|
|
- Lesley Carroll
- 7 years ago
- Views:
Transcription
1 Pulse Policy Secure Supported Platforms Guide The current version of this product is now called Pulse Policy Secure. For more information, go to Product Release Published Revision 2015 by Pulse Secure, LLC. All rights reserved 1
2 Contents Introduction... 3 Administrator Web User Interface... 3 Pulse Secure Client Software... 4 Third-Party Wireless LAN Controller... 5 Third-Party Supplicants... 6 Agentless Access (Browsers)... 7 Agentless Access (Java-Based)... 9 Platform Support for Device Onboarding... 9 Platform Support for AAA MDM Solutions Authenticators in Layer 2 Network Access Control Deployments Endpoint Security Assessment Plug-in (ESAP) Compatibility Infranet Enforcers in Layer 3 Resource Policy Deployments IDP Devices in Coordinated Threat Control Deployments IF-MAP Compatibility Revision History by Pulse Secure, LLC. All rights reserved 2
3 Introduction This document describes the client environments and IT infrastructure that are compatible with this release. In this document, we identify compatibility testing for this release with the following terminology: Qualified Indicates that the item was systematically tested by QA for this release. Compatible Indicates that the item was not tested for this release, but based on testing done for previous releases, we support it. Pulse Secure supports all items listed as qualified or compatible. Administrator Web User Interface Table 1 lists supported platforms for the administrator user interface. Table 1: Admin User Interface Operating System Browsers/Java Qualified Compatible Windows Windows 8.1 Enterprise Windows 7 Enterprise, 64-bit Internet Explorer 11 Internet Explorer 10 Firefox 38 ESR Windows 8.1 Professional Windows 8 basic edition / Enterprise / Professional, 32-bit or 64-bit Windows 7 Ultimate / Professional / Home Basic / Home Premium, 32- bit or 64-bit Windows 7 SP1 Enterprise, 32-bit Windows Vista Enterprise / Ultimate / Business / Home-Basic / Home-Premium, 32-bit or 64-bit Internet Explorer 11 Internet Explorer 9.0 Internet Explorer 8.0 Internet Explorer 7.0 Firefox 3.0 and later Mac Mac OS 10.10, 64-bit Safari 8.0 Mac OS 10.9, 64-bit Safari 7.0 Mac OS 10.8, 64-bit Mac OS , 64-bit Mac OS , 32-bit Mac OS , 32-bit and 64- bit Safari 7.0 Safari 5.1 Safari by Pulse Secure, LLC. All rights reserved 3
4 Pulse Secure Client Software Table 2 lists platforms requirement for the Pulse Secure desktop client. Table 2: Pulse Secure Desktop Client Operating System Browsers/Java Qualified Compatible Windows Windows 8.1 Enterprise, 64-bit Windows 7 SP1 Enterprise, 64-bit Internet Explorer 11 Internet Explorer 10 Firefox 38 ESR Oracle JRE 8 Windows 8.1 Enterprise, 32-bit Windows 8 basic edition / Enterprise / Professional, 32-bit or 64-bit Windows 7 Ultimate / Professional / Home Basic / Home Premium, 32- bit or 64-bit Windows 7 SP1 Enterprise, 32-bit Windows Vista Enterprise / Ultimate / Business / Home-Basic / Home-Premium, 32-bit or 64-bit Internet Explorer 9.0 Internet Explorer 8.0 Internet Explorer 7.0 Firefox 3.0 and later Oracle JRE 7 and later Windows 10 Enterprise,64-bit Internet Explorer 11 Mac* Mac OS Mac OS 10.9, 64-bit Mac OS 10.8, 32-bit,64-bit Mac OS , 32-bit or 64-bit Mac OS , 32-bit Safari 8.0 Safari 7.0/ Oracle JRE 8 Safari 7.0 Oracle, JRE 7 Safari 5.1 Oracle, JRE 6 Safari 5.0 Oracle, JRE 6 *The Pulse client on Mac does not support by Pulse Secure, LLC. All rights reserved 4
