Network Detective. User Guide. Copyright 2015 RapidFire Tools, inc. All Rights Reserved

Size: px
Start display at page:

Download "Network Detective. User Guide. Copyright 2015 RapidFire Tools, inc. All Rights Reserved. 20150201"

Transcription

1 Network Detective User Guide Copyright 2015 RapidFire Tools, inc. All Rights Reserved

2 Contents Contents... 1 Purpose of this Guide... 6 About Network Detective... 6 Network Detective Overview... 7 Installing and Running Network Detective... 8 Network Detective Sites... 9 Creating a Site... 9 Using a Site Starting an Assessment Using the Checklist Collecting Data Importing a Scan Generating Reports Report Preferences Adding a Connector to a Site Downloading Scans with Client Connector Initiating an External Scan Adding an InForm Sheet Finishing/Archiving Assessments Changing the Type of an Assessment Enabling/Disabling Sites Removing Sites Network Detective Data Explorer Requirements Creating a Site Opening the Data Explorer The Data Explorer Dashboard Using Filters Network Detective Data Collector Network Detective Data Collector Wizard Step 1 - Select Scan Types Step 3 - Specify Domains

3 Step 4 - External Domains Step 5 - IP Ranges Step 6 - SNMP Information Step 7 - Microsoft Baseline Security Analyzer Step 8 - User Control Tests Step 9 - Verify and Run Protocol Availability Scan Step 10 - Collection Progress Step 11 - Finish Exchange Assessment Data Collector Exchange Assessment Data Collector Wizard Step 1 Select Your Exchange Version Step 2 Verify Required Files Microsoft Exchange Online for Office Microsoft Exchange Microsoft Exchange Step 3 Input Credentials Step 4 Verify and Run Step 5 Collection Progress Step 6 Finish SQL Server Assessment SQL Server Assessment Data Collector Wizard Step 1 - Input Credentials Step 2 - Verify and Run Step 3 - Collection Progress Step 4 Finish Running Network Detective Network Detective Wizard Network Detective Application Scans Recent Scans All Scans External Scans Import Scan

4 Reports Generating Reports Report Customization Preview a Report Assessment Modules Network Assessments Standard Reports Client Risk Report Full Detail Report Excel Report Specialty Reports Full Detail Change Report Site Diagram* Site Diagrams Export to Microsoft Visio* Asset Detail Report Security Assessments Standard Reports Security Risk Report Internal Vulnerabilities Report Security Policy Assessment Specialty Reports Share Permission Report Share Permission Report by User Vulnerability Scan Detail Report Exchange Assessments Standard Reports Exchange Risk Report Exchange Mailbox Detail Report Exchange Traffic and Use Report Exchange Distribution Lists Report Specialty Reports Exchange Mobile Device Report Exchange Mailbox Permission Report by Mailbox

5 Exchange Mailbox Permissions by User SQL Server Assessment Reports Standard Reports Routine Health Report SQL Server Detail Report Database Detail Report SQL Server Agent Jobs Report Maintenance Plan Report InForm Overview Templates Creating a New Template Modifying an Existing Template... Error! Bookmark not defined. Cloning an Existing Template... Error! Bookmark not defined. Site Interviews... Error! Bookmark not defined. Creating a Site Interview Inputting Interview Data... Error! Bookmark not defined. Creating InForm Reports... Error! Bookmark not defined. Reports Available in InForm... Error! Bookmark not defined. Client Interview Form... Error! Bookmark not defined. Interview Response Report... Error! Bookmark not defined. IT SWOT Analysis... Error! Bookmark not defined. Initiate External Vulnerability Scan Exporting Configuration Items Export fields for Autotask Export fields for ConnectWise Manage Users Billing Information Preferences Appendices Appendix I Using a USB drive Appendix II ConnectWise Configuration Items Setting up an Integrator Login in ConnectWise

6 ConnectWise Connection Manager Appendix III Group Policy Reference Forward and Introduction Policies for Windows Firewall Policies for Windows Services rd party Firewalls and Group Policy Considerations Appendix IV Mac Data Collector Running As.cmd Scripting Troubleshooting Appendix V Push-Deploy Tool Step 1 Download and Run Step 2 Complete Settings and Configuration Step 3 Input Computers and/or IP Range Step 4 Start Collection Step 5 Scan Output

7 Purpose of this Guide This document is intended for users of Network Detective. It will guide you through the initial use of the software as well as the more advanced features. Additional guides are available for various modules. This guide is designed to be used in conjunction with other supplementary guides. About Network Detective Network Detective performs automated assessments to uncover and document network assets, problems and security risks. Service Providers and MSPs save countless hours when proposing or onboarding new clients and performing periodic network documentation of existing customers, while IT departments benefit from periodic reports to assist in network documentation and compliance projects. For On Demand users who pay per report, running the data collection and viewing the Preview Report is free, and there is a charge to run the Full Report. Certain Premium Reports are at an additional charge, while some reports are only available to annual subscribers. Annual subscribers enjoy the benefit of running an unlimited number of scans and reports, including the Premium reports, for a fixed annual cost. They also have access to reports that are not available in the On Demand model and the Export feature, which integrates with other services, like Autotask and ConnectWise, to automatically populate configuration items. 6

8 Network Detective Overview Network Detective is composed of the Network Detective application, the Network Detective Data Collectors (for Network and Security modules), and various other Data Collector, and the optional External Vulnerability scanner (for subscription accounts only). Network Detective is quick and easy to use; there are just three basic steps: 1. Create Sites to organize your assessments. Sites can be customers, remote offices, data centers, departments, organizational units, or any structure that is applicable for your environment. 2. Run scans as required for the individual module. If possible, run the Network Scan from the Primary Domain Controller on the network. The output of the scan will either be a.zip or module specific scan files (.ndf,.cdf,.sdf,.hdf) used to generate reports via Network Detective. 3. Run the Network Detective tool. Import the files generated in step 1 into an assessment. Customize the report by branding with your logos and client information, and run the reports. The Wizard will walk you through your first time! You can initiate an external Vulnerability scan from the Network Detective console BEFORE or AFTER performing the network scan. (Only available to Subscribers. ) 7

9 Installing and Running Network Detective Install the Network Detective Application on your system from This is not installed on a client network only the Data Collector is run on the client network. It is a click-once application and you should always accept the update to have the latest version. When you run Network Detective the first time, it will launch the Network Detective Wizard. You can dismiss the dialog and simply use the Site Model. If you use the wizard to do ad-hoc reporting, you have three options: 1. Generate Report from a New Scan This is the fastest way to import the data from a scan and run a report; it combines the two actions: a. Import a Scan where you will: Browse to the ZIP/NDF file from the Network Data Collection If you have CDF and/or SDF files, put them in a folder with the NDF file to simplify this step Create a new NDZ Archive file b. Generate a Report where you will: Select the Reports that you want to run Note 1: Do NOT select the Full Detail Change Report unless you have a second NDZ file (network scan) that you are comparing against. Note 2: The Premium Reports are an extra charge for non-subscriber accounts Choose the Vulnerability Scan for this network (or click Cancel if there is not one) Customize the report with your logo and company information, and the client information Generate the set of reports NOTE: The recommended best practice is to use Sites and always organize your scans. See the following chapter for information on how to use Sites properly. 8

