See below for an introduction to Quest Defender, and then follow the step-by-step instructions to experience each user scenario.
|
|
- Matilda Robinson
- 7 years ago
- Views:
Transcription
1 Welcome to QuestDrive Quest Defender This document will guide you through experiencing Quest Defender as a user, a Helpdesk user, a Helpdesk Administrator and a Defender administrator, using a self-contained, working, virtual Defender installation. See below for an introduction to Quest Defender, and then follow the step-by-step instructions to experience each user scenario. What is Quest Defender? Quest Defender enhances security by enabling two-factor authentication to network, Web, and applications-based resources in your enterprise. Without Defender, users typically authenticate to these resources using just a password with Defender, a token can be used, such as the Defender itoken shown below, to provide a higher level of authentication. Quest Defender forms part of the Quest One Identity Solution, simplifying identity and access management.
2 Defender tokens As described on the previous page, Defender tokens are used instead of or as well as a password to provide a higher level of authentication to resources. A wide range of tokens are available: hardware tokens, eg, the Go-6 token software tokens that can be installed on a user s corporate desktop or hand-held device, eg iphone Web-based tokens, eg the Defender GrIDsure token For the practical purposes of these demonstrations, we will use a simulated display of a Defender software token installed on a user s iphone this token is called the Quest itoken. Page 2
3 Experience Defender using QuestDrive This QuestDrive demonstration will guide you through: an end-user s experience of Defender: o o o authenticating to a secured web site using a Defender token using a Defender token to reset a password via Quest Password Manager requesting a token using the web-based Defender Token Deployment System a Defender administrator s experience of Defender, including: o o o o o o o a walk through introduction to Defender configuration held in Active Directory quickly assign the appropriate permissions to a Defender service account testing connectivity between the Defender Security Server and Active Directory using Defender Reports to view today s authentication activity using PowerShell Management for Defender to list tokens per user using the Quest ActiveRoles Server console to modify a Defender token policy an introduction to Defender Token Deployment System administration a basic Helpdesk user s experience of Defender, using Active Directory Users & Computers to assign a temporary token response for a user a Helpdesk administrator's experience of Defender, using Quest ActiveRoles Server to set up a Defender token for a user via the ActiveRoles Web interface. Page 3
4 an end-user experience Page 4
5 Authenticating using a Defender token In this session, you will take the role of an end-user, to experience authenticating to a secure web page using a Defender token. You will be authenticating using a Defender itoken, as shown in the picture below, to gain secure access to your web application. All token responses used in this document are examples. In this setup, we are using Quest Webthority behind the scenes, to prompt you for Defender authentication when you try to access the application. You are now ready to start the demonstration follow the instructions on the next page. Page 5
6 You will be authenticating as a user called Demo, using a Defender itoken, to access a secure website, Follow the steps below to start: 1. Double click (or right click and select Open) the Authentication Demo shortcut from the desktop. This will launch Internet Explorer, which has its home page set to for this demonstration. 2. As the web site is protected by Defender, the user is prompted to provide their username (Customer ID) and token response for authentication before the web site can be accessed. 3. Enter the username Demo in the Customer ID field. 4. Using the iphone Simulator on the QuestDrive desktop, click the button next to the number display to generate the next token response. If the iphone Simulator is not displayed on the desktop double click the icon on the desktop to run the application. Page 6
7 5. Enter this response in to the Token Response field on the web page. For example, in the screenshot below the token response is entered in the Token Response: field. 6. Select OK on the Login webpage. 7. Your Defender protected web site will be displayed. 8. Close the browser to end this session. Summary In this session, you successfully authenticated to a secure web site, using a Defender itoken. Page 7
8 Reset your password using a Defender token In this session, you will again take the role of an end-user, this time using your Defender token to validate your identity to allow you to reset a forgotton password using Quest Password Manager. You will be entering your Defender token response on the Quest Password Manager password reset page, as shown in the picture below, to validate your identity before resetting your password. Page 8