5 Odyssey Access Client (OAC) 5.6Rx and 5.5Rx are compatible with this release. Table 3 lists platform requirements for OAC. Table 3: OAC Operating System Browsers/Java Qualified Compatible Windows Windows 7 SP1 Enterprise, 64-bit Internet Explorer 11 Firefox 38 ESR Oracle JRE 8 Windows 7 Ultimate / Professional / Home Basic / Home Premium, 32- bit or 64-bit Windows 7 SP1 Enterprise, 32-bit Windows Vista Enterprise / Ultimate / Business / Home-Basic / Home-Premium, 32-bit or 64-bit Internet Explorer 9.0 Firefox 3.0 and later Oracle JRE 6 and later Third-Party Wireless LAN Controller Table 4 lists platform requirements for third-party wireless LAN Controller. Table4: Third-Party Wireless Controller Platform Environment Qualified Compatible Cisco Cisco 2500 WLC [version ] --- AIR-CAP702I [ version is 15.2(4)JB6] Cisco catalyst 3850 [Cisco IOS Software, IOS-E Software, Catalyst L3 Switch Software (CAT3K_CAA- UNIVERSALK9-M), Version E ] --- AIR-CAP702I ( version is 15.3(3)JNB) Aruba Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Aruba 650 WLC [Aruba OS ] ---- AP-105 [ArubaOS Version ] Aruba 3400 WLC[Aruba OS ] AP-205 [ArubaOS Version ] Aurba Instant Access Point AP-205 [ ] 2015 by Pulse Secure, LLC. All rights reserved 5
6 Aruba 600 Series WLC Aruba 3200 Series WLC Aruba 3600 Series WLC Aruba Instant Access Point 200 Series Third-Party Supplicants Table 5 lists platform requirements for third-party supplicants. Table 5: Third-Party Supplicants Platform Environment Qualified Compatible Windows Windows 8.1 Enterprise, 64-bit Windows 7 SP1 Enterprise, 64-bit. Windows 8 basic edition / Professional / Enterprise,32-bit or 64-bit Windows 7 Ultimate / Professional / Home Basic / Home Premium, 32-bit or 64- bit Windows 7 SP1 Enterprise, 32-bit Windows Vista Ultimate / Business / Home-Basic / Home-Premium with SP 2, 32-bit or 64-bit Windows 10 Enterprise, 64-bit. Mac Mac OS 10.10, 64-bit Mac OS 10.9, 64-bit Mac OS 10.8, 32-bit/64-bit Mac OS , 64-bit Mac OS , 32-bit Mac OS , 32-bit, and 64-bit Google Android Android 5.0 Android 4.4 and later Apple ios ios 8.0 ios 7.0 and later 2015 by Pulse Secure, LLC. All rights reserved 6
7 Agentless Access (Browsers) Table 6 lists desktop platform requirements for the agentless access using browsers. Table 6: Agentless Access (Browsers) Operating System Browsers/Java Qualified Compatible Windows Windows 8.1 Enterprise Windows 7 SP1 Enterprise, 64-bit Internet Explorer 11 Internet Explorer 10 Firefox 38 ESR Oracle JRE 8 Windows 8.1 Professional Windows 8 basic edition / Enterprise / Professional, 32-bit or 64-bit Windows 7 Ultimate / Professional / Home Basic / Home Premium, 32- bit, or 64-bit platforms Windows 7 SP1 Enterprise, 32-bit or 64-bit Windows Vista Ultimate / Business / Home-Basic / Home- Premium with SP 2, 32-bit, or 64- bit platforms Internet Explorer 11 Internet Explorer 10 Internet Explorer 9.0 Internet Explorer 8.0 Internet Explorer 7.0 Firefox 3.0 and later Oracle JRE 6 and later Windows 10 Enterprise,64-bit Internet Explorer 11 Mac Mac OS 10.10, 64-bit Mac OS 10.9, 64-bit Mac OS 10.8, 32-bit /64-bit Mac OS , 32-bit Mac OS , 32-bit or 64-bit Safari 8.0 Safari 7.0 / Oracle JRE 8 Safari 7.0 Sun JRE 7 Safari 5.1 Sun JRE 6 Safari 5.0 Sun JRE 6 Linux Ubuntu 14.x opensuse 12.1 Firefox 38 ESR Oracle JRE 8 opensuse 10.x and 11.x Ubuntu 9.10, 10.x, and 11.x Red Hat Enterprise Linux 5 Firefox 3.0 and later Oracle JRE 6 and later Solaris 10, 32-bit Solaris Firefox 38 ESR 2015 by Pulse Secure, LLC. All rights reserved 7