10 Network Detective Sites The Site Model for Network Detective is a framework which enables users to intuitively organize client information. A Site is a collection of scans, reports, and associated data. An advantage of this abstraction is that you can choose what a Site represents to fit your business model. For example, if your client s organization has multiple physical locations, you may choose to create one Site for the entire organization, or you can represent each one as an individual Site. Creating a Site To create a new site, select New Site from the menu bar. You will be prompted to name the Site. Since a Site represents a logical grouping, such as a physical location (i.e. an office or data center) or a customer, we recommend choosing a descriptive name. Customer A (Denver) and Customer A (all locations) are both examples of appropriate Site names. 9

11 Using a Site After creating and naming a new Site, the Network Detective application will display the Site s Dashboard. From here, you can change the Site s name, make it Active or Inactive, add Connectors, edit the Site-specific report preferences, or start an Assessment. Starting an Assessment From the Site s Dashboard, click the Start button on the Active Assessment bar to start an Assessment. This will open the Assessment setup wizard. First, you will be prompted to choose one or more Assessment Types. 10

12 After selecting Assessment Types, click Next. The wizard will ask you to enter a label and comment for your Assessment. Please note that while the comment section is optional, the label is required and each label must be unique. 11

13 The final window of the setup wizard summarizes the new Assessment and provides a link to the Checklist, which you can use to track the progress of your Assessment. After starting a new Assessment, the Network Detective application will display the Assessment s Dashboard. From there, you can edit the Assessment label and type, associate a previous Assessment, collect data, generate Reports, and finish the Assessment. You can also view the updated Checklist. Using the Checklist The Checklist is a helpful outline of the information you will need to collect to complete the Assessment. It is continuously updated to reflect completed items and changed to your Assessment. By using the Checklist, you can make sure that your tasks are complete on schedule and that all relevant data you collect is integrated into your reports. 12

14 Required items must be completed in order to complete the Assessment and generate reports. Note that Reports will not be available until required data has been added to the Assessment. As you work, the document will be updated to reflect completed Checklist items. Note that the Checklist must be accessed from the application in order for it to be up to date. The Status Bar is a useful visual indicator of the progress of your Assessment. To view an Assessment s status bar, navigate to the Assessment s Dashboard by double-clicking on the Site you are working on and clicking Go to Active Assessment." 13

15 From the Assessment Dashboard, you can track the progress of your Assessment by viewing the Checklist and the Checklist status bar. The Checklist status bar displays the number of items to complete and their required (in red) and optional (in yellow) prerequisites. As you complete Checklist items, the status bar will be updated to reflect your progress. Click the View link to view the current Checklist and find the information you need in order to begin collecting data. Collecting Data In order to generate Reports, data from InForm and Network Detective scans must be associated with the Assessment. The checklist (which can be found under the Status and Check List bar in the Assessment s Dashboard) will provide you with up-to-date information about the items you need in order to complete your Assessment. 14

16 Some of these items, such as running the Computer Data Collector or the Network Detective Data Collector, must be done either onsite or remotely For more information, please see the Scans section about conducting Network Scans. The resulting files can then be imported into Network Detective via the Import File or Download Scans buttons located in the Import Scans bar on the Assessment Dashboard. Additionally, you may initiate an External Vulnerability Scan by clicking the Initiate External Scan button. Note that you can only use the Download Scans feature if you have set up Client Connector for your Site. InForm data can be entered directly or compiled from a questionnaire completed by a customer or onsite tech. For more information, please see the InForm section. Importing a Scan Scans are associated with individual Assessments and Sites. This means that they must be imported into each Assessment in order to use the Scan data in Assessment Reports. In order to navigate to a specific Assessment from the Network Detective home screen, double click on the Site you are currently working on. 15

17 From the Site Dashboard, you can either click on the Go to Active Assessment button or the Active Assessment folder icon under the SITES sidebar on the left. This will bring you to the Dashboard of the Site s current Assessment. From the Assessment s Dashboard, click the Import File button from the Imported Scans bar. 16

18 This will open a file selection wizard. Browse to the NDFs and (if necessary) CDFs. For more information on NDFs and CDFs and how importing Scans works in the Network Detective Application, please see Import Scan. Once the file is imported it will be listed under the Imported Scans bar in the Assessment Dashboard. If you have imported all of the Scans and completed the other requirements listed by the checklist, you may now generate reports. Generating Reports Network Detective Reports are associated with a specific Assessment in the Site Model. You can generate Reports for your client based on the information you have added to the Site Assessment. Additionally, you can set Site-specific defaults to customize your Reports. 17

19 To generate Network Detective Reports, navigate to the desired Site from the Home screen by doubleclicking on its icon. This will open the Site s Dashboard. From the Site s Dashboard, you can either click on the Go to Active Assessment button or the Active Assessment folder icon under the SITES sidebar on the left. This will open the Assessment s Dashboard. From the Assessment s Dashboard, you can view the Reports you are able to generate under the Reports bar. Note that only the Reports listed in black may be generated. Greyed out reports are either unavailable with your subscription or the Assessment is lacking the necessary data. 18

20 Click the Generate button on the Reports bar. This will open the Report Generation wizard. Only available Reports will be listed in the wizard. Choose the Reports you would like to generate and proceed with the instructions. If you are unfamiliar with the Report Generator, please see Report Customization for more information. After your reports have been generated, you can access them from the Generated Reports folder on the Sites sidebar. 19

21 Report Preferences In Network Detective Sites, you can specify defaults on a Site-by-Site basis to create a consistent custom look and feel for each client. The defaults you set from within a Site s Dashboard will persist over all Reports generated for that Site. First, navigate to the desired Site from the Home screen by double-clicking on its icon. This will open the Site s Dashboard. From the Site s Dashboard, click the Edit button on the Report Preferences bar. This will open the Report Customization wizard. Follow the instructions in the Customization wizard. If desired, navigate to the My Logo and Cover Images tabs to upload images, or the Themes tab to specify a theme. When you are finished, exit the wizard and generate Reports. 20

22 Adding a Connector to a Site As an alternative to importing Scans from a local source, Scans can be downloaded remotely via the Network Detective Client Connector service. Preferences for Client Connectors are configured on a Site-by-Site basis and can be customized for each individual site. To add a Connector to a Site, first navigate to the desired Site from the Home screen by double-clicking on its icon. This will open the Site s Dashboard. From the Site s Dashboard, select Add from the Connectors bar. 21

