Knowledge Base Articles
|
|
- Ralf Ray
- 8 years ago
- Views:
Transcription
1 Knowledge Base Articles 2005 Jalasoft Corp. All rights reserved. TITLE: How to configure and use the Jalasoft Xian Syslog Server. REVISION: Revision : B001-SLR01 Date : 11/30/05 DESCRIPTION: Jalasoft has released Service Pack 2 for Xian Network Manager, which includes the Jalasoft Xian Syslog Server that receives and filters all the syslog messages generated by managed network devices and UNIX Servers. This new feature increases the functionality and monitoring power of Xian Network Manager by allowing it to asynchronously monitor devices and servers. A syslog message is a log message sent from certain device or machine to a syslog server. This message includes the facility or logical location of the log message, the severity level and the message itself. Please refer to the RFC 3164 documentation for more information. The Jalasoft Xian Syslog Server will receive all these syslog messages and after filtering them, it will immediately send the appropriate event messages to MOM. CONFIGURATION: There are 2 steps to follow in order to setup the Xian Syslog server: - Enable the Xian Syslog Server to receive the syslog messages. - Configure the managed network devices and UNIX servers to send their syslog messages to the Jalasoft Syslog Server. Enabling the Xian Syslog Server: The Syslog Server is part of the NSS service and it is disabled by default, so it is necessary to enable it and then configure its settings. Please follow these steps: 1. Open the Xian console. 2. Click on the Xian Servers tab located on the upper left tree window: 1
2 3. Access the Network Scan Server properties by double clicking on the server or by right clicking on it and then clicking on the Properties contextual menu option: You should view this properties window: 2
3 4. Click on the Syslog Server tab. You should see a properties window similar to the following one: 3
4 Please notice that the Server state is disabled. 5. Configure the UDP port that the server will use and then click on the Apply button 6. Click on the Syslog severities to Xian severities mapping button. 4
5 Configure the level of severity of the Xian events associated to the syslog message severities. In other words, you should configure the severity level that the Xian event should display in MOM when a syslog message with a certain severity level is processed. Click on the OK button after configuring these settings. 7. Once the port and the severities mapping is configured, click on the Enable button. You will see that the Syslog server goes to the Running status after a few seconds: If for some reason (i.e., ports already used, services not running properly or not enough permissions) the service can not be enabled, then the view last error button will be enabled. If you click on it, a window will be displayed indicating the error and the status of the server will remain in a disabled state. Configuring the Network Devices and UNIX Servers to send syslog messages to the Xian Syslog Server: Any network device or UNIX server that can send syslog messages can be configured to send this information to a syslog server. You should enable this service, configure the IP address of the server and configure also the message severities. For example if you would like to configure a Linux Syslog client, you should follow these steps: 5
6 - Add a new entry in the /etc/hosts file with the Syslog server information: <IP address> <fully qualified domain name> <host name> <nickname> For example: XianUser.DevLab.com XianUser loghost - Add this entry to your etc/syslog.conf file with the nickname given on the previous step: For example: - Restart the syslog Please review your device and server documentation for the necessary steps in order to send the syslog messages to the Xian Syslog Server. WORKING WITH THE SYSLOG MESSAGE FILTERS: Once you have the Xian Syslog Server, all the devices and UNIX servers enabled and have configured them to send their syslog messages to the Syslog Server, the next step is to add the filters that the Xian Syslog Server will apply to the arriving syslog messages in order to filter the desired messages and discard the undesired ones. Please note that there are 2 types of filters: - User defined filters. - Predefined syslog filters for Linux and Solaris servers. Adding and Configuring a User Defined Filter: For adding a new user defined filter, please follow these steps (in the example we will use a Linux Server): 1. Open the Xian console and click on the Syslog message filters tab. 2. Right click on the Syslog messages filters working area and click on the Add contextual menu option: 6
7 The following window will be displayed: 3. Enter a name for the filter or use the default one suggested. 4. Select the action that the filter will perform when a syslog message that matches this filter arrives: o The Accept action will receive and process a syslog message that matches the filter and raises an event in MOM. 7
8 o The Reject action will discard any syslog message that matches this filter. 5. Enter an Event number: this number will be used by MOM to identify this event with predefined rules in the Xian plug-in SMP, or use custom rules to create alerts based on the event and then associate them to the appropriate KB Article. 6. Enter the Event source: in a similar way to the Event number, this field will be used by MOM to associate the event to some predefined or user rule that will associate the event to a KB Article. Please note that there are some reserved words used by Xian predefined filters and an error message like the following will be displayed if you try to use some of them: 7. Enter the Description for the filter. This field is not mandatory but will give you an idea of the filter and its purpose. 8. The next step is to configure the filtering of the severity levels of the messages and which severity levels will be considered and which ones will be discarded. To configure this feature, select the Severity check box and then select the severity levels for the filter. Please notice that if you click the Select All button, all the severity options will be selected as shown on the next figure: 8
