Quest Soft Token for Android. Administration and User Guide

Size: px
Start display at page:

Download "Quest Soft Token for Android. Administration and User Guide"

Transcription

1 Quest Soft Token for Android Administration and User Guide

2 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser's personal use without the written permission of Quest Software, Inc. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA USA legal@quest.com Refer to our Web site for regional and international office information. TRADEMARKS Quest, Quest Software, the Quest Software logo and itoken are trademarks and registered trademarks of Quest Software, Inc. in the United States of America and other countries. Gridsure and the Gridsure logos are trademarks and registered trademarks of Gridlock TS Limited. All other trademarks and registered trademarks are property of their respective owners. Disclaimer The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. Quest Soft Token for Android Administration and User Guide Updated - November 2010 Software Version - 5.6

3 Contents ABOUT THIS GUIDE QUEST ONE IDENTITY SOLUTION AUDIENCE AND SCOPE CONVENTIONS ABOUT QUEST SOFTWARE CONTACTING QUEST SOFTWARE CONTACTING CUSTOMER SUPPORT CHAPTER 1 ADMINISTRATION GUIDE INTRODUCTION WHAT IS THE QUEST SOFT TOKEN FOR ANDROID PROGRAMMING A QUEST SOFT TOKEN FOR ANDROID DEFENDER PRE-REQUISITES DEFENDER TOKEN DEPLOYMENT SYSTEM CHAPTER 2 USER GUIDE INSTALLING ACTIVATING AUTHENTICATING iii

4 About this Guide Quest One Identity Solution Audience and Scope Conventions About Quest Software Contacting Quest Software

5 Quest Soft Token for Android Administration and User Guide Quest One Identity Solution Defender is a component of the Quest One Identity Solution, a set of enabling technologies, products, and integration that empowers organizations to simplify identity and access management by: Reducing the number of identities Automating identity administration Ensuring the security of identities Leveraging existing investments, including Microsoft Active Directory. Quest One improves efficiency, enhances security and helps organizations achieve and maintain compliance by addressing identity and access management challenges as they relate to: Single sign-on Directory consolidation Provisioning Password management Strong authentication Privileged account management Audit and compliance. Audience and Scope This book is intended for administrators who want to configure, assign and distribute the Quest Soft Token for Android and users who need to authenticate to a Defender protected network using the Quest Soft Token for Android. This book does not provide tutorial information on the use of the Windows operating system or on network communication concepts. Users must have experience in using the specified operating system and an understanding of networking concepts 6

6 About Conventions In order to help you get the most out of this guide, we have used specific formatting conventions. These conventions apply to procedures, icons, keystrokes, and cross-references. ELEMENT Select Bolded text courier text Italic text Bold Italic text Blue text CONVENTION This word refers to actions such as choosing or highlighting various interface elements, such as files and radio buttons. Used to highlight installation questions and responses. File, daemon, utility, option, attribute names. Used for comments. Used for emphasis. Indicates a cross-reference. When viewed in Adobe Acrobat, this format can be used as a hyperlink. Used to highlight additional information pertinent to the process being described. Used to provide Best Practice information. A best practice details the recommended course of action for the best result. Used to highlight processes that should be performed with care. + A plus sign between two keystrokes means that you must press them at the same time. A pipe symbol (vertical bar) between elements means that you must select the elements in that particular sequence. \ The back slash, immediately followed by a new line, indicates a Unix command line continuation. <version>.<build number> References to the product version you are installing are displayed with <version>.<build number> in angle brackets. 7

7 Quest Soft Token for Android Administration and User Guide About Quest Software Quest Software, Inc., a two-time winner of Microsoft s Global Independent Software Vendor Partner of the Year award, delivers innovative products that help organizations get more performance and productivity from their applications, databases Windows infrastructure and virtual environments. Through a deep expertise in IT operations and a continued focus on what works best, Quest helps more than 100,000 customers worldwide meet higher expectations for enterprise IT. Quest s Windows management solutions simplify, automate, secure and extend Active Directory, Exchange Server, SharePoint, SQL Server,.NET and Windows Server as well as integrating Unix, Linux and Java into the managed environment. Quest Software can be found in offices around the globe and at Contacting Quest Software Phone Mail (United States and Canada) info@quest.com Quest Software World Headquarters 5 Polaris Way Aliso Viejo, CA Web site Please refer to our Web site for regional and international office information. Contacting Customer Support Quest Software's world-class support team is dedicated to ensuring successful product installation and use for all Quest Software solutions. 8 SupportLink at support@quest.com You can use SupportLink to do the following: Create, update, or view support requests Search the knowledge base Access FAQs Download patches.

