How to Build a simple App for Splunk
|
|
- Mae Felicity Bates
- 8 years ago
- Views:
Transcription
1 How to Build a simple App for Splunk Version: 1.2 Date: SPP, Lösungen im Team Seite 1/24
2 Project How to Build a simple App for Splunk Project Leader Alexander Szönyi Responsible Alexander Szönyi Created Last Change Revision Reference Change log No. Date Version Author Comment Szönyi Create Document SPP, Lösungen im Team Seite 2/24
3 Table of Contents 1 Create a new APP (Sample Snort App) Create a Index for your App (Sample Snort App) Install Snort on your System Create a Data Input for your App (Sample Snort App) Test your new APP with a search (Sample Snort App) Create 3 new important Fields for your App (Sample Snort App) Create 3 new searches for your new App Generate a Dashboard for your new APP Launch to your new App and press the button Actions and select Create new dashboard SPP, Lösungen im Team Seite 3/24
4 1 Create a new APP (Sample Snort App) - Login to Splunk - Go to the Manager -> Apps - Click the button Create app - Fill in (see Picture) - If you are finished press the Save Button SPP, Lösungen im Team Seite 4/24
5 2 Create a Index for your App (Sample Snort App) - Launch to your new APP - - go from your App direct to the Manager-> Indexes (this is important!!!, that your new index will match with your App) SPP, Lösungen im Team Seite 5/24
6 - Click the button New - Fill in (see Picture) - If you are finished press the Save Button - Reboot Splunk (Manager->Server controls>restart Splunk) SPP, Lösungen im Team Seite 6/24
7 3 Install Snort on your System - In my example apt-get install snort (Ubuntu installation) 4 Create a Data Input for your App (Sample Snort App) - Launch to your new APP - go from your App direct to the Manager-> Data inputs (this is important!!!, that your new index will match with your App) - in my example choose Files & Directories - Click the button New - Fill in (see Picture) and then go to your new APP SPP, Lösungen im Team Seite 7/24
8 5 Test your new APP with a search (Sample Snort App) - Tip in in the search windows index= snort * then press Enter SPP, Lösungen im Team Seite 8/24
9 6 Create 3 new important Fields for your App (Sample Snort App) - Go to your new App - Tip in in the search windows- index= snort * then press Enter - Press the Button right from your messages (see Picture) - Chose Extract Fields (a new windows appears) SPP, Lösungen im Team Seite 9/24
10 - Now you are in the Interactive Field Extractor Window - First we want to extract following field (marked in yellow) - [**] [1: :2] COMMUNITY SIP TCP/IP message flooding directed to SIP proxy [**] [Classification: Attempted Denial of Service] [Priority: 2] 03/25-10:11: : > :8000 TCP TTL:128 TOS:0x0 ID:4168 IpLen:20 DgmLen:40 DF ***A**** Seq: 0x79E273B3 Ack: 0x29A5CE25 Win: 0x4029 TcpLen: 20 SPP, Lösungen im Team Seite 10/24
11 - First you copy and paste all messages (see yellow marked) into the Example values Box and click Generate (see Picture) - Know you have generate a regex for your Field (?im)^(?:[^ ]* ){2}(?P<FIELDNAME>.*?)\s+\[, but you can see in the picture that this regex also match to other text in your log. SPP, Lösungen im Team Seite 11/24
12 - So the correct regex is for your Field is (?im)^[^ ]* \[\d+:\d+:\d+]\s+(?p<fieldname>.*?)\s+\[, you can know see in the picture that only your messages are marked. SPP, Lösungen im Team Seite 12/24
13 - Save your new Field, press the Save Button and save the Filed as snort_message (see picture). - Repeat this steps with the following new Fields, o o snort_classification [**] [1: :2] COMMUNITY SIP TCP/IP message flooding directed to SIP proxy [**] [Classification: Attempted Denial of Service] [Priority: 2] 03/25-10:11: : > :8000 TCP TTL:128 TOS:0x0 ID:4168 IpLen:20 DgmLen:40 DF ***A**** Seq: 0x79E273B3 Ack: 0x29A5CE25 Win: 0x4029 TcpLen: 20 Regex = (?i)\[classification: (?P<FIELDNAME>[^\]]*)(?=\]) snort_priority [**] [1: :2] COMMUNITY SIP TCP/IP message flooding directed to SIP proxy [**] [Classification: Attempted Denial of Service] [Priority: 2] 03/25-10:11: : > :8000 TCP TTL:128 TOS:0x0 ID:4168 IpLen:20 DgmLen:40 DF ***A**** Seq: 0x79E273B3 Ack: 0x29A5CE25 Win: 0x4029 TcpLen: 20 Regex = (?i)\[priority:\s+(?p<fieldname>[^\]]*)(?=\]) SPP, Lösungen im Team Seite 13/24
