EventTracker: Integrating McAfee epolicy Orchestrator
|
|
- Rebecca Stevens
- 7 years ago
- Views:
Transcription
1 EventTracker: Integrating McAfee epolicy Orchestrator Publication Date: Jan 18, 2012 EventTracker 8815 Centre Park Drive Columbia MD
2 About This Guide Purpose This guide will help you in configuring epo, Trap Tracker and EventTracker to receive McAfee epolicy Orchestrator events. You will find the detailed procedures required for monitoring epolicy by McAfee. Intended Audience Administrators who are assigned the task to monitor and manage events using EventTracker. Scope The configurations detailed in this guide are consistent with EventTracker Enterprise version 7.x and before, and McAfee epolicy Orchestrator 4.5 and later. 1
3 Table of Contents Overview... 3 Pre-requisite... 3 Configure McAfee epolicy Orchestrator to log all client events... 3 Configure McAfee epolicy Orchestrator to send all events as SNMP traps to Trap Tracker... 4 Add SNMP server... 4 Create automatic response rule... 5 Trap Tracker configuration... 7 Import McAfee epo knowledge pack into EventTracker To import Category To import Alerts To import Scheduled Reports Verify McAfee epo knowledge pack in the EventTracker Verify McAfee categories Verify McAfee alerts Verify McAfee scheduled reports Sample Analysis report
4 Overview In order to monitor McAfee epolicy Orchestrator 4.6 in EventTracker, you need to perform the configurations as below. Configure McAfee epolicy Orchestrator to log all client events. Configure McAfee epolicy Orchestrator to send all events as SNMP traps to Trap Tracker. Configure Trap Tracker to send events to EventTracker system. Pre-requisite EventTracker should be installed with Trap tracker MacAfee epolicy Orchestrator 4.6 (or later) should be installed Per McAfee EPO console needs one trap tracker license. Configure McAfee epolicy Orchestrator to log all client events 1 Launch McAfee epolicy Orchestrator. 2 Enter appropriate user credentials, and log in. 3 Click Menu on the navigation bar, click Configuration, and then click Server settings. 4 In Setting Categories, click Event Filtering. NOTE: On the right side, the message should be The agent forwards: All events to the server. 5 To change the message (if required), click the Edit button. 6 Select appropriate option, and then click the Save button. 7 In Setting categories, click Event Notifications. Here you can set the time interval at which epo notifications can be sent to Automatic responses. 8 To change the Evaluation Interval, click the Edit button. 9 Enter the required time in Minutes text box, and then click the Save button. 3
5 Configure McAfee epolicy Orchestrator to send all events as SNMP traps to Trap Tracker Add SNMP server Once the automation is completed, you must register the SNMP server to communicate with. To add the SNMP server, 1 Click Menu on the navigation bar, click Configuration, and then click Registered Servers. 2 Click the New Server button. Figure 1 3 Select Server type as SNMP server. 4 Enter the name and description of the server. NOTE: The server name should be name of Trap Tracker or EventTracker server. 5 Click the Next button. 6 Enter appropriate address. NOTE: The address would be DNS name or IP address. 7 Enter SNMP version, Security details, and then click the Save button. 4
6 Create automatic response rule 1 Click Menu on the navigation bar, click Automation, and then click Automatic responses. Figure 2 2 Click the Actions button, and then click New response or click Edit to an existing rule. McAfee epo opens Response Builder page 3 In the Description tab, Enter the response s name in the Name box. From the Event Group dropdown, click event group as epo Notification Events. Click Event Type as Threat. Click Enabled in the Status to enable the response. 4 After making appropriate changes, click the Next button. 5 In the Filter tab, verify the criteria which should be Defined at System is in group or subgroup, and its value will be My Organization. 6 Click the Next button. 7 In the Aggregation tab, make the required changes to define when the event triggers the rule, and then click the Next button. 8 In the Actions tab, select Send SNMP trap option from the dropdown. 5
7 Figure 3 9 Click target SNMP server from the SNMP Servers, individually select all the values in Available Type, and then click the arrow button. Figure 4 10 Click the Next button. 11 In the Summary tab, verify the updated details. 6
8 Figure 5 12 Click the Save button. NOTE: In the above steps, we have configured only Event type Threat to send events as SNMP trap. To configure epo to send all events as SNMP trap, repeat the above steps for Event type Client and Server. Trap Tracker configuration 1 Launch EventTracker Control panel. 2 Double click Trap Tracker. 3 Click the Options menu, and then click Configuration. Figure 6 7
