SYSTEMS MANAGEMENT. Partner Guide

Size: px
Start display at page:

Download "SYSTEMS MANAGEMENT. Partner Guide"

Transcription

1 SYSTEMS MANAGEMENT Partner Guide

2 Content 1. PROLOGUE Audience. Icons. 2. INTRODUCTION Main features of Systems Management. Systems Management User. Profile. Main components. Key players of Systems Management. 3. HIERARCHY OF LEVELS WITHIN THE SYSTEMS MANAGEMENT CONSOLE System Level. Profile Level. Device Level. 4. BASIC COMPONENTS OF THE SYSTEMS MANAGEMENT CONSOLE General Menu. Tab Bar / List Bar. Icon Bar / Action Bar. Filters and Groups panel. Dashboards. 5. DEVICES Downloading the Systems Management agent to the devices on the client s network. Installing the Systems Management Agent on Mac OS X and Linux platforms. Installing the Systems Management agent on Windows platforms. Installing the Systems Management Agent on Android and ios. Approving devices. Configuring a Connection Broker. Viewing device information. Managing the resource consumption of the devices. 6. FILTERS AND GROUPS What are Groups and Filters?. Types of Groups and Filters. 7. HOW TO EFFICIENTLY ADMINISTER THE MANAGED DEVICES Differences between Profiles, Groups and Filters. General approach and device management structure. Quick view of device information. 8. THE FIRST 8 STEPS TO START USING SYSTEMS MANAGEMENT Create and configure the first Profile. Deploy the Systems Management Agent. Check the device list in the Profile and basic Filtering. Hardware, software and license audit. Patch Management. Create Monitors. ComStore. Access remote managed device resources. 9. POLICIES What are Policies?. How to define a System Policy. How to define a Profile Policy. Policy types. How to deploy a Policy. 10. MONITORING What is it?. Composition of a Monitor. Manual creation of Monitors. Automatic creation of Monitors. 11. COMPONENT EXECUTION Why develop components?. What are the requirements for developing components?. General architecture of Systems Management components. Create a Monitor component. Create a Script type component. 12. ASSETS AUDIT Hardware audit at Profile Level. Software audit at Profile Level. Audits at Device Level. 13. CENTRALIZED SOFTWARE DEPLOYMENT AND INSTALLATION Package deployment and installation procedure. Centralized software installation requirements. Objective of centralized software installation. Deployment examples. Save bandwidth in software deployment. 14. TICKETING What is the Ticketing system?. Description of a Ticket. Create a Ticket. Ticket Management. 15. PATCH MANAGEMENT What is Patch Management?. What patches can I deploy / apply?. Patch deployment and installation. Audits. 16. USER ACCOUNTS AND ROLES What is a User account?. What is a Role?. Why are Roles necessary?. The accountadmin Role. Access User account and Role configuration. Create and configure User account. Create and configure Roles. Configure Roles. How many different Roles are needed?. 17. MOBILE DEVICE MANAGEMENT Which platforms are supported?. Mobile Device Management Policies. Tools for remotely managing mobile devices. 18. SECURITY AND CONTROL OVER ACCESS TO THE SYSTEMS MANAGEMENT SERVICE Two-factor authentication. Essential requirements. Settings. Enabling Two Factor Authenticator for all accounts. Password policy. Systems Management console IP Address Restriction. Agent IP. Address Restriction. APPENDIX A: Source code APPENDIX B: COMPATIBLE PLATFORMS

3 1 Prologue This guide contains basic information and procedures of use to get maximum benefit from the product Systems Management. Audience This documentation is written for technical staff that offer support services to Users without IT knowledge and in two possible environments: The IT Department which wishes to professionalize the internal support it provides to the rest of the company. The Managed Service Provider (MSP), which currently provides services to its client accounts onsite, remotely, reactively or proactively. Icons This guide contains the following icons: i Additional information, for example, an alternative method for performing a particular task. Suggestions and recommendations.! Important and/or useful tips for using Systems Management.