9 As the Demo user, you will be resetting your password using the Quest Password Manager reset tool at using a Defender itoken to first validate your identity. Follow the steps below to start: 1. Double click (or right click and select Open) the QPM Integration demo shortcut from the desktop. This will launch Internet Explorer, which has its home page set to for this demonstration. The Quest Password Manager user details page is displayed, which is used to identify the user and their domain. 2. Enter the user account name Demo in the Enter your first, last, partial, or logon name: field and select Search. The Quest Password Manager menu page will be displayed, showing the options available to our Demo user. Page 9
10 3. Select the first menu option Forgot My Password. 4. As Quest Password Manager has been configured to use Defender for authentication rather than prompting the user to answer secret questions, the Defender Enter Token Response: prompt is displayed. 5. Using the iphone Simulator on the QuestDrive desktop, click the button to display the next token response. Page 10
11 6. Return to the web page and enter this response in the Enter Token Response: field. In the example below, token response is entered. 7. Select Next. Having been successfully authenticated by Defender, you are now prompted to reset your password. 8. Enter Quest123 in the new and confirm new password fields. 9. Select Finish to complete the password reset. 10. Close the browser to end this session. 11. Right click on the iphone Simulator and select Exit to close the simulator. Page 11
12 Summary In this session, you used a Defender itoken to validate your identity, to allow you to reset your password using Quest Password Manager. Explore further As described earlier, a range of Defender tokens can be used for authentication. Further information on Defender tokens is included in the documentation set, which can be found in the Documentation folder on the QuestDrive desktop. Start with the following books: Defender Software Token User Guide Defender Hardware Token User Guide Page 12
13 Requesting a token using the web-based Defender Token Deployment System In this session, as an end-user, you will access the software token setup wizard using the Defender Token Deployment System. The Defender Token Deployment System is a web based portal that enables Defender hardware and software token users to request and register tokens without administrator intervention. Follow the steps below to start: 1. Double click (or right click and select Open) the Token Deployment System demo shortcut from the desktop. This will launch Internet Explorer, which has its home page set to for this demonstration. 2. To log on to the Token Deployment System web interface as the Demo user, enter the following credentials and select OK: Username: Demo Password: Quest123 Page 13
14 The Defender Token Deployment System web interface is displayed: 3. Select Request a Software Token to start the Defender Software Token Setup wizard web page. Page 14
15 4. You will only see images for the token type(s) that you are allowed to request. This is defined by an administrator. To continue with the wizard the user would now click on the token image for the type of token that is required, for example, the Blackberry token. An would then be sent to the user, however, for this QuestDrive demonstration no SMTP server is configured. Summary In this session, you accessed the Defender token setup wizard within the Token Deployment System web site. This would be used to self-register a software token to your account and provide the necessary information for you to install and activate the token software on your device. Explore further Further information on the Defender Token Deployment System can be found in the Documentation folder on the QuestDrive desktop. See: Defender Token Deployment System User Guide Page 15
16 a Defender administrator s experience Page 16
17 Explore Defender configuration in Active Directory In this session, you ll gain an administrator s insight into the Defender configuration stored in Active Directory Users and Computers. Below is simple illustration of the core components of Defender: Page 17
18 Follow the steps below to start: 1. Select the icon on the QuestDrive task bar to open Active Directory Users & Computers. Alternatively, go to Start, Administrative Tools and select Active Directory Users and Computers. 2. Select and expand the Defender OU in the Active Directory Users and Computers tree: The Defender OU contains the configuration settings for the Defender Access Nodes, Polices, Radius Payloads and Security Servers that form the core of the Defender system. An additional menu option is available from the menu bar for Defender when the Defender OU is selected, as indicated above. This is also used for some of the administration functions of Defender such as importing tokens. Page 18
19 3. To view Defender configuration for a specific user, select the Users OU, then double-click the Demo Account user to display the Demo Account Properties for this user. 4. Select the Defender tab to display the tokens assigned to the Demo user. This dialog can be used to perform various administrative tasks, such as assigning a token to the user, or testing the user s token. Page 19