14 7 Create 3 new searches for your new App - First search is index="snort" snort_message="*" snort_classification="*" snort_priority="*" src_ip="*" src_port="*" dest_ip="*" dest_port="*" (see Picture) SPP, Lösungen im Team Seite 14/24
15 - Save the search, go to the Actions button and press save search... (see Picture) SPP, Lösungen im Team Seite 15/24
16 - A new windows appears, name the search Snort Alerts Last 4 Hours (see Picture) and Save it. SPP, Lösungen im Team Seite 16/24
17 - Secound search is a report, the search is index="snort" snort_priority="*" snort_message="*" snort_classification="*". Go to the left sight from the windows and press by the fields the right from snort_messages the button. (see picture) SPP, Lösungen im Team Seite 17/24
18 - Know choose Report on : top values overall - Call your Chart Title: Snort Top messages overall - Press the button Save and chose Save Report... - Name the Save Report Snort Top messages overall and save it. SPP, Lösungen im Team Seite 18/24
19 - Third search is also a report, the search is index="snort" snort_priority="*" snort_message="*" snort_classification="*". Go to the left sight from the windows and press by the fields the right from snort_priority the button and chose top values by time save your report as Snort Prioritys in the last 24 Hours (see the picture how its looks like) SPP, Lösungen im Team Seite 19/24
20 8 Generate a Dashboard for your new APP - Launch to your new App and press the button Actions and select Create new dashboard... - Name the dashboard SNORT (see picture) and press Create SPP, Lösungen im Team Seite 20/24
21 - Know press Edit the dashboard SPP, Lösungen im Team Seite 21/24
22 - Build your first panel and name it Snort Prioritys in the last 24 Hours (see Picture) and press Add panel - Add the next panel Snort Top messages overall (see Picture). SPP, Lösungen im Team Seite 22/24
23 - Add the next last panel Snort Alerts Last 4 Hours (see Picture) and close. SPP, Lösungen im Team Seite 23/24
24 - Know you see your new dashboard (see picture) LAST POINT, to not forget to give other people access to your new App and index, searches, reports and dashboards. SPP, Lösungen im Team Seite 24/24
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
More informationHow To Test For Penetration On The Cloud
Penetration Testing in the Cloud Dan Lambright LISA14 1 $ whoami dlambrig@redhat.com henry_lambright@uml.edu 2 Agenda Explore penetration testing on the cloud..* Public Private (as owner) Private (as tenant)
More informationEFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS
EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS Manu Bansal Assistant Professor Department of IT University Institute of Engineering & Technology Panjab University,
More informationNetwork security Exercise 10 Network monitoring
Network security Exercise 10 Network monitoring Tobias Limmer Computer Networks and Communication Systems Dept. of Computer Sciences, University of Erlangen-Nuremberg, Germany 2. 6.02.2009 Tobias Limmer:
More informationDCOM & Control List Genetec Information Systems Page i Win2003 Service Pack 1
Windows 2003 SP1 configuration DCOM & Control List Genetec Information Systems Page i Win2003 Service Pack 1 Table of Contents 1 INTRODUCTION...1 1.1 NETWORK CHANGES IN WINDOWS 2003 SERVER SP1...3 1.1.1
More informationIntrusion Preventing System using Intrusion Detection System Decision Tree Data Mining
American J. of Engineering and Applied Sciences 2 (4): 721-725, 2009 ISSN 1941-7020 2009 Science Publications Intrusion Preventing System using Intrusion Detection System Decision Tree Data Mining 1 Syurahbil,
More informationActive Directory Integration for Greentree
App Number: 010044 Active Directory Integration for Greentree Last Updated 14 th February 2013 Powered by: AppsForGreentree.com 2013 1 Table of Contents Features... 3 Options... 3 Important Notes... 3
More informationExchange 2013 mailbox setup guide