4 2 Introduction Systems Management is a cloud-based remote device Monitoring and management solution for IT departments that want to offer a professional service, while minimizing User disruption. Systems Management increases efficiency through centralized and straightforward management of devices, while promoting task automation. The overhead costs dedicated to serving each client or account are reduced as Systems Management: Requires no additional infrastructure on-site as the solution is hosted in the cloud. Has a very gentle learning curve for technical support, allowing you to deliver value from day one. Tools accessible from anywhere, anytime, allowing you to manage support remotely and avoiding wasted time and money by eliminating the need to travel to those sites. Task and response automation triggered by configurable Alerts that prevent failures before they occur. Systems Management is a product that promotes collaboration among the technicians in charge of providing support and minimizes or completely eliminates the time spent interacting with the User to determine the cause of problems

5 Main features Característica The following are the most important features of the product: Feature Cloud-based solution Managed via agent for compatible devices. Managed without agent Automatic detection of devices Scheduled and custom audits Description No additional infrastructure at the client or the MSP / IT Department site. Manage all your devices anytime, anywhere. Extremely light agent for compatible devices with Windows, Linux, Mac OS X, Android and ios. Managed via SNMP for those devices in which it is not possible to install the Systems Management Agent, such as printers. A Systems Management Agent installed on a single device can detect other devices connected to the same network and initiate automatic installation. Track all changes to the device (hardware, software and system). Reports Collaborative environment Activity log ComStore Mobile Device Management (MDM) Send scheduled or special Reports via . Find out who does what, when, and who uses most of those resources. Manage incident allocation, status and documentation with the Ticket System. Simplify creation of an intervention history with Device Notes. Communicate live with the end User through IM Messaging service. History of all administrators activity in the Systems Management Console Extend the capabilities of the platform. Select and download the components you need. Supports ios and Android, allowing monitoring and management of smart phones and tablets, configuring settings and user policies, geolocation of devices and safeguarding of data should the device be stolen or lost. Software license management Keep track of all software installed. Alerts and Monitoring Monitor CPU usage, memory and disk space, services and Exchange Servers, performance graphs, panel Alerts... all in real time. Create scripts and quick Jobs Create your own scripts, download our pre-configured scripts from the online ComStore and deploy either on a scheduled basis or as an automatic response to an Alert. All at a click. Patch management Automate deployment of updates and patches of the software installed. Software deployment Centralized update and software deployment. Policies Define a set of general settings to manage your IT environment in a flexible manner. Remote access Task manager, file transfer, registry editor, command prompt, event log viewer, etc. All of these integrated tools enable you to repair multiple devices without interrupting the Users. Remote control Shared access to the User's desktop or total control. Supports firewalls and NAT. Secure communications All communications between the Agents and the Systems Management Server are encrypted (SSL). Service access control Ensuring secure access to the Console by the service administrator with Two-factor authentication and with other resources that restrict access from devices to the Server.