8 Solaris 10, 32-bit Mozilla 2.0 and later Table 7 lists requirements for the smart mobile devices that can gain agentless access to the network using the Web browsers indicated. Table 7: Smart Mobile Devices for Layer 3 Access Device/Operating System Browsers/Java Qualified Compatible Apple ios ios 8.0 Safari browser ios 7.0 and later Safari browser Google Android Android Android native browser Android smart phones with Android 4.4 and later Android native browser RIM Blackberry Blackberry OS 10 Blackberry native browser Blackberry smart phones with Blackberry OS 6 and later Blackberry native browser Windows Mobile Windows Mobile 8 Internet Explorer Windows Mobile smart phones with Windows Mobile 6.5 Internet Explorer Symbian Symbian Devices with Symbian OS version 9.3: S60 3rd Edition Feature Pack 2 and later Symbian Native Browser Symbian Devices with Symbian OS version 9.3: S60 3rd Edition Feature Pack 2 and later Symbian Native Browser 2015 by Pulse Secure, LLC. All rights reserved 8
9 Agentless Access (Java-Based) Table 8 lists platform requirements for the agentless access that is Java-based. Table 8: Agentless Access (Java-Based) Operating System Browsers/Java Qualified Compatible Linux opensuse 12.1, 32-bit Ubuntu 14.x, 32-bit Firefox 38 ESR Oracle JRE 8 opensuse 11.x and 10.x Ubuntu 11.x, 10.x, and 9.10 Red Hat Enterprise Linux 5 Firefox 3.0 and later Oracle JRE 6 and later Platform Support for Device Onboarding Table 9 lists platform requirements for device onboarding features that are qualified with this release. Table 9: Device Onboarding Features Operating System/Feature VPN Certificate Wifi ios Android Windows 8.1 Desktop Windows 7 Mac OS 10.10, Safari 8.x Mac OS 10.9, Safari 7.x 2015 by Pulse Secure, LLC. All rights reserved 9
10 Platform Support for AAA Table 10 lists platform requirements for third-party AAA servers that are compatible with this release. Table 10: Third-Party AAA Servers Third-Party AAA Server Qualified Compatible Active Directory* Windows 2012 R2 Windows 2008 R2 Windows 2003 LDAP using Active Directory Windows 2012 R2 Windows 2008 R2 Windows 2003 LDAP using Novell edirectory Novell Client for Windows 2000 / P Version 4.91 SP2 LDAP using Sun ONE iplanet Server Sun ONE Directory Server 5.2 LDAP with Greatbay Endpoint Profiler LDAP with Pulse Secure Profiler Beacon 4.1.1_11 LDAP (other standards-compliant servers) OpenLDAP Authentication and authorization based on user attributes or group RADIUS Steel-Belted Radius (SBR) 6.1 RSA Authentication Manager 6.1 Defender 5.2 Windows IAS 2008 RADIUS (other standardscompliant servers) ACE RSA Authentication Manager 7.1 SP4 RSA Authentication Manager 6.1 RSA Authentication Manager 5.2 Siteminder CA Siteminder 12.0 SP3 CA Siteminder 6.0 SP4 CA Siteminder 5.5 Certificate Windows Server 2008 R2 Certificate Services RSA Keon Certificate Manager Certificate (other standards-compliant servers) SQL Oracle 11g Express Edition * Additional requirements and limitations apply. See Active Directory 2015 by Pulse Secure, LLC. All rights reserved 10
11 MDM Solutions Table 11 lists the requirements for integration with mobile device management (MDM) vendors. Table 11: MDM Vendors Solution Qualified Compatible AirWatch Appliance OS Virtual appliance OS MobileIron Cloud service Appliance OS Virtual appliance OS Authenticators in Layer 2 Network Access Control Deployments Table 12 lists the authenticators that have been qualified with this release authenticators are Layer 2 Ethernet switches. In addition to the qualified platforms, other standards-compliant Ethernet switches are compatible. Table 12: Authenticators Platforms Hardware Models Junos OS Release Dynamic VLAN RFC 3580 Qualified Compatible E Series E 8200 E 6200 E 4500 E 4200 Junos OS 12.3R10.2 Yes Cisco Series Cisco 2960 Cisco 3850 SR Series SR 100 Junos OS D35.1 No 2015 by Pulse Secure, LLC. All rights reserved 11