20 5. Select the Policy tab to display the policy rules associated with this user s token, and the RADIUS Payload tab to display Radius configuration used for VPN access for this user: 6. Close the Demo Account Properties dialog and Active Directory Users and Computers to end this session. Summary In this session you explored the Defender configuration held in Active Directory, and looked at the Defender properties for the Demo user. Page 20
21 Explore further To fully appreciate the integration of Defender with Active Directory, we recommend you read the documentation included within the Documentation folder on the QuestDrive desktop, starting with: Defender Quick Start Guide Defender Installation Guide Defender Configuration Guide The diagram below is an example of how Defender may be deployed, utilizing many of the additional components available such as the Defender Desktop Login and Token Deployment System. You can refer to the appropriate documents in the Documentation folder for further information. Further information can also be found online at: Page 21
22 Quickly assign the appropriate permissions to a Defender service account In this session, as an administrator, you will use Active Directory Users & Computers to run the Defender Delegate Control wizard to assign the required Active Directory permissions to an account that will be used as the Defender Security Server (DSS) service account. The DSS service account is configured on the DSS Configuration dialog and is used to read and write to / from Active Directory (AD). For the purposes of this demonstration the account used is named DSS_Service_Account. This account has already been created in AD and configured on the DSS configuration dialog as in the above screen shot Page 22
23 Follow the steps below to start: 1. Select the icon on the QuestDrive task bar to open Active Directory Users & Computers. Alternatively, go to Start, Administrative Tools and select Active Directory Users and Computers. 2. Select the Defender OU in the Active Directory Users and Computers tree which will then display the Defender menu bar item: 3. Select Defender from the main menu and choose Delegate Control to display the Defender Delegated Administration Wizard: Page 23
24 4. Select Add and use the AD Select Users or Groups dialog to add DSS_Service_Account as above. Select Next to continue. 5. Scroll down to the Service Accounts section and enable Defender Security Server as above. Select Next to continue. 6. Select Add and use the dialog displayed to select the defenderdemo.local Users OU as above. Select Next to continue. Page 24
25 7. The Defender Object Locations dialog will be automatically completed as above. Select Next to continue. 8. Select Finish completing the wizard. Page 25
26 Summary In this session you used the Defender Delegate Control wizard to assign the required AD permissions to an account that is used as the DSS service account. Explore further Further information on Defender delegated administration is included in the documentation set, which can be found in the Documentation folder on the QuestDrive desktop. See: Defender Delegated Administration User Guide Page 26
27 Test Defender Server connectivity with AD In this session, you ll take the role of an administrator testing connectivity between the Defender Security Server (DSS) and Active Directory. The DSS is responsible for managing Defender authentications, and is a core component of Defender. Follow the steps below to start: 1. Select the shortcut on the taskbar to access the DSS Configuration dialog. Alternatively, go to Start, All Programs, Defender Active Directory Edition and select Defender Security Server Configuration. The Defender Security Server Configuration dialog is displayed - the Active Directory LDAP tab shows the address of the domain the DSS is using for Active Directory communications, together with the service account and account password. Page 27
28 2. To test connectivity between the DSS and Active Directory, select the Test Connection tab: 3. Select the Test button to display the results of authenticating and connecting to the server specified on the Active Directory LDAP tab. 4. Close the dialog to end the session. Summary In this session you tested connectivity between the Defender Security Server (DSS) and Active Directory. Page 28
29 Using Defender Reports In this session, you ll use the web-based Defender reporting tool as the Administrator user to view today s Defender authentication activity. Follow the steps below to start: 1. To access the Defender Reports console select the shortcut from the desktop or open Internet Explorer and browse to 2. Enter your administrator user credentials: Username: Administrator Password: Quest123 Page 29
30 3. The Defender Reports Console is displayed: 4. Select Audit Trail to display the Audit Trail selection criteria window: Page 30
31 5. Accepting all default values, select the Generate button at the bottom of the page to display a report displaying all Defender log messages for today. 6. Select the Home button in the top left corner, else select one of the options in the left pane to gain a flavour of the other Defender reports available, eg users who have failed authentication, user activity and token information. 7. Close the browser to end this session. Summary In this session, you used the Defender Reports tool to display the Defender audit log for today, and explored other available Defender reports. Page 31
