ENTERPRISE DATA CENTER BUSINESS OBJECTS XI RULES OF ENGAGEMENT
|
|
- Merry Spencer
- 7 years ago
- Views:
Transcription
1 BUSINESS OBJECTS I RULES OF ENGAGEMENT Version 1.2 Date: 5/15/2014 SECURITY WARNING The information contained herein is proprietary to the Commonwealth of Pennsylvania and must not be disclosed to un-authorized personnel. The recipient of this document, by its retention and use, agrees to protect the information contained herein. Readers are advised that this document may be subject to the terms of a non-disclosure agreement. DO NOT DISCLOSE ANY OF THIS INFORMATION WITHOUT OBTAINING PERMISSION FROM THE MANAGEMENT RESPONSIBLE FOR THIS DOCUMENT. EDC BUSINESS OBJECTS I RULES OF ENGAGEMENT PAGE 1 OF 10
2 Version History Date Version Modified By / Approved By Section(s) Comment 04/28/ Wes Hammond C. Reber All Initial Version 11/16/ C. Reber All Change ESF to EDC. Change SC to ESR. 05/15/ C. reber Cover page Update cover page to OA standard.. EDC BUSINESS OBJECTS I RULES OF ENGAGEMENT PAGE 2 OF 10
3 Table of Contents 1 EDC OVERVIEW & EDC INFRASTRUCTURE EDC OVERVIEW EDC Engagement Process EDC Deployment Process Commonwealth Application Certification and Accreditation (CA 2 ) EDC INFRASTRUCTURE External DMZ Security Zone Internal Services Security Zone Internal DMZ Security Zone BUSINESS OBJECTS I IMPLEMENTATION BOE I PURPOSE / OVERVIEW ASSUMPTIONS SCHEMATIC DIAGRAM PREREQUISITES IMPLEMENTATION DETAILS BOE I RULES OF ENGAGEMENT RULES OF ENGAGEMENT OVERVIEW NAMING CONVENTIONS SERVICES Automatic Software Installation ROLES AND RESPONSIBILITIES MONITORING BACKUP AND RECOVERY CHANGE MANAGEMENT SECURITY Administrative Access Remote Access Physical Access MAINTENANCE APPENDI A - RESOURCES AND REFERENCES EDC BUSINESS OBJECTS I RULES OF ENGAGEMENT PAGE 3 OF 10
4 1 EDC Overview & EDC Infrastructure This section contains standard information that is included in all ROE documents. 1.1 EDC OVERVIEW The Commonwealth of Pennsylvania s Enterprise Data Center (EDC) provides hosting services for agency web-based and agency specific applications. Its mission is to maintain a high level of security, availability, reliability, and management of the Commonwealth of Pennsylvania's mission critical web applications. Refer to the Enterprise Data Center website, for a full description of the EDC and all hosting and service offerings EDC Engagement Process If your agency is considering deploying applications in the EDC, first examine the EDC website to understand the EDC Services Portfolio, and then contact your Enterprise Services Representative who acts as a liaison between agencies and the EDC. They answer preliminary questions and coordinate meetings with EDC personnel to ensure consistent communication on simple or complex projects EDC Deployment Process The EDC follows a well-defined deployment process for all application deployments. Application development is performed at the agency or contractor location while the EDC houses both a staging and a production environment, which are mirror images of each other. This structured deployment and testing process ensures a stable application in production. Refer to Deploying in Managed Services to review MS deployment process documents Refer to Deploying in Managed Services Lite to review MSL deployment process documents Commonwealth Application Certification and Accreditation (CA 2 ) Prior to entering the EDC every new application is required to undergo a security assessment. It is the responsibility of each agency to ensure that the security assessment is completed for their application. Refer to Commonwealth Policy ITB-SEC005 regarding "Commonwealth Application Certification and Accreditation" Click to initiate the Commonwealth Application Certification and Accreditation (CA 2 ) Process. EDC BUSINESS OBJECTS I RULES OF ENGAGEMENT PAGE 4 OF 10
5 1.2 EDC INFRASTRUCTURE The EDC architecture is segmented into security zones that are isolated from each other via firewalls. The EDC network contains the External DMZ security zone, the Internal Services security zone, and the Internal DMZ security zone. These three primary networks are either, physically or logically, connected to one another. MAN Internet Agency MAN site Agency Firewall EDC Intranet Firewall Perimeter Firewall Internal DMZ / Services Managed Services Lite Internal DMZ Managed Services Internal Services Managed Services Internal DMZ Co-location Internal Services Co-location External DMZ Managed Services External DMZ Co-location External DMZ Managed Services Lite EDC InterZone Firewall External DMZ Security Zone The External DMZ security zone contains Internet-facing servers that are connected to the Enterprise DMZ. EDC-managed web servers (such as Managed Services) and agency-managed servers (such as Co- Location servers) both exist in the External DMZ Security zone. Managed Services and Co-Location servers are on separate subnets secured by either firewalls or Access Control Lists (ACLs) Internal Services Security