12 SR Series SR 3400 SR 1400 SR 650 SR 240 SR 220 SR 210 Junos OS D35.1 Yes J Series J6350, J4350, J2350, J2320 Junos OS D10 Yes (other standards-compliant Ethernet switches) Endpoint Security Assessment Plug-in (ESAP) Compatibility ESAP package version is the minimum version to be compatible with this release. The default version for ESAP is Infranet Enforcers in Layer 3 Resource Policy Deployments Table 13 lists Infranet Enforcers that have been qualified with this release. Infranet Enforcers are enforcement points in Layer 3 resource policy deployments. In addition to the qualified platforms, other Screen OS, SR Series, and E Series models are compatible, provided the firewall or switch model and software version supports integration with UAC. Table 13: Third-Party AAA Servers Platform Hardware Models Software Versions *ScreenOS SSG550 SSG20 ISG-1000 ScreenOS 6.3.0R19 Palo Alto Network PA 500 PA 3000 OS SR Series SR 650 SR 240 Junos OS D35.1 E Series E 4200 Junos OS 12.3R by Pulse Secure, LLC. All rights reserved 12
13 IDP Devices in Coordinated Threat Control Deployments Table 14 lists the IDP devices that are compatible. Table 14: IDP Devices in Coordinated Threat Control Deployments Hardware Models Software Versions IDP-8200 IDP-800 IDP-250 IDP R3 (Standalone) IF-MAP Compatibility Table 15 lists the IF-MAP clients that are supported. Table 15: IF-MAP clients IF-MAP Client Qualified Compatible Connect Secure Policy Secure Third-party IF-MAP 1.x clients Revision History Table 16 lists the revision history for this document. Table 16: Revision History Revision 01/31,March 2015 Description Initial Publication 2015 by Pulse Secure, LLC. All rights reserved 13
Pulse Policy Secure. Supported Platforms Guide. Product Release 5.1. Document Revision 1.0 Published: 2014-12-15
Pulse Policy Secure Supported Platforms Guide Product Release 5.1 Document Revision 1.0 Published: 2014-12-15 2014 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700 Zanker Road, Suite 200
More informationPulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 9.0 Published: 2016-01-05
Pulse Connect Secure Supported Platforms Guide Product Release 8.1 Document Revision 9.0 Published: 2016-01-05 Pulse Connect Secure Supported Platforms Guide 2700 Zanker Road, Suite 200 San Jose, CA 95134
More informationPulse Connect Secure. Supported Platforms Guide. Product Release 8.0. Document Revision 2.0 Published: 2016-01-05
Pulse Connect Secure Supported Platforms Guide Product Release 8.0 Document Revision 2.0 Published: 2016-01-05 2015 by Pulse Secure, LLC. All rights reserved 1 2700 Zanker Road, Suite 200 San Jose, CA
More informationPulse Connect Secure. Supported Platforms Guide. Product Release 8.1. Document Revision 3.0 Published: 2015-03-31
Pulse Connect Secure Supported Platforms Guide Product Release 8.1 Document Revision 3.0 Published: 2015-03-31 Pulse Connect Secure Supported Platforms Guide 2700 Zanker Road, Suite 200 San Jose, CA 95134
More informationJunos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document
Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document Junos Pulse Access Control Service 4.4R4-MDM Build #22687 OAC Version 5.60.22687 Junos Pulse Client Version 4.0.4.38461 Juniper
More informationUnified Access Control 4.0R1. Supported Platforms. IC Build 14913. OAC Build 5.2.14913. Junos Pulse Release 1.5.0.6541.
Access Solutions Unified Access Control 4.0R1 Supported Platforms IC Build 14913 OAC Build 5.2.14913 Junos Pulse Release 1.5.0.6541, Inc. 1194 rth Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or
More informationPlatform Guide. SA Supported Platforms. Service Package Version 7.2R1
Platform Guide Service Package Version 7.2R1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net June 2012 Rev 7.2R1 Page i Contents Introduction...
