Detector Software Appliance User Guide

Size: px
Start display at page:

Download "Detector Software Appliance User Guide"

Transcription

1 Software Appliance User Guide 2017 RapidFire Tools, Inc. All rights reserved Ver 4C

2 Contents Overview... 3 Components of the Diagnostic Tool... 3 Network Detective Application... 3 Features... 4 Level 1 (Daily) Network Scan... 4 Level 2 (Weekly) Security Scan... 4 Daily Alerts... 4 Weekly Notices... 4 Automated Assessment Reporting... 4 Remote Updating of the... 5 Automated Scanning and Scheduling Best Practices... 5 Getting Started... 6 Deployment Options... 6 Installing the on Hyper-V or VMware... 6 Starting the on Hyper-V or VMware... 6 Connecting the Optional Small Form Factor Server Computer... 6 Creating a Site and Associating the to the Site... 7 Step 1 - Creating a New Site... 7 Step 2 - Adding a to a Site... 8 Warning Concerning the Removal of a Appliance from a Site... 9 Backing Up Smart Tags for Reuse... 9 Defining the Settings Configuring Daily and Weekly Data Collection Scans and Schedules Configuring the Scan Settings Setting Daily Alert and Weekly Notice Schedule Setting Up Daily Alerts and Weekly Notices Setting-up Daily Alerts Example of a Daily Alert

3 Setting Up Weekly Notices Example of a Weekly Notice Assigning Smart Tags to Change Events that Refine Alerts and Notices Examples of Smart Tag Use Warning Concerning the Removal of a Appliance from a Site Backing Up Smart Tags for Reuse Adding and Configuring Smart Tags Deleting Smart Tags Viewing the Notifications History and Past Alert Details Preferences Menu Options Setting the Master Report Default Preferences Using the Manage Appliance Feature to Configure Automatic Report Generation Setting Up Automatic Reports for Network Assessments Setting Up Automatic Reports for Security Assessments Updating a Software Appliance Appendices Appendix I Software Appliance Diagnostic Tool Purpose of the Diagnostic Tool Appendix II Saving and Reusing Smart Tags through Export and Import Steps to Export and Save Smart Tags for Later Use Steps to Import Smart Tags for into your Site for Use with

4 Overview is an appliance-based system used for performing scheduled IT assessment scans then issue network change related Daily Alerts and Weekly Notices after Anomalies, Changes, or Threats (ACT) have been identified on the network. This guide is designed to provide an overview and specific steps required to install and configure the appliance and schedule the collection of data remotely, schedule automated assessment scans, and issue network change related Daily Alerts and Weekly Notices. Components of the This is the software application that operates on either on a user supplied Microsoft Hyper-V or VMware based system or the Small Form Factor Server computer available from RapidFire Tools. Optional Small Form Factor Server Computer This is an optional hardware component that can be purchased from RapidFire Tools to host and operate the. It is a small, portable appliance which plugs into the target network through an Ethernet connection. Diagnostic Tool This tool is used for configuring and troubleshooting the. The Diagnostic Tool should be run on the same network as the to perform diagnostics checks such as for connectivity or for available updates. Network Detective Application This is the same Network Detective desktop application and report generator that is used with any other Network Detective modules. This application contains additional features to manage the remotely. 3

5 Features The one key purpose of the is to perform scans from the point-of-view of the client s internal network and issue Daily Alerts and Weekly Notices. Below is an overview of the scans that can be performed by the. Level 1 (Daily) Network Scan The Level 1 Network and Security Assessment Scan is a Daily Scan performed from the point-of-view of the. The resulting scan can be used to issue Daily Alerts, Weekly Notices, and generate reports from the Network Assessment and Security Assessment modules. Level 2 (Weekly) Security Scan The Level 2 Network and Security Assessment Scan is a Weekly Scan performed from the point-ofview of the. The resulting scan can be used to issue Weekly Notices and generate reports from the Network Assessment and Security Assessment modules. Daily Alerts Daily Alerts is a feature whereby you and other designated recipients within your company can be sent Alerts via based on automated scans being performed on a daily basis. These Alerts serve the purpose of notifying you of changes identified within your customer s IT infrastructure after pre-scheduled scans/assessments have been performed. Daily Alerts are sent as s in both Expanded and Compact detail formats. Weekly Notices Weekly Notices is a feature whereby you and other designated recipients within your company can be sent Notices via based on automated scans being performed on a weekly basis. These Notices serve the purpose of notifying you of changes identified within your customer s IT infrastructure after pre-scheduled scans/assessments have been performed. Automated Assessment Reporting Automatic Report Generation enables you to use the to schedule and generate of a number of assessment reports associated with the following: Network Assessments Security Assessments Note that the: A) Network Assessment Reports are only available to Network Assessment module subscribers. B) Security Assessment Reports are only available to Security Assessment module subscribers. 4

6 Remote Updating of the The is easy to update remotely. Updates include bug fixes, new features, and additional scans types. Automated Scanning and Scheduling Best Practices It is recommended that scans are scheduled to be performed on a daily and weekly basis using the Level 1 (Daily) Scan and Level 2 (Weekly) Scan respectively. 5

7 Getting Started Deployment Options There are two deployment options available to users: deployment on a user owned and operated Hyper-V or VMware based system deployment on the Small Form Factor Computer Server available from RapidFIre Tools Installing the on Hyper-V or VMware Please refer to the Virtual Appliance Installation Guide. During the installation process, please take note of the Appliance ID presented to you during the Virtual Appliance installation process. The Appliance ID will be required when you Associate the with the Network Detective application Site that you will set-up for your client s network as detailed in the instructions provided below. Starting the on Hyper-V or VMware Upon the installation of the Virtual Appliance software, will be available for use based on your purchase of the as referenced within you Network Detective account subscription. Connecting the Optional Small Form Factor Server Computer To set up the Small Form Factor Server Computer used to operate the, first go to the physical location of the target network. After finding a secure location for the device, connecting it to the network can be accomplished in two easy steps: Note: When users have purchased a Small Form Factor Server Computer, the Appliance ID can be found on a printed label on the Small Form Factor Server Computer itself. 6

8 Creating a Site and Associating the to the Site In order to set up the use of to identify security issues and issue alerts, a Site must be created within the Network Detective application and the that is connected to your client s network must be Associated with the created Site. Before using the, the must be associated with a Site in the Network Detective application. Perform the following steps to use Network Detective to create a Site and Associate a with the site: Step 1 - Creating a New Site If you have not yet added any Sites, open the Network Detective application and navigate to New Site from the Home screen. Define a name for the Site. This should be unique and easily identifiable, such as the customer name or physical location. 7

9 Step 2 - Adding a to a Site Adding a to a Site After starting a new assessment, or within an existing assessment, in order to Associate a with the Site, you must first select the selector symbol to expand the Site s preferences view. This action will expand the Site s preferences window for you to view and to add an Appliance to the Site. To add an Appliance to a Site, from the Site Preferences Window select the Appliances Add button as noted above. Select the Appliance ID of the Appliance from the drop down menu. Note: When users have purchased a Small Form Factor Server Computer, the Appliance ID can be found on a printed label on the Small Form Factor Server Computer itself. 8