23 You will be prompted with a wizard to configure the Connector. Enter a unique label for the Connector. If you wish, the label can be identical to the Site name. Note that the Connector ID is randomly generated and will be used to configure the Connector. Next, configure your Connector. You can now use your Connector to download Scans and associate them with your Assessments. Downloading Scans with Client Connector Downloading Scans using the Site Model is done on a Site-by-Site basis. In order to download Scans, you must first set up a Connector to associate with your Site (see Adding a Connector to a Site ). First, navigate to the desired Site from the Home screen by double-clicking on its icon. This will open the Site s Dashboard. 22

24 From the Site s Dashboard, you can view the Site s associated Connectors under the Connectors bar. Here you can also view whether or not your Connectors have downloads available. If you have downloads available that you would like to add to the Site s Assessment, click on Go to Active Assessment. When the Assessment s Dashboard opens, click Download Scans from the Imported Scans bar. 23

25 This will open a dialog box which will allow you to browse the Scans available from the Connector. You can select specific scans or use the Download All option. After your Scans have finished downloading, they will be listed under the Imported Scans bar and you can use them to generate Reports. Initiating an External Scan Some Reports either require or have the option of using External Vulnerability Scans. These can either be imported or downloaded from an outside source or initiated from within the Assessment. navigate to the desired Site from the Home screen by double-clicking on its icon. First, This will open the Site s Dashboard. When the Site opens, click on the Go to Active Assessment button in the Active Assessment bar. 24

26 This will open the Assessment Dashboard. Select Initiate External Scan from the Imported Scans bar. This will bring up the External Scan wizard. Follow the instructions provided. For more information about External Vulnerability Scans, please see External Scans. Adding an InForm Sheet InForm surveys can be a valuable addition to Site Assessments. Information collected by a tech onsite or entered manually into a template can be compiled into Network Detective Reports. For more information, please see the InForm section. The Site Model allows you to create and edit InForm sheets from within the Assessment. 25

27 To add an InForm sheet to your Assessment, first navigate to the desired Site from the Home screen by double-clicking on its icon. This will open the Site s Dashboard. When the Site opens, click on the Go to Active Assessment button in the Active Assessment bar. From the Assessment s Dashboard, select Add under the InForm bar. 26

28 Using the Start InForm Assessment dialog box, select your template, type in the name of your customer and click Ok. The new template will be listed under the InForm bar. Click the visit link to configure your template. Finishing/Archiving Assessments Once you have completed all of the items on the checklist(s) you can click the Finish button to archive the Assessment. This changes to status of the Assessment from Active to Archived. After you archive an Assessment, you can create a new Assessment for the same Site. This new Assessment will be the Site s currently active Assessment. The archived Assessment will remain accessable for your records. You may also switch between active Assessments by re-activating an archived Assessment. Archived Assessments are accessible from a Site s Dashboard. To view a Site s archived Assessments, click the Archived Assessment folder located in the SITES sidebar. Changing the Type of an Assessment Checklists are based on the type of the Assessment you are conducting. If you decide to collect additional information for your customer after starting an Assessment, you do not need to create a new Assessment. Instead, change the Assessment Type. You can change the type of an Assessment from its Dashboard. Click the Edit link next to Assessment Type in the Status and Check List section of the Site Dashboard. 27

29 From the Select Assessment Type dialog box, select the revised Assessment Type. 28

30 This will update the Checklist to include any additional items. Enabling/Disabling Sites Sites can have either an active (enabled) or archived (disabled) status. An archived site is one that you are no longer currently working on but may re-initialize at a later date. This option is preferable to removing a Site in many cases, such as when you need to save all of the settings and associated data for a particular Site for your records, or when you wish to re-start work at a later date. The Sites home screen has two views: Active Sites and All Sites. The Active Sites view will display only enabled Sites and the To disable a Site from the home screen, right click on the Site and select Disable Site. Once disabled, the Site will move under All Sites and will not be visible from the Active Sites screen. 29

31 To enable a Site, click the All Sites icon from the menu on the left. From the All Sites screen, right click on the Site you need to enable and choose Enable Site from the context menu. Note that a disabled Site is greyed out and has a Red indicator when viewed under All Sites and is not visible in the Active Sites screen. 30

32 Removing Sites Removing a Site removes all of its associated Assessments and their information. We recommend archiving Sites instead of removing them whenever possible. To remove a Site, right-click on the Site from the home screen and select Remove from the context menu. 31

33 Network Detective Data Explorer This section describes how to use the Network Detective Data Explorer. The Data Explorer is a tool available to Network Detective subscribers. It enables the user to preview report data and continuously monitor customer metrics. Used with the Site Module, this is a powerful way to ensure that you get the most from Network Detective. Requirements Network Detective Application Network Detective Subscription Creating a Site In order to use the Data Explorer, you must have a Network Detective Site associated with your customer. Creating a Site is simple, just click the New Site and follow the prompts to name your Site and start an Assessment. If you have already collected data, the NDF/NDZ and InForm data can be easily imported into a Site Assessment. Note that you must have data in order to use the Data Explorer. 32

34 Opening the Data Explorer After you have created a Site for your customer, initialized an Assessment, and added Scan data, you can use the Data Explorer tool to preview graphs and charts that may be included in your Reports. In the Network Detective application, navigate to Sites>Your Site > Go To Active Assessment. From the Active Assessment, click the Explore Data button. This will bring up the Data Explorer. 33

35 The Data Explorer Dashboard When you open the Data Explorer the default view is the Dashboard, which summarizes all of the Scan data you have imported into the current Assessment. This screen is a condensed overview of the Network Assessment. All of the metrics in the Dashboard are current. As you import new data and continue with your Assessment, the figures will be updated. The Dashboard can help you monitor a Site and track the progress of your Assessment. It is faster and more convenient than generating a report. In many cases, small changes such as if customer has added a Windows XP machine to the network, may not necessitate a full report. 34

36 Using Filters After you have created a Site for your customer, initialized an Assessment, and added Scan data, you can use the Data Explorer tool to view information about your customer s Network. In the Network Detective application, navigate to Sites>Your Site > Go To Active Assessment. From the Active Assessment, click the Explore Data button. This will bring up the Data Explorer. Click on a Filter such as Computers to switch to a more specific view of your Customer s data. From here, you can also filter using the search box in the upper right-hand corner or the Filters menu on the left hand side. Filter by criteria such as computers running Windows XP, inactive computers, or computers on different domains. Using the Search box, you can filter by other values, such as IP address. 35