More informationPlatform Guide. SA Supported Platforms. Service Package Version 7.4R1
Platform Guide Service Package Version 7.4R1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net February 2013 Pageiof9 Contents Introduction...
More informationPlatform Guide. SA Supported Platforms. Service Package Version 7.3R1
Platform Guide Service Package Version 7.3R1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net September 2012 Pageiof9 Contents Introduction...
More informationPlatform Guide. SA Supported Platforms Service Package Version 7.4R7
Platform Guide Service Package Version 7.4R7 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net June 2014 Pageiof9 Contents Introduction...
More informationPlatform Guide. SA Supported Platforms. Service Package Version 7.3R1
Platform Guide Service Package Version 7.3R1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net September 2012 Pageiof9 Contents Introduction...
More informationJunos Pulse Supported Platforms Guide
Junos Pulse Platforms Guide 5.0R1 November 2013 Contents Introduction........................................................ 2 Documentation...................................................... 2 Hardware
More informationJunos Pulse Supported Platforms
Platforms Guide Junos Pulse Platforms Release 4.0 R1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net February 2013 Copyright 2010,
More informationJuniper SSL VPN Notes Page 1
Juniper SSL VPN Notes Page 1 The Juniper SSL VPN is a full-featured appliance using SSL protocol to allow remote computers to securely access our organization s resources with a standard browser. The types
More informationPulse Secure Desktop Client Supported Platforms Guide
Pulse Secure Desktop Client Platforms Guide Pulse Secure Desktop Client v5.1 For more information on this product, go to www.pulsesecure.net/products. Product Release Published Document Version 5.1R5 October
More informationPulse Secure Desktop Client
Pulse Secure Desktop Client Platforms Guide Product Release 5.1 Document Revision 2.0 Published: 2015-02-25 2015 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700 Zanker Road, Suite 200
More informationSA Supported Platforms
Platform Guide SA Supported Platforms Service Package Version 7.1R4 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net September 2011
More informationPulse Secure Desktop Client Supported Platforms Guide
Pulse Secure Desktop Client Platforms Guide Pulse Secure Desktop Client v5.1 For more information on this product, go to www.pulsesecure.net/products. Product Release Published Document Version 5.1R5 October
More informationJunos Pulse Supported Platforms
Supported Platforms Guide Junos Pulse Supported Platforms Release 2.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Sep 25, 2011
More informationSA Supported Platforms
Platform Guide SA Supported Platforms Service Package Version 7.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net October 18, 2010
More informationRequirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4)
Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets
More informationPulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published: 2015-02-10
Pulse Policy Secure RADIUS Server Management Guide Product Release 5.1 Document Revision 1.0 Published: 2015-02-10 2015 by Pulse Secure, LLC. All rights reserved iii Pulse Secure, LLC 2700 Zanker Road,
More informationPulse Policy Secure. Data Sheet. Published Date
Data Sheet Published Date July 2015 Product Overview Pulse Policy Secure is a market leading network and application access control (NAC) solution that ensures network access only to authorized and secured
More informationOrchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer
Orchestrated Security Network Automated, Event Driven Network Security Ralph Wanders Consulting Systems Engineer Orchestrated Security Network! " TCG/ TNC Architecture! " IF-MAP! " Use cases of IF-MAP!
More informationSA Supported Platforms
Guide SA Supported s Service Package Version 6.5 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 or 888 JUNIPER www.juniper.net April 16, 2010 Contents Introduction...