10 After successfully adding a to the Site, it will appear under the Appliance bar in the Site Preferences Window. The status of the Appliance will be indicated as Active. To view a list of all Appliances and their associated Sites, navigate to the Appliance tab from the top bar of the Network Detective Home screen. This will show a summary of all Appliances, their activity status, and other useful information. To return to the Site that you are using to perform your based assessments, click on Home icon above, and select the Site that you are using with the. Warning Concerning the Removal of a Appliance from a Site When a has been Associated with a Site and the Scan Schedule, Alert Schedule, Alert Recipients, and Smart Tags settings have been defined, if the is ever Associated with a different Site, the original Site s settings will be automatically deleted. Backing Up Smart Tags for Reuse You have the ability to Export the Smart Tags associated with a Network Detective Site file that is Associated with. If you wish to save the assigned Smart Tags contained within the existing Site that is Associated with for later use with a new Site, then use the Smart Tags Export and Import options described in Appendix II Saving and Reusing Smart Tags through Export and Import found on page 73. 9

11 Defining the Settings The setup process of the consists of setting up the following options: Level 1 (Daily) Scan Level 2 (Weekly) Scan Daily Alerts Recipient Assignment, Event Selection, and Scheduling Weekly Notices Recipient Assignment, Event Selection, and Scheduling Automatic Report Generation Smart Tags Configuring Daily and Weekly Data Collection Scans and Schedules based scans can be setup to run on a daily and weekly basis. Below is an overview of the scans that can be set-up and performed using the. Level 1 Scan (Daily) Scan The resulting daily scan can be used to issue Daily Alerts, Weekly Notices, and generate reports from the Network Assessment and Security Assessment modules. Level 2 Scan (Weekly) Scan The resulting weekly scan can be used to issue Daily Alerts, Weekly Notices, and generate reports from the Network Assessment and Security Assessment modules. The next section outlines the steps to set-up the scans to be performed using. 10

12 Configuring the Scan Settings To set up the scans to be performed by, follow the steps below. Step 1 Select the Site Double click your mouse pointer on the Site that you are configuring automated scan, alerts, and reports to be performed upon in order to view and access the Site. Step 2 Select Manage Appliance and Access the Settings After the Site has been opened, select the icon located within the Site bar. 11

13 The Settings window will be displayed. Next select the Settings Preferences option by selecting the selector. - The Settings window will be presented. Step 3: Define the Scan Settings To set the Scan Configuration, select the Modify option. 12

14 The Scan Configuration Wizard window will be displayed. Choose Merge Option from the wizard and click the Next button. Step 4: Input Credentials 13

15 Input administrative credentials to access the Domain Controller or indicate that the target network does not contain a Domain Controller. Then select the Next button. Step 5: Select Local Domains Choose either to scan all Domains detected on the target network or to restrict the Scan to selected Organizational Units (OUs) and Domains. Then select the Next button. Step 6: Specify IP Ranges The IP ranges from the target network will be auto-detected and included in the scan. To include additional subnets input them here. Then select the Next button. 14

16 Step 7: Add SNMP Information By default, the will retrieve data from devices with the community string public. If desired, define an additional read community string (such as private ) and enter it here. Then select the Next button. Step 8: Confirm and Finish Scan Settings Click on the Finish button to complete the configuration of the Scan Configuration settings. The result of the setting of the Scan Configuration will be updated to the Settings window with the following information: 15

17 Step 9: Setting Daily and Weekly Scan Schedules Set the Daily and Weekly Scan schedule by setting the Level 1 (Daily) Scan and Level 2 (Weekly) Scan schedule times and days. To schedule the scans, select the Modify button in the Schedules section of the Settings window. The Schedule window will be displayed. Set the Time Zone, the Level 1 Scan (Daily) scan time, and the Level 2 Scan (Weekly) scan time and day. After these scan Schedule Settings have been defined, select the Save button to save the settings. 16

18 Setting Daily Alert and Weekly Notice Schedule Daily Alerts and Weekly Notice bulletins can be scheduled to be issued on a daily or weekly basis respectively. The Daily Alerts and Weekly Notice schedule can be defined using the Site s Settings Preferences option. To set up the Daily Alerts and Weekly Notices schedule, follow the steps below. Step 1 Select the Site Double click your mouse pointer on the Site that you are configuring automated scan, alerts, and reports to be performed upon in order to view and access the Site. Step 2 Select Manage Appliance and Access the Settings After the Site has been opened, select the icon located within the Site bar. 17

19 The Manage Settings window will be displayed. Next select the Settings Preferences option by selecting the selector. 18

20 The Settings window will be presented. Step 3: Define the Alerts and Notice Schedule Settings Select the Modify button in the Schedules section of the Settings window. The Schedule window will be displayed. Within the Schedule Window set the Time and Days when Daily Alert and Weekly Notice bulletins should be issued. After the Alerts and Notice schedule has been set, select the Save button to save these settings. 19

21 Setting Up Daily Alerts and Weekly Notices Setting-up Daily Alerts The use of the Daily Alerts feature presumes that the Level 1 (Daily) Scan and/or Level 2 (Weekly) Scan types available on the Appliance have been configured. Daily Alerts will be sent to designated recipients when a number of changes to your client s network and IT infrastructure have been identified as a result of automated scans being performed by. The changes detected and reported upon include: changes to network users, computers, and the network itself. To send Daily Alerts containing important information to contacts within your company, setup Daily Alerts to be sent to designated recipients by performing the following steps. Step 1 Select the Site Double click your mouse pointer on the Site that you are configuring automated scan, alerts, and reports to be performed upon in order to view and access the Site. Step 2 Select Manage Appliance and Access the Settings After the Site has been opened, select the icon located within the Site bar. 20

22 The Settings window will be displayed. Step 3 Add Daily Alerts Recipients and Assign Daily Alert Notification Subject Text 1. To add a Daily Alerts Recipient, select the Daily Alerts Preferences option by selecting the selector on the Daily Alerts bar. The Daily Alerts Preferences will be displayed to enable access to the Daily Alerts settings. 21

23 The Daily Alerts settings enable the selection of the Daily Alert recipients, setting the Subject text for the alert, the assignment of the types of changes to the network that issue alerts, and to enable the suppression of No Issue Alerts notifications. 2. Add one or more alert Recipient by selecting the Add Recipient button available in the Daily Alerts Preferences window as displayed below. The Daily Alert Configuration window will be displayed. 3. Select the To button in order to display a the list of Network Detective User addresses that can be designated as Daily Alert Recipients: 22

24 The Select Users Form will be displayed. Select the address for the person that you want to receive Daily Alert notifications. After selecting a Recipient s address from the list of addresses in the Select Users Form, or typing in a Recipient s address manually, click on the OK button. Repeat this process for each recipient that you want to add to the To list present in the Daily Alert Configuration window, Using Addresses That Are Not Available in Network Detective If you do not see an address for an individual in your company that you want to be assigned as a Daily Alert Recipient, then add the desired individual as a user of the Network Detective using the Network Detective Manage Users option. Alternatively, if an individual you that would like to receive an alert is not listed in the Select Users Form, you can select the field to the right of the To button in the Daily Alert Configuration window and type in the address of the intended recipient of the alert as presented below. 23

25 4. Once each Daily Alert recipient s address has been selected and assigned, the Daily Alert Configuration window will be updated with the list of recipient addresses. 24

26 5. Type in text for the Subject line to be contained within the Daily Alert as illustrated below. 25