8 1 Administration Guide Introduction What is the Quest Soft Token for Android Programming a Quest Soft Token for Android Defender Token Deployment System 13

9 Quest Soft Token for Android Administration and User Guide Introduction This guide describes how to administer the Quest Soft Token for Android when using Defender as your authentication server and how to authenticate using the Quest Soft Token for Android. What is the Quest Soft Token for Android The Quest Soft Token for Android is a software token that can be used to gain secure access to network, web, and applications-based resources when used with Quest Defender. The picture above shows an example of the Quest Soft Token for Android displayed on the Android phone. The token response, , is used as the One Time Password (OTP) when the user is prompted to authenticate. 14

10 Programming Programming a Quest Soft Token for Android This section describes how to program the Quest Soft Token for Android. Defender Pre-requisites Quest Soft Token for Android can be used on all Android phones running Android version 1.6 or later. When using Quest Defender as the authentication server for the Quest Soft Token for Android, the following software versions are required: Defender Administration Console or later Defender Security Server or later. These are available from Quest SupportLink at You will need to obtain a Quest Soft Token for Android license from Quest Licensing at Please refer to the Defender Installation Guide for information on installing a Desktop Token license. 15

11 Quest Soft Token for Android Administration and User Guide The Quest Soft Token for Android is programmed in the same way as a Defender Desktop token. The following example describes how to program a Quest Soft Token for Android for an individual user. The Quest Soft Token for Android can also be programmed through the ActiveRoles Server Web Interface using the Defender ActiveRoles Server Integration Pack. The Quest Soft Token for Android is also available through the Defender Token Deployment System. 1. Using Active Directory Users & Computers (ADUC), open the Defender - username Properties dialog for the required user and select the Defender tab: 16

12 Programming 2. Select Program to start the Token Programming Wizard: 3. Click Next to display the Token Types dialog: 4. Select Defender Desktop Token. 17

13 Quest Soft Token for Android Administration and User Guide 5. Click Next. The Defender Desktop Token Types dialog is displayed: 6. Select Android. 18

14 Programming 7. Click Next. The Select Token Mode dialog is displayed: In the Encryption Strength box, select the encryption strength for the token, either Defender SNK Encryption, AES Encryption, Triple DES Encryption or OATH Compliant HMAC/SHA1. In the Response Length box, select the length of the response, either 6 or 8 characters, that will be issued by the token. 19

15 Quest Soft Token for Android Administration and User Guide 8. Click Next. The Checking User License dialog is displayed: The number of available user licenses and the number of allocated user licenses are displayed. 9. Click Next. The Token Location dialog is displayed. 10. Click Next to accept the default location to store the tokens. Alternatively, click Browse and navigate to the required location. 11. The Save Activation Codes dialog is displayed: 20

16 Programming 12. If you wish to create an individual file for each activation code, select File per user. To change the location in which the file will be saved, click Browse and navigate to the required location. To save to a single file, select Single File and provide the filename. If required, check the box to append new activation codes to the end of existing files. 13. Click Next. The Defender Token Programming Complete dialog is displayed: 14. Click Finish. 21

17 Quest Soft Token for Android Administration and User Guide 15. The Quest Soft Token for Android has now been created and assigned to the user s account and is displayed in the Token Management section of the Defender - username Properties - Defender tab as shown below: 16. The activation code for this token is contained in the text file created in step 8. An example is shown below: 17. Now send the activation code to the user. Refer to Chapter 2 - Installing and Activating the Quest Soft Token for Android for information on how to install and activate the token on the Android phone, and how to authenticate using the Quest Soft Token for Android. 22

18 Programming Defender Token Deployment System For information on how to program the Quest Soft Token for Android using the Defender Token Deployment System, please refer to the Defender Token Deployment System User Guide. 23

19 2 User Guide Installing Activating Authenticating 25

20 Quest Soft Token for Android Administration and User Guide This section provides information on installing and activating the Quest Soft Token for Android on the Android Operating systems. Installing The Quest Soft Token for Android can be downloaded and installed in the same way as any other Android application, as described below: 1. From the Android phone, select the Market icon. 2. Click Search located at the top right hand side of the phone. 3. Search for Quest Soft Token and then click Search Select Quest Soft Token and click Install.

