The purpose of this document is to describe how to connect Crystal Reports with BMC Remedy AR System using ODBC. 1. Install BMC

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

SecureIT Plus Firewall Features and Functionality

SecureIT Plus Firewall Features and Functionality SecureIT Plus Firewall Features and Functionality Iowa Network Services SecureIT Plus Firewall Page 1 of 11 1.1 Enabling Firewall 1.1.1 Main Settings Once you have installed the firewall and have rebooted

More information

Integrating Symantec Endpoint Protection

Integrating Symantec Endpoint Protection Integrating Symantec Endpoint Protection EventTracker Version 7.x Publication Date: Nov 8, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About this Guide This guide provides

More information

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support

More information

Manual. 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0

Manual. 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0 Manual 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0 Copyright 2006-2009, 3CX ltd. http:// E-mail: info@3cx.com Information in this document is subject to change without

More information

Immotec Systems, Inc. SQL Server 2005 Installation Document

Immotec Systems, Inc. SQL Server 2005 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013 Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management

More information