9 9. The following step consists of selecting the syslog messages which will be filtered by contents. To do this, you will have to check the Contents check box and enter a valid regular expression that will be applied to the contents of the syslog message so that the filter will process all the messages that match this criteria only. If no regular expression was provided for this field, the following error message will be displayed when pressing the OK button: 10. The last step consists of configuring the devices or device groups that the filter will be applied to. You can select all the devices that belong to certain categories (e.g. Cisco switches) or select a specific discovered device or server only. To configure this setting, click on the Devices tab and click on the device category or expand certain categories for a list of discovered devices from a particular category and select the desired device or server. In the following figure, we are selecting the Linux Server category so that the syslog messages from the current device and the ones from the Linux servers, which will be added later, will be processed by this filter. 9
10 Please note that you can select several categories or devices to which this filter will be applied. You can select a specific device or server without having to select its category, if the filter will only monitor this particular machine. Finally, if you do not select any device or category, the following error message will be displayed when pressing the OK button: 11. Click on the OK button after finishing the configuration of this filter and the filter will be added to the list of filters that is displayed on the Syslog message filters tab on the Xian console main window. Now when a new syslog message that meets the filter criteria arrives, Xian will send an event to MOM containing the number, source and message description. Adding and Configuring a Predefined Syslog Filter for a Linux and/or Solaris Server: 10
11 The other types of filters that Xian Network Manager 2005 includes are the Linux and Solaris servers predefined filters that were created and configured to filter the most important syslog messages from these servers. These raise proper alert messages to MOM associated to the corresponding KB articles. To add this type of syslog filters, follow the next procedure (in the example we will add a syslog filter to a Linux server but the procedure is the same for a Solaris server): 1. Open the Xian console. 2. Click on the Syslog message filters tab located on the upper right pane. You should see the following window: 3. Expand the Linux Server tree and drag and drop the desired filter to the desired Linux Server: Please note that you can perform the same action by clicking on the Apply syslog filter device menu option, located on the left panel. When you click on the desired server the following window will be displayed: 11
12 You should select the filter that you want to apply to the server and then click on the OK button. 4. When the selected filter has been applied to the server, the next window will be displayed: 12
13 Please note that you will not be able to edit the Event number and the Event source fields since this kind of filters were configured with default values in order to match rules present in the Jalasoft SMPs. 5. Select the server or servers where this filter will be applied. You can also select the hole category. 6. Click on the Filter tab and configure the severity levels to filter: 13
14 Note that you can select all of the severity levels or just configure the filter to not consider this aspect by unselecting the Severity check box. Additionally, please note that unlike the user configured filters, the Content filter will not be available since the content of the filter is also predefined. 7. Click on the OK button in order to finish this filter configuration. Working with the Filter Order: When the Xian Syslog Server receives a new syslog message, it will try to match it to the first syslog filter that captures and processes the message. The Syslog server will compare this message with the first filter, and if it does not match then it will go to the second, and so on until it finds the filter that captures this message or just discards it if no filter for the message was found. Basically, you should consider that the most specific filters should be the first one to be compared and the most general one should go at the end. It is in this sense that the order of the filters is very important and you need to consider this aspect when adding a new filter, which should be located in the right position. To change the filter order, please follow these steps: 1. Open the Xian console 2. Go to the Syslog messages filters tab located at the bottom center pane on the console main window. 3. Verify that all the syslog filters are sorted by the Order column 14
15 4. Right click on the syslog filter that you want to move. The following options will be displayed: The filter can be moved up or down one position or it can be placed at the first or last position. 5. Click on the move option that you choose for the filter. 6. Repeat this procedure for each of the filters until they are placed on the appropriate position. Editing and Removing the Syslog Filters: The last operation that you can perform over a certain syslog filter consists of editing its settings and/or removing it. To edit a syslog filter, please follow this procedure: - Open the Xian console. - Go to the Syslog message filters tab where the syslog filters are located. - Double click over the desired syslog filter or right click over it and click on the Edit contextual menu option. The Syslog message filter properties window will be opened for the filter and you will be able to edit it an click on the OK button for applying these modifications or click on the Cancel button for canceling the operation. To delete or remove certain filter, you should follow these steps: - Open the Xian console. - Go to the Syslog message filters tab where the syslog filters are located. - Right click over the filter that you want to remove and then click on the Remove contextual menu option. - The following dialog will be displayed asking you to confirm the operation: 15