Zone The Internal Services security zone contains Managed Services database servers and other application servers from which dynamic content is obtained by web servers Internal DMZ Security Zone The Internal DMZ security zone contains the Managed Web and application servers that need to be accessible only from the Commonwealth Metropolitan Area Network (MAN). This Security Zone also contains internal Co-Location databases and web and application servers that are isolated from the Managed Services servers. When EDC Domain Controllers intercommunicate in a security zone, all communications use standard RPC and do not require IPSEC encryption or authentication. Domain Controller-to-Domain Controller communications between security zones only use IPSEC with Authentication Headers (AH). Other host-to-ad Component communication in the Managed Services portion of the Enterprise Data Center does not require IPSEC. However, IPSEC is required for all communications between entities outside the Managed Services and EDC AD components. EDC BUSINESS OBJECTS I RULES OF ENGAGEMENT PAGE 5 OF 10
6 2 Business Objects I Implementation 2.1 BOE I PURPOSE / OVERVIEW The document focuses on BOE applications. Using this document an agency will gain an understanding of how to request services provided by the EDC. The EDC implements and supports Business Objects Enterprise (BOE) at the agency s request. BOE is a suite of reporting and analysis applications, which includes, Crystal Reports and InfoView. Each application in the suite provides functionality for a particular aspect of the commonwealth s data analysis and reporting needs. 2.2 ASSUMPTIONS This document assumes that the reader has a basic understanding of: Business Objects Enterprise I R2 and its function User rights and permissions structures Crystal Reports 2.3 SCHEMATIC DIAGRAM MAN Load Balancer Business Objects Enterprise I R2 Web Server Business Objects Enterprise I R2 Application Servers File Server Database 2.4 PREREQUISITES A supported web browser is required, such as IE Explorer 6 and above. EDC BUSINESS OBJECTS I RULES OF ENGAGEMENT PAGE 6 OF 10
7 2.5 IMPLEMENTATION DETAILS The BOE applications are integrated into the Business Intelligence Platform, which provides a common infrastructure for all components of BOE to be deployed and administered. The following applications are part of BOE and are available to agency users: Crystal Reports is a reporting tool that is used to create highly formatted canned reports, which are frequently distributed in high volumes. InfoView is a portal which provides secured access to all the content created by the other tools. The content can be accessed via searching, folder structures, custom lists of favorites or categorizations, etc. Non Business Objects content, such as documents and spreadsheets, can also be stored and accessed via InfoView. The following application is not part of BOE but is available to agency users: BOBJ is a Java web service that is also supported. BOBJ allows applications that are not on BOE to query and build reports. The EDC provides the URL for the web service so applications can access reports. The agency sets up and manages all aspects of this service. The EDC sets up access to BOE for agencies as described below using the Central Management Console: 1. Create folder for Agency and Application 2. Create groups for Admins and for End Users 3. Assign Full Control permissions for Admins 4. Assign Schedule & View permissions for End Users 5. Create User accounts 6. Assign User accounts to proper groups as defined in the EDC Document EDC BUSINESS OBJECTS I RULES OF ENGAGEMENT PAGE 7 OF 10
8 3 BOE I Rules of Engagement 3.1 RULES OF ENGAGEMENT OVERVIEW In this section we discuss all aspects of services provided by the EDC. 3.2 NAMING CONVENTIONS Naming conventions provide a standard approach to naming different objects. Standard 2-digit agency code is used when naming the parent folder. o AC Application Name The Application name is used for naming child folders. o Set up as desired by the agency 3.3 SERVICES To request these services, the agency must create an incident ticket and must provide a detailed EDC Document with all of the requirements identified in detail. EDC implements and supports Business Objects Enterprise I Release 2 and provides the following support: Crystal Reports Establishes connectivity to database and ensures that the service is available. InfoView Creates the users and groups for access. BOBJ Ensures that the service is available Automatic Software Installation Active plug in must be installed for InfoView. This is done automatically when the client connects to Info View. 3.4 ROLES AND RESPONSIBILITIES Roles EDC Agency Software Installation Active Plug in installation License Management Procurement of Licenses General EDC Document completion CMR Processing (for database only) Data Backup Hardware Inventory Development Environment Administrative Access Configuration Auditing EDC BUSINESS OBJECTS I RULES OF ENGAGEMENT PAGE 8 OF 10