More informationKAIST SSL VPN USER MANUAL 2014. 5
KAIST SSL VPN USER MANUAL 2014. 5 목차 제 1장 DESKTOP USER 1. Microsoft Windows 2. MACKINTOSH MAC 제 2장 MOBILE USER (p83) 1. ANDROID PHONE 2. IPHONE 1.2.1 MAC 10.7 USER Above p13 - New-install p14 - Re-install
More informationMRU Secure Remote Access Service (SRAS) External User Guide
MRU Secure Remote Access Service (SRAS) External User Guide The MRU Secure Remote Access Service (SRAS) allows MRU approved vendors and external clients, restricted remote access to internal computing
More informationCA Service Desk Manager Release 12.5 Certification Matrix
CA Service Desk Manager Release 12.5 Certification Matrix Last Updated: February 11, 2014 End-of-Service: May 31, 2013 CA Service Desk Manager will support service-packs and point-releases of Operating
More informationRequirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6)
Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets
More informationXenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
More informationMDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
More informationMRU Secure Remote Access Service (SRAS) External User Guide
MRU Secure Remote Access Service (SRAS) External User Guide The MRU Secure Remote Access Service (SRAS) allows MRU approved vendor and external clients restricted remote access to MRU internal computing
More informationSA Supported Platforms
Platform Guide SA Supported Platforms Service Package Version 7.0R6 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 or 888-JUNIPER www.juniper.net June 2011 Copyright
More informationThis document lists the configurations that have been tested for the Oracle Primavera P6 version 7.0 release.
Oracle Primavera P6 Tested Configurations Release Version: 7.0 Date: November 2014 Revision: 7.0.0.0.16 This document lists the configurations that have been tested for the Oracle Primavera P6 version
More informationContents. Primavera P6 Tested Configurations Release Version: 6.2.1 Date: December 2013 Revision: 6.2.1.0.7
Primavera P6 Tested Configurations Release Version: 6.2.1 Date: December 2013 Revision: 6.2.1.0.7 This document lists the configurations that have been tested for the Primavera P6 version 6.2.1 release.
More informationCompatibility Matrixes. Blackboard Academic Suite
Compatibility Matrixes Application Pack 3 (Release 6.3) Blackboard Learning System Blackboard Community System Blackboard Learning System - Basic Edition (Release 2.3) Blackboard Content System PRODUCT
More informationLANDESK Service Desk. Supported Platforms and Feature Compatibility
LANDESK Service Desk Supported Platforms and Feature Compatibility LANDESK SERVICE DESK SUPPORTED PLATFORMS This document contains information, which is the confidential information and/or proprietary
More informationBYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
More informationGood MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
More informationOn-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
More informationCisco TrustSec How-To Guide: Planning and Predeployment Checklists
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...
More informationSAP NetWeaver 7.4 Planning Product Availability Matrix (Planning PAM)
SAP NetWeaver 7.4 Planning Product Availability Matrix (Planning PAM) with all EHPs February, 2014 Disclaimer: This document represents current planning for NW only and not for the SAP products using NW
More informationOracle Desktop Virtualization
Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on
More informationSystem requirements for Qlik Sense. Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved.
System requirements for Qlik Sense Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech,
More informationTested configuration for Major versions of Primavera:-
Tested configuration for Major versions of Primavera:- s 7:- This configurations that have been tested for the Primavera P6 version 7.0 release is shown below. s Generic Platform Platform Collation Page/Locale
More informationKaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
More informationSystem requirements. Java SE Runtime Environment(JRE) 7 (32bit) Java SE Runtime Environment(JRE) 6 (64bit) Java SE Runtime Environment(JRE) 7 (64bit)
Hitachi Solutions Geographical Information System Client Below conditions are system requirements for Hitachi Solutions Geographical Information System Client. 1/5 Hitachi Solutions Geographical Information
More informationMicrosoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OS X Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-04-02
More informationWhat's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise
What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise Upgrade paths Enhancements to the setup application Administrators can upgrade to BlackBerry Enterprise Server 5.0 SP4 for Novell
More informationPassTest. Bessere Qualität, bessere Dienstleistungen!
PassTest Bessere Qualität, bessere Dienstleistungen! Q&A Exam : JN0-314 Title : Junos Pulse Access Control, Specialist (JNCIS-AC) Version : Demo 1 / 6 1.A customer wants to create a custom Junos Pulse
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationMeasurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member
More informationSNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution
More informationCisco Secure Access Control Server 4.2 for Windows
Cisco Secure Access Control Server 4.2 for Windows Overview Q. What is Cisco Secure Access Control Server (ACS)? A. Cisco Secure ACS is a highly scalable, high-performance access control server that operates
More informationFAQS. You can schedule a WebEx session ahead or start it instantly in your choice of ways:
FAQS What is WebEx? WebEx is an easy way to exchange ideas and information with anyone, anywhere. It combines real-time desktop sharing with phone conferencing, so everyone sees the same thing as you talk.