16 You have to click on the Yes button for removing the filter or click on the No button if you don t want to delete it Working with the Syslog Messages using the Device Properties Window: Most of the operations described on this document can be also performed using the Device Properties window that will allow you to add, edit and remove the syslog filters for a particular device. To configure the syslog filters for a certain device, please follow these steps: 1. Open the Xian console 2. Double click on the device or server, or right click on it and click on the Properties contextual menu option. 3. Once the Properties window for the device has been opened, click on the Syslog message filters tab. The following window will be displayed: 16
17 This window displays all the filters that were applied to the device or server, the Add, Edit and Remove buttons that will let you configure the filters which will be applied to the device or server. In the case of the Linux server and the Solaris server plug-ins, the Predefined Syslog Filters List for the plugin will be displayed. 4. Now you should be able to perform any of the previously described operations. APPLIES TO: Xian Network Manager 2005 SP2 STATUS: Procedure provided. ADDITIONAL COMMENTS: At the time that this document was written, the Xian Syslog server was in a beta version and the following issues were present: - The Syslog Server can not detect if the port that this service uses is being used by another application, if so the service will not work properly. Please make sure that the default UDP 514 port or the one assigned when enabling this service is not being used by any other service or application. - After enabling the Syslog Server, some Xian events are recorded twice or appear duplicated in the System Event Viewer. To solve this problem, an additional step should be performed after enabling the Xian Syslog server: open the Services window and restart the Jalasoft Xian Network Scan Server service on the machine where this component was installed. 17
Integrating Trend Micro OfficeScan 10 EventTracker v7.x
Integrating Trend Micro OfficeScan 10 EventTracker v7.x Publication Date: August 26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help you in
More informationTopology Diagrams with Jalasoft Xian and Savision Live Maps
Topology Diagrams with Jalasoft Xian and Savision Live Maps Extending System Center Operations Manager 2007 with Jalasoft and Savision Authors: Roberto Alcocer, Jalasoft Version: 1.0 March 2009 Some Rights
More informationSystem Administration and Log Management
CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,
More informationSyslog Monitoring Feature Pack
AdventNet Web NMS Syslog Monitoring Feature Pack A dventnet, Inc. 5645 G ibraltar D rive Pleasanton, C A 94588 USA P ho ne: +1-925-924-9500 Fa x : +1-925-924-9600 Em ail:info@adventnet.com http://www.adventnet.com
More informationBioWin Network Installation
BioWin Network Installation Introduction This document outlines the procedures for installing the network version of BioWin. There are three parts to the network version installation: 1. The installation
More informationAttix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
More informationNetwork Load Balancing
Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account
More informationConfiguring Network Load Balancing with Cerberus FTP Server
Configuring Network Load Balancing with Cerberus FTP Server May 2016 Version 1.0 1 Introduction Purpose This guide will discuss how to install and configure Network Load Balancing on Windows Server 2012
More informationEventTracker: Integrating Imperva SecureSphere
EventTracker: Integrating Imperva SecureSphere Publication Date: June 14, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract This guide provides instructions
More informationWorking with SQL Server Integration Services
SQL Server Integration Services (SSIS) is a set of tools that let you transfer data to and from SQL Server 2005. In this lab, you ll work with the SQL Server Business Intelligence Development Studio to
More informationDeploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
More informationManaged Security Web Portal USER GUIDE
Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1
More informationWhatsUp Event Alarm v10.x Listener Console User Guide
WhatsUp Event Alarm v10.x Listener Console User Guide Contents WhatsUp Event Alarm Listener Console Overview Firewall Considerations... 6 Using the WhatsUp Event Alarm Listener Console... 7 Event Alarm
More informationIntegrate Astaro Security Gateway
Integrate Astaro Security Gateway EventTracker v7.x Publication Date: July 24, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions
More informationTracking Network Changes Using Change Audit
CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and
More informationGETTING STARTED GUIDE 4.5. FileAudit VERSION. www.isdecisions.com
GETTING STARTED GUIDE FileAudit 4.5 VERSION www.isdecisions.com Introduction FileAudit monitors access or access attempts to sensitive files and folders on Microsoft Windows servers. FileAudit allows you
More informationEventia Log Parsing Editor 1.0 Administration Guide
Eventia Log Parsing Editor 1.0 Administration Guide Revised: November 28, 2007 In This Document Overview page 2 Installation and Supported Platforms page 4 Menus and Main Window page 5 Creating Parsing
More informationMonitoring Inventory. Inventory Management. This chapter includes the following sections:
This chapter includes the following sections: Inventory Management, page 1 Overview to Global Logical Resources, page 2 Configuring Inventory Data Collection Schedule, page 3 Viewing Inventory Details,
More informationQuick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
More informationGETTING STARTED GUIDE. FileAudit VERSION. www.isdecisions.com
GETTING STARTED GUIDE FileAudit 5 VERSION www.isdecisions.com Introduction FileAudit monitors access or access attempts to sensitive files and folders on Microsoft Windows servers. FileAudit allows you
More informationParallels Plesk Panel
Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011
More informationXStream Remote Control: Configuring DCOM Connectivity
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
More informationWindows Firewall Configuration with Group Policy for SyAM System Client Installation
with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it
More informationNovell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
More informationRx Medical. SMD Utility. Task Scheduler Configuration
Rx Medical SMD Utility Task Scheduler Configuration This document contains important information for all Rx Medical users. Please ensure this document is circulated amongst all your staff. We suggest these
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationSecrets of Event Viewer for Active Directory Security Auditing Lepide Software
Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More informationHaving Fun with QNAP and your Home Automation
Having Fun with QNAP and your Home Automation The popularity of home automation has been increasing greatly in recent years due to much higher affordability and greater simplicity via smartphone and tablet
More informationRSA Authentication Manager
McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: RSA Authentication Manager February 26, 2015 RSA Authentication Manager Page 1 of 9 Important Note: The information contained
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationHow to integrate Verax NMS & APM with Verax Service Desk
How to integrate Verax NMS & APM with Verax Service Desk Table of contents Abstract... 3 1. Configuring Service Desk notification profile in Verax Administrator Console... 4 2. Configuring incident categories
More informationGetting Started with Tableau Server 6.1
Getting Started with Tableau Server 6.1 Welcome to Tableau Server. This guide will walk you through the basic steps to install and configure Tableau Server. Then follow along using sample data and users
More informationSecurity Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
More informationSystem Log Setup (RTA1025W Rev2)
System Log Setup (RTA1025W Rev2) System Log As shown on the web page, you can view the system log and configure system log whenever you want. To view the system log, you must configure system log first.
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationAttix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks
More informationManaging Software Updates with System Center 2012 R2 Configuration Manager
Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Microsoft Updates with Configuration Manager 2012 R2 This document is for informational purposes only. MICROSOFT MAKES
More informationViewing and Troubleshooting Perfmon Logs
CHAPTER 7 To view perfmon logs, you can download the logs or view them locally. This chapter contains information on the following topics: Viewing Perfmon Log Files, page 7-1 Working with Troubleshooting
More informationImmotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
More informationAVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
More informationUser Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationMicrosoft Visual Studio Integration Guide
Microsoft Visual Studio Integration Guide MKS provides a number of integrations for Integrated Development Environments (IDEs). IDE integrations allow you to access MKS Integrity s workflow and configuration
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationConfiguring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server
Configuration Guide Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server This document describes how to configure Apache HTTP Server
More informationAutodesk Inventory Advisor Quick Start Guide
Autodesk Inventory Advisor Quick Start Guide 30- Mar- 12 i Contents Overview... 3 Installation... 3 Install AIA... 3 Enter unlock code... 4 Initial configuration... 5 Selecting a scan option... 6 Import
More informationProviding Patch Management With N-central. Version 7.2
Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
More informationLab 14A: Using Task Manager and Event Viewer
Lab 14A: Using Task Manager and Event Viewer Objectives After completing this lab, you will be able to:!" Monitor application performance by using Task Manager.!" Shut down applications by using Task Manager.!"
More informationNetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant
How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup
More informationLepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
More informationActiveImage Protector 3.5 for Hyper-V Enterprise. User Guide - Backup Hyper-V Server 2012 R2 host and
ActiveImage Protector 3.5 for Hyper-V Enterprise User Guide - Backup Hyper-V Server 2012 R2 host and restore individual virtual machines First Edition - July 7, 2014 Copyright NetJapan, Inc. All Rights
More informationChapter 8 Monitoring and Logging
Chapter 8 Monitoring and Logging This chapter describes the SSL VPN Concentrator status information, logging, alerting and reporting features. It describes: SSL VPN Concentrator Status Active Users Event
More informationProperSync 1.3 User Manual. Rev 1.2
ProperSync 1.3 User Manual Rev 1.2 Contents Overview of ProperSync... 3 What is ProperSync... 3 What s new in ProperSync 1.3... 3 Getting Started... 4 Installing ProperSync... 4 Activating ProperSync...