27 Note About Subject Text: It may be helpful to use a subject text format that references your client s company name, the name of the Network Detective Site you used, and the term Daily Alert. For example: Client Company Name Site Name Daily Alert After the completion of Step 5 above, the Subject text to be present within each Daily Alert message along with the recipients that will receive Daily Alerts will have been defined. 6. Next, set the Format for the Daily Alert. The Format options are Expanded and Compact. Expanded Format selecting this option will augment Daily Alerts with detailed information about the Anomalies, Changes, and Threats (ACT) detected. Using this option, Daily Alerts will be sent via an HTML formatted in a friendly readable format for alerts that includes recommendations and formatting. The Expanded for is ideal for users using readers on PC or tablet devices. Compact Format selecting this option will present the identified Anomalies, Changes, and Threats detected in a summarized form. Using this option, Daily Alerts will be sent in a Plain Text format. Daily Alerts in Compact form work well with mobile device readers and integration to PSAs. 7. Next, set the Alert Sort option to control how Anomalies, Changes, and Threats (ACT) notices are to be sorted within the Daily Alerts s sent to Recipients. The Alert Sort options are ACT then Severity, which sorts issues by Anomaly, Change and Threat (ACT) types and Severity. The other Alert Sort option is by Severity only. 26

28 Select the Alert Sort method of choice 8. Set the Suppress No Issue Alerts option if you wish to suppress Daily Alerts that contain no issues from being sent when no ACT issues have been identified. Next, either select the Save & Close button to save the Daily Alert Configuration, or select the 27

29 Selected Alerts tab to set the Change events that trigger a Daily Alert. Note, if the Suppress No Issue Alerts is not selected, the Daily Alerts will be sent with a No Issue Alerts status as presented in the example below. Step 4 Use the Selected Alerts Feature to Set Network and Use Change Events that Trigger Daily Alerts There are four primary settings options that can be configured to set-up and trigger Daily Alerts. These options are: Access Control Access Control Bulletins are issued for changes in the following: o o o o o o o Administrative rights New device on restricted networks New profiles and users Suspicious user logins Unauthorized access to endpoints on the accounting, Cardholder Data Environment (CDE), EPHI, and restricted IT computers, and unauthorized printers Addition of unauthorized printers on the network Unusual logon times and unusual logons to computers by users Computers Alerts are issued for changes in the following: o o o o Applications installed on locked down systems Critical patches missing Internet restrictions on not enforced Removable drives added to one or more locked down systems Network Security High and medium internal network vulnerabilities trigger Alerts 28

30 Wireless Alerts are issued when connections to Unauthorized Wireless Networks take place. To specify which network and security change events should trigger Daily Alerts to be sent to one or more alert recipients, the Daily Alerts Selected Alerts settings must be defined. Select the Selected Alerts tab in the Daily Alert Configuration window to access and select the Daily Alert change events that, when detected, trigger a Daily Alert notice being sent reporting a change event. The Anomalies, Changes, and Threat (ACT) alert events options are available for selection within the Daily Alerts settings window as presented below. Select the Daily Alerts options of your choice, then, select the Save & Close button to save the Daily Alert Configuration settings. 29

31 Step 5 Configure the Daily Alerts Delivery Schedule To schedule the Daily Alerts notifications, select the Modify button in the Schedule section of the Settings Preferences window in order to set the Daily Alerts notification schedule. Please note that the default setting for alert distribution frequency of Daily Alerts is for alert s to be sent per the Notifications Time and Schedule specified within the Schedule Settings Preferences as presented below. ` Daily Alerts will be sent to alert recipients at the scheduled time and frequency to notify alert recipients of network and/or security issues related to internal vulnerabilities that are detected as changes to the network or its security status. After setting the Daily Alert time and frequency (days selected), select the Save button to save these settings. 30

32 Example of a Daily Alert Below is an example of a Daily Alert message sent by. 31

33 Setting Up Weekly Notices The use of the Weekly Notices feature presumes that you have set up one (1) or more automated scans for one (1) or more of the Assessments types available on the Appliance. Weekly Notices is a feature whereby you and other designated recipients within your company can be sent Notices via . These Weekly Notices serve the purpose of notifying recipients by of changes identified within your customer s IT infrastructure after pre-scheduled scans/assessments have been performed. The changes contained within a Weekly Notice will be a result of a comparison of the most current and previous scans being performed by. To setup Weekly Notices perform the following steps. Step 1 Select the Site Double click your mouse pointer on the Site that you are configuring automated scan, alerts, and reports to be performed upon in order to view and access the Site. Step 2 Select Manage Appliance and Access the Settings After the Site has been opened, select the icon located within the Site bar. 32

34 The Settings window will be displayed. Step 3 Add Weekly Notice Recipients and Assign Weekly Notice Notification Subject Text 1. To add a Weekly Notice Recipient, select the Weekly Notice Preferences option by selecting the selector on the Weekly Notice bar. The Weekly Notice Preferences will be displayed to enable access to the Weekly Notice settings. 33

35 The Weekly Notice settings enable the selection of the Weekly Notice recipients, setting the Subject text for the alert, the assignment of the types of changes to the network that issue alerts, and to enable the suppression of No Issue Alerts notifications. 2. Add one or more alert Recipient by selecting the Add Recipient button available in the Weekly Notice Preferences window as displayed below. The Weekly Notice Alerts configuration window will be displayed. 3. Select the To button in order to display a the list of Network Detective User addresses that can be designated as Weekly Notice Recipients: 34

36 The Select Users Form will be displayed. Select the address for the person that you want to receive Weekly Notice notifications. After selecting a Recipient s address from the list of addresses in the Select Users Form, or typing in a Recipient s address manually, click on the OK button. Repeat this process for each recipient that you want to add to the To list present in the Weekly Notice alerts configuration window. Using Addresses That Are Not Available in Network Detective If you do not see an address for an individual in your company that you want to be assigned as a Weekly Notice Recipient, then add the desired individual as a user of the Network Detective using the Network Detective Manage Users option. Alternatively, if an individual you that would like to receive an alert is not listed in the Select Users Form, you can select the field to the right of the To button in the Weekly Notice configuration window and type in the address of the intended recipient of the alert as presented below. 35

37 4. Once each Weekly Notice recipient s address has been selected and assigned, the Weekly Notice Alerts configuration window will be updated with the list of recipient addresses. 5. Type in text for the Subject line to be contained within the Weekly Notice as illustrated below. 36

38 Note About Subject Text: It may be helpful to use a subject text format that references your client s company name, the name of the Network Detective Site you used, and the term Weekly Notice. For example: Client Company Name Site Name Weekly Notice After the completion of Step 5 above, the Subject text to be present within each Weekly Notice message along with the recipients that will receive Weekly Notice will have been defined. 6. Set the Suppress No Issue Alerts option if you wish to suppress Weekly Notices that contain no issues from being sent when no Anomalies, Changes, and Threats (ACT) issues have been identified. 37

39 Next, either select the Save & Close button to save the Weekly Notice Alerts configuration, or select the Selected Notices to set the Change events that trigger a Weekly Notice. Note, if the Suppress No Issue Alerts is not selected, the Weekly Notice will be sent with a No Issue Alerts status as presented in the example below. 38