Fasthosts Customer Support Exchange 2013 mailbox setup guide This article covers the setup of Exchange 2013 mailboxes in Microsoft Outlook 2013, 2010 and Outlook 2011 for Mac. Contents Exchange 2013 Mailbox
More informationCloud Services. Lync. IM/ Web Conferencing Admin Quick Start Guide
Cloud Services Lync IM/ Web Conferencing Admin Quick Start Guide 10/14/2014 ACTIVATION LETTER An activation letter will be sent to the email account of your administrator contact. Please look for the following
More informationPICTURES. the flood of raw data generated by. Tools for visualizing IDS output. Cover story. Security Visualization Tools
Cover story Security Visualization Tools tasosk, 123RF Tools for visualizing IDS output PICTURES Spot intruders with these easy security visualization tools. BY RUSS MCREE the flood of raw data generated
More informationOutlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions
HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange
More informationDownload and Install the Citrix Receiver for Mac/Linux
Download and Install the Citrix Receiver for Mac/Linux NOTE: WOW can only be used with Internet Explorer for Windows. To accommodate WOW customers using Mac or Linux computers, a Citrix solution was developed
More informationHow to setup Mobility Extension on the 2N OfficeRoute and 2N VoiceBlue Enterprise
How to setup Mobility Extension on the 2N OfficeRoute and 2N VoiceBlue Enterprise This is the manual for a firmware version 2.2.9 Our scenario: 1. Firstly you need to set up the IP address of the OfficeRoute
More informationWordware Family Website Instructions
Registering on the Family Website Wordware Family Website Instructions Important: You must fully complete registration in one session in order to guarantee that there are no problems with activating your
More informationSnort ids. Alert (file) Fig. 1 Working of Snort
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Developing rules
More informationSMC7004ABR Barricade Broadband Router Installation Instructions
SMC7004ABR Barricade Broadband Router Installation Instructions SPECIAL NOTE: Part D Upgrading the Firmware in Your Barricade MUST occur in ALL installations for multiple VPN sessions to work!!! SPECIAL
More informationThis means that any user from the testing domain can now logon to Cognos 8 (and therefore Controller 8 etc.).
ChaseReferrals and multidomaintrees Graphical explanation of the difference Imagine your Active Directory network looked as follows: Then imagine that you have installed your Controller report server inside
More informationPowerSchool. Parent Single Sign-On (SSO)
PowerSchool Parent Single Sign-On (SSO) K i n g s C a n y o n U n i f i e d 6 7 5 W M a n n i n g A v e, R e e d l e y, C A 9 3 6 5 4 559-3 0 5-7 0 1 0 w w w. k c u s d. c o m Starting with the 2015-2016
More informationGlobal UGRAD Program
Application Instructions for Global UGRAD 2016-2017 Portal Step-by-Step I. REGISTERING FOR THE PROGRAM Google Chrome and Mozilla Firefox work best when completing the UGRAD application. We do NOT recommend
More information1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
More informationHow To Connect Your Event To PayPal
How To Connect Your Event To PayPal This document describes, in click by click detail, how to connect your event's registration page to your PayPal merchant account. You PayPal merchant account MUST BE
More informationSwisscom Mobile Device Services Quick Start Guide: Set-up Remote Management basic. Mobile Device Services Februar 2014
Swisscom Mobile Device Services Quick Start Guide: Set-up Remote Management basic Mobile Device Services Februar 2014 Contents 2 Login «Welcome to Swisscom MDS» First steps Step 1: Installing the MDM certificate
More informationSysAidTM Deployment Tool Guide
SysAidTM Deployment Tool Guide Document Updated: 10 November 2009 Introduction You want SysAid to see your assets, providing information on their hardware, software, history, and more. The most simple
More informationQuerying Databases Using the DB Query and JDBC Query Nodes
Querying Databases Using the DB Query and JDBC Query Nodes Lavastorm Desktop Professional supports acquiring data from a variety of databases including SQL Server, Oracle, Teradata, MS Access and MySQL.