37 Network Detective Data Collector The Network Data Collector is a self-extracting zip file that executes an.exe and is completely noninvasive it is not installed on the domain controller or any other machine on the client s network, and does not make any changes to the system. The Data Collector makes use of multiple technologies/approaches for collecting information on the client network, including: Active Directory Access and APIs Network API calls* DNS and DHCP lookups Microsoft APIs and Event Logs* Remote WMI, RPC and Remote Registry (over the network) whois and network lookups* Microsoft Baseline Security Analyzer (MBSA)* * Network Data Collector Only When using the Network Data Collector for the Network Assessment module, to get the most information from the systems on the network, you will want to make sure that WMI and Remote Registry calls are available: Enable Windows Firewall: Allow remote administration exception in Group Policy. Add/Define Windows Firewall: Define Port Exceptions enabled:remote Registry for IP range in Group Policy. (While enabling remote protocols is optional and not always possible, this will provide network access to each of the machines so that the data collector can gather data from the individual systems. Even without this, Network Detective can provide useful information on the systems from Active Directory and the port scans.) For information on modifying Group Policies, see Appendix III Group Policy Reference 36

38 Network Detective Data Collector Wizard After downloading the Network Detective (ND) and the Network Detective Data Collector (NDDC), run the NDDC with administrator privileges to generate the files necessary to create reports in ND. On nondomain networks, you still must run a Network Data Collection. Choose one of the systems on the peer-peer network, and enable both the Network Data Collector and the Local Computer Data Collector. Step 1 - Select Scan Types Run the NDDC via its portable executable and choose the types of scans you wish to perform. Your first scan should include the Network Data Collector to produce the required.ndf file, so that option is checked by default. Running the Local Computer Collector alone? Click Next and skip to Step 9 - Verify and Run. Running the Security Data Collector alone? Click Next and skip to Step 8 - User Control Tests. Want to include a Macintosh device in your scan? See Appendix IV Mac Data Collector 37

39 Step 2 - Input Credentials The NDDC requires access to the Domain Controller and Active Directory in order to provide you with all the data necessary to produce accurate reports. If your current login has those administrator rights, simply click next to continue. Otherwise specify a user with elevated permissions. 38

40 Step 3 - Specify Domains (If you selected, This network does not have a Domain Controller in Step 2, this step will be grayed out and the wizard will skip to Step 4.) The NDDC will query your Active Directory for domains to scan through and list them on this window. By default, all domains will be scanned for data. Alternatively, you may individually Ctrl+Click domains. 39

41 Step 4 - External Domains External Domain names allow others to visit your site and facilitates services, such as . To gather information regarding external domains, input them into this wizard page and they will be added to the data collection. Examples of external domains include: mycompany.com mycompany.biz 40

42 Step 5 - IP Ranges The Wizard will auto-detect IP ranges from the NIC card(s) installed on this system to include in the scan. You may include additional subnets. 41

43 Step 6 - SNMP Information By default, the NDDC will retrieve data from devices with the community string public. If you wish to define an additional community string (such as private ), enter it here. 42

44 Step 7 - Microsoft Baseline Security Analyzer If you have the Microsoft Baseline Security Analyzer (MBSA) installed, the NDDC can use it as part of the detection process to perform vulnerability assessment checks. If you do not have the MBSA installed, a link has been provided. Use Run MBSA to perform a weak password check. Enable Patch Analysis to gather information on missing patches (this second option will increase the time required to perform the scan). 43

45 Step 8 - User Control Tests (Not running the Security Data Collector? Skip this step.) The User Control Test tests outbound access to a variety of sites from the computer. This can be useful for checking the functionality of your existing content control system. You can also specify known URLs that violate your content control policies to test the ability of users to connect to those sites. 44

46 Step 9 - Verify and Run This page asks you to specify a destination for the output files of your chosen scans. You have the option of outputting to a folder, or the NDDC can also output to a compressed.zip file. 45

47 Protocol Availability Scan Some machines may be blocked by a firewall or have security restrictions that may prevent information from being collected by your centralized scan. The Protocol Availability Scan will pre-scan to detect which machines are unavailable and, if desired, must be scanned separately. You can save the results of this scan as a.txt file, which will allow you scan those restricted machines while your main scan runs. 46

48 Step 10 - Collection Progress This page charts the progress of your scan. You can cancel the data collection entirely (no data will be saved), or you can choose to Wrap It Up. This will end the scan prematurely, leaving some machines not scanned but still providing you with partial results. 47

49 Step 11 - Finish This final page confirms that the scan has completed. The wizard shows the output destination, allows you to open that folder, and also review the results of your completed scan. Once you re finished, click Done and the wizard will close. 48

50 Exchange Assessment Data Collector The Exchange Assessment Data Collector is a self-extracting zip file that executes an.exe and is completely non-invasive it is not installed on the Exchange server or any other machine on the client s network, and does not make any changes to the system. The Data Collector makes use of multiple technologies/approaches for collecting information on the Microsoft Exchange environment depending on the version of Exchange. Remote protocols are used to access Office 365 environments, while the use of local PowerShell CmdLets specific for Microsoft Exchange are used for local scans. In most cases, the server Microsoft Exchange will already have PowerShell and the proper CmdLets installed. The Exchange Assessment Data Collector will check for pre-requisites before performing its scan. For local Exchange 2007 and 2010, the Exchange Assessment Data Collector must be run on the server running Exchange. 49

51 Exchange Assessment Data Collector Wizard Step 1 Select Your Exchange Version The scan for Microsoft Exchange Online for Office 365 can be done from any Internet connected PC; however, the Microsoft Exchange 2010 and Microsoft Exchange 2007 must be run from the actual server Microsoft Exchange is running on from an account with administrative credentials. 50

52 Step 2 Verify Required Files Microsoft Exchange Online for Office 365 Office 365 requires: Microsoft.Online.Administration.Automation.PSModule.dll. If the wizard cannot find this file, this error message will display: If the wizard can successfully discover the file, this confirmation screen will display: 51

53 Microsoft Exchange 2010 Exchange 2010 requires: RemoteExchange.ps1. If the wizard cannot find this file, this error message will display: If the wizard can successfully discover the file, this confirmation screen will display: 52

54 Microsoft Exchange 2007 Exchange 2007 requires: Exchange.ps1. If the wizard cannot find this file, this error message will display: If the wizard can successfully discover the file, this confirmation screen will display: 53

55 Step 3 Input Credentials (If you selected Microsoft Exchange 2010 or Microsoft Exchange 2007 in Step 1, this step will be grayed out and the wizard will skip to Step 4.) Input your credentials for Office 365 and click Next. The Wizard will test your credentials and will ask you to try again upon failure to connect. 54

56 Step 4 Verify and Run This page asks you to specify a destination for the output files of your scan. You have the option of outputting to a folder, or you can output to a compressed.zip file. 55

57 Step 5 Collection Progress This page charts the progress of your scan. You can cancel the data collection entirely - no data will be saved. Doing so will show the following screen: If this was done in error, you have the option to Start Again. 56

58 Step 6 Finish This final page confirms that the scan has completed. The wizard reminds you of where it outputted the results and allows you to open that folder. Once you re finished, simply click Done and the wizard will close. 57