6 User Profile Main components Most Systems Management Users will have a medium high technical Profile, as this tool provides daily maintenance of computing devices subject to constant use and change. However there are two specific, targeted user groups of Systems Management:: Enterprise level IT technicians Technicians subcontracted or belonging to a company to offer a company-wide support service for devices and end-users. These scenarios often include the remote offices to which access is restricted so technicians must use Monitoring tools and remote access for roaming Users or Users who work outside the office, which makes them vulnerable to all types of problems with their devices. Managed Service Provider (MSP) technicians Technical staff employed by a company to provide a professional service to client accounts that have decided to outsource or subcontract the IT Department for maintenance of their devices. SYSTEMS MANAGEMENT CONSOLE A web portal accessible via compatible browsers, from anywhere, anytime with any web enabled device. Most of the daily tracking and Monitoring tasks will be performed from this console via a browser. This resource is available to technical support only. SYSTEMS MANAGEMENT AGENT This is a small (3 MB) program installed on all supported devices to be managed. After installing the Systems Management Agent on the device, its information will become directly accessible through the Systems Management Console. For devices such as printers, on which it is impossible to install a Systems Management Agent, Systems Management can collect status information and display it in the Systems Management console using SNMP protocol. For more information, Chapter 5: Devices, Management of devices not supported by the Systems Management Agent section. The Systems Management Agent supports two execution modes: Administration Mode: In this mode, which is the usual mode, the agent is barely noticeable to the end-user and access to some specific settings can be delegated by the administrator. User Mode and Monitor Mode: After entering valid credentials, the network administrator can use the Systems Management Agent in to access remote devices. Install the Systems Management Agent on both client devices and those belonging to the technicians for remote management.. SYSTEMS MANAGEMENT SERVER The Systems Management Console, the processes required to collect, synchronize and redirect messages, events, and information flows generated by the Systems Management Agents and the databases that support them are all hosted on a cloud-based Systems Management Server and are available 24 hours a day. The status information that flows from each of the devices to the Systems Management Server is highly optimized so that the impact on the client s network is negligible. This information is sorted and consolidated in the Systems Management Server so that it is displayed as a flow of events to diagnose and even efficiently foresee problems on managed devices.

7 Key players IT ADMINISTRATOR / ADMINISTRATOR / MANAGED SERVICE PROVIDER / MSP / IT DEPARTMENT / SUPPORT TECHNICIAN / TECHNICAL TEAM These terms include all those who have access to the Systems Management Console, regardless of the privilege level associated with the credentials supplied. These are the technical staff from the IT department of the company that opts for Systems Management to manage and Monitor its systems or the MSP staff who access the client s devices to manage and Monitor them. SYSTEMS MANAGEMENT ADMINISTRATION ACCOUNT / PRINCIPAL ADMINISTRATION ACCOUNT Each client or company using Systems Management will be given a Principal administration account. An Account with the highest level of privileges that can manage all the resources of the product. Chapter 16: User account and roles describes how to create new Users and Roles in order to restrict the access of systems technicians to key Systems Management resources. CLIENT ACCOUNT / CLIENT A client account is a contract between the Managed Service Provider and a company that comes to them with the intention of outsourcing their day to day IT Support needs. Except in Chapter 16: User account and roles, in this manual, account has an organizational meaning: for the MSP, it is equivalent to a set of devices related to one another for belonging to the same client network that will require maintenance. USER The User is the person using the device that requires direct support from the MSP or IT department. DEVICE A device is a computer that has the Role of either client or server, which has a Systems Management Agent installed or is managed indirectly via SNMP. In Chapter 18: Security and control over access to the service you can see how to configure Two-Factor Authentication to access the Systems Management Console. Each Principal administration account belongs to a secure and separate product instance. Therefore, all of the settings of a Systems Management client and all of the devices managed will not be accessible or visible to other administration accounts.

8 In order to separate management of the devices of different client accounts and reuse and restrict procedures defined by technical staff in the Systems Management Console, and to expedite and refine management, Systems Management provides three entities / Group levels / operation levels. 3 Hierarchy of levels within the Systems Management Console From the most general to the most specific, these are the following: System level Profile level Device level System level Profile level Device level