40 Step 4 Use the Selected Notices Feature to Set Network and Use Change Events that Trigger Weekly Notices There are two primary settings options that can be configured to set-up and trigger Weekly Notice. These options are: Network, Endpoint, and Security Related Change Events o o o o o o Computers DNS Domain and local users Network devices and printers Switch port connects Wireless network Network Security this option sends notices when new vulnerabilities associated with Internal Network Security are identified To specify which network and security change events should trigger Weekly Notice to be sent to one or more alert recipients, the Weekly Notice Selected Notices settings must be defined. Select the Selected Alerts tab in the Weekly Notice Alerts configuration window to access and select the Weekly Notice change events that, when detected, trigger a Weekly Notice being sent reporting a change event. The Weekly Notice alert events options are available for selection within the Weekly Notice settings window as presented below. 39

41 Select the Weekly Notice alert options of your choice, then, select the Save & Close button to save the Weekly Notice configuration settings. Step 5 Configure the Weekly Notice Delivery Schedule To schedule the Weekly Notice alerts, select the Modify button in the Schedule section of the Settings Preferences window in order to set the Weekly Notice notification schedule. Please note that the default setting for scheduled delivery of the Weekly Notice is for the Notice to be sent per the Notifications Time and Schedule specified within the Schedule Settings Preferences as presented below. ` Weekly Notices will be sent to alert recipients at the scheduled time and day to notify alert recipients of network and/or security issues related to internal vulnerabilities that are detected as changes to the network or its security status. After setting the Weekly Notice time and day, select the Save button to save these settings. 40

42 Example of a Weekly Notice Below is an example of a Weekly Notice message sent by. 41

43 Assigning Smart Tags to Change Events that Refine Alerts and Notices incorporates a proprietary feature named Smart Tags. The Smart Tags feature allows you to fine-tune the to adapt to each client s unique IT environment to detect network Anomalies, Changes, and Threats (ACT). Smart Tags allow you to enrich the detection system by adding information about specific users, assets, and settings that helps get smarter about what it is finding. That means more potential threats identified with fewer false positives. Here is an example of some of the Smart Tags available for use: Tag AUTHORIZED SSID BUSINESS OWNER BUSINESS OWNER PC GUEST NETWORK GUEST WIRELESS NETWORK IT ADMIN LOCKED DOWN RESTRICTED IT ADMIN ONLY RESTRICTED NETWORK SINGLE DESKTOP USER VIRTUAL MACHINE AUTHORIZED PRINTER TRANSIENT PRINTER Applied To SSID User Computer IP Range IP Range User Computer Computer IP Range User Computer Printer Printer Examples of Smart Tag Use Here are some examples of how you might use the Smart Tags to fine-tune s alerts for a particular client: Restricted Computer Access Detection Within, you can tag a particular computer as being RESTRICTED IT ADMIN ONLY. Then, when any user logs into the network that has not been tagged IT ADMIN, will send an alert. 42

44 Changes to Locked Down Computer Detection Within, you can tag a particular computer as Locked Down (meaning, do not allow changes to this computer). If someone manages to install an application on this machine, then will detect that the application was installed and send an Alert. In this way, tagging can remove false positives and increases the relevance of alerts. Wireless Network Availability Detection Within, you can tag a specific wireless network as a GUEST WIRELESS NETWORK telling it does not need to worry about new devices appearing on it. But if a new device shows up on any non-guest network, then the appearance is significant and will send you an alert so you can determine if it is worth looking into. Using Smart Tags You can select, configure, or modify, your Smart Tags at any time. That allows you to see what kind of alerts is sending you and create the tags you want to use to tweak the system. The use of Smart Tags improves the detection of Anomalies, Changes, and Threats (ACT) by providing additional knowledge of the network environment to the. Once the has scanned your network for the first time, you can explore the data and assign Smart Tags to entries like computers and users. The use of the Smart Tags feature presumes that the Level 1 (Daily) Scan and/or Level 2 (Weekly) Scan types available on the Appliance have been configured and performed. Warning Concerning the Removal of a Appliance from a Site When a has been Associated with a Site and the Scan Schedule, Alert Schedule, Alert Recipients, and Smart Tags settings have been defined, if the is ever Associated with a different Site, the original Site s settings will be automatically deleted. Backing Up Smart Tags for Reuse You have the ability to Export the Smart Tags associated with a Network Detective Site file that is Associated with. If you wish to save the assigned Smart Tags contained within the existing Site that is Associated with for later use with a new Site, then use the Smart Tags Export and Import options described in Appendix II Saving and Reusing Smart Tags through Export and Import found on page

45 Adding and Configuring Smart Tags To assign and configure Smart Tags to enable to recognize any Anomalies, Changes and Threats (ACT) that trigger Daily Alerts or Weekly Notice alerts, perform the following steps. Step 1 Select the Site Double click your mouse pointer on the Site that you are configuring automated scan, alerts, and reports to be performed upon in order to view and access the Site. Step 2 Select Manage Appliance and Access the Settings After the Site has been opened, select the icon located within the Site bar. 44

46 The Settings window will be displayed. Step 3 Access Smart Tags and Verify that Scan Data has been Downloaded Select the Smart Tags link within the s Settings window. If no scans have been performed by the, the following message will be presented by Network Detective. After scans have been performed, select the Smart Tags link and download the scan as instructed. 45

47 Once the scans have been downloaded, the completion of the process will be confirmed by the presentation of the Smart Tags options consisting of Applied Tags, Recommended Tags, and Available Tags as presented below. Once the Smart Tags are Up to Date, you can access, view, and use the settings for Applied Tags, Recommended Tags, and Available Tags. Also note: When starting a Site using the, then attempting to view or update the Smart Tags configuration, you may be prompted to update the scan data with the latest scan per a notice as displayed below. Depending on the number of changes in Users and Computers on your client s network, you may wish download the updated scan to ensure the latest User identity and Computer information is available for use when setting Smart Tag configurations. 46

48 Step 4 Select and Apply Recommended Tags 1. To add a Smart Tag from the Recommended Tags list, select the Recommended Tags option by selecting the selector on the Recommended Tags bar. The Recommended Tags window will be displayed. 2. Next, select the Smart Tag that you would like to configure and apply. For example, select the IT Admin tag by double-clicking on the IT Admin User Smart Tag Icon. 47

49 This action will display the Tag Explorer window for this Smart Tag. Within the Tag Explorer window, instructions are presented that detail: what the Tag is to be Applied To (i.e. users or computers) the For What purpose the Tag can be used the Why reason to use the Tag Note: There are a number of Smart Tags that should be used as logical pairs. For example, the IT Admin User tag should be used with the Restricted IT Admin Computer Only tag. Using this pair of Smart Tags will enable you to define all of the IT Admin users, and the computer endpoints that are to be only accessible by IT Admin users. Alerts will be generated when non-it Admin users access the computers designated as Restricted IT Admin Computers Only. 3. Next, define which network Users are IT Admin Users by selecting the Users that should be designated as IT Administrators in the Tag Explorer window presented for the IT Admin Users tag. To specify the IT Admin Users, select the Check Box next to Users that should be designated as IT Admin Users from the list presented in the Tag Explorer window as displayed below. 48

50 4. Next, select the Save & Close button to save the Smart Tag settings for the IT Admin User Smart Tag. When the IT Admin Tag is configured and Applied, the IT Admin Tag will be available for updating in the Applied Tags section of the Smart Tags options window. Step 5 View Applied Tags To view the Smart Tags that have been Applied from the Applied Tags list, select the Applied Tags option by selecting the selector on the Applied Tags bar. The Smart Tags that have been applied to the configuration for the Site will be listed in 49