9 3.5 MONITORING EDC monitors the Business Objects Windows services to assure they are running at all times. EDC monitors to assure the site is up. Application alerts are sent to the EDC Application Management Team (AMT) 3.6 BACKUP AND RECOVERY Backup services are provided and are based on existing EDC processes and standards. Details of this service are available at the following link EDC BACKUP AND RECOVERY OVERVIEW. EDC backs up all changes to the environment on a daily basis. 3.7 CHANGE MANAGEMENT Existing EDC Change Management Processes and procedures are leveraged for any modifications to the BOE application services. Reference the change management page for additional information: 3.8 SECURITY Security for this environment is managed by EDC personnel Administrative Access Only EDC has Admin access to all supported services Remote Access Only EDC has remote access to the servers hosting the application Physical Access Only EDC has physical access to the servers hosting the application. 3.9 MAINTENANCE Maintenance for this environment is managed by EDC personnel. EDC will provide advance notice for all scheduled maintenance activities performed on BOE services. EDC BUSINESS OBJECTS I RULES OF ENGAGEMENT PAGE 9 OF 10
10 4 Appendix A - Resources and References Business Objects Enterprise URL: Administrator s Guide: efault.htm End User s Guide: EDC BUSINESS OBJECTS I RULES OF ENGAGEMENT PAGE 10 OF 10
Enterprise Data Center (EDC) SQL Server Database Services
Enterprise Data Center (EDC) SQL Server Database Services Rules of Engagement Application Management Team Version 1.0 October, 09, 2015 SECURITY WARNING The information contained herein is proprietary
More informationENTERPRISE DATA CENTER CSS HARDWARE LOAD BALANCING POLICY
CSS HARDWARE LOAD BALANCING POLICY Version 2.5 Date: 04/11/2014 SECURITY WARNING The information contained herein is proprietary to the Commonwealth of Pennsylvania and must not be disclosed to un-authorized
More informationEnterprise Server Farm (ESF) Help Desk Procedures
Enterprise Server Farm (ESF) Help Desk Procedures Version 1.1 Date: November 6, 2008 SECURITY WARNING The information contained herein is proprietary to the Commonwealth of Pennsylvania and must not be
More informationACTIVE DIRECTORY RULES OF ENGAGEMENT
ACTIVE DIRECTORY RULES OF ENGAGEMENT Version: 1.14 Date: 03/21/2016 SECURITY WARNING The information contained herein is proprietary to the Commonwealth of Pennsylvania and must not be disclosed to un-authorized
More informationENTERPRISE DATA CENTER BACKUP AND RECOVERY OVERVIEW
BACKUP AND RECOVERY OVERVIEW Version 2.15 Date: 09/16/2014 SECURITY WARNING The information contained herein is proprietary to the Commonwealth of Pennsylvania and must not be disclosed to un-authorized
More information1B1 SECURITY RESPONSIBILITY
(ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,
More informationThe Bomgar Appliance in the Network
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
More informationMS-55115: Planning, Deploying and Managing Microsoft Project Server 2013
MS-55115: Planning, Deploying and Managing Microsoft Project Server 2013 Description The goal of this three-day instructor-led course is to provide students with the knowledge and skills necessary to effectively
More informationHow To Audit Telecommunication Services And Enterprise Security
EXECUTIVE DIGEST TELECOMMUNICATION SERVICES AND ENTERPRISE SECURITY INTRODUCTION This report, issued in March 2002, contains the results of our performance audit* of Telecommunication Services and Enterprise
More informationIntroduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
More informationCourse 55115: Planning, Deploying and Managing Microsoft Project Server 2013
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Course 55115: Planning, Deploying and Managing Microsoft Project Server 2013 Length: 3 Days Audience:
More informationHoneywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
More informationRetention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
More informationHow To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
More informationUnited States Department of Agriculture Agricultural Marketing Service Directive 3130.3 06/13/2008
United States Department of Agriculture Agricultural Marketing Service Directive 3130.3 I. PURPOSE DEVELOPMENT OF BROWSER-BASED APPLICATIONS This Directive provides guidance for the development and enhancements
More informationFIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
More informationSupplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
More informationSecuring access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
More informationRecommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
More informationDeveloping the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
More informationExam Information Guide