9 System Level What is it? System Level also referred to as Account or Account level entity cluster is the most general and highest level, and is also unique for each MSP / IT Department. It automatically groups all devices managed by the MSP / IT Department belonging to their clients and Users with a Systems Management Agent installed. Scope The actions performed on this level will affect all devices registered on the system, although they can be limited to a subset of devices using Filters and Groups, described in Chapter 6: Filters and Groups. Access The System Level resources are accessed from General Menu, System. Parameter Password Policy Access Control Power Rating Agent Deployment Credentials End-User Ticket Assignee Variables Custom Labels Custom Agent Settings Agent Update Settings Description This lets you set password policies. See Chapter 18: Security and control over access to the Systems Management service for more details. Lets you set advanced access controls for the Console and the service. See Chapter 18: Security and control over access to the Systems Management service for more details. Lets you set power consumption parameters (in Watts) for each type of device in order to calculate monthly consumption. See Chapter 5: Devices for more details. Lets you set the credentials required for remotely installing the Agent. See Chapter 5: Devices for more details. Indicates the account to which users send the tickets that are opened directly from the Agent. See Chapter 14: Ticketing for more details. Variables passed to the scripts run on the devices. See Chapter 11: Component execution for more details. Lets you define the names of the labels used to collect the results of the scripts run on the devices. See Chapter 11: Component execution for more details. Lets you define how the Agents will perform as the Connection Broker. See Chapter 5: Devices for more details. Prevents or allows the automatic updates of the Agents installed. Funcionality System Level can perform global actions. Therefore, you can obtain the status of all managed devices, consolidated Reports on your environment and actions on all or part of the registered devices. Settings The System Level settings include a wide range of parameters that are dealt with in several chapters throughout this guide. Below you will find a complete list of all the options in the General Menu, Account, Settings and a short description of each one. Mail Settings Mail Recipients Update Profile Variables Apple Push Certificate Reset Columns Display Lets you configure the source/target account for s sent by the Server to service administrators. Lets you configure the accounts that will receive warnings, reports and notifications of new devices administered by Systems Management. Variables passed to the scripts run on the devices. Lets you configure the certificate required to administer Apple mobile devices. See Chapter 17: Mobile device management for more details. Lets you restore the default settings to display basic information about the devices managed. See Chapter 5: Devices for more details.

10 Profile Level What is it? Profile Level is a grouping entity immediately below System. It is a logical grouping that contains the devices that belong to the same client account or office. The Profiles list can be accessed from General Menu, Profiles. Each Profile is associated with a number of configurations accessible from Tab Bar, Settings in the Systems Management Console, which in turn, are bundled with the Systems Management Agent. Funcionality Profile Level can perform actions on all of the devices it contains. In this way, you can obtain the status of devices, consolidated Reports and tasks to perform on all or some of the devices which make up the Profile. Settings The Profile Level settings also include a wide range of parameters that are described in several chapters in this guide, some of these coincide with some of the parameters defined at System Level, in which case the latter shall have priority. Below is a complete list of all options, noting the chapters in which they are described if applicable. Scope The procedures triggered at Profile Level can affect all devices belonging to that Profile, while some actions can be restricted to a subset of devices using Filters and Groups, described in Chapter 6: Filters and Groups. Unlike System Level, which is unique, the administrator can create as many Profile Groups as needed. Membership Membership of a given device to a Profile is determined when installing the Systems Management Agent. i! Download the Systems Management Agent from the chosen Profile page so that when installed on the User s device, it will be automatically added to the Profile in question in the Systems Management Console. For further details, see Chapter 5: Devices. You can move devices from one Profile to another from the Systems Management Console after you have installed the Systems Management Agent on the User s device. In order to minimize the tasks required in the distribution phase, it is advisable to first create the Profile and then download the Systems Management Agent from there so that the relation between the devices and the Profile is automatic. Parameter General Power Rating Proxy Agent Deployment Credentials Connection Broker Local Caches End-User Ticket Assignee Variables Credentials Custom Labels Descripción General Profile information: Name, internal identifier, description and types of devices hosted. Lets you set power consumption parameters (in Watts) for each type of device in order to calculate monthly consumption. See Chapter 5: Devices for more details Lets you set the proxy details for network users without a direct Internet connection. See Chapter 5: Devices for more details. Lets you set the credentials required for remotely installing the Agent. See Chapter 5: Devices for more details. Lets you define how the Agents will perform as the Connection Broker. See Chapter 5: Devices for more details. Lets you assign the role of cache to one of the network devices. This saves bandwidth during software deployment. See Chapter 13: Centralized software deployment and installation for more details. Indicates the account to which users send the tickets that are opened directly from the Agent. See Chapter 14: Ticketing for more details. Variables passed to the scripts run on the devices. See Chapter 11: Component execution for more details. This is for setting the credentials for software deployment. See Chapter 13: Centralized software deployment and installation for more details. Lets you define the names of the labels used to collect the results of the scripts run on the devices. See Chapter 11: Component execution for more details.