51 the Applied Tags window as seen below. You can double click on the Smart Tag to view the tag s settings. Step 6 Select and Apply Additional Smart Tags from the Available Tags Window 1. To add a Smart Tag from the Available Tags list, select the Available Tags option by selecting the selector on the Available Tags bar. The Smart Tags available for use will be displayed. 50

52 2. Double click on the Smart Tag that you want to use and the Tag Explorer window for the selected tag will open. Configure the Tag by selecting the Users or Computers listed in the Tag Explorer window that you want to designate as being Tagged within the Tag as displayed below. 3. Next, select the Save & Close button to save the Smart Tag settings for the selected Smart Tag. When the Tag you selected is configured and Applied, the Tag will be available for updating in the Applied Tags section of the Smart Tags options window. 51

53 4. Verify that the Tag you configured and Applied is in the Applied Tags window. To view the Smart Tags that have been Applied from the Applied Tags list, select the Applied Tags option by selecting the selector on the Applied Tags bar. The Applied Tags will be displayed to enable you to confirm that the Smart Tag you selected and configured has been Applied. 52

54 Deleting Smart Tags Use the following steps to delete a Smart Tag Step 1 Open the Applied Tags Window and Select the Tag for Deletion To access the Smart Tags that have been Applied from the Applied Tags list, select the Applied Tags option by selecting the selector on the Applied Tags bar. The Applied Tags window will be displayed. Step 2 Select the Tag and Delete Right click the mouse pointer on the tag to be deleted. A Remove Tag menu option will be presented. Select the Remove Tag menu option and the tag will be deleted and removed from the Applied Tags window. 53

55 Viewing the Notifications History and Past Alert Details When using the Network Detective with a, there is an ability to access the history associated with all Daily Alerts and Weekly Notices for review purposes. To access the Notifications History, select the Notifications link available within the Settings window. The Notification History window will be displayed. The Notifications History Time Frame view of the alert history can be set to 7, 14, and as long as 30 days. 54

56 To view an individual Daily Alert or Weekly Notice, select the row containing the record of the Alert or Notice you want to view and double click the row to see the Alert or Notice details. 55

57 Preferences Menu Options The Network Detective Preferences menu presents one set of options that can be configured as defaults for s branding of the reports generated by the Appliance. Setting the Master Report Default Preferences For instructions on how to set the Report Default preferences, please refer to the Setting the Report Branding and Customization Preferences instructions contained within the Network Detective User Guide. 56

58 Using the Manage Appliance Feature to Configure Automatic Report Generation Below is an overview of the steps required to setup Automatic Report Generation for the following Assessment Report types: Network Assessments Security Assessments Note: Automated reports for the Network and Security Modules can be scheduled for delivery from the Appliance. Reports below 5 MB in size will be attached the Reports Available notification sent to Recipients. Reports over 5 MB in size will be available for download in the Downloaded Reports section. Setting Up Automatic Reports for Network Assessments Automatic report generation for the Network Assessment Module requires that the scans be run on a before a report can be generated. Following are the steps necessary to set up automatically generated reports for the Network Assessment Module: Automatic report generation for the Network Assessment Module requires that the scans be run on a before a report can be generated. Following are the steps necessary to set up automatically generated reports for the Network Assessment Module being used with : 1. Create a new Site that is that is to be used with to perform and collect network scan information. 2. Associate your with the Site that is to be used for a particular network that has installed. 3. Manage the and create a new Scan Task that collects the necessary Network Assessment data. 57

59 4. Schedule the Daily Scan and Weekly Scan Task for the times that are appropriate for this Assessment. 5. Next, define the Branding for the reports to use your company s brand for all of the reports generated by selecting the Branding button. Assign the Report Prepared For information, Report Prepared By information, your company Logo, the Theme, and Cover Images for your reports. Select the Ok button to save your Branding settings. 6. Using the access Settings feature and the Reports Settings Window, select the Schedule Report button to create a Report Delivery Task that specifies desired reports from the Network Assessment Module. 58

60 Select the Network Assessment reports that should be generated. Keep in mind that reports for specific Assessment types can only be produced after the Scans required for a specific Assessment type have been performed. Click Next button to proceed to the next step. 7. Schedule the created Report Generation and Delivery Task for a time which is certain to be after the scan is complete. Reports will use whatever data is on the based on the most recent scan that has been completed, so if the scan is not complete then the reports will not have the most recent scan s data either. 59

61 8. If the user has specified that reports be delivered by , the specified should receive an with a.zip file of the reports attached as long as the zip file is less than 5 MB in size. To enable to send reports or report availability notifications by , set the Subject and type in the recipient s address in the field or select the address of the recipient from a list of available Network Detective users. If the generated Report s file in.zip format should be protected by a password, then select the Password Protect ZIP File option and assign a password to be used for the file s access protection. 9. Report generation can take several minutes. After sufficient time has passed after the report generation task schedule time, view the generated reports by navigating to the Download Reports item on the left hand side of the Network Detective application. 60

62 Report generation can take several minutes. After sufficient time has passed after the report generation task schedule time, view the generated reports by navigating to the Downloaded Reports icon on the left hand side of the Network Detective application as seen below. The Download Reports option will appear at the top of the Network Detective window. Then press the Download Reports button at the top. A dialog will appear with reports generated by the. 61

63 10. Select and right click on a report to download the report. 62

64 Setting Up Automatic Reports for Security Assessments Automatic report generation for the Security Assessment Module requires that the scans be run on a before a report can be generated. Following are the steps necessary to set up automatically generated reports for the Security Assessment Module being used with : 1. Create a new Site that is that is to be used with to perform and collect network scan information. 2. Associate your with the Site that is to be used for a particular network that has installed. 3. Manage the and create a new Scan Task that collects the necessary Security Assessment data. 4. Schedule the Daily and Weekly Scan Task for the times that are appropriate for this Assessment. 5. Next, define the Branding for the reports to use your company s brand for all of the reports generated by selecting the Branding button. Assign the Report Prepared For information, Report Prepared By information, your company Logo, the Theme, and Cover Images for your reports. 63

65 Select the Ok button to save your Branding settings. 6. Using the access Settings feature and the Reports Settings Window, select the Schedule Report button to create a Report Delivery Task that specifies desired reports from the Security Assessment Module. Select the Security Assessment reports that should be generated. 64

66 Keep in mind that reports for specific Assessment types can only be produced after the Scans required for a specific Assessment type have been performed. Click Next button to proceed to the next step. 7. Schedule the created Report Generation and Delivery Task for a time which is certain to be after the scan is complete. Reports will use whatever data is on the based on the most recent scan that has been completed, so if the scan is not complete then the reports will not have the most recent scan s data either. 65

67 8. If the user has specified that reports be delivered by , the specified should receive an with a.zip file of the reports attached as long as the zip file is less than 5 MB in size. To enable to send reports or report availability notifications by , set the Subject and type in the recipient s address in the field or select the address of the recipient from a list of available Network Detective users. If the generated Report s file in.zip format should be protected by a password, then select the Password Protect ZIP File option and assign a password to be used for the file s access protection. 9. Report generation can take several minutes. After sufficient time has passed after the report generation task schedule time, view the generated reports by navigating to the Downloaded Reports icon on the left hand side of the Network Detective application as seen below. 66