More informationSA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationTidspunkt 18-08-2015 11:58 01-07-2015 00:00-18-08-2015 23:59 (49 dag(e)) Operativsystem (OS) fordelt på browsere Total: 267852. Safari9 ios 7921 100%
Indstillinger Tidspunkt 18-08-2015 11:58 Periode 01-07-2015 00:00-18-08-2015 23:59 (49 dag(e)) Operativsystem (OS) fordelt på browsere Total: 267852 Safari9 ios 7921 100% MAC OS X 1 0% Safari8 ios 572
More informationvrealize Automation Support Matrix
vrealize Automation Support Matrix vrealize Automation 6.x and 7.x 31 Mar 2016 To find the most up-to-date technical documentation, see http://www.vmware.com/support/pubs/vcac-pubs.html. The VMware Web
More informationRoadmap to Solving Enterprise Mobility
Roadmap to Solving Enterprise Mobility OUTLINE Enterprise Mobility Problem Start with email and device security Workspace is the right solution for existing assets How to build new apps? Bringing it all
More informationDeploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
More informationCasper Suite. Security Overview
Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite
More informationCA Productivity Accelerator v12.1.0.1:
CA Productivity Accelerator v12.1.0.1: Technical Specifications CA Productivity Accelerator is a single, synchronized content development platform which allows organizations deliver a broad range of user
More informationSystem Requirements and Platform Support Guide
Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationClient System Requirements for Brainloop Secure Dataroom as of Version 8.30
Client System Requirements for Brainloop Secure Dataroom as of Version 8.30 Copyright Brainloop AG, 2004-2014. All rights reserved. Document version 2.0 All trademarks referred to in this document are
More informationHost Checker. Configuration Guide
Host Checker Configuration Guide Overview... 2 Client Side requirements for Host Checker:... 2 Qualified platforms:... 2 Compatible platforms:... 2 Windows clients... 3 Installer Package Files and File
More informationMicrosoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OSX Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-02-12
More informationSystem Requirements for Microsoft Dynamics NAV 2016
System Requirements for Microsoft Dynamics NAV 2016 Microsoft Dynamics NAV 2016 The following sections list the minimum hardware and software requirements to install and run Microsoft Dynamics NAV 2016.
More informationBYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service
BYOD How-To Guide Securely deliver business applications and data to BYOD using Workspace as a Service WORKSPOT UNDERSTANDS END USER COMPUTING AMITABH SINHA, CEO PUNEET CHAWLA, CTO (GM XenApp/XenDesktop,
More informationBES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
More informationTrustSec How-To Guide: On-boarding and Provisioning
TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
More informationIBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
More informationThis document is provided to you by ABC E BUSINESS, Microsoft Dynamics Preferred partner. System Requirements NAV 2016
This document is provided to you by ABC E BUSINESS, Microsoft Dynamics Preferred partner. System Requirements NAV 2016 Page 1 System Requirements NAV 2016 Microsoft Dynamics NAV Windows Client Requirements
More informationRSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method
RSA envision Supported Event Sources A Actividentity 4TRESS AAA Server - version 6.4.1 AirDefense AirDefense Enterprise Server - version 7.2 Airmagnet Airmagnet Enterprise - version 7.5.0 Apache HTTP Server
More informationIC Series Unified Access Control Appliances, UAC Agent, Junos Pulse and Enforcement Points
DATASHEET Unified Access Control IC Series Unified Access Control Appliances, UAC Agent, Junos Pulse and Enforcement Points Product Overview Network access control ensures users and devices are authorized
More informationGlobalProtect Overview
GlobalProtect Overview Whether checking email from home or updating corporate documents from the airport, the majority of today's employees work outside the physical corporate boundaries. This increased
More informationSystem Requirements for Microsoft Dynamics NAV 2016
1 of 13 19.01.2016 17:52 System Requirements for Microsoft Dynamics NAV 2016 Microsoft Dynamics NAV 2016 The following sections list the minimum hardware and software requirements to install and run Microsoft
More informationIBM Unica Enterprise Products Version 8.6.0 Publication Date: May 26, 2014. Recommended Software Environments and Minimum System Requirements
IBM Unica Enterprise Products Version 8.6.0 Publication Date: May 26, 2014 Recommended Software Environments and Minimum System Requirements Copyright Copyright IBM 2014 IBM Corporation Reservoir Place
More informationRSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION
RSA ACCESS MANAGER Web Access Management Solution ESSENTIALS Secure Access Enforces access to Web applications based on risk and context Centralizes security and enforces business policy Web Single Sign-on
More informationCompatibility Matrix. VPN Authentication by BlackBerry. Version 1.7.1
Compatibility Matrix VPN Authentication by BlackBerry Version 1.7.1 Published: 2015-07-09 SWD-20150709134854714 Contents Introduction... 4 Legend...5 VPN Authentication server... 6 Operating system...6
More informationHow To Write A Test Drive For Kaspersky Anti Virus 6.0 For Windows Server (For Windows)
Kaspersky Anti-Virus >> Enterprise Proof of Concept (PoC) Request Form Dear Kaspersky Lab Prospect, To facilitate the proof of concept (PoC) process, we require the following form which documents your
More informationThe operating system requirements listed in this document include the most current patches and service packs.