59 SQL Server Assessment The SQL Server Assessment Data Collector is a self-extracting zip file that executes an.exe and is completely non-invasive it is not installed on the SQL Server or any other machine on the client s network, and does not make any changes to the system. The Data Collector makes use of multiple various protocols to scan a SQL Server instance and can be done remotely. The SQL Server Assessment Data Collector can be used to inspect any SQL Server on the LAN or hosted at a remote location so long as it can be accessed using SQL Server Authentication (the same as Management Studio). 58

60 SQL Server Assessment Data Collector Wizard Step 1 - Input Credentials The SQL Server Assessment Data Collector requires a SQL Server Authenticated account with sufficient administrative privileges to collect data (i.e., sa ). Step 2 - Verify and Run This page asks you to specify a destination for the output files of your scan. You have the option of outputting to a folder, or the SSDC can also output to a compressed.zip file. 59

61 Step 3 - Collection Progress This page charts the progress of your scan. You can cancel the data collection entirely - no data will be saved. Step 4 Finish This final page confirms that the scan has completed successfully. The wizard shows the output destination, and allows you to open that folder and review the results of your completed scan. Once you re finished, click Done and the wizard will close. 60

62 Running Network Detective Network Detective Wizard Install the Network Detective Application on your system from This is not installed on a client network only the Data Collector is run on the client network. It is a clickonce application and you should always accept the update to have the latest version. When you run Network Detective the first time, it will launch the Network Detective Wizard. You have three options: 2. Generate Report from a New Scan This is the fastest way to import the data from a scan and run a report; it combines the two actions: a. Import a Scan where you will: Browse to the ZIP/NDF file from the Network Data Collection If you have CDF and/or SDF files, put them in a folder with the NDF file to simplify this step Create a new NDZ Archive file b. Generate a Report where you will: Select the Reports that you want to run Note 1: Do NOT select the Full Detail Change Report unless you have a second NDZ file (network scan) that you are comparing against. Note 2: The Premium Reports are an extra charge for non-subscriber accounts Choose the Vulnerability Scan for this network (or click Cancel if there is not one) Customize the report with your logo and company information, and the client information Generate the set of reports See the sections below with more detail on both of these Actions. 3. Download the Data Collector Takes you to the Download page where you can download the Network Data Collector, Computer Data Collector, and other resources. 4. Initiate an External Vulnerability Scan Allows you to initiate an External Vulnerability scan. You can do this prior to going on-site to run the Network Data Collection, or after you have run the Data Collection. 61

63 Network Detective Application The Main screen of Network Detective allows you to quickly import and generate reports, organize your Scans and Reports, Add or Manage access for other users in your company, edit billing information and set preferences. 62

64 Scans Click the Scans icon on the top bar to view and manage the scans you have already imported into Network Detective Libraries (archives), stored as.ndz files. These files contain the scans from the Data Collector. (Each NDZ file must include a valid Network Scan (ZIP/NDF).) Recent Scans Select Recent Scans, above, which will provide a list of all the scans, from all the directories, sorted by date (most recent first). Select a scan and click Generate Report (or double-click) to run reports from this scan. You can select and rename the scans, delete scans, etc. 63

65 All Scans The All Scans view provides you with a list of all of your Folders and Scans. You can drill down into folders, rename scans, delete scans, etc., as well as double-click to generate reports. 64

66 External Scans The External Scan folder shows you the External Vulnerability Scans, and their completion status. 65

67 Import Scan Click Import Scan to import one NDF/ZIP file from a Network Data Collection and optionally, multiple CDF/SDF files from Local/Computer Data Collections and Security Scans into a Network Detective archive file (NDZ file). Each NDZ file must include a valid Network Scan (ZIP/NDF). There are two steps: 1. Select the Scan Results. Browse to the NDF and optionally the CDF files. It is helpful if you have them all in a single directory. If necessary, you can add CDF files to an existing NDZ at a later time. 2. Import into a Scan Library/Archive. Browse to select an existing NDZ archive file, or create a new one. a. If the NDZ does not already exist it will be created. b. If the NDZ does exist, and you are importing an NDF, the NDF will be replaced. c. If the NDZ does exist and you are adding CDF files, the CDF files will be merged into the NDF file inside the NDZ archive (the CDF files are not retained as separate files). When the CDFs are merged, you can determine which Domain either a Custom Domain that you can name (e.g.-workgroup), merge it into the Domain from the Network Scan (shown in green), or choose to exclude it from the merge. Click Merge Now to perform the Merge. Clicking close will skip the merge entirely. d. You MUST create the NDZ or new folder within the Network Detective Scans Folder in order for Network Detective to manage these from the Scans screen. 66

68 Reports Generating Reports From the Scans screen, select an archive file (NDZ) and click Generate a Report (or double-click) to start the Generate Report Wizard. You may include any combination of reports from multiple assessment modules in one report set. 1. The first step is to select the reports that you wish to run. This is done from each Assessment Module tab inside the Report Generation Wizard, detailed later in this section. 2. The next step is to select an External Vulnerability Scan. If you do not have one for this site, click Cancel to continue. 3. Next you will Customize the report: 67

69 Report Customization After you ve selected your reports, a customization dialogue will appear. There are a few fields on this first page that you can fill to customize the text portion of your reports: Report Prepared For: Who are you ultimately delivering this report to? Report Prepared By*: This is you, your company, your DBA. Footer*: This is the footer of the document, and appears on all pages. By default it reads, PROPRIETARY & CONFIDENDTIAL Cover Page Disclaimer*: By default this is a confidentiality disclaimer, but could also could serve well for Copyright. *These fields can be automatically populated by setting Preferences (see Preferences) 68

70 On the next tab, you can upload your company logo as a custom image in your reports. If set in Preferences, this will automatically appear in future reports you generate. Cover Logo Image: Recommended size of 700x150 pixels*. Header Logo Image: Recommended size of 350x75 pixels or 700x150 pixels*. 69

71 Each report generated follows a pre-built theme and is color-coded based on the Assessment Module it comes from. On this page, select your desired theme and pre-defined color palette, or specify your own colors.(note: Some Color Palettes and Themes available only to Subscribers) 70

72 Each report generated has a unique Cover Image for each of the Network Detective Assessment Modules. Alternatively, you can specify your own cover image* in this Customization dialogue, or set a default in Preferences. After you have finished customizing your reports, click Generate to begin. *Custom Cover Images available only to Subscribers. 71