More informationConfiguring Solaris as a Firewall. Configuring Solaris as a Secure Gateway
250 Chapter 8 Configuring Solaris as a Secure Router and Firewall Configuring Solaris as a Secure Gateway In this section we have talked about using Solaris as a router between different networks. Solaris
More informationAzMERIT Secure Browser Installation Manual For Technology Coordinators
AzMERIT Secure Browser Installation Manual For Technology Coordinators 2014-2015 Revised January 5, 2015 Prepared by the American Institutes for Research Descriptions of the operation of the Test Information
More informationSpam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
More informationReliable and Security-Based Myren Network Traffic Management using Open Source Tools
Journal of Information & Communication Technology Vol. 3, No. 1, (Spring 2009) 01-10 Mohamed Othman Mostafa Nikpour Kermanian* Department of Communication Technology and Network, Faculty of Computer Science
More informationSECURE PROVIDER PORTAL. Step by step webpage and functionality walkthrough Updated: 3/12/12
SECURE PROVIDER PORTAL Step by step webpage and functionality walkthrough Updated: 3/12/12 1 Public Web Portal: www.huskyhealthct.org/providers By selecting Provider Login in the PROVIDER PORTAL box, the
More informationIT Help Desk/ updated 11/04/2011 Page 1
Campus Group Instructions Group Members Becoming a Group Member on the Portal 1. Log into the Portal 2. Click the Campus Groups tab 3. Click the Browse Groups Link 4. The Browse Groups link allows you
More informationFrom a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green).
From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green). You will be presented with a dialog box asking for you to enter an ad-hoc
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationA-AUTO 50 for Windows Setup Guide
A-AUTO 50 for Windows Setup Guide 1st Edition 1 A-AUTO is a registered trade mark of UNIRITA Inc. "This product includes software developed by the Apache Software Foundation (http://www.apache.org/)."
More informationCitrix Client Installation
Citrix Client Installation A guide to installing and using the Citrix Client for applications hosted by the Maricopa County Education Service Agency. For MCESA Internal IVEE Users Installation of the Citrix
More informationHow to Register to use the Staff Printer Network at any device on the network Monitor Embedded : Login & First Use
How to Register to use the Staff Printer Network at any device on the network Monitor Embedded : Login & First Use Touch your Swinburne Staff ID card on the card reader on the Fuji Xerox Device The card
More informationAgile Applicant Tracking System. Hiring Manager
Agile Applicant Tracking System Hiring Manager 2/27/2014 Section Page Change Password 3 Forgot Password? 4 Logging Into System 2 Printed or Scanned Candidate Information 10 Routed Candidates and Messages
More informationSet up Delegate & Travelers
Set up Delegate & Travelers Setting Up a Delegate and Assigning New Travelers Learn how to Login to Banner Travel and Expense Management Application and to set up yourself as a Delegate and assign Travelers
More informationDashboard Designer. Introduction Guide. Basic step by step guide to creating a Dashboard. June 2012 V1.2
webkpi Dashboard Designer Introduction Guide Basic step by step guide to creating a Dashboard June 2012 V1.2 webkpi Dashboard Designer Introduction Guide Page 1 Table of Contents Introduction... 3 webkpi
More informationCloud Services. Sharepoint. Admin Quick Start Guide
Cloud Services Sharepoint Admin Quick Start Guide 3/12/2015 ACTIVATION An activation letter will be sent to the email account of your administrator contact. SharePoint will be part of your Cloud Control
More informationManaging Snort Alerts
Chapter 5 Managing Snort Alerts Scripts and Samples in this Chapter Gathering Snort Logs Building an Alerts Detail Report Building an Alerts Overview Report Managing Snort Rules 147 148 Chapter 5 Managing
More informationSales Person Commission
Sales Person Commission Table of Contents INTRODUCTION...1 Technical Support...1 Overview...2 GETTING STARTED...3 Adding New Salespersons...3 Commission Rates...7 Viewing a Salesperson's Invoices or Proposals...11
More informationSonicOS 5.9 One Touch Configuration Guide
SonicOS 5.9 One Touch Configuration Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationOBJECTIVES Impor Im tance of Logs Un U derstanding Logs Log samp Log sam les & analysis Challenges in Log Analysis 2