32 Using PowerShell Management for Defender In this session, you ll use PowerShell Management for Defender to view the list of cmdlets available and use one of the cmdlets to list the tokens assigned to a user. PowerShell Management for Defender is implemented as a Windows PowerShell snap-in, providing an extension to the Windows PowerShell environment. Follow the steps below to start: 1. To access PowerShell Management for Defender select the shortcut from the desktop. 2. To view a list of the Defender cmdlets that are available enter the command: Get-Command Quest.Defender.AdminTools\* 3. To list the tokens that are assigned to the User1 user account enter the command Get-TokensforUser user1 Page 32
33 Summary In this session, you used PowerShell Management for Defender to list the Defender cmdlets that are available and used the Get-TokensforUser cmdlet to display a list of the tokens that are assigned to a user. Explore further Further information on PowerShell Management for Defender is included in the documentation set, which can be found in the Documentation folder on the QuestDrive desktop. See: PowerShell Management for Defender Page 33
34 Using Quest ActiveRoles Server to modify a Defender Token Policy In this session, you ll use the Quest ActiveRoles Server console to modify a Defender Token Policy. Follow the steps below to start: 1. Select the icon on the QuestDrive task bar to open the Quest ActiveRoles Server console. Alternatively, go to Start, All Programs, Quest Software, ActiveRoles Server and select ActiveRoles Server Console. Page 34
35 2. If the Policies OU is not selected in the left hand window navigate to Active Directory, defenderdemo.local, Defender and then select Policies. A list of configured Defender policies is displayed. 3. Select Token Only, right click and select Properties. 4. Select the Account tab. Modify the setting by selecting Enable Account Lockout and changing the Lockout After setting to 5. Page 35
36 5. Select Apply to save the changes. Summary In this session, you used the Quest ActiveRoles Server console to modify a Defender Token Policy. Defender administration using the Quest ActiveRoles Server console is supported in version and later. Page 36
37 Defender Token Deployment System administration In this session we will explore the configuration pages for the Defender Token Deployment System (TDS). The Defender Token Deployment System is a web based portal that enables Defender hardware and software token users to request and register tokens without administrator intervention. Follow the steps below to start: 1. Double click (or right click and select Open) the Token Deployment System demo shortcut from the desktop. This will launch Internet Explorer, which has its home page set to for this demonstration. 2. To log on to the Token Deployment System web interface as the Demo user, enter the following credentials and select OK: Username: Administrator Password: Quest123 Page 37
38 The Defender TDS web interface is displayed: 3. Select Administer Token Deployment System. 4. The Common Settings web page is used to configure the service account which will be used to communicate with AD. Page 38
39 This web page is also used to enforce the use of PINs and set their minimum and maximum lengths. 5. The Settings page contains the SMTP server details. When requesting software tokens the setup process requires the sending of an to the user requesting a new token. If an SMTP server has not been configured software token requests will not function. Page 39
40 6. The Hardware Tokens page displays the URLs to access the relevant hardware token self-registration web sites and provides an option for a default token type. Page 40
41 7. The Software Tokens page is used to configure the AD groups that will contain the user accounts who are authorized to request their own software tokens. In the above example the AD groups specified must exist in AD and the members of these groups will be authorized to request / self-register their own software tokens. Page 41
42 Summary In this session, you were given an introduction to the administration web pages for the Defender Token Deployment System. Explore further Further information on the Defender Token Deployment System can be found in the Documentation folder on the QuestDrive desktop. Start with the following books: Defender Token Deployment System Quick Start Guide Defender Token Deployment System Installation and Configuration Guide Defender Token Deployment System User Guide Page 42
43 a basic Helpdesk user s experience Page 43
44 Assigning a temporary token response to a user In this session, you will take the role of a basic Helpdesk user, and experience setting a temporary token response for a user. A typical scenario for assigning a temporary response could be that a member of the Sales team has called from his hotel room the night before he is to do an important demonstration and he has forgotten or lost his Defender Go-6 token. By setting a temporary token response for this user the Helpdesk can allow temporary access. Normally a Helpdesk user would be given restricted rights over Active Directory, and only allowed to perform certain functions. For the purpose of this demonstration, you have the administrator rights that were assigned when you first logged into QuestDrive. Page 44