9 4 Click Forward all traps to EventTracker Manager checkbox. 5 Verify Destination and Port number, and then click the OK button. 6 Click the Tools menu, and then click MIB complier. EventTracker opens MIB compiler. Figure 7 7 Click the File menu, and then click Compile one MIB. EventTracker displays Open MIB file pop-up window. 8 Click NAI-MIB.mib file, and then click the Open button. EventTracker displays confirmation message box. Figure 8 8
10 9 Click the Yes button. EventTracker displays a window and prompts to provide the missing module. Figure 9 10 Click the Browse button. EventTracker displays Open window to search for the module. Figure 10 NOTE: The path for the modules will be <install dir>\traptracker\smi\mibs\ietf. 11 In the Open window, search the missing module, and then click the Open button. 9
11 NOTE: For all the missing modules, EventTracker will prompt you to provide the same. Please follow the steps 10 and 11 to add the missing modules. Once all the required modules are added, EventTracker returns to MIB compiler and displays a success message in the bottom pane. Figure Click the File menu, and then click Compile one MIB option. EventTracker displays Open MIB file pop-up window. 13 Click TVD-MIB.mib file, and then click the Open button. EventTracker displays confirmation window. 14 Click the Yes button. 15 Click the File menu, and then click Compile one MIB option. EventTracker displays Open MIB file pop-up window. 16 Click EPO-MIB.mib file, and then click the Open button. EventTracker displays confirmation window. 10
12 17 Click the Yes button. NOTE The MIB files should be compiled in the sequence as below: NAI-MIB.mib TVD-MIB.mib EPO-MIB.mib You need to manually compile the MIB files only for EventTracker Enterprise version 7.2 and before. The later releases will do the compilation automatically. To add MIB files to the disk, click the File menu, and then click Save (OR) click the save icon on the toolbar. 11
13 Import McAfee epo knowledge pack into EventTracker 1 Launch EventTracker Control Panel. 2 Double click Import Export Utility. 3 Click the Import tab. 4 Import Category/ Alert/ Scheduled reports as given below. To import Category 1 Click Category option, and then click the browse button. 2 Locate the McAfee EPO categories.iscat file, and then click the Open button. 3 Click the Import button to import the categories. To import Alerts 1 Click Alert option, and then click the browse button. 2 Locate the McAfee EPO Alerts.isalt file, and then click the Open button. 3 Click the Import button to import the alerts. To import Scheduled Reports 1 Click Scheduled Report option, and then click the browse button. 2 Locate the McAfee EPO Threat analysis report.issch file, and then click the Open button. 3 Click the Import button to import the scheduled reports. 12
14 Verify McAfee epo knowledge pack in the EventTracker Verify McAfee categories 1 Logon to EventTracker Enterprise. 2 Click the Admin dropdown, and then click Categories. 3 In the Category Tree, expand Antivirus. Here you will find the imported categories under McAfee EPO. Verify McAfee alerts Figure 12 1 Logon to EventTracker Enterprise. 2 Click the Admin dropdown, and then click Alerts. 3 In the Search field, type McAfee, and then click the Go button. Alert Management page will display all the imported alerts. 13
15 Figure 13 4 To activate the imported alerts, select the respective checkbox in the Active column. EventTracker displays message box. Figure 14 5 Click the OK button, and then click the Activate now button. NOTE: You can select alert notification such as Beep, , and Message etc. For this, select the respective checkbox in the Alert management page, and then click the Activate Now button. 14
16 Verify McAfee scheduled reports 1 Logon to EventTracker Enterprise. 2 Click the Analysis tab. 3 In the Actions pane, click Defined. EventTracker displays Defined Analysis page. Figure 15 Here you can find imported Scheduled reports as McAfee HIPS threat detail report. 4 Select the imported analysis, and then click the Schedule button. 5 Select the Groups/Systems/All Systems for analysis, and then click the Next >> button. 6 Select the Schedule and More options, and then click the Next >>button. 7 Select or add column(s) to display, and then click the Next >>button. 8 Enter Refine and Filter criteria, and then click the Next >>button. 9 Enter Title and description for the analysis, and then click the Next >>button. 10 Crosscheck Disk cost analysis details. 11 Configure the Publishing options as required, and then click the Next >>button. 12 Click the Schedule button. EventTracker displays message box. 15
17 Figure Click the OK button. 16
18 Sample Analysis report EPO Threat Event Details Analysis 17
19 18
EventTracker: Integrating Imperva SecureSphere
EventTracker: Integrating Imperva SecureSphere Publication Date: June 14, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract This guide provides instructions