به نام خدا مديريت رويدادها مسعود اخو ت Okhovat@NSec.ir فرد نظري بهادر Nazari@NSec.ir آپا دانشگاه صنعتي اصفهان مركز OBJECTIVES Importance of Logs Understanding Logs Log samples & analysis Challenges in
More informationLivezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
More informationKaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationNF3ADV VoIP Setup Guide (for TPG)
NF3ADV VoIP Setup Guide (for TPG) Configuring your NF3ADV for TPG VoIP The following steps will take you through the process of setting up your VoIP connection. This guide assumes that the NF3ADV already
More informationRelease Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
More informationMarcum LLP MFT Guide
MFT Guide Contents 1. Logging In...3 2. Installing the Upload Wizard...4 3. Uploading Files Using the Upload Wizard...5 4. Downloading Files Using the Upload Wizard...8 5. Frequently Asked Questions...9
More informationSecure Browser Installation Manual
Secure Browser Installation Manual 2015 2016 Published August 17, 2015 Prepared by the American Institutes for Research Table of Contents Section I. Introduction to the Secure Browser Manual... 1 Scope...
More informationOFFICE 365 SELF- CONFIGURATION GUIDE
IT HELPDESK, REPUBLIC POLYTECHNIC OFFICE 365 SELF- CONFIGURATION GUIDE Version 7.0 IT Helpdesk 6-30-2015 0 TABLE OF CONTENTS Things to note before proceeding with this guide:... 1 Office 365 ProPlus Installation
More informationVersion 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)
Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................
More informationSetting up an account and logging in using Design & Print Online. Opening a saved project
Setting up an account and logging in using Design & Print Online Opening a saved project 1 of 7 Account Set-Up & Login 1. On the Design and Print Online home page click on the Click to start Design & Print
More informationFIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
More informationPowering Monitoring Analytics with ELK stack
Powering Monitoring Analytics with ELK stack Abdelkader Lahmadi, Frédéric Beck INRIA Nancy Grand Est, University of Lorraine, France 2015 (compiled on: June 23, 2015) References online Tutorials Elasticsearch
More informationV-Sept CRM Integration Setup
V-Sept CRM Integration Setup 1 Contents V-SEPT CRM INTEGRATION SETUP... 1 ENABLING YOUR V-SEPT/50 BELOW INTEGRATION... 3 GENERATING A LOGIN AND PASSWORD FOR THE FIRST TIME... 3 Integration Manager... 3
More informationTracking the Role of Adversaries in Measuring Unwanted
Tracking the Role of Adversaries in Measuring Unwanted Traffic Mark Allman ICSI Paul Barford University of Wisconsin Balachander Krishnamurthy & Jia Wang AT&T Labs Research Abstract Measurements related
More informationInstalling SQL Express. For CribMaster 9.2 and Later
Installing SQL Express For CribMaster 9.2 and Later CRIBMASTER USER GUIDE Installing SQL Express Document ID: CM9-031-03012012 Copyright CribMaster. 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
More informationNAS 206 Using NAS with Windows Active Directory
NAS 206 Using NAS with Windows Active Directory Connect your NAS to a Windows Active Directory domain A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to:
More informationImmotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
More informationLMS USER GUIDE AN INTRODUCTION TO REPORTS
LMS USER GUIDE AN INTRODUCTION TO REPORTS Report Information The E nable system generates a lot of data to enable administrators/monitors/managers to obtain information useful to their organisation. Different
More informationProfessional Mailbox Email Software Setup Guide
Professional Mailbox Email Software Setup Guide Table of contents Download and Install Microsoft Outlook 2010 or 2011... 2 Enabling access from email software... 4 Setting up Outlook 2010... 6 Before you
More informationVenza Group. Learning Management System (LMS) Login and Dashboard Guide
10886 Crabapple Rd, Ste 100 Roswell, GA 30075 Phone: 770-685-6500 Fax: 770-685-6553 Venza Group Learning Management System (LMS) Login and Dashboard Guide Table of Contents 1.0 Learning Management System
More informationWindows XP SP2 configuration
Windows XP SP2 configuration Table of Contents 1 INTRODUCTION...1 1.1 NETWORK CHANGES IN WINDOWS XP SERVICE PACK 2...1 1.1.1 DCOM Security...1 1.1.2 Windows Firewall...2 2 EFFECT OF WINDOWS SERVICE PACK