45 How to assign a temporary token response As a basic Helpdesk user, you will be assigning a temporary token response to the Go-6 token for a user, User1, using Active Directory Users & Computers. Follow the steps below to start: 1. Select the icon on the QuestDrive task bar to open Active Directory Users & Computers. Alternatively, go to Start, Administrative Tools and select Active Directory Users and Computers. 2. In the Users OU, open the Properties dialog for User1 by double clicking on User1. Normally a Helpdesk user s view would be restricted according to their rights and privileges. Page 45
46 3. Select the Defender tab to view the tokens assigned to User1, and then select the GO-6 token as in the screenshot below. 4. Select the Helpdesk button to display the Defender Helpdesk dialog. This dialog is used to assign a temporary token response for the selected token. 5. Expand the Expires drop down list and select 2 days. 6. Select Allow response to be used multiple times. Page 46
47 7. Select Assign to generate the temporary response this is displayed in the Response field. This number can then be sent to the end user and can be used to authenticate for the next 2 days. 8. Select Close to finish. 9. Close the Defender Properties dialog and Active Directory Users and Computers to end the session. Summary In this session, you assigned a temporary token response to the Defender Go-6 token assigned to User1, using Active Directory Users & Computers. Explore further Further information on token administration is included in the documentation set, which can be found in the Documentation folder on the QuestDrive desktop. Start with the following book: Defender Token Administration Guide Page 47
48 a Helpdesk administrator s experience Page 48
49 Setting up a Defender token for a user In this session, you will take the role of a Helpdesk administrator using the Quest ActiveRoles Server web interface, and experience setting up a Windows Desktop token for a user. For the purpose of this QuestDrive demonstration, we are using the Quest ActiveRoles Server to provide an easy-to-use web interface view of the tasks that the Helpdesk administrator can perform. The picture below shows the Defender Properties for our Demo user account within the Quest ActiveRoles Server Web Interface. This is an example of one of pages available for Defender administration. Page 49
50 How to set up a Defender token for a user As a Helpdesk administrator, Helpdesk1, you will be setting up a Defender token for a user, User1, using the Quest ActiveRoles Server helpdesk web page Follow the steps below to start: 1. Double click (or right click and select Open) the ARS Integration Demo shortcut from the desktop. This will launch Internet Explorer, which has its home page set to for this demonstration. 2. To log on to the Quest ActiveRoles Server web interface as a Helpdesk administrator, enter the following credentials and select OK: Username: defenderdemo\helpdesk1 Password: Quest123 Page 50
51 The ActiveRoles Server menu page is displayed. 3. Next use the Quick Search facility to locate the user, User1. In the Quick Search box in the top left-hand corner of the page, enter User1 and press return or select the search icon. 4. Select User1 from the returned search results to display the General Properties dialog for the user. Page 51
52 5. Select Menu from to display the Defender menu options as in the above screen shot. 6. Select Program Defender Token from the left hand menu to display the Program Defender Token page. Page 52
53 7. This page shows that Windows Desktop, Blackberry, itoken, GrIDsure, Android and OTP tokens are available. Keep the default selection of Windows and then select Program. Page 53
54 The page above is displayed to show that a Defender Windows Desktop Token has now been programmed and assigned to User1. You would now normally send the token activation code (shown above) to the user, so that the user can activate their Defender token. 8. Close the browser to end the session. Summary In this session, you set up a Defender token for a user, using the Quest ActiveRoles Server web interface. Explore further Further information on using the Quest ActiveRoles Server Web Interface for Defender administration can be found in Defender Integration with ARS.pdf, which is stored in the Documentation folder on the QuestDrive desktop. Page 54
55 Next steps Now that you have experienced Defender first hand, you may want to try installing and configuring the product yourself. You can request a free Defender Starter Pack from here. Alternatively, contact your local Quest Sales representative for further information on Defender and the Quest One Identity Solution. Page 55
Defender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
More informationTechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.