More informationIntegrating Trend Micro OfficeScan 10 EventTracker v7.x
Integrating Trend Micro OfficeScan 10 EventTracker v7.x Publication Date: August 26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help you in
More informationIntegrating Symantec Endpoint Protection
Integrating Symantec Endpoint Protection EventTracker Version 7.x Publication Date: Nov 8, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About this Guide This guide provides
More informationIntegrate Cisco IronPort Email Security Appliance (ESA)
Integrate Cisco IronPort Email Security Appliance (ESA) EventTracker v7.x Publication Date: Jun 17, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides
More informationIntegrate Cisco IronPort Web Security Appliance (WSA)
Integrate Cisco IronPort Web Security Appliance (WSA) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides
More informationIntegrating Juniper Netscreen (ScreenOS)
Integrating Juniper Netscreen (ScreenOS) EventTracker Enterprise Publication Date: Jan. 5, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide helps you
More informationIntegrate Microsoft Windows Hyper V
Integrate Microsoft Windows Hyper V EventTracker v7.x Publication Date: Aug 9, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract Hyper-V in Windows Server 2008 and
More informationIntegrate Websense Web Security Gateway (WSG)
Integrate Websense Web Security Gateway (WSG) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions
More informationEventTracker Knowledge Update
EventTracker Knowledge Update ET75ASIG - 004 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Released on: 25 February 2014 Applies to Versions: 7.5 All Builds Knowledge Update:
More informationIntegrating Barracuda Web Application Firewall
Integrating Barracuda Web Application Firewall EventTracker v7.x Publication Date: July 28, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides
More informationIntegrate Check Point Firewall
Integrate Check Point Firewall EventTracker Enterprise Publication Date: Oct.26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is
More informationIntegrating with IBM Tivoli TSOM
Integration Notes Integrating with IBM Tivoli TSOM The Cascade Profiler integrates with the IBM Tivoli Security Operations Manager (TSOM) through the use of SNMP traps. It has been tested with TSOM Version
More informationHDA Integration Guide. Help Desk Authority 9.0
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
More informationIntegrate Astaro Security Gateway
Integrate Astaro Security Gateway EventTracker v7.x Publication Date: July 24, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions
More informationSonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in
More informationSetting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationEventTracker: Configuring DLA Extension for AWStats Report AWStats Reports
EventTracker: Configuring DLA Extension for AWStats Report AWStats Reports Publication Date: Oct 18, 2011 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract
More informationHDAccess Administrators User Manual. Help Desk Authority 9.0
HDAccess Administrators User Manual Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks
More informationS&C IntelliTeam CNMS Communication Network Management System Table of Contents Overview Topology
S&C IntelliTeam CNMS Communication Network Management System Operation Topology Table of Contents Section Page Section Page Overview.... 2 Topology Discovery... 4 Viewing the Network.... 4 Add Entire Network
More informationMcAfee Content Security Reporter 1.0.0 Software
Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationOperation Error Management
S&C IntelliTeam CNMS Communication Network Management System Operation Error Management Table of Contents Section Page Section Page Overview.... 2 Error Management Alarms... 4 Viewing Alarms.... 5 Editing
More informationReleasing blocked email in Data Security
Releasing blocked email in Data Security IN-TopicInfo:Topic 41101/ Updated: 02-May-2011 Applies To: Websense Data Security v7.1.x Websense Data Security v7.5.x Websense Data Security v7.6.x - v7.8x SMTP
More informationUsing Device Discovery
2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery
More informationEventTracker: Support to Non English Systems
EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to
More informationInstructions for Configuring a SAS Metadata Server for Use with JMP Clinical
Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical These instructions describe the process for configuring a SAS Metadata server to work with JMP Clinical. Before You Configure
More informationAPNS Certificate generating and installation
APNS Certificate generating and installation Quick Guide for generating and installing an Apple APNS Certificate Version: x.x MobiDM Quick Guide for APNS Certificate Page 1 Index 1. APPLE APNS CERTIFICATE...