68 The Download Reports option will appear at the top of the Network Detective window. Then press the Download Reports button at the top. A dialog will appear with reports generated by the. 10. Select and right click on a report to download the report. 67

69 Updating a Software Appliance After installing a Software Appliance at the Site s physical location and associating the Software Appliance with a Site in the Network Detective Application, it s important to regularly update the Appliance to get the most out of the features available on the Software Appliance you are using which may include one or more of the following Data Collections, Automated Reports, Tech-Alerts, and Weekly Notices. In the Network Detective Application, navigate to Network Detective ribbon bar and select the Appliances icon. This action will display the Software Appliances window that lists all of the Appliances that are available for use within Network Detective. To update the selected Software Appliance, right click on the Appliance s name, and select the Update menu option presented as displayed below. Note that the Update menu will only be visible if software updates are available. 68

70 IMPORTANT: The Appliance Update Now feature, when activated to update the Software Appliance, will shut down any tasks that are currently running on the Software Appliance. Before updating the Software Appliance, either stop a currently running task listed in the Task Library window Queued Tasks list, or perform the update after running tasks are completed. A dialog will appear confirming the request for a software update. 69

71 Appendices Appendix I Software Appliance Diagnostic Tool Purpose of the Diagnostic Tool The Diagnostic Tool is used to gather relevant diagnostic information, test connectivity, manage updates, and allow remote support to the Appliance. 70

72 Available Commands There are a number of commands available within the Appliance Manager. Location and Information Locate Network Detective Appliance Re-initialize the Appliance discovery process and attempts to retrieve the Device ID number and other diagnostic information. Get Appliance Device ID Display the Software Appliance s Device ID, used when associating the Software Appliance with a Site in the Network Detective Application. Diagnostics and Troubleshooting Appliance Diagnostics Queries the Software Appliance for diagnostic information used to verify running status, software, connectivity, and NIC Information. Ping Test from Appliance Performs a ping test directed at a specified host or IP address from the point of view of the Software Appliance itself. Note: network connectivity is required for the Appliance to operate properly. Get Log Files Retrieves diagnostics logs from the Appliance. Returns a link to download a.zip file containing run log information which may be used for further troubleshooting. Service Control Appliance Service Status Queries the Software Appliance to return its current status. The possible statuses are as follows: Idle: The Software Appliance is online, but performing no action. Queued: The Software Appliance is online and performing no action. A schedule is active and queued to run. Running: The Software Appliance is online and currently running a schedule. Appliance Service Restart Requests a Service Restart from the Software Appliance. Exercise caution when using this command because it may interrupt any running Scan. 71

73 Updating via USB Update Appliance via USB Requests the Software Appliance to update via USB. Attempts to detect a USB device. If a USB device is detected containing the necessary files is found to be connected to the Software Appliance an update will be performed. Please ensure that a USB stick containing the update is plugged into the USB port of the system hosting the Software Appliance. Check USB Update Status Returns the current status of a running update. Also attempts to detect any USB device with available updates. Remote Assistance Toggle Remote Assistance Status Instructs the Software Appliance to make itself available for Remote Assistance and to allow a technician to access the device for support. Check Remote Assistance Status Return the current status of Remote Assistance. Shutdown and Restart Restarts the Software Appliance. Shutdown Appliance Shuts down the Software Appliance. 72

74 Appendix II Saving and Reusing Smart Tags through Export and Import Before associating a new Network Detective Site file to a that has already been configured for use with another Site to detect Anomalies, Changes, and Threats (ACT) on a network, you may want to Export and reuse the original site s Smart Tag settings before associating a new Site with your if the is to be used to detect ACT events on the same network. Once a and its associated Site have been configured to operate with a given network, switching the Site file to be used with your will trigger a deletion of the Smart Tag settings associated with the original Site used to configure and apply the Smart Tag settings to your. If there is a requirement to save the Smart Tags from the current Site s configuration for reuse in a different Site associated with your that is to be connected to the same network as the original Site was monitoring, you must use the Smart Tags Export and Import options to save and reuse the tags for later use in your new Site file used to configure the s configuration. Steps to Export and Save Smart Tags for Later Use Step 1 Select the Site Double click your mouse pointer on the Site that you are configuring automated scan, alerts, and reports to be performed upon in order to view and access the Site. Step 2 Select Manage Appliance and Access the Settings After the Site has been opened, select the icon located within the Site bar. 73

75 The Settings window will be displayed. Step 3 Access Smart Tags and Verify that Scan Data has been Downloaded Select the Smart Tags link within the s Settings window. 74

76 Step 4 Export Smart Tags Select the Export option to export the Smart Tags configuration. Your will be prompted to save the Smart Tags export file in a location of your choice. Select the folder you want to save the Smart Tags Configuration file in, name the file, and select the Save button to export the file. 75

77 Steps to Import Smart Tags for into your Site for Use with Step 1 Select the Site Double click your mouse pointer on the Site that you are configuring automated scan, alerts, and reports to be performed upon in order to view and access the Site. Step 2 Select Manage Appliance and Access the Settings After the Site has been opened, select the icon located within the Site bar. The Settings window will be displayed. 76

78 Step 3 Access Smart Tags and Verify that Scan Data has been Downloaded Select the Smart Tags link within the s Settings window. Step 4 Import a Smart Tags Configuration File Select the Import option to import a Smart Tags configuration file. A prompt will be presented requesting verification from you in order to continue the Import of the Smart Tags Configuration File. 77

79 Select the Yes button to continue. The Import Smart Tag Configuration window will be displayed. Select the Smart Tag Configuration File name and select the Open button to perform the Smart Tag Import process. 78

Network Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D

Network Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D Network Detective 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D Contents Overview... 3 Components of the Inspector... 3 Inspector Appliance... 3 Inspector Diagnostic Tool... 3 Network

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

Customer admin guide. UC Management Centre

Customer admin guide. UC Management Centre Customer admin guide UC Management Centre June 2013 Contents 1. Introduction 1.1 Logging into the UC Management Centre 1.2 Language Options 1.3 Navigating Around the UC Management Centre 4 4 5 5 2. Customers

More information

Network Detective. Security Assessment Module Using the New Network Detective User Interface Quick Start Guide

Network Detective. Security Assessment Module Using the New Network Detective User Interface Quick Start Guide Network Detective Security Assessment Module Using the New Network Detective User Interface Quick Start Guide 2016 RapidFire Tools, Inc. All rights reserved. V20160111 Ver 3M Overview The Network Detective

More information

Network Detective. PCI Compliance Module Using the PCI Module Without Inspector. 2015 RapidFire Tools, Inc. All rights reserved.

Network Detective. PCI Compliance Module Using the PCI Module Without Inspector. 2015 RapidFire Tools, Inc. All rights reserved. Network Detective PCI Compliance Module Using the PCI Module Without Inspector 2015 RapidFire Tools, Inc. All rights reserved. V20150819 Ver 5T Contents Purpose of this Guide... 4 About Network Detective

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Instructions for installing Microsoft Windows Small Business Server 2003 R2 on HP ProLiant servers

Instructions for installing Microsoft Windows Small Business Server 2003 R2 on HP ProLiant servers Instructions for installing Microsoft Windows Small Business Server 2003 R2 on HP ProLiant servers integration note Abstract... 2 Installation requirements checklists... 3 HP ProLiant server checklist...