73 The standard set of reports for the Trial Edition includes: Client Risk Report (Executive Summary) (.docx) Full Detail Report (.docx) Excel details (.xlsx) Full Detail Change Report (.docx) only select this report when you are creating a comparison to a previous scan on the same network. Note that these reports are delivered to you as Microsoft Word and/or Excel documents so that you are able to add information to the report, or extract information to be included in your own documentation, sort and analyze, in Excel, etc. For Trial Edition users, please remember that generating any of these reports is a billable event (or decrements your pre-paid report quota). If needed, you may re-run or regenerate reports from the same.ndf (NDZ) file without additional charge should you later want the.xlsx, for instance, or simply need to change your logo. However, the step of merging CDF files creates a new NDF file inside the NDZ, and would be considered a new, billable, report. (Note: Please keep in mind that each.ndf file has its own unique ID. You can re-run reports for the SAME NDF file at no charge. Running a new data collection on the same network as a previous scan and then running reports is a separate chargeable event.) Preview a Report Sometimes you may wish to preview a report. Right-click and select Generate Preview Report. This will generate a redacted version of the Full Detail Report so that you can judge whether you have a good scan. This is particularly useful for Trial Edition users to decide if they should run the full reports, or perform a new scan. 72

74 Assessment Modules Network Assessments Standard Reports Report Name Client Risk Report Full Detail Report Excel Report Specialty Reports Report Name Full Detail Change Report Site Diagram* Site Diagrams Export to Microsoft Visio* Asset Detail Report *Additional fees apply without annual subscription Description Summary report which presents detailed findings with charts and graphs. Comprehensive report containing device and network information. Detailed report with each reporting category separated by worksheet. Description Compares current scan against a previous scan, creating a differencing report. A visual breakdown of assets broken down by function and OS (Static). Microsoft Visio format which is used as framework for custom projects. Comprehensive report with information separated on a per-asset basis. 73

75 Security Assessments Standard Reports Report Name Security Risk Report Internal Vulnerabilities Report Security Policy Assessment Description Summary report which presents overall security position. Summary report outlining internal vulnerabilities. Detail report of security policies on the domain and individual computers. Specialty Reports Report Name Share Permission Report Share Permission Report by User Vulnerability Scan Detail Report Description Breakdown of share permissions by computer. Breakdown of share permissions by user. Full detailed results from the External Vulnerability Scan 74

76 Exchange Assessments Standard Reports Report Name Exchange Risk Report Exchange Mailbox Detail Report Exchange Traffic and Use Report Exchange Distribution Lists Report Description Summary report presenting an assessment and summary of the Exchange Server. Detailed report for each mailbox on the Exchange Server. Report showing traffic analysis and mailbox usage on the Exchange Server. Detailed report showing all distribution lists. Specialty Reports Report Name Exchange Mobile Device Report Exchange Mailbox Permission Report by Mailbox Exchange Mailbox Permissions by User Description Detailed report of mobile device users. Detailed report showing mailbox permissions by mailbox. Detailed report showing mailbox permissions by user. 75

77 SQL Server Assessment Reports Standard Reports Report Name Routine Health Report SQL Server Detail Report Database Detail Report SQL Server Agent Jobs Report Maintenance Plan Report Description This report is designed to be run on a regular basis to assess the general health of an SQL server. This report is designed to show specific, technical details for an entire SQL server. This report is designed to show specific, technical details for a single Database This report is designed to show the status and history of scheduled jobs on the Database This report is designed to show the status of maintenance plans on the Database 76

78 InForm Overview InForm allows you to create custom forms to gather information about a client and their site and generate reports. Your Interviews could focus on anything from purely technical information server room security, cable management, etc. to policies like BYOD. Templates Templates represent a re-usable form design. Templates contain the list of Categories and Topics. You can have multiple templates for different types of clients (e.g. Managed Services, Prospect, IT Site Survey etc.) or services (e.g. Security Audit). Creating a New Template From the InForm screen within Network Detective, click Site Interview Templates. This will bring up the template builder. 77

79 Change the name of the form. This will also change the filename for the template description file. Right-click on the Form header or any other node to bring up the context menu. From this menu, you can Add New Categories. Categories are used to group various topics together. Use the category editor to change the label of the category and add instructions for the category as a whole. Select the Category and right-click to add individual topics. 78

80 Use the topic editor to select the type of response, change the label for the topic, and add instructions for the topic. Response Types InForm supports three types of responses: Response Type Description Example Use Text Response Free-form text response Describe the condition of the data center. Multiple Choice Multiple fixed responses Does the firewall have IPS? - Yes - No - Cannot Determine Checklist Item An item that is marked off if done Check the security of the door locks Follow-ups Follow-ups are Topics that will appear if a particular response to a question is chosen. You can add multiple follow-ups for a particular response by using the Add Follow-up Question link next to a particular response. Issues The selection of any response can be marked as an Issue. Issues must have the Issue Description, Issue Score, and Issue Recommendation completed. If a response is selected that is marked as an issue, the issue will be added to the Risk Analysis, Management Plan, and Power Point issue section. In this way, you can create forms that affect the risk and issue scores. 79

81 Response Forms Response forms can be added to any assessment from the InForm section. Creating a Response Form From the InForm section, press the Add button to add an InForm response form to the assessment. Click on the visit link to open up the response form. Entering Responses Use the response column to enter your answers for the various topics. Notes are used to augment or supplement the information in the responses. Files and SWOT are used to attach pictures and other files, as well as specify strength, weakness, opportunities, and threat entries. 80

82 Initiate External Vulnerability Scan You can initiate an External Vulnerability Scan from the Wizard or by clicking the link on the right-hand side. This feature is ONLY available to subscribers. Enter a Scan Label (Name for this scan), and an IP address or address range. You can also supply an address to be notified when the scan is completed. Click OK, and then Next to send the request to our servers that will perform the scan. Click the External Scans Folder Icon to view the status of the scan. Once the Scan has been completed you can then run your reports to include the External Vulnerability scan. Note: You can, and should, initiate the External Vulnerability Scan before visiting the client site to perform the data collection. This way the External Scan data should be available when you are ready to generate the client s reports. 81

83 Exporting Configuration Items You can use Network Detective to export data to configuration items within PSA/CRM or Ticketing Systems such as Autotask and ConnectWise. Select the archive (NDZ file) and click Export Configuration Items to Autotask or Export Configuration Items to ConnectWise. Network Detective will Create and/or Update Configuration items. 1. Enter your PSA Connection information so that Network Detective can login to your PSA database to populate the drop-down items. If you have not setup a Connection, click the Manage Connection link to enter the login/connection information. a. For Autotask, this will be a user s login to Autotask (preferably an administrative user). b. For ConnectWise, you must first setup an Integrator login. Please see Appendix II. 2. Select the Company/Account where you want the items to be mapped. 3. You then select the Items to Export (right hand column) 4. Map the known Network Detective elements (Computers, Servers, Printers, SQL Servers, etc.) to the configuration item in your PSA system. 5. Choose whether to Create New configuration items 6. Select Update Existing Records with Same Reference Title if you want to update existing configuration items with information from Network Detective. 82