More informationEventTracker: Configuring DLA Extension for AWStats report AWStats Reports
EventTracker: Configuring DLA Extension for AWStats report AWStats Reports Prism Microsystems Corporate Headquarter Date: October 18, 2011 8815 Centre Park Drive Columbia MD 21045 (+1) 410.953.6776 (+1)
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationDell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
More informationInstalling GFI Network Server Monitor
Installing GFI Network Server Monitor System Requirements Machines running GFI Network Server Monitor require: Windows 2000 (SP1 or higher), 2003 or XP Pro operating systems. Windows scripting host 5.5
More informationMICROSOFT OUTLOOK 2011 READ, SEARCH AND PRINT E-MAILS
MICROSOFT OUTLOOK 2011 READ, SEARCH AND PRINT E-MAILS Lasted Edited: 2012-07-10 1 Find the Inbox... 3 Check for New Mail... 4 Manually check for new messages... 4 Change new incoming e-mail schedule options...
More informationMonitor Mobile Devices via ActiveSync Using EventTracker
Monitor Mobile Devices via ActiveSync Using EventTracker White Paper Publication Date: March 1, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Exchange
More informationDelegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
More informationActive Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
More informationConfiguration Guide. Remote Backups How-To Guide. Overview
Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter
More informationAnti-Spyware Enterprise Module software
Anti-Spyware Enterprise Module software version 8.0 Guide What is the Anti-Spyware Enterprise Module? The McAfee Anti-Spyware Enterprise Module is an add-on to the VirusScan Enterprise 8.0i product that
More informationRemote Media Encryption Log Management
Configuring RME Log Options: Remote Media Encryption Log Management The Remote Media Encryption (RME) Log functionality allows the SES and SESWEb administrators to free up the storage space by better managing
More informationFile Management Utility User Guide
File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held
More informationSonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange User Mailbox Backup and Restore feature
More informationStarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No
More informationExchange Mailbox Protection
User Guide This guide applies to Windows Server 2008 and later. For Windows Server 2003, refer to the Exchange Server Protection whitepaper. BackupAssist User Guides explain how to create and modify backup
More informationHow can I ensure that I have the correct version of the McAfee epo client with VirusScan & AntiSpyware?
C&C s effectiveness when responding to virus activity can only be improved with the continued cooperation of our clients. Clients are therefore strongly cautioned against opening email attachments from
More informationLytecube Technologies. EnCircle Automation. User Guide
Lytecube Technologies EnCircle Automation User Guide Lytecube Technologies 1/1/2009 Contents Installation... 3 Using Encircle... 3 Launching EnCircle as a desktop application... 3 Logon Screen... 3 EnCircle
More informationCONSOLEWORKS WINDOWS EVENT FORWARDER START-UP GUIDE
CONSOLEWORKS WINDOWS EVENT FORWARDER START-UP GUIDE BEFORE YOU BEGIN This document assumes some things: You are using ConsoleWorks 4.6 or later (required), it s currently running, and a browser displaying
More informationBlackboard s Collaboration Tool
Blackboard s Collaboration Tool Using Blackboard s Collaboration Tool, instructors can create and host a course-related chat session or virtual classroom in which students and instructors can interact
More informationLAB 1: Installing Active Directory Federation Services
LAB 1: Installing Active Directory Federation Services Contents Lab: Installing and Configuring Active Directory Federation Services... 2 Exercise 1: installing and configuring Active Directory Federation
More informationLepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
More informationSonicWALL CDP Local Archiving
This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving
More informationMANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA
All Information provided in this document and in the accompanying software is subject to change without notice and does not represent a commitment on the part of RamSoft. RamSoft assumes no responsibility
More informationMcAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
More informationMonitor TemPageR 4E With PageR Enterprise
Monitor TemPageR 4E With PageR Enterprise TemPageR 4E is AVTECH Software s Real-Time Temperature Monitor with Data Logging, SNMP & Unlimited Alerting. It is designed specifically to monitor 1-4 digital
More informationIdera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013
Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management
More informationCRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide
CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM User Guide Revision D Issued July 2014 Table of Contents About CRM Migration Manager... 4 System Requirements... 5 Operating Systems... 5 Dynamics
More informationIBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide
IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright
More informationEMC Smarts Integration Guide
vcenter Operations Manager Enterprise 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more
More informationSophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
More informationHow do I Configure, Enable, and Schedule Reports?