Secure Remote Access SRA Two-factor Authentication with Quest Defender SonicOS Contents Introduction... 1 System Requirements... 1 Defender Configuration... 2 Dell SonicWALL SRA Configuration... 18 Two-factor
More informationMICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)
MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative
More informationDefender Configuring for Use with GrIDsure Tokens
Defender Configuring for Use with GrIDsure Tokens Introduction The GrIDsure token can be used to protect any website hosted on Internet Information Server (IIS). This guide provides information for the
More informationNetWrix Password Manager. Quick Start Guide
NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...
More informationDelegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
More informationSymantec PGP Whole Disk Encryption Hands-On Lab V 3.7
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption
More informationMapping ITS s File Server Folder to Mosaic Windows to Publish a Website
Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website April 16 2012 The following instructions are to show you how to map your Home drive using ITS s Network in order to publish a website
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationUP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
More informationQuick Start Guide. IT Management On-Demand
1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationUser guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
More informationSecrets of Event Viewer for Active Directory Security Auditing Lepide Software
Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related
More informationHow to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection
How to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection Revised 09/2014 These instructions presume that you already have the Cisco AnyConnect Secure
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationMicrosoft Dynamics GP Release
Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.
More informationBusiness Portal for Microsoft Dynamics GP 2010. Field Service Suite
Business Portal for Microsoft Dynamics GP 2010 Field Service Suite Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views
More informationCreate, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
More informationSafeWord Domain Login Agent Step-by-Step Guide
SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact johan@accessdenied.be Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...
More informationNetWrix Account Lockout Examiner Version 4.0 Administrator Guide
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email
More informationDefender Group Policy Templates Installation and Configuration Guide
Defender Group Policy Templates Installation and Configuration Guide Introduction Defender provides two Group Policy administrative templates that can be used to provide additional features and configuration
More informationQuest Soft Token for Windows Phone User Guide
Quest Soft Token for Windows Phone User Guide What is the Quest Soft Token for Windows Phone? The Quest Soft Token for Windows Phone is a two-factor authentication token that can be used with any OATH-compliant
More informationHow to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On
How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On How to implement the X.509 certificate based Single Sign-On solution from SAP Page 2 of 34 How to
More informationArcGIS Business Analyst Premium* ~ Help Guide ~ Revised October 3, 2012
ArcGIS Business Analyst Premium* ~ Help Guide ~ Revised October 3, 2012 ArcGIS Business Analyst Premium is an Esri software package that combines GIS analysis and visualization with data to provide a better
More informationTool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
More informationATTENTION: End users should take note that Main Line Health has not verified within a Citrix
Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal
More informationPassword Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.
More informationDefender 5.7. Installation Guide
Defender 5.7 Installation Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationUsing the Content Distribution Manager GUI
CHAPTER 3 Using the Content Distribution Manager GUI The Content Distribution Manager is the central location from which much of the work of creating and managing ACNS networks and hosted content can be
More informationRoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
More informationSTATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationAT&T Business Messaging Account Management
AT&T Business Messaging Account Management Admin User Guide December 2015 1 Copyright 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein
More informationZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative
More informationEnterprise Self Service Quick start Guide
Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.
More informationSECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013
SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054
More informationDeploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide
Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection
More informationExternal Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
More informationSnow Active Directory Discovery
Product Snow Active Directory Discovery Version 1.0 Release date 2014-04-29 Document date 2014-04-29 Snow Active Directory Discovery Installation & Configuration Guide Page 2 of 9 This document describes
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationTest Lab Guide: Creating a Windows Azure AD and Windows Server AD Environment using Azure AD Sync
Test Lab Guide: Creating a Windows Azure AD and Windows Server AD Environment using Azure AD Sync Microsoft Corporation Published: December 2014 Author: Mark Grimes Acknowledgements Special thanks to the
More informationDefender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationSetting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationWeb Deployment on Windows 2012 Server. Updated: August 28, 2013
Web Deployment on Windows 2012 Server Updated: August 28, 2013 Table of Contents Install IIS on Windows 2012... 3 Install Sage 300 ERP...16 Create Web Deployment User...17 Sage 300 ERP Services...22 Web
More informationUpgrade of Business Systems Data Warehouse Reporting
Upgrade of Business Systems Data Warehouse Reporting The Business Systems Data Warehouse Reporting System was upgraded to a new version of Business Objects the weekend of December 12 th. The current system
More information1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts
This document will guide you through setting up your outgoing server (SMTP) Microsoft Outlook and Windows Live Mail. There is also a section below that guides you through the manual configuration of your
More informationMacs are not directly compatible with Noetix.