21 Installing, Activating and Authenticating When the installation is complete, your token, called Quest Soft Token, will be available from the Programs menu on your Android phone. Note: You can also use a browser on your Android device to download the Quest Soft Token for Android from 27

22 Quest Soft Token for Android Administration and User Guide Activating To activate the Quest Soft Token for Android, you need to import the activation code provided to you by your Defender administrator. To do this from your Android phone: 1. Launch the Quest Soft Token application. 2. Press Menu on your Android phone. 3. Select Preferences. 4. Select Activate Token. 5. Enter your token activation code provided by your administrator. You can long press the screen and paste the code from your original Click the Activate button. The message Successfully Activated will be displayed. Please ensure that the activation code is entered correctly. If it is not entered correctly, you will receive an incorrect token response that will not be valid for Defender authentication. 28

23 Installing, Activating and Authenticating Authenticating Launch the Quest Soft Token from your programs menu. 1. A new token response will be generated for you immediately. 2. To display the next response, press. The 6 digit value displayed is your One Time Password (OTP). 29

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,

More information

Quest ChangeAuditor 4.8

Quest ChangeAuditor 4.8 Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Quick Connect Express for Active Directory

Quick Connect Express for Active Directory Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Webthority 6.6. Best Practice Guide

Webthority 6.6. Best Practice Guide Webthority 6.6 Best Practice Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide

Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Dedicated Directory Replication Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

Web Portal Installation Guide 5.0

Web Portal Installation Guide 5.0 Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

8.7. Target Exchange 2010 Environment Preparation

8.7. Target Exchange 2010 Environment Preparation 8.7 Target Exchange 2010 Environment Preparation 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document

More information

ActiveRoles 6.8. Web Interface User Guide

ActiveRoles 6.8. Web Interface User Guide ActiveRoles 6.8 Web Interface User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Quest Management Agent for Forefront Identity Manager

Quest Management Agent for Forefront Identity Manager Quest Management Agent for Forefront Identity Manager Version 1.0 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

6.7. Quick Start Guide

6.7. Quick Start Guide 6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Enterprise Single Sign-On 8.0.3

Enterprise Single Sign-On 8.0.3 For Internal Use Only Enterprise Single Sign-On 8.0.3 Additional Dedicated Server Instance Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary

More information

Quest vworkspace Virtual Desktop Extensions for Linux

Quest vworkspace Virtual Desktop Extensions for Linux Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.

More information

6.7. Replication: Best Practices and Troubleshooting

6.7. Replication: Best Practices and Troubleshooting 6.7 Replication: Best Practices and Troubleshooting 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott

More information

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide Foglight for Oracle Managing Oracle Database Systems Getting Started Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

ActiveRoles 6.9. Replication: Best Practices and Troubleshooting

ActiveRoles 6.9. Replication: Best Practices and Troubleshooting ActiveRoles 6.9 Replication: Best Practices and Troubleshooting 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide Foglight Foglight for Virtualization, Enterprise Edition 7.2 Virtual Appliance Installation and Setup Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Object Level Authentication

Object Level Authentication Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required

More information

Quick Connect for Cloud Services

Quick Connect for Cloud Services Quick Connect for Cloud Services Version 3.5 Administrator Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Quest InTrust for Active Directory. Product Overview Version 2.5

Quest InTrust for Active Directory. Product Overview Version 2.5 Quest InTrust for Active Directory Product Overview Version 2.5 Copyright Quest Software, Inc. 2006. All rights reserved. This guide contains proprietary information, which is protected by copyright. The

More information

7.5 7.5. Spotlight on Messaging. Evaluator s Guide

7.5 7.5. Spotlight on Messaging. Evaluator s Guide 7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Defender 5.7. Installation Guide

Defender 5.7. Installation Guide Defender 5.7 Installation Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

formerly Help Desk Authority 9.1.3 HDAccess User Manual

formerly Help Desk Authority 9.1.3 HDAccess User Manual formerly Help Desk Authority 9.1.3 HDAccess User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

ChangeAuditor 6.0. Web Client User Guide

ChangeAuditor 6.0. Web Client User Guide ChangeAuditor 6.0 Web Client User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated MMES - What Can and Cannot Be Migrated First Release - April 2015 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

New Features and Enhancements

New Features and Enhancements Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements

More information

Quest Collaboration Services 3.6.1. How it Works Guide

Quest Collaboration Services 3.6.1. How it Works Guide Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Introduction to Version Control in

Introduction to Version Control in Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any

More information

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Foglight. Dashboard Support Guide

Foglight. Dashboard Support Guide Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

8.3. Competitive Comparison vs. Microsoft ADMT 3.1

8.3. Competitive Comparison vs. Microsoft ADMT 3.1 8.3 Competitive Comparison vs. Microsoft ADMT 3.1 Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described

More information

10.2. Auditing Cisco PIX Firewall with Quest InTrust

10.2. Auditing Cisco PIX Firewall with Quest InTrust 10.2 Auditing Cisco PIX Firewall with Quest InTrust 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.5.2 Managing SQL Server Database Systems Getting Started Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