How do I Configure, Enable, and Schedule Reports? There are four core steps involved in the production and delivery of scheduled reports in Ad Hoc. 1. Configuration of the Scheduler Service 2. Enabling
More informationMcAfee Client Proxy 2.0
Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationUser Guide. SysMan Utilities. By Sysgem AG
SysMan Utilities User Guide By Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective holders. 2013 Sysgem AG, Lavaterstr. 45, CH-8002 Zürich,
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationRelease Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
More informationuh6 efolder BDR Guide for Veeam Page 1 of 36
efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder
More informationMcAfee Enterprise Security Manager 9.3.2
Release Notes McAfee Enterprise Security Manager 9.3.2 Contents About this release New features for 9.3.2 Upgrade instructions for 9.3.2 Find product documentation About this release This document contains
More informationMigrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync)
Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) This document is intended for those users moving from WVWC s Bobcat Mail system to the new Google Apps mail system
More informationTrend ScanMail. for Microsoft Exchange. Quick Start Guide
Trend ScanMail for Microsoft Exchange Quick Start Guide Trend ScanMail for Microsoft Exchange ScanMail for Exchange This Quick Start Guide provides a step-by-step guide to installing ScanMail for Exchange,
More informationowncloud Configuration and Usage Guide
owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,
More informationMcAfee DAT Reputation Implementation Guide. Version 1.0 for Enterprise
McAfee DAT Reputation Implementation Guide Version 1.0 for Enterprise McAfee DAT Reputation... 2 What is McAfee DAT Reputation?... 2 Rollout phases: Elective Download, AutoUpdate & AutoEnable... 3 DAT
More informationSage 200 Web Time & Expenses Guide
Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than
More informationPandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide
Pandora FMS 3.0 Quick User's Guide April 27th, 2009 1 Contents How to monitor a network computer/device?...3 Concepts...3 What's an agent?...3 What's a module?...3 Data transfer modes...3 What is an alert?...3
More informationIntegrate ExtraHop with Splunk
Integrate ExtraHop with Splunk Introduction The ExtraHop system monitors network and application performance by gathering data passively on the network. It offers deep and customizable analytics of wire
More informationScan to E-mail Quick Setup Guide
Xerox WorkCentre M118i Scan to E-mail Quick Setup Guide 701P42574 This guide provides a quick reference for setting up the Scan to E-mail feature on the Xerox WorkCentre M118i. It includes procedures for:
More informationApplication Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service
Application Note Configuring McAfee Firewall Enterprise for McAfee Web Protection Service This document explains how to configure McAfee Firewall Enterprise (Sidewinder ) to redirect all web traffic to
More informationXStream Remote Control: Configuring DCOM Connectivity
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
More informationCentral Management Software CV3-M1024
Table of Contents Chapter 1. User Interface Overview...5 Chapter 2. Installation...6 2.1 Beginning Installation...6 2.2 Starting the CMS software...10 2.3 Starting it from the Start menu...10 2.4 Starting
More informationConfiguring a Custom Load Evaluator Use the XenApp1 virtual machine, logged on as the XenApp\administrator user for this task.
Lab 8 User name: Administrator Password: Password1 Contents Exercise 8-1: Assigning a Custom Load Evaluator... 1 Scenario... 1 Configuring a Custom Load Evaluator... 1 Assigning a Load Evaluator to a Server...
More informationExchange Granular Restore Instructional User Guide
Exchange Granular Restore Instructional User Guide www.backup-assist.ca Contents 1. Exchange Granular Restore overview... 2 2. Creating an Exchange backup... 3 3. Exchange Granular Restore... 6 Step 1
More informationMicrosoft Access Rollup Procedure for Microsoft Office 2007. 2. Click on Blank Database and name it something appropriate.