11 Device Level What is it? This represents a single node, end-point, or device with a Systems Management Agent installed and Reporting to the Systems Management Server. Devices are automatically created in the Systems Management Console, as they are added as the Agents are installed on the client s devices or it is managed indirectly through SNM. Scope All actions performed at this level affect only the selected device. Funcionality Device Level can perform actions on a particular device. This way you can get detailed lists from the device as well as Reports and actions.

12 4 Basic components of the Systems Management Console The Systems Management Console is structured in an intuitive and visual manner, so that most management resources are just a click away, avoiding the clutter of unnecessary checkboxes and settings. The goal is a Systems Management Console which is clean, quick and convenient to use, while avoiding, wherever possible, full page reloads and offering a gentle and short learning curve so that the IT department can deliver value to a client from the outset. The basic components of the Systems Management Console to which we will refer throughout this guide are:

13 4. Basic components of the Systems Management Console GENERAL MENU This menu is accessible from anywhere in the Systems Management Console. It consists of 6 entries: Elements: Menu System Profiles Components ComStore Scheduled Jobs Scheduled Reports Help Center Account Description Access to System Level. Access to Profile Level. Access to components downloaded by and accessible to the administrator Repository of components created by Panda Security that extend the functionality of Systems Management List of active and finished Jobs List of configured and default Reports Help center with links to Panda Security resources Access to the details of the Principal administration account and to resources for creating new Roles and Users. For more information, see Chapter 16: User account and roles. Components: Tab Accessible from Description Summary Profile, Device Status Information Dashboard System General control panel Devices Profile List of devices accessible with associated information Audit System, Profile, Device Hardware, software and license audit list Manage System, Profile, Device List of patches pending and applied Monitor System, Profile, Device List of Alerts created by Monitors or finished Jobs Support System, Profile, Device List of Tickets generated Report System, Profile, Device List and generation of on-demand Reports Policies System, Profile, Device List and generation of Policies, described later. Settings Profile Configuration associated to the Profile. TAB BAR / LIST BAR The Tab Bar and also the List Bar provides access to the tools available in the Systems Management Console for generating and presenting consolidated lists on-screen, with details of the status of the devices belonging to the level accessed. It also allows configurations to be defined and viewed. This bar is slightly different if it is accessed from Profile Level, System Level or Device Level for a specific device, as each management scope is also different. Suspended devices System List of uninstalled Devices The scope of the Tab Bar refers to the current level. Therefore, If you go to the Tab bar at System level, you ll see consolidated information on all Devices. If you access at Profile Level, it will show consolidated information on the devices in the Profile. If you access at Device Level, it will only show information for that particular device.

14 4. Basic components of the Systems Management Console ICON BAR / ACTION BAR The Icon Bar or Action Bar accesses actions to change the status of the devices. This bar does not exist in General Menu, System and varies slightly if accessed from General Menu, Profile or a specific device, as the management scope is different. The scope of the Icon Bar will be formed by manually selecting the devices that have been selected in a Profile. Elements: Request audit Profile, Device Force the launch of an audit. For more details see Chapter 12: Assets Audit Schedule Job Profile, Device Create a scheduled Job for a later date Run a Quick Job Profile, Device Create and run a Job already created Download Profile Download the list of devices in the Profile Add/Remove Cache Profile, Device Mark the device as network cache. Turn Privacy On Profile, Device Prevent remote access to the devices by the administrator unless approved by the User Send a message Profile, Device Send a message to the selected devices Schedule Reports Profile Schedule Reports for a later date Refresh Profile, Device Refresh the data on the screen Show device(s) on Google Map Device Geolocation of devices on a map. QR Code Device QR code associated to the device for paper auditing Refresh the current view Profile, Device Reloads the list of devices displayed or the specific device. Icon Accessible from Description Move Device to Profile, Device Move a or the devices selected to another Profile Add Device to Profile, Device Move a or the devices selected to a Group! If you want to perform actions at System Level, you will need to create a Filter or Group, as System Level does not display the Icon Bar by default. Edit Toggle Delete Profile Profile Profile, Device Add notes and custom fields to the selected devices that can be used by Filters. Mark devices as favorite for quick access from Summary / Dashboard Delete a Device from a Profile. The device will no longer be managed, the Systems Management Agent will be uninstalled and the device will be added to the Suspended Devices Tab under General Menu, System.