DATA GOVERNANCE EDITION

DATA GOVERNANCE EDITION Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Gain Control of Space with Quest Capacity Manager for SQL Server. written by Thomas LaRock

Gain Control of Space with Quest Capacity Manager for SQL Server. written by Thomas LaRock Gain Control of Space with Quest Capacity Manager for SQL Server written by Thomas LaRock Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains proprietary information, which is

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Foglight Experience Monitor and Foglight Experience Viewer

Foglight Experience Monitor and Foglight Experience Viewer Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains

More information

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide Foglight 1.0.0.0 Cartridge for Active Directory Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

8.10. Required Ports

8.10. Required Ports 8.10 Required Ports 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide Foglight Managing Java EE Systems Supported Platforms and Servers Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions 6.7 Feature Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

System Requirements and Platform Support Guide

System Requirements and Platform Support Guide Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Quest Collaboration Services 3.5. How it Works Guide

Quest Collaboration Services 3.5. How it Works Guide Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

ActiveRoles 6.9. Quick Start Guide

ActiveRoles 6.9. Quick Start Guide ActiveRoles 6.9 Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Foglight. Managing Hyper-V Systems User and Reference Guide

Foglight. Managing Hyper-V Systems User and Reference Guide Foglight Managing Hyper-V Systems User and Reference Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Quest vworkspace. System Requirements. Version 7.2 MR1

Quest vworkspace. System Requirements. Version 7.2 MR1 Quest vworkspace System Requirements Version 7.2 MR1 2011 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright. The software described

More information

ActiveRoles 6.8. Web Interface Administrator Guide

ActiveRoles 6.8. Web Interface Administrator Guide ActiveRoles 6.8 Web Interface Administrator Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell NetVault Backup Plug-in for SQL Server 6.1

Dell NetVault Backup Plug-in for SQL Server 6.1 Dell NetVault Backup Plug-in for SQL Server 6.1 April 2014 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Enhancements Resolved issues Known

More information

Dell One Identity Manager 7.0. Help Desk Module Administration Guide

Dell One Identity Manager 7.0. Help Desk Module Administration Guide Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

Quest SQL Optimizer. for Oracle 8.0. User Guide

Quest SQL Optimizer. for Oracle 8.0. User Guide Quest SQL Optimizer for Oracle 8.0 User Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is

More information

FOR SHAREPOINT. Quick Start Guide

FOR SHAREPOINT. Quick Start Guide Quick Apps v6.2 FOR SHAREPOINT Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

How to Deploy Models using Statistica SVB Nodes

How to Deploy Models using Statistica SVB Nodes How to Deploy Models using Statistica SVB Nodes Abstract Dell Statistica is an analytics software package that offers data preparation, statistics, data mining and predictive analytics, machine learning,

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

2011 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS DISCLAIMER

2011 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS DISCLAIMER 8.8 Upgrade Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under a software

More information

Powershell Management for Defender

Powershell Management for Defender Powershell Management for Defender 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

NetVault LiteSpeed for SQL Server version 7.5.0. Integration with TSM

NetVault LiteSpeed for SQL Server version 7.5.0. Integration with TSM NetVault LiteSpeed for SQL Server version 7.5.0 Integration with TSM 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Foglight 5.5.4.5 for SQL Server

Foglight 5.5.4.5 for SQL Server Foglight 5.5.4.5 for SQL Server Managing SQL Server Database Systems 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

ChangeAuditor 5.7. What s New

ChangeAuditor 5.7. What s New ChangeAuditor 5.7 What s New 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a

More information

Quest Soft Token for Windows Phone User Guide

Quest Soft Token for Windows Phone User Guide Quest Soft Token for Windows Phone User Guide What is the Quest Soft Token for Windows Phone? The Quest Soft Token for Windows Phone is a two-factor authentication token that can be used with any OATH-compliant

More information

6.9. Administrator Guide

6.9. Administrator Guide 6.9 Administrator Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Foglight 5.5.5. Managing Microsoft Active Directory Installation Guide

Foglight 5.5.5. Managing Microsoft Active Directory Installation Guide Foglight 5.5.5 Managing Microsoft Active Directory 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Enterprise Reporter Report Library

Enterprise Reporter Report Library Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports

More information

Dell NetVault Backup Plug-in for SQL Server 10.0.1

Dell NetVault Backup Plug-in for SQL Server 10.0.1 Dell NetVault Backup Plug-in for SQL Server 10.0.1, Revision 1 February 2015 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Dell NetVault Backup

More information

Dell Client Profile Updating Utility 5.5.6

Dell Client Profile Updating Utility 5.5.6 Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System

More information