More information

First Time On-Campus VLab Setup Windows XP Edition

First Time On-Campus VLab Setup Windows XP Edition First Time On-Campus VLab Setup Windows XP Edition General: This guide is a step-by-step walkthrough of downloading, installing and configuring VMware View Client for the University of Cincinnati s VLab

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

SevOne NMS Download Installation and Implementation Guide

SevOne NMS Download Installation and Implementation Guide SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and

More information

Getting Started with Vision 6

Getting Started with Vision 6 Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop

More information

This document is intended to make you familiar with the ServersCheck Monitoring Appliance

This document is intended to make you familiar with the ServersCheck Monitoring Appliance ServersCheck Monitoring Appliance Quick Overview This document is intended to make you familiar with the ServersCheck Monitoring Appliance Although it is possible, we highly recommend not to install other

More information

Monnit Wi-Fi Sensors. Quick Start Guide

Monnit Wi-Fi Sensors. Quick Start Guide Monnit Wi-Fi Sensors Quick Start Guide Inside the Box You should find the following items in the box: Monnit Wi-Fi (MoWi ) Sensors 2 x AA Batteries for Each MoWi Sensor Quick Start Guide Note: A MoWi USB

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

LifeCyclePlus Version 1

LifeCyclePlus Version 1 LifeCyclePlus Version 1 Last updated: 2014-04-25 Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted.

More information

Remote Desktop Services User's Guide

Remote Desktop Services User's Guide Contents Remote Desktop Services Document Revision Control Revision Description Author DATE 1.0 Initial Release Karen M. Hess 3/24/2015 1.1 Added section for viewing mapped drives Karen M. Hess 4/15/2015

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Quick Start Guide FLIR Firmware Update Tool

Quick Start Guide FLIR Firmware Update Tool Quick Start Guide FLIR Firmware Update Tool Copyright 2014 FLIR Systems, Inc. All rights reserved. Doc. No.: 427-0073-99-28, Rev. 110, Oct 2014 FLIR Systems, Inc., 2014. All rights reserved worldwide.

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update Secure Remote Access Dell SonicWALL SRA 7.5.0.9 Contents Release Purpose...1 Platform Compatibility...1 Licensing on the Dell SonicWALL SRA Appliances and Virtual Appliance...2 Important Differences between

More information

genie app and genie mobile app

genie app and genie mobile app genie app and genie mobile app User Manual 350 East Plumeria Drive San Jose, CA 95134 USA June 2012 202-10933-02 v1.0 2012 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,

More information

Job Aid: Creating Additional Remote Access Logins

Job Aid: Creating Additional Remote Access Logins This job aid describes the steps required to add an additional remote access login to the Avaya S8300, S8500, and S8700 Series Media Servers. These logins may be used to establish a Point to Point Protocol

More information

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices

More information

Flowlink Pro Server Software Installation Guide

Flowlink Pro Server Software Installation Guide Flowlink Pro Server Software Installation Guide Part #69-2543-274 ii Flowlink Pro Server Installation Guide COPYRIGHT 2006, 2014 Teledyne Isco, Inc. 4700 Superior St., Lincoln, Nebraska, U.S.A. 68504 Phone:

More information

138 Configuration Wizards

138 Configuration Wizards 9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP

More information

Stellar Phoenix Exchange Server Backup

Stellar Phoenix Exchange Server Backup Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically

More information

Fiery EX4112/4127. Printing from Windows

Fiery EX4112/4127. Printing from Windows Fiery EX4112/4127 Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45083884 01 April 2009 CONTENTS 3 CONTENTS

More information

Online Help StruxureWare Data Center Expert

Online Help StruxureWare Data Center Expert Online Help StruxureWare Data Center Expert Version 7.2.1 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.

More information

6.0. Getting Started Guide

6.0. Getting Started Guide 6.0 Getting Started Guide Netmon Getting Started Guide 2 Contents Contents... 2 Appliance Installation... 3 IP Address Assignment (Optional)... 3 Logging In For the First Time... 5 Initial Setup... 6 License

More information

Printer Maestro. True Enterprise Print Management for Windows WHITE PAPER

Printer Maestro. True Enterprise Print Management for Windows WHITE PAPER Printer Maestro True Enterprise Print Management for Windows WHITE PAPER Contents Overview 3 The Printer Maestro Service 4 Installing the Printer Maestro Service 4 Managing the Printer Maestro Service

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Internet Explorer 7. Getting Started The Internet Explorer Window. Tabs NEW! Working with the Tab Row. Microsoft QUICK Source

Internet Explorer 7. Getting Started The Internet Explorer Window. Tabs NEW! Working with the Tab Row. Microsoft QUICK Source Microsoft QUICK Source Internet Explorer 7 Getting Started The Internet Explorer Window u v w x y { Using the Command Bar The Command Bar contains shortcut buttons for Internet Explorer tools. To expand

More information

Wireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No.

Wireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No. 2,4 GHz WIRELESS Wireless-N PCI Adapter User Guide Model No. WMP300N (EU) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

VMware Horizon FLEX User Guide

VMware Horizon FLEX User Guide Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this

More information

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 LabTech Commands COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 Overview Commands in the LabTech Control Center send specific instructions

More information

User Guide for Windows 10

User Guide for Windows 10 User Guide for Windows 10 System requirements E10684 First Edition July 2015 To facilitate a smoother transition from your previous operating system, read the system requirements below before upgrading

More information

Intelli-M Access Quick Start Guide

Intelli-M Access Quick Start Guide Intelli-M Access Quick Start Guide Before You Begin The Intelli-M Access software can be used in conjunction with the eidc. Use Intelli-M Access to manage, view, and report activity through an eidc controlled

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

RPM Utility Software. User s Manual

RPM Utility Software. User s Manual RPM Utility Software User s Manual Table of Contents 1. Introduction...1 2. Installation...2 3. RPM Utility Interface...4 1. Introduction General RPM Utility program is an RPM monitoring, and management

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption

More information

Ipswitch Client Installation Guide

Ipswitch Client Installation Guide IPSWITCH TECHNICAL BRIEF Ipswitch Client Installation Guide In This Document Installing on a Single Computer... 1 Installing to Multiple End User Computers... 5 Silent Install... 5 Active Directory Group

More information

Rapid Assessment Key User Manual

Rapid Assessment Key User Manual Rapid Assessment Key User Manual Table of Contents Getting Started with the Rapid Assessment Key... 1 Welcome to the Print Audit Rapid Assessment Key...1 System Requirements...1 Network Requirements...1

More information

Novell ZENworks Asset Management

Novell ZENworks Asset Management Novell ZENworks Asset Management Administrative Best Practices and Troubleshooting www.novell.com APRIL 19, 2005 2 GETTING THE MOST OUT OF NOVELL ZENWORKS ASSET MANAGEMENT The award-winning asset tracking

More information

TE100-P21/TEW-P21G Windows 7 Installation Instruction

TE100-P21/TEW-P21G Windows 7 Installation Instruction Hardware Installation TE100-P21/TEW-P21G Windows 7 Installation Instruction 1. Go to http://www.trendnet.com/downloads/ to download the Windows 7 Utility. Save the file to your desktop. 2. Right click

More information

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No

More information

MFC7840W Windows Network Connection Repair Instructions

MFC7840W Windows Network Connection Repair Instructions Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

BaseManager & BACnet Manager VM Server Configuration Guide

BaseManager & BACnet Manager VM Server Configuration Guide BaseManager & BACnet Manager VM Server Configuration Guide For Self-Hosted BaseManager & BACnet Manager Servers Deployed as Virtual Machines August 27, 2015 Customer Service 1-866-294-5847 i Baseline Inc.