Those that use Macintosh computers to access Noetix cannot directly access Noetix through http://www.sandiego.edu/noetix. If one is on a Mac and goes to Noetix directly in a web browser, the page is likely
More informationInstalling Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials
Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure
More informationConfigure Single Sign on Between Domino and WPS
Configure Single Sign on Between Domino and WPS What we are doing here? Ok now we have the WPS server configured and running with Domino as the LDAP directory. Now we are going to configure Single Sign
More informationDefender EAP Agent Installation and Configuration Guide
Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections
More informationSophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
More informationExternal Partner and Customer Login Instructions via myngc Portal
External Partner and Customer Login Instructions via myngc Portal https://www.myngc.com Purpose The purpose of this document is to provide the Northrop Grumman Corporation (NGC) external partners and customers
More informationSelf-Service Password Manager
WWW.ROSE-HULMAN.EDU/EIT OFFICE OF ENTERPRISE INFORMATION TECHNOLOGY Self-Service Password Manager Rose-Hulman Institute of Technology has implemented a self-service password manager that provides an easy-to-use
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationDefender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationWindows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook
Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For
More informationINSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY
INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY 1) Install the UKSSOGateway application on the desktop: The UKSSOGateway application passes information from the myuk portal to launch the FESClient. The FESClient
More informationAdministration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
More informationWindows VPN and Epic Installation Instructions
Windows VPN and Epic Installation Instructions Contents Read Me First... 2 Windows 8 VPN installation instructions... 3 Windows 7 VPN installation instructions... 5 BIGIPEdge FAT Client installation instructions...
More informationInstallation Guide v3.0
Installation Guide v3.0 Shepherd TimeClock 4465 W. Gandy Blvd. Suite 800 Tampa, FL 33611 Phone: 813-882-8292 Fax: 813-839-7829 http://www.shepherdtimeclock.com The information contained in this document
More informationCitrix Remote Access Portal U s e r M a n u a l
Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting
More informationPassword Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
More informationInteract for Microsoft Office
Interact for Microsoft Office Installation and Setup Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge, R&D Date: October 2014 2014 Perceptive Software. All rights reserved Perceptive
More informationXenDesktop Implementation Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation
More informationHELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE
HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationStep-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)
Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:
More informationMTS Remote Drive Service. Quick Start Guide
MTS Remote Drive Service Quick Start Guide Signing In to Remote Drive service through My Internet Account To sign in to use the service, you need to be a registered user with a user name and password.
More informationApplication Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009
Application Note AN-10233 June 2009 ShoreTel 9: Active Directory Integration This application note outlines the configuration required to prepare a customer s Microsoft Active Directory environment for
More informationAD Self Password Reset Installation and configuration
AD Self Password Reset Installation and configuration AD Self Password Reset Installation 1 Manual v1.4 Table of Contents TABLE OF CONTENTS 2 SUMMARY 3 INSTALLATION 4 REMOVAL 6 AD SELF PASSWORD RESET CONFIGURATION
More informationShellfire L2TP-IPSec Setup Windows XP
Shellfire L2TP-IPSec Setup Windows XP This guide explains how to configure your Windows XP PC to work with a Shellfire L2TP-IPSec VPN. Index 1. Required data and files... 2 2. Creating a connection...