Exam Information Guide Exam Numbers: SABE201, SABE301 and SABE401 Certification Track: Business Objects Certified Professional BusinessObjects Enterprise (formerly BusinessObjects Enterprise Certified
More informationAltus UC Security Overview
Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...
More informationMusic Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
More informationSANGFOR SSL VPN. Quick Start Guide
SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully
More informationIT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time
More informationCourse Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion
Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,
More informationSecurity Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant
Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /
More informationMS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010
MS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Description: Days: 5 Prerequisites: This course will provide you with the knowledge and skills to configure and manage
More informationBusinessObjects Enterprise XI Release 2 Administrator s Guide
BusinessObjects Enterprise XI Release 2 Administrator s Guide BusinessObjects Enterprise XI Release 2 1 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,
More informationITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server Inhalte Teil 01 Network Architecture Standards Network Components and Terminology Network Architecture Network Media Access Control Methods
More information<Project Name> Solution Architecture Preliminary System Design
Solution Architecture Preliminary System Design Gate 2 Date: Version: Gate 2 Change Log Any moderate or significant changes to the solution
More informationVendor Audit Questionnaire
Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be
More informationYou need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. What should you do?
QUESTION 1 Your network contains the following: 20 Hyper-V hosts 100 virtual machines 2,000 client computers You need to recommend an update infrastructure design to meet the following requirements: Deploy
More informationDepartment of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government
Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft
More informationParallels Mac Management v4.0
Parallels Mac Management v4.0 Deployment Guide July 18, 2015 Copyright 1999 2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. All other marks and names mentioned herein may be trademarks
More informationInformation Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
More informationUpdating Your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008
MOC6416 Updating Your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 About this Course This five-day instructor-led course provides students with the knowledge and
More informationCMS Operational Policy for VPN Access to 3-Zone Admin and Development /Validation Segments
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for VPN Access to 3-Zone Admin and Development /Validation Segments January 9, 2008
More informationUpdating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008
Updating your Network Infrastructure and Active Directory Technology Skills to Windows Introduction This five day instructor led course provides students with the knowledge and skills to work with Network
More informationEntrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
More informationSecondary DMZ: DMZ (2)
Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or
More information55115 - Planning, Deploying and Managing Microsoft Project Server 2013
55115 - Planning, Deploying and Managing Microsoft Project Server 2013 Duration: 3 Days Course Price: $1,785 Software Assurance Eligible Course Description Course Overview The goal of this three-day instructor-led
More informationQ A F 0 3. ger A n A m client dell dell client manager 3.0 FAQ
DELL CLIENT MANAGER 3.0 FAQ dell client manager 3.0 FAQ Do i need to license dell client manager standard edition? 2 What are the system requirements and prerequisites for installation? 2 When installing
More informationCheck Point Security Administrator R70
Page 1 of 6 Check Point Security Administrator R70 Check Point Security Administration R70 Length Prerequisites 5 days* (recommended) Basic networking knowledge, knowledge of Windows Server and/or UNIX,
More informationDell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationUpdating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008
Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 Overview About this Course This five-day instructor-led course provides students with the knowledge and
More informationInfoView User s Guide. BusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 InfoView User s Guide BusinessObjects Enterprise XI Release 2 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,
More information6445A - Implementing and Administering Small Business Server 2008