More informationSubmitting a Loan to DO through Point
Submitting a Loan to DO through Point This document shows you how to work with a loan in Calyx Point and submit it to Fannie Mae Desktop Originator or Desktop Underwriter for underwriting. It is not intended
More informationF-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
More informationFirst Advisors Login Guide
WebLink Login Guide First Advisors Login Guide In order to conform to the Federal Financial Institutions Examination Council (FFIEC) Authentication Guidance, our First Advisors site requires you to step
More informationIPRO Viewer. Installation
IPRO Viewer Attention: This guide is intended to help those who are authorized to install content onto their computers with the installation of IPRO Premium Viewer software. Please contact your IT personnel
More informationTechnology Services Group Procedures. IH Anywhere guide. 0 P a g e
VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple
More informationHow to Apply Online Select School and Program
How to Apply Online Go to the application site at www.houstonisdschoolchoiceapplication.com. When you are ready to apply for a student within your household, continue to the application by clicking on
More informationIntegrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
More informationOnline Exam Instructions
Online Exam Instructions Creating a User: 1. If this is your first time using the new NFHS Online Exam System. Click on New Users click Here. This will ask you to create an account. 2. The Create Account
More informationAccessing Citrix on a MAC using OS X (Mountain Lion and Newer)
These instructions are specifically designed for OS X Mountain Lion and Mavericks. Earlier versions of the OS will require a different installation. These instructions assume that there are no Java, Citrix
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationXopero Backup Build your private cloud backup environment. Getting started
Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...
More informationSet My University of Melbourne Identity Management Password for the First Time
Set My University of Melbourne Identity Management Password for the First Time This document provides instructions for New Staff or Existing Staff members who are using the Identity Management System (IdMS)
More informationPatient Portal. Accessing the Patient Portal. How to Begin: Enter first and last name, date of birth and create a user name and password.
Patient Portal How to Begin: If you provided an email address when you registered as a patient, you can expect an email after your discharge that will be sent directly from CPSI, our Electronic Health
More informationVoIP Intercom and Elastix Server
VoIP Intercom and Elastix Server Setup Guide http://www.elastix.org 1.0 Setup Diagram Figure 1-1 is a setup diagram for a single VoIP Intercom configuration. In this configuration, the VoIP Intercom acts
More informationSnom 720 and Elastix Server
Snom 720 and Elastix Server Setup Guide http://www.elastix.org 1.0 Setup Diagram Figure 1-1 is a setup diagram for a single IP Phone Snom 720 configuration. The phone is setup as a SIP telephony device.
More informationOnboarding for Administrators
Welcome! This resource will walk you through the quick and easy steps for configuring your Paylocity Onboarding module and managing events. Login Launch Events Complete Tasks Create Records Configure Events
More informationPage 1 of 14. MyAerospace. Order Status. E-mail Notifications
Page 1 of 14 MyAerospace Order Status E-mail Notifications Honeywell Services and Technology Team January 2014 Page 2 of 14 Table of Contents Table of Contents... 2 Introduction... 3 I. Subscribing to
More informationVoIP Intercom and Cisco Call Manager Server Setup Guide
The IP Endpoint Company VoIP Intercom and Cisco Call Manager Server Setup Guide CyberData Corporation 2555 Garden Road Monterey, CA 93940 T:831-373-201 F: 831-373-4193 www.cyberdata.net 2 1.0 Setup Diagram
More informationEJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading
More informationTechnology Manager Non-Seller Admin Guide Creating and Managing Fannie Mae User IDs
Technology Manager Non-Seller Admin Guide Creating and Managing Fannie Mae User IDs As a Technology Manager Administrator, you can use Technology Manager to create and manage users as well as authorize
More informationFedTraveler.com. Log o FedTraveler.com using your valid Member ID and PIN.