More information1 Installation. Note: In Windows operating systems, you must be logged in with administrator rights to install the printer driver.
Installation A printer driver is an application that manages communication between a printer and your computer. Once installed, the printer driver settings must be configured in the printer Properties
More informationInstructions for Configuring a SAS Metadata Server for Use with JMP Clinical
Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical These instructions describe the process for configuring a SAS Metadata server to work with JMP Clinical. Before You Configure
More informationWebSphere Business Monitor V6.2 KPI history and prediction lab
Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...
More informationFiltering Spam Using Outlook s Rule
Filtering Spam Using Outlook s Rule No one enjoys receiving spam (unsolicited junk e-mail). However, at Cuesta College we do not delete suspected spam. Instead, to assure the delivery of legitimate e-mail,
More informationProviding Patch Management with N-central. Version 9.1
Providing Patch Management with N-central Version 9.1 Contents Patch Management 4 Introduction 4 Monitoring for Missing Patches 4 Setting up Patch Management in N-central 5 Adding a WSUS Server to N-central
More informationHow to Logon with Domain Credentials to a Server in a Workgroup
How to Logon with Domain Credentials to a Server in a Workgroup Johan Loos johan@accessdenied.be Version 1.0 Authentication Overview Basically when you logon to a Windows Server you can logon locally using
More information138 Configuration Wizards
9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP
More informationApplication Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server
Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server DCOM Configuration Introduction This document is intended to provide a check-list of
More informationSetting up Hyper-V for 2X VirtualDesktopServer Manual
Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein
More informationUser's Guide - Beta 1 Draft
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent vnext User's Guide - Beta 1 Draft SC27-2319-05 IBM Tivoli Composite Application Manager for Microsoft
More informationMonitoring ESX/ESXi servers with Verax NMS & APM
Monitoring ESX/ESXi servers with Verax NMS & APM Table of contents Abstract... 3 Preparing VMware server for monitoring... 3 1. Adding a VMware ESX/ESXi server to device inventory... 4 2. Adding sensors
More information1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
More informationAltaro Hyper-V Backup - Getting Started
Altaro Hyper-V Backup - Getting Started System Requirements Supported Host Operating Systems: Altaro Hyper-V Backup: o Windows 2008 R2 (all editions) o Windows 2008 R2 SP1 o Windows Hyper-V Server 2008
More informationSQL Server Setup for Assistant/Pro applications Compliance Information Systems
SQL Server Setup for Assistant/Pro applications Compliance Information Systems The following document covers the process of setting up the SQL Server databases for the Assistant/PRO software products form
More informationShavlik Patch for Microsoft System Center
Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This
More informationApple Mail... 36 Outlook Web Access (OWA)... 38 Logging In... 38 Changing Passwords... 39 Mobile Devices... 40 Blackberry...
Contents Email Accounts... 3 Adding accounts... 3 Account Modifications... 6 Adding Aliases... 7 Primary E-mail Addresses... 10 Mailbox Quotas... 12 Removing accounts... 13 Mail Forwarding and Distribution
More informationMcAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do?
McAfee SIEM Alarms Setting up and Managing Alarms Introduction McAfee SIEM provides the ability to send alarms on a multitude of conditions. These alarms allow for users to be notified in near real time
More informationSystem Area Management Software Tool Tip: Integrating into NetIQ AppManager
System Area Management Software Tool Tip: Integrating into NetIQ AppManager Overview: This document provides an overview of how to integrate System Area Management's event logs with NetIQ's AppManager.