84 Note that you can perform this operation multiple times with different Selected Items to map each group to different Product types. For example, if different sets of Non-A/D devices need to get mapped to different elements (e.g. - some to Switches, other to Printers), select appropriate items, set the mapping and repeat with different settings as necessary. Export fields for Autotask When exporting to Autotask, Network Detective will set the following fields in each Configuration item: Product (mapped as per step 4 above) Reference Title (from the machine name) Notes (information on the device, including O/S, CPU, RAM, IP, etc. as available from scan) Export fields for ConnectWise When exporting to ConnectWise, you can use any existing Configuration Types that you have setup. In this case, Network Detective will populate the standard fields, and the Notes field will be set with the information for that system (CPU, Memory, etc.). If there was information in the Notes field, it will be overwritten by Network Detective. There is also the option to use a Configuration Type specific to Network Detective for each of Computers, Servers, Printers, etc. These will be in the appropriate drop-down with (ND) as the suffix - for example Computer (ND) and Server (ND). These will automatically be created by Network 83

85 Detective. If you use this Configuration Type, Network Detective will create and set custom Configuration Questions relevant to the Configuration type. For example, for Computers (ND), the Configuration Questions include: Computer Name, Operating System, CPU, etc. The full list of information will also be entered into the Configuration Question: Misc. 84

86 Manage Users You can add users to the account so that they can run reports. Set them to Standard User to prevent them from accessing the Manage Users, Billing and Preferences screens. 85

87 Billing Information Enter or update billing information for your account. 86

88 Preferences Set or change the default settings for the reports: 87

89 Appendices Appendix I Using a USB drive It is often handy to use a USB drive so that you are not downloading anything onto the client or prospect machine. And it is extremely useful when using the Local Data Collector. To setup the USB drive, simply download and run NetworkDetectiveDataCollector.exe, and unzip it directly to the USB drive (uncheck When done unzipping ). To run a scan from the USB, run any of: RunNetworkDetective.exe runs the interactive Data Collector. This is the same as downloading and unzipping/running the Data Collector from the download site. runlocal.bat runs the Data Collector to perform a Local Data Collection, and will pop up a dialog with the folder containing the CDF file once complete. Note that the CDF file output is stored on the root of USB and in the CDF folder that will be created. This way all CDFs from multiple machines are in one folder. runlocalsilent.bat runs the Data Collector to perform a Local Data Collection, but does not pop open a dialog box. Note that the CDF file output is stored on the root of USB and in the CDF folder that will be created. This way all CDFs from multiple machines are in one folder. 88

90 Appendix II ConnectWise Configuration Items Before configuration items can be imported into the ConnectWise PSA, the appropriate permissions must be setup in your ConnectWise system and you must configure a ConnectWise Connection in Network Detective. Setting up an Integrator Login in ConnectWise Navigate to Setup-> Setup Tables Type Integrator into the Table lookup and hit Enter Click the Integrator Login link Click the New Icon to bring up the New Integrator login screen as shown on the right. Enter and record Username and Password values which you will need later on when configuring a ConnectWise Connection in the Network Detective tool (see below). Set the Access Level to All Records. Enable both Company API and Configuration API. Click the Save icon to save this Integrator Login. (Note, if you already have an Integrator Login configured, you may use it as long as the Company and Configuration API s are enabled.) 89

91 ConnectWise Connection Manager From the Export to ConnectWise screen, click Manage Connections to provide the login credentials so Network Detective can connect to your ConnectWise database. (If you have already done this, select a Connection from the drop down box and skip this step.) From the ConnectWise Connections Manager screen, click New to create a new Connection. Enter the Username and Password that you setup in in the Integrator Login step, above. Enter your Company ID that is specified when you log into the ConnectWise PSA client. Enter the hostname of the ConnectWise site that you connect to into the PSA URL. For instance: If your Site is enter test.connectwise.com. (without the quotes). 90

Network Detective. Network Assessment Module Using the New Network Detective User Interface Quick Start Guide

Network Detective. Network Assessment Module Using the New Network Detective User Interface Quick Start Guide Network Detective Network Assessment Module Using the New Network Detective User Interface Quick Start Guide 2015 RapidFire Tools, Inc. All rights reserved. V20151228 Ver 3N Overview The Network Detective

More information

Network Detective. PCI Compliance Module Using the PCI Module Without Inspector. 2015 RapidFire Tools, Inc. All rights reserved.

Network Detective. PCI Compliance Module Using the PCI Module Without Inspector. 2015 RapidFire Tools, Inc. All rights reserved. Network Detective PCI Compliance Module Using the PCI Module Without Inspector 2015 RapidFire Tools, Inc. All rights reserved. V20150819 Ver 5T Contents Purpose of this Guide... 4 About Network Detective

More information

Network Detective. Using the New Network Detective User Interface Quick Start Guide. 2016 RapidFire Tools, Inc. All rights reserved.

Network Detective. Using the New Network Detective User Interface Quick Start Guide. 2016 RapidFire Tools, Inc. All rights reserved. Network Detective SQL Server Assessment Module Using the New Network Detective User Interface Quick Start Guide 2016 RapidFire Tools, Inc. All rights reserved. V20160111 Ver 3F Overview The Network Detective

More information

Network Detective. Security Assessment Module Using the New Network Detective User Interface Quick Start Guide

Network Detective. Security Assessment Module Using the New Network Detective User Interface Quick Start Guide Network Detective Security Assessment Module Using the New Network Detective User Interface Quick Start Guide 2016 RapidFire Tools, Inc. All rights reserved. V20160111 Ver 3M Overview The Network Detective

More information

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201 Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...

More information

Network Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D

Network Detective. Network Detective Inspector. 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D Network Detective 2015 RapidFire Tools, Inc. All rights reserved 20151013 Ver 3D Contents Overview... 3 Components of the Inspector... 3 Inspector Appliance... 3 Inspector Diagnostic Tool... 3 Network

More information

Paranet Solutions Network Discovery Client. Paranet Professional Services

Paranet Solutions Network Discovery Client. Paranet Professional Services Paranet Solutions Network Discovery Client Paranet Professional Services Contents 1. INTRODUCTION... 3 1.1 1.2 PURPOSE OF THIS DOCUMENT... 3 WHAT S IN THIS DOCUMENT... 3 2. SCANNING INSTRUCTIONS... 4 3.