6445A - Implementing and Administering Small Business Server 2008 Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course
More informationHow To Protect Your School From A Breach Of Security
SECURITY MANAGEMENT IT Security Policy (ITSP- 1) 1A Policy Statement District management and IT staff will plan, deploy, and monitor IT security mechanisms, policies, procedures, and technologies necessary
More informationSSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
More information70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
More informationUpdating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 (MS6416)
Duration: 5 days About this Course This five-day instructor-led course provides students with the knowledge and skills to work with Network Infrastructure and Active Directory technologies in Windows Server
More informationMicrosoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435
coursemonster.com/au Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 View training dates» Overview This course will provide students with an understanding
More informationhttp://support.oracle.com/
Contract Management System Architecture Data Sheet October 2012 Legal Notices Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle
More informationDell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS
Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationSystem Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
More informationSTEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended
More informationAD Self-Service Suite for Active Directory
The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.
More informationANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION
ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE COURSE: Windows 2003 Server COURSE NO: CSI 265 CREDIT HOURS: 3 hours of lecture weekly DEPARTMENT: CATALOG DESCRIPTION CSI 265 Windows 2003
More informationEmbracing Microsoft Vista for Enhanced Network Security
Embracing Microsoft Vista for Enhanced Network Security Effective Implementation of Server & Domain Isolation Requires Complete Network Visibility throughout the OS Migration Process For questions on this
More informationINCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
More informationCisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X
QUICK START GUIDE Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X 1 Package Contents 1 Powering On the ASA 2 Connecting Interface Cables and Verifying Connectivity
More informationPassword Reset PRO INSTALLATION GUIDE
Password Reset PRO INSTALLATION GUIDE This guide covers the new features and settings available in Password Reset PRO. Please read this guide completely to ensure a trouble-free installation. March 2009
More informationUnicenter Patch Management
Unicenter Patch Management Best Practices for Managing Security Updates R11 This documentation (the Documentation ) and related computer software program (the Software ) (hereinafter collectively referred
More informationCourse Outline: Course 10165: Updating Your Skills from Microsoft Exchange Server 2003 or Exchange
Course Outline: Course 10165: Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 Learning Method: Instructor-led Classroom Learning Duration: 5.00
More informationGRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
More informationNetworking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
More informationState of Wisconsin Enterprise Distributed Batch Scheduling Service Offering Definition (SOD)
State of Wisconsin Enterprise Distributed Batch Scheduling Service Offering Definition (SOD) Document Revision History Date Version Creator Notes Sep 19, 2008 - Sep 22, 2008 1.0 Tom Ober Initial draft
More informationCA Mobile Device Management 2014 Q1 Getting Started
CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informations@lm@n Microsoft Exam MB2-702 Microsoft Dynamics CRM 2013 Deployment Version: 6.1 [ Total Questions: 90 ]
s@lm@n Microsoft Exam MB2-702 Microsoft Dynamics CRM 2013 Deployment Version: 6.1 [ Total Questions: 90 ] Question No : 1 You install Microsoft Dynamics CRM on-premises. The Microsoft Dynamics CRM environment
More informationMS 10972A Administering the Web Server (IIS) Role of Windows Server
MS 10972A Administering the Web Server (IIS) Role of Windows Server Description: Days: 5 Prerequisites: This course provides students with the fundamental knowledge and skills to configure and manage Internet
More informationBusiness Portal for Microsoft Dynamics GP 2010. Field Service Suite
Business Portal for Microsoft Dynamics GP 2010 Field Service Suite Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views
More informationRemote Support Center 2.6.5. Installation Guide
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationGetting Started Guide
Getting Started Guide Operations Center 5.0 March 3, 2014 Legal Notices THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT
More informationAPPENDIX 8 TO SCHEDULE 3.3
EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.