More informationIntegrate Websense Web Security Gateway (WSG)
Integrate Websense Web Security Gateway (WSG) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions
More informationDCA Local Print Agent Push Install
DCA Local Print Agent Push Install PageTrac Support DCA Local Print Agent Push Install System Requirements Each workstation on which you install Local Print Agent must have the following: Windows operating
More informationMulti-factor Authentication using Radius
Multi-factor Authentication using Radius Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data between two or more computers over
More informationHyperoo 2.0 A (Very) Quick Start
Hyperoo 2.0 A (Very) Quick Start Download and install the Hyperoo 2.0 beta Hyperoo 2.0 is a client/server based application and as such requires that you install both the Hyperoo Client and Hyperoo Server
More informationvcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationInstallation Troubleshooting Guide
Installation Troubleshooting Guide Firebird Database Connection Errors DBA Next Generation uses the Firebird Database server for connections to the database. If you have a connection error when launching
More informationPRINT CONFIGURATION. 1. Printer Configuration
PRINT CONFIGURATION Red Flag Server5 has improved the designs of the printer configuration tool to facilitate you to conduct print configuration and print tasks management in a more convenient and familiar
More informationCourse 2277: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services
Course 2277: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Managing and Monitoring Domain Name System To adjust the TTL value for a zone: 1. Log on with a non-administrative
More informationNetWrix Account Lockout Examiner Version 4.0 Administrator Guide
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email
More informationTenrox and Microsoft Dynamics CRM Integration Guide
Tenrox Tenrox and Microsoft Dynamics CRM Integration Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide describes the procedures for setting up integration between Microsoft
More informationConfiguration Guide. Remote Backups How-To Guide. Overview
Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter
More informationActiveImage Protector 3.5 for Hyper-V with SHR. User Guide - Back up Hyper-V Server 2012 R2 host and
ActiveImage Protector 3.5 for Hyper-V with SHR User Guide - Back up Hyper-V Server 2012 R2 host and restore individual virtual machines 2 nd Edition July 7, 2014 Copyright NetJapan, Inc. All Rights Reserved.
More informationCloud Portal User Guide
Cloud Portal User Guide Table of Contents Access to the User Portal... 3 Account Homepage... 4 Catalogue... 5 IaaS details and service setup... 6 PaaS - details and service setup... 10 Requests review...
More informationEcora Enterprise Auditor Instructional Whitepaper. Who Made Change
Ecora Enterprise Auditor Instructional Whitepaper Who Made Change Ecora Enterprise Auditor Who Made Change Instructional Whitepaper Introduction... 3 Purpose... 3 Step 1 - Enabling audit in Windows...
More informationAdaptive Log Exporter Users Guide
IBM Security QRadar Version 7.1.0 (MR1) Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page page 119. Copyright IBM Corp. 2012,
More informationACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
More informationAvaya Network Configuration Manager User Guide
Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information
More informationInstalling GFI Network Server Monitor
Installing GFI Network Server Monitor System Requirements Machines running GFI Network Server Monitor require: Windows 2000 (SP1 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5
More informationIdera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013
Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management
More informationInstallation Overview
Contents Installation Overview... 2 How to Install Ad-Aware Management Server... 3 How to Deploy the Ad-Aware Security Solutions... 5 General Deployment Conditions... 5 Deploying Ad-Aware Management Agent...
More informationCNW Re-Tooling Exercises
CNW Re-Tooling Exercises I Exercise 1: VPN... 1 Scenario... 1 Detail Steps to perform exercise:... 1 Exercise 2: Install and Configure a Certificate to Web Server... 4 Scenario... 4 Detail Steps to perform
More informationAdvanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
More informationMICROSOFT OUTLOOK 2011 READ, SEARCH AND PRINT E-MAILS
MICROSOFT OUTLOOK 2011 READ, SEARCH AND PRINT E-MAILS Lasted Edited: 2012-07-10 1 Find the Inbox... 3 Check for New Mail... 4 Manually check for new messages... 4 Change new incoming e-mail schedule options...
More informationProjectWise Explorer V8i User Manual for Subconsultants & Team Members
ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support
More informationANDROID RECOVERY STICK QUICK START GUIDE
Before you get started do the following: Open, and read through http://sticks.paraben.com/phone-recovery-faq.htmlhttp:// sticks.paraben.com/phone-recovery-faq.html this will help you with any questions
More informationSecureIT Plus Firewall Features and Functionality
SecureIT Plus Firewall Features and Functionality Iowa Network Services SecureIT Plus Firewall Page 1 of 11 1.1 Enabling Firewall 1.1.1 Main Settings Once you have installed the firewall and have rebooted
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationSetting up DCOM for Windows XP. Research
Setting up DCOM for Windows XP Research 1- Setting up DCOM for Windows XP This document has been produced as a guide to configuring DCOM settings on machines with Windows XP SP2 installed. You must make
More informationInstall MS SQL Server 2012 Express Edition
Install MS SQL Server 2012 Express Edition Sohodox now works with SQL Server Express Edition. Earlier versions of Sohodox created and used a MS Access based database for storing indexing data and other
More information