System requirements The Quark Publishing Platform system requirements listed below are baseline requirements, but your number of users, number of assets, and number of asset revisions affect system performance.
More informationSetting up an icap Server for ISG- 1000/2000 AV Support
Application Note Setting up an icap Server for ISG- 1000/2000 AV Support Version 1.1 Ronald Ng AJTAC Engineer AV/DI/UF Specialist Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA
More informationPOLICY SECURE FOR UNIFIED ACCESS CONTROL
White Paper POLICY SECURE FOR UNIFIED ACCESS CONTROL Enabling Identity, Role, and Device-Based Access Control in a Simply Connected Network Copyright 2014, Pulse Secure LLC 1 Table of Contents Executive
More informationDell Enterprise Mobility Management
Dell Enterprise Mobility Management Comprehensive mobile enablement solution enables your unique mobility/byod strategy Secure the business. Empower the user. It s no secret that employees who use mobile
More informationPlatform support for UNIT4 Milestone 4
Platform support for UNIT4 Milestone 4 Agresso Web The following HTML5 compatible web browsers are supported for accessing Agresso Web: Browser Type Platform Notes Internet Explorer 11** Last tested on
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationBring Your Own Device:
Bring Your Own Device: Finding the perfect balance between Security, Performance, Flexibility & Manageability SECURELINK WHITEPAPER 2012 By Frank Staut Management summary This white paper discusses some
More informationCisco Identity Services Engine
Cisco Identity Services Engine Secure Access Stefan Dürnberger CCIE Security Sourcefire Certified Expert Most organizations, large and small, have already been compromised and don t even know it: 100 percent
More informationSystem Requirements for Microsoft Dynamics NAV 2016
Page 1 of 7 System Requirements for Microsoft Dynamics NAV 2016 Microsoft Dynamics NAV 2016 The following sections list the minimum hardware and software requirements to install and run Microsoft Dynamics
More informationIntegrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
More informationPULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway.
PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Published Date July 2015 Contents Executive Summary 3 Introduction
More informationJUNOS PULSE APPCONNECT
White Paper JUNOS PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Copyright 2014, Juniper Networks, Inc. 1 Table of
More informationCisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1996-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are the exclusive properties of BMC Software, Inc., are registered
More informationRecommended operating systems and software for end user services. Operating systems and software not supported for end user services
Recommended operating systems and software for end user services There are different requirements for different features in Office 365 Beta Beta, but the following list will work with every feature: Windows
More informationJuniper Networks Unified Access Control (UAC) and EX-Series Switches
White Paper Juniper Networks Unified Access Control (UAC) and EX-Series Switches Meeting Today s Security Challenges with End-to-End Network Access Control Juniper Networks, Inc. 1194 North Mathilda Avenue
More informationSecure Access Using VPN
Secure Access Using VPN WHAT IS CISCO SSL VPN? Cisco is the brand name of the VPN appliance (hardware). The SSL VPN stands for Secure Sockets Layer Virtual Private Network. SSL VPN is a service that allows
More informationSNOW LICENSE MANAGER (8.X)... 4
SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Unix Client for OS
More informationNetwork Access Security It's Broke, Now What? June 15, 2010
Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's
More information