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Policy Compliance. Getting Started Guide. January 22, 2016

Policy Compliance. Getting Started Guide. January 22, 2016 Policy Compliance Getting Started Guide January 22, 2016 Copyright 2011-2016 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

Rapid Assessment Key User Manual

Rapid Assessment Key User Manual Rapid Assessment Key User Manual Table of Contents Getting Started with the Rapid Assessment Key... 1 Welcome to the Print Audit Rapid Assessment Key...1 System Requirements...1 Network Requirements...1

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

OneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31

OneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31 OneStop Reporting 3.7 Installation Guide Updated: 2013-01-31 Copyright OneStop Reporting AS www.onestopreporting.com Table of Contents System Requirements... 1 Obtaining the Software... 2 Obtaining Your

More information

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

GP REPORTS VIEWER USER GUIDE

GP REPORTS VIEWER USER GUIDE GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

VMware vrealize Operations for Horizon Administration

VMware vrealize Operations for Horizon Administration VMware vrealize Operations for Horizon Administration vrealize Operations for Horizon 6.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM

WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create

More information

AssetWise Performance Management. APM Remote Upgrade Guide

AssetWise Performance Management. APM Remote Upgrade Guide AssetWise Performance Management APM Remote Upgrade Guide Trademark Notice Bentley, the B Bentley logo, AssetWise, Ivara, the Ivara EXP logo, Ivara Work Smart, Aladon and RCM2 are either registered or

More information

Test Automation Integration with Test Management QAComplete

Test Automation Integration with Test Management QAComplete Test Automation Integration with Test Management QAComplete This User's Guide walks you through configuring and using your automated tests with QAComplete's Test Management module SmartBear Software Release

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide NFIRS 5.0 Software Version 5.3 Prepared for: Directorate of Preparedness and Response (FEMA) Prepared by:

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Decision Support AITS University Administration. Web Intelligence Rich Client 4.1 User Guide

Decision Support AITS University Administration. Web Intelligence Rich Client 4.1 User Guide Decision Support AITS University Administration Web Intelligence Rich Client 4.1 User Guide 2 P age Web Intelligence 4.1 User Guide Web Intelligence 4.1 User Guide Contents Getting Started in Web Intelligence

More information

LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide

LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Ajera 7 Installation Guide

Ajera 7 Installation Guide Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services

More information

Issue Tracking Anywhere Installation Guide

Issue Tracking Anywhere Installation Guide TM Issue Tracking Anywhere Installation Guide The leading developer of version control and issue tracking software Table of Contents Introduction...3 Installation Guide...3 Installation Prerequisites...3

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

NetWrix SQL Server Change Reporter

NetWrix SQL Server Change Reporter NetWrix SQL Server Change Reporter Version 2.2 Administrator Guide Contents NetWrix SQL Server Change Reporter Administrator Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

FileMaker 12. ODBC and JDBC Guide

FileMaker 12. ODBC and JDBC Guide FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency

More information

BillQuick Agent 2010 Getting Started Guide

BillQuick Agent 2010 Getting Started Guide Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Agent 2010 Getting Started Guide BQE Software, Inc. 2601 Airport Drive Suite 380 Torrance CA 90505 Support: (310)

More information

Xerox 700 Digital Color Press with Integrated Fiery Color Server. Utilities

Xerox 700 Digital Color Press with Integrated Fiery Color Server. Utilities Xerox 700 Digital Color Press with Integrated Fiery Color Server Utilities 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45072726

More information

Dial-up Installation for CWOPA Users (Windows Operating System)

Dial-up Installation for CWOPA Users (Windows Operating System) Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012.

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Copyright 1995-2012 Lenel Systems International, Inc. Information

More information

FileMaker 11. ODBC and JDBC Guide

FileMaker 11. ODBC and JDBC Guide FileMaker 11 ODBC and JDBC Guide 2004 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered

More information

Password Memory 6 User s Guide

Password Memory 6 User s Guide C O D E : A E R O T E C H N O L O G I E S Password Memory 6 User s Guide 2007-2015 by code:aero technologies Phone: +1 (321) 285.7447 E-mail: info@codeaero.com Table of Contents Password Memory 6... 1

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

Central Administration User Guide

Central Administration User Guide User Guide Contents 1. Introduction... 2 Licensing... 2 Overview... 2 2. Configuring... 3 3. Using... 4 Computers screen all computers view... 4 Computers screen single computer view... 5 All Jobs screen...

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

FortKnox Personal Firewall

FortKnox Personal Firewall FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright

More information

Shavlik Patch for Microsoft System Center

Shavlik Patch for Microsoft System Center Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This

More information

Installing SQL Express. For CribMaster 9.2 and Later

Installing SQL Express. For CribMaster 9.2 and Later Installing SQL Express For CribMaster 9.2 and Later CRIBMASTER USER GUIDE Installing SQL Express Document ID: CM9-031-03012012 Copyright CribMaster. 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,

More information

Setup and configuration for Intelicode. SQL Server Express

Setup and configuration for Intelicode. SQL Server Express Setup and configuration for Intelicode SQL Server Express Due to overwhelming demand and the increased load on support, we are providing a complete SQL Server installation walkthrough document. SQL Server

More information

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central

WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central and remote sites. Contents Table of Contents Using WhatsUp

More information

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Virtual CD v10. Network Management Server Manual. H+H Software GmbH Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide

Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Table of Contents TABLE OF CONTENTS... 3 1.0 INTRODUCTION... 1 1.1 HOW TO USE THIS GUIDE... 1 1.2 TOPIC SUMMARY...

More information

EntroWatch - Software Installation Troubleshooting Guide

EntroWatch - Software Installation Troubleshooting Guide EntroWatch - Software Installation Troubleshooting Guide ENTROWATCH SOFTWARE INSTALLATION TROUBLESHOOTING GUIDE INTRODUCTION This guide is intended for users who have attempted to install the EntroWatch

More information

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup

More information

Installing LearningBay Enterprise Part 2

Installing LearningBay Enterprise Part 2 Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Administration Guide. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Gpupdate is a trademark owned by Specops Software.

More information

Exchange Mailbox Protection Whitepaper

Exchange Mailbox Protection Whitepaper Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

HIRSCH Velocity Web Console Guide

HIRSCH Velocity Web Console Guide HIRSCH Velocity Web Console Guide MAN012-1112 HIRSCH Velocity Web Console Guide MAN012-1112, November 2012 Version 1.1 Copyright 2012 Identive Group. All rights reserved. ScramblePad and ScrambleProx are

More information

Load testing with. WAPT Cloud. Quick Start Guide

Load testing with. WAPT Cloud. Quick Start Guide Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

ILTA HANDS ON Securing Windows 7

ILTA HANDS ON Securing Windows 7 Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding

More information

Discovery Guide. Secret Server. Table of Contents

Discovery Guide. Secret Server. Table of Contents Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Software Version 5.1 November, 2014. Xerox Device Agent User Guide

Software Version 5.1 November, 2014. Xerox Device Agent User Guide Software Version 5.1 November, 2014 Xerox Device Agent User Guide 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or

More information

Visual Studio.NET Database Projects

Visual Studio.NET Database Projects Visual Studio.NET Database Projects CHAPTER 8 IN THIS CHAPTER Creating a Database Project 294 Database References 296 Scripts 297 Queries 312 293 294 Visual Studio.NET Database Projects The database project

More information

Thinspace deskcloud. Quick Start Guide

Thinspace deskcloud. Quick Start Guide Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information