More informationAltius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
More informationLarry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
More informationHow To - Deploy Cyberoam in Gateway Mode
How To - Deploy Cyberoam in Gateway Mode Cyberoam appliance can be deployed in a network in two modes: Gateway mode. Popularly known as Route mode Bridge mode. Popularly known as Transparent mode Article
More informationIntroduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
More informationCOMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY POLICY Name Of Policy: Security Audit Logging Policy Domain: Security Date Issued: 05/23/11 Date
More informationIBM Implementation Services for Power Systems IBM Systems Director
Sample Statement of Work for Services This an example and your Statement of Work may vary given your specific requirements and the related IBM engagement. IBM Implementation Services for Power Systems
More informationSAP Business Objects Security
SAP Business Objects Security Pal Alagarsamy President Business Intelligence Practice GloWiz Inc 1 GloWiz Inc GloWiz is an IT Staffing and Consulting company since 2005 We focus on Business Intelligence,
More informationInsightix Discovery & NAC. Lite Edition. Installation Guide. Version 3.0. May 2007. United States. International 945 Concord St.
Insightix Discovery & NAC Lite Edition Version 3.0 Installation Guide May 2007 United States International 945 Concord St. 13 Hasadna Street Framingham, MA 01701 Ra'anana, Israel 508.620.4788 +972.9.740.1667
More informationCourse Syllabus. 6416: Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008. Key Data.
Course Syllabus 6416: Updating your Network Infrastructure and Active Key Data Product #: 3702 Course #: 6416B Number of Days: 5 Format: Instructor-Led Certification Exams: This course helps you prepare
More informationIntroduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
More informationMicrosoft Dynamics GP Business Portal. Installation Guide Release 3.0
Microsoft Dynamics GP Business Portal Installation Guide Release 3.0 Copyright Copyright 2006 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility
More informationNCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
More informationUCI FISMA Core Program Procedures & Processes Frequently Asked Questions (FAQs)
Health Affairs Information Systems University of California, Irvine UCI FISMA Core Program Procedures & Processes Frequently Asked Questions (FAQs) April 11, 2012 Version 1.1 HAIS Coordination Copy The
More informationNetIQ Directory and Resource Administrator NetIQ Exchange Administrator. Installation Guide
NetIQ Directory and Resource Administrator NetIQ Exchange Administrator Installation Guide August 2013 Legal Notice NetIQ Directory and Resource Administrator is protected by United States Patent No(s):
More informationHow To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
More informationHow To Create A Network Access Control (Nac) Solution
Huawei Terminal Security Management Solution Create Enterprise Intranet Security Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security
More informationUnderstanding Connected DataProtector
Understanding Connected DataProtector Version 7.1 Includes Data Center Information 2003 Connected Corporation. All Rights Reserved. Connected, Connected DataProtector, Connected EmailOptimizer, iroam,
More informationAPPENDIX 8 TO SCHEDULE 3.3
APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE
More information70-647: Windows Server Enterprise Administration
70-647: Windows Server Enterprise Administration Course Introduction Course Introduction Chapter 01 - Planning for Active Directory Lesson 1: Logical Design The Forest How Will AD DS be Used? Requirements
More informationDeploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
More informationTable of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students
More informationBEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
More informationAppendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
More informationMCSA: Windows Server 2008
MCSA: Windows Server 2008 Course Description and Overview Overview SecureNinja's MCSA: Windows Server 2008 training and certification boot camp in Washington, DC will prepare Microsoft professionals to
More information