FedTraveler.com Log o FedTraveler.com using your valid Member ID and PIN. Page 3 / 38 FedTraveler.com S een will refresh to Organizer page Page 4 / 38 Organizer 3. On he Organizer Page, click the link
More informationBasic User Tips http://train.ora.msu.edu
Basic User Tips http://train.ora.msu.edu Certification vs Course vs Offering vs Certificate Certificate - piece of paper; printable documentation of Course completion Registration Process Some courses
More informationMATCH IT! Antibody v1.2 Software Installation
MATCH IT! Antibody v1.2 Software Installation Table of Contents 1.0 Table of Contents... 1 2.0 Revisions... 2 3.0 Installation Checklist... 3 4.0 Prerequisites... 4 5.0 Database Configuration Options...
More information1. Install a Virtual Machine... 2. 2. Download Ubuntu Ubuntu 14.04.1 LTS... 2. 3. Create a New Virtual Machine... 2
Introduction APPLICATION NOTE The purpose of this document is to explain how to create a Virtual Machine on a Windows PC such that a Linux environment can be created in order to build a Linux kernel and
More informationCISCO VPN CLIENT INSTALL AND UPDATE INSTRUCTIONS
CISCO VPN CLIENT INSTALL AND UPDATE INSTRUCTIONS * If you are installing the VPN client for the first time skip the Uninstall section and start with the Install procedure on page 3. Uninstall: Prior to
More informationQuick Installation Guide
avast! Enterprise Administration Quick Installation Guide avast! Reseller Technical Support reseller-support@avast.com How to Install System Requirements AVAST! ENTERPRISE ADMINISTRATION SERVER Windows
More informationAlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts
AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,
More informationMichigan Care Improvement Registry (MCIR) User Registration Four-Step Process
Michigan Care Improvement Registry (MCIR) User Registration Four-Step Process Step 1. User Receives PIN Number Email from mcir@michigan.gov Once a User is added to MCIR, they will receive an email message
More informationCLEARONE DOCUMENT 801-000-002 (REVISION 1.0) October, 2008. with Converge Pro Units
APPLICATION NOTES Converge Pro Products CLEARONE DOCUMENT 801-000-002 (REVISION 1.0) October, 2008. Troubleshooting USB Connections with Converge Pro Units Description This document explains how to connect
More informationDisabling Microsoft SharePoint in order to install the OneDrive for Business Client
Disabling Microsoft SharePoint in order to install the OneDrive for Business Client If you try to setup and sync your OneDrive online documents with the client software and Microsoft SharePoint opens,
More informationHow to Use Remote Access Using Internet Explorer
Introduction Welcome to the Mount s Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote
More informationMozilla Thunderbird: Setup & Configuration Learning Guide
Mozilla Thunderbird: Setup & Configuration Learning Guide Exchange Email at Tufts Below you will find some nomenclature to help familiarize you with the Tufts email system. Term UTLN Email Address Exchange
More informationHRC Advanced Citrix Troubleshooting Guide. Remove all Citrix Instances from the Registry
HRC Advanced Citrix Troubleshooting Guide Advanced Troubleshooting procedures: 1. Add https://mobile.hrc.army.mil to Internet Explorer s trusted sites list. Click on Tools Internet Options Security. Click
More informationFAQs. OneDrive for Business?
Contents FAQs... 1 From a Web Browser (for PCs and mobile devices)... 1 From the OneDrive for Business Sync Application (for PCs only)... 2 From Office 2013 (for PCs only)... 3 From the OneDrive for Business
More informationMobile Collaborative Search App
Mobile Collaborative Search App Setting up your agent-branded Mobile Collaborative Search Setup your agent-branded Mobile Collaborative Search and begin inviting clients today! Getting started * For ios
More informationAriba Supplier Mobile App Quick Start Guide
Ariba Supplier Mobile App Quick Start Guide Table of Contents Getting Started...3 Downloading and Authenticating Your App... 3 Using the Ariba Supplier Mobile App...6 Logging In... 6 Setting Up Alerts
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More information