More information

Suite. How to Use GrandMaster Suite. Exporting with ODBC

Suite. How to Use GrandMaster Suite. Exporting with ODBC Suite How to Use GrandMaster Suite Exporting with ODBC This page intentionally left blank ODBC Export 3 Table of Contents: HOW TO USE GRANDMASTER SUITE - EXPORTING WITH ODBC...4 OVERVIEW...4 WHAT IS ODBC?...

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0

Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0 Smart Control Center User Guide 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10685-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted,

More information

Acceptable Encryption Usage for UTHSC

Acceptable Encryption Usage for UTHSC This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged

More information

Trend Micro KASEYA INTEGRATION GUIDE

Trend Micro KASEYA INTEGRATION GUIDE Trend Micro KASEYA INTEGRATION GUIDE INTRODUCTION Trend Micro Worry-Free Business Security Services is a server-free security solution that provides protection anytime and anywhere for your business data.

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Deposit Direct. Getting Started Guide

Deposit Direct. Getting Started Guide Deposit Direct Getting Started Guide Table of Contents Before You Start... 3 Installing the Deposit Direct application for use with Microsoft Windows Vista... 4 Running Programs in Microsoft Windows Vista...

More information

Internet Filtering Appliance. User s Guide VERSION 1.2

Internet Filtering Appliance. User s Guide VERSION 1.2 Internet Filtering Appliance User s Guide VERSION 1.2 User s Guide VERSION 1.2 InternetSafety.com, Inc 3979 South Main Street Suite 230 Acworth, GA 30101 Phone 678 384 5300 Fax 678 384 5299 1 Table of

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Cisco TelePresence Management Suite Extension for Microsoft Exchange Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide D14846.01 June 2011 Software version 2.3 Contents Introduction 5 End user guidance 5 Server requirements 6 Exchange

More information

Site Monitor. Version 5.3

Site Monitor. Version 5.3 Site Monitor Version 5.3 1 1 Table of contents 1 Table of contents... 2 2 Installation... 3 2.1 Components... 3 2.1.1 Monitoring Service... 3 2.1.2 Desktop User Interface... 3 2.1.3 Web User Interface...

More information

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide

Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates

More information

System Center 2012 R2 SP1 Configuration Manager & Microsoft Intune

System Center 2012 R2 SP1 Configuration Manager & Microsoft Intune 2015 System Center 2012 R2 SP1 Configuration Manager & Microsoft Intune DEPLOYING MICROSOFT OFFICE 365 PROFESSIONAL PLUS RONNI PEDERSEN & HANS CHRISTIAN ANDERSEN RONNIPEDERSEN.COM Microsoft MVP: Enterprise

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Using Device Discovery

Using Device Discovery 2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery

More information

Chapter 10 Encryption Service

Chapter 10 Encryption Service Chapter 10 Encryption Service The Encryption Service feature works in tandem with Dell SonicWALL Email Security as a Software-as-a-Service (SaaS), which provides secure data mail delivery solutions. The

More information

Andover Continuum Remote Communication Configuration Guide

Andover Continuum Remote Communication Configuration Guide Andover Continuum Remote Communication Configuration Guide 2010, Schneider Electric All Rights Reserved No part of this publication may be reproduced, read or stored in a retrieval system, or transmitted,

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Setting up and Automating a MS Dynamics AX Job in JAMS

Setting up and Automating a MS Dynamics AX Job in JAMS Setting up and Automating a MS Dynamics AX Job in JAMS Introduction... 1 Creating a User for the AX Job Execution... 2 Setting up the AX Job... 4 Create a New folder... 4 Adding a new Dynamics AX Job using

More information

SNMP Web Management. User s Manual For SNMP Web Card/Box

SNMP Web Management. User s Manual For SNMP Web Card/Box SNMP Web Management User s Manual For SNMP Web Card/Box Management Software for Off-Grid Inverter Version: 1.2 Table of Contents 1. Overview... 1 1.1 Introduction... 1 1.2 Features... 1 1.3 Overlook...

More information

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013 Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Setup Cisco Call Manager on VMware

Setup Cisco Call Manager on VMware created by: Rainer Bemsel Version 1.0 Dated: July/09/2011 The purpose of this document is to provide the necessary steps to setup a Cisco Call Manager to run on VMware. I ve been researching for a while

More information

Intel Active Management Technology with System Defense Feature Quick Start Guide

Intel Active Management Technology with System Defense Feature Quick Start Guide Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine

More information

User s Manual. Management Software for ATS

User s Manual. Management Software for ATS ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

ScriptLogic Enterprise Security Reporter. VERSION 3 Installation Guide

ScriptLogic Enterprise Security Reporter. VERSION 3 Installation Guide ScriptLogic Enterprise Security Reporter VERSION 3 Installation Guide ENTERPRISE SECURITY REPORTER 3 INSTALLATION GUIDE II Copyright 2011 by ScriptLogic Corporation All rights reserved. This publication

More information

1 Download & Installation... 4. 1 Usernames and... Passwords

1 Download & Installation... 4. 1 Usernames and... Passwords Contents I Table of Contents Part I Document Overview 2 Part II Document Details 3 Part III EventSentry Setup 4 1 Download & Installation... 4 Part IV Configuration 4 1 Usernames and... Passwords 5 2 Network...

More information

SonicWALL SRA Virtual Appliance Getting Started Guide

SonicWALL SRA Virtual Appliance Getting Started Guide COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started

More information

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-04 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,

More information

How to setup a network printer using HP Universal Printer Driver

How to setup a network printer using HP Universal Printer Driver How to setup a network printer using HP Universal Printer Driver This patch is only usable on HP T5730 Thin Client and up. The Printer also has to be networked and be PCL6 driver compatible in order to

More information

R&S AFQ100A, R&S AFQ100B I/Q Modulation Generator Supplement

R&S AFQ100A, R&S AFQ100B I/Q Modulation Generator Supplement I/Q Modulation Generator Supplement The following description relates to the Operating Manuals, version 03 of R&S AFQ100A, and version 01 of R&S AFQ100B. It encloses the following topics: LXI features,

More information

BillQuick Agent 2010 Getting Started Guide

BillQuick Agent 2010 Getting Started Guide Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)

More information

How to use Pcounter for Windows Common Configurations and Options Revised April 30, 2008

How to use Pcounter for Windows Common Configurations and Options Revised April 30, 2008 The Goal How to use Pcounter for Windows Common Configurations and Options Revised April 30, 2008 The Goal of this document is to provide step by step configuration instructions for Pcounter in some of

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Wireless Network Guide

Wireless Network Guide DYONICS PULSE Wireless Image Solution The Power of Connection. Surgical media access made simple. Wireless Network Guide DYONICS PULSE WIRELESS IMAGE SOLUTION Contents Introduction...1 DYONICS PULSE Network

More information

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud CaseWare Time CaseWare Cloud Integration Guide For Time 2015 and CaseWare Cloud Copyright and Trademark Notice Copyright. 2015 CaseWare International Inc. ( CWI ). All Rights Reserved. Use, duplication,

More information