Microsoft Access Rollup Procedure for Microsoft Office 2007 Note: You will need tax form information in an existing Excel spreadsheet prior to beginning this tutorial. 1. Start Microsoft access 2007. 2.
More informationVerified Volunteers. System User Guide 10/2014. For assistance while navigating through the system, please contact Client Services at:
Verified Volunteers System User Guide 10/2014 For assistance while navigating through the system, please contact Client Services at: RCAN@verifiedvolunteers.com - (855) 326-1860 - Option 1 Welcome to Verified
More informationIIS Web Server Configuration Guide
EventTracker v8x Publication Date: Feb. 26, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About the document The purpose of this document is to help users install or customize
More informationProjectWise Explorer V8i User Manual for Subconsultants & Team Members
ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support
More informationSecure IIS Web Server with SSL
Secure IIS Web Server with SSL EventTracker v7.x Publication Date: Sep 30, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is to help
More informationChanging Your Cameleon Server IP
1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may
More informationHow to Access Coast Wi-Fi
How to Access Coast Wi-Fi Below is a summary of the information required to configure your device to connect to the coast-wifi network. For further assistance in configuring your specific device, continue
More informationNote: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.
Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.
More informationTechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.
Secure Remote Access SRA Two-factor Authentication with Quest Defender SonicOS Contents Introduction... 1 System Requirements... 1 Defender Configuration... 2 Dell SonicWALL SRA Configuration... 18 Two-factor
More informationHow to Connect to Berkeley College Virtual Lab Using Windows
How to Connect to Berkeley College Virtual Lab Using Windows Minimum Requirements Create and Save a Remote Desktop Services Connection Connecting to a Remote Desktop Services session Copy Files between
More informationCustomer admin guide. UC Management Centre
Customer admin guide UC Management Centre June 2013 Contents 1. Introduction 1.1 Logging into the UC Management Centre 1.2 Language Options 1.3 Navigating Around the UC Management Centre 4 4 5 5 2. Customers
More informationRx Medical. SMD Utility. Task Scheduler Configuration
Rx Medical SMD Utility Task Scheduler Configuration This document contains important information for all Rx Medical users. Please ensure this document is circulated amongst all your staff. We suggest these
More informationUsing the Content Distribution Manager GUI
CHAPTER 3 Using the Content Distribution Manager GUI The Content Distribution Manager is the central location from which much of the work of creating and managing ACNS networks and hosted content can be
More informationStellar Phoenix Exchange Server Backup
Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically
More informationCrystal Reports Payroll Exercise
Crystal Reports Payroll Exercise Objective This document provides step-by-step instructions on how to build a basic report on Crystal Reports XI on the MUNIS System supported by MAISD. The exercise will
More informationElectronic Signature Capture
Electronic Signature Capture Contents Configuration Store... 1 Configuration Work Station... 2 Configuration Customized Workflow... 8 Customizing the Fill Regular Rx Workflow... 9 Capturing Electronic
More informationfor Small and Medium Business Quick Start Guide
for Small and Medium Business Quick Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described herein without notice. Before using
More informationInstallation Guide and Machine Setup
Installation Guide and Machine Setup Page 1 Browser Configurations Installation Guide and Machine Setup The first requirement for using CURA is to ensure that your browser is set up accurately. 1. Once
More informationOrientation Course - Lab Manual
Orientation Course - Lab Manual Using the Virtual Managed Workplace site for the lab exercises Your instructor will provide the following information before the first lab exercise begins: Your numerical
More informationTECHNICAL TRAINING LAB INSTRUCTIONS
In this lab you will learn how to login to the TotalAgility Designer and navigate around it. You will also learn how to set common Server Settings, create a simple capture workflow business process, save,
More informationTechnical Notes P/N 302-000-337 Rev 01
SNMP Trap Monitoring Solution EMC SourceOne Version 7.0 and later Technical Notes P/N 302-000-337 Rev 01 September 27, 2013 These technical notes contain supplemental information about EMC SourceOne, version
More informationWindows XP Chinese Character Support Installation Instruction
Windows XP Chinese Character Support Installation Instruction Windows XP has a utility to allow user to modify language sets for both multi-language input and viewing of foreign character sets. This document
More informationLegal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More information