More informationEmail Instructions. Outlook (Windows) Mail (Mac) Webmail Windows Live Mail iphone 4, 4S, 5, 5c, 5s Samsung Galaxy S4 BlackBerry
Email Instructions Outlook (Windows) Mail (Mac) Webmail Windows Live Mail iphone 4, 4S, 5, 5c, 5s Samsung Galaxy S4 BlackBerry ii Table of Contents Table of Contents 1 Mail Account Settings 1 Account Set
More informationUsing Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005
Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows
More informationecstudent-ts Terminal Server How to Use
ecstudent-ts Terminal Server How to Use Connect to Cisco Any Connect Connect to Terminal Server, Set Options to Use Home Computer Files, Printers, Clipboard Use Network Folders Copy Files from Network
More informationGetting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class
Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class A Guide for Administrators Table of Contents Requirements... 3 1. Activate & Setup Online Software
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationManufacturing Representative SSL VDM Login User s Guide
June 12 2008 Ver. 1.5 KEMET Corporation Manufacturing Representative SSL VDM Login User s Guide This document is a guide to assist a Manufacturing Representative (MFG REP) to connect and login to the SSL
More informationSet My University of Melbourne Identity Management Password for the First Time
Set My University of Melbourne Identity Management Password for the First Time This document provides instructions for New Staff or Existing Staff members who are using the Identity Management System (IdMS)
More informationADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
More informationWhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationQuick Troubleshooting Guide: Authentication Issues
Defender Quick Troubleshooting Guide: Authentication Issues Introduction This guide is provided for use by Defender administrators to help troubleshoot common Defender authentication issues. It also provides
More informationWindows Clients and GoPrint Print Queues
Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup
More informationNetWrix SQL Server Change Reporter
NetWrix SQL Server Change Reporter Version 2.2 Administrator Guide Contents NetWrix SQL Server Change Reporter Administrator Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationWindows 7 Hula POS Server Installation Guide
Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3
More informationLAB: Enterprise Single Sign-On Services. Last Saved: 7/17/2006 10:48:00 PM
LAB: Enterprise Single Sign-On Services LAB: Enterprise Single Sign-On Services 2 TABLE OF CONTENTS HOL: Enterprise Single Sign-On Services...3 Objectives...3 Lab Setup...4 Preparation...5 Exercise 1:
More informationAPNS Certificate generating and installation
APNS Certificate generating and installation Quick Guide for generating and installing an Apple APNS Certificate Version: x.x MobiDM Quick Guide for APNS Certificate Page 1 Index 1. APPLE APNS CERTIFICATE...
More informationManaged Security Web Portal USER GUIDE
Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1
More informationAuthentication in XenMobile 8.6 with a Focus on Client Certificate Authentication
Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication Authentication is about security and user experience and balancing the two goals. This document describes the authentication
More informationSSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
More informationHOTPin Integration Guide: DirectAccess
1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility
More informationUser Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007
Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...
More informationECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7
ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...
More informationOFFICE 365 SELF- CONFIGURATION GUIDE
IT HELPDESK, REPUBLIC POLYTECHNIC OFFICE 365 SELF- CONFIGURATION GUIDE Version 7.0 IT Helpdesk 6-30-2015 0 TABLE OF CONTENTS Things to note before proceeding with this guide:... 1 Office 365 ProPlus Installation
More informationecontrol 3.5 for Active Directory & Exchange Administrator Guide
econtrol 3.5 for Active Directory & Exchange Administrator Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Administrator Guide. This guide is for system administrators and
More informationLAB 1: Installing Active Directory Federation Services
LAB 1: Installing Active Directory Federation Services Contents Lab: Installing and Configuring Active Directory Federation Services... 2 Exercise 1: installing and configuring Active Directory Federation
More informationPassport Installation. Windows XP + Internet Explorer 8
Passport Installation Windows XP + Internet Explorer 8 OS Version Windows XP System Type 32bit or 64bit Browser & version Internet Explorer 8 Before you begin.. Make sure you have Anti Virus software installed
More informationSpecial thanks to the following people for reviewing and providing invaluable feedback for this document: Joe Davies, Bill Mathers, Andreas Kjellman
Test Lab Guide: Creating a Microsoft Azure Active Directory and Windows Server Active Directory Environment using Microsoft Azure Active Directory Sync Services Microsoft Corporation Published: December
More information