15 4. Basic components of the Systems Management Console FILTERS AND GROUPS PANEL The left of the Systems Management Console contains three panels with different groups: System Dashboard Accessible from General Menu, System, clicking System Dashboard. Default Filters: Filters automatically generated by the system Profile Filters / System Filters: device Filters created by the administrator at Profile Level or System Level, respectively. Profile Device Groups / System Device Groups: device Groups created by the administrator at Profile Level or System Level, respectively. System Profile Groups: only available at System Level, these are Groups of various Profiles. DASHBOARD It collects general information on the status of all devices: Notifications, Jobs, Alerts, etc The Dashboards reflect the status of a set of devices. There are four types of Dashboard. Security Status Accessible from General Menu, System, it reflects the security status of all managed devices.

16 4. Basic components of the Systems Management Console SUMMARY (PROFILE) Accessible from General Menu, Profile and by selecting a specific Profile. It reflects the status of all the devices that belong to the selected Profile. There will be a Summary Dashboard for each Profile created. SUMMARY (DEVICE) Accessible from a Device. It reflects the status of a specific device. There will be one for each managed device.

17 i See Appendix B to see the platforms that support installation of the Systems Management Agent. 5 Devices In an environment managed by Systems Management a device is a computer that can be accessed from the Systems Management console for remote management and maintenance. All devices managed by Systems Management send and receive information that the Systems Management Server collects, catalogs and displays in real-time in the Systems Management Console. There are three possible forms of communication between the Systems Management Server and any given device: Directly by installing the Agent on supported platforms (see Appendix B). In this scenario Agents connect directly to the Internet and communicate with the Server without proxies. Indirectly via a proxy for those devices without a direct Internet connection. Later in this chapter we describe how to configure a proxy. Indirectly via SNMP For devices on which it is not possible to install the Systems Management Agent, another device on the same subnet with the Systems Management Agent installed can be used as a relay or gateway and communicate with the device via SNMP. This way, the gateway device receives commands from the Systems Management server and converts them to SNMP protocol before sending them to the device without the agent installed. In the response from the device, the same Systems Management Agent undoes the changes to deliver information from the incompatible device to the Systems Management server. i The discovery of manageable devices using SNMP is an automatic task. See Management of unsupported devices (printers) later in this chapter. See Chapter 12: Assets Audit for information about the process of discovering assets.

18 5. Devices DOWNLOADING THE SYSTEMS MANAGEMENT AGENT TO THE DEVICES ON THE CLIENT S NETWORK The download process varies slightly depending on the platform, although in all cases the Systems Management Agent sent to the User s devices requires certain basic information to be able to operate once installed: For network configurations that have a proxy for Internet access, the Systems Management Agent will need this information, which will have to be entered manually or globally, by entering it in the Profile. This can be done from Profiles in the General menu, selecting the Profile to which the newly installed device belongs, then select the Tab Bar, Settings and enter the required data in the Proxy section. The Profile to which it will belong. The essential information it will need to connect with the Systems Management Server. Profile to which the Systems Management Agent belongs In order to keep all managed devices organized they must be put in the appropriate Profile within the Systems Management Console. For desktop platforms (Windows, Linux and Mac OS X) the Profile to which the device belongs is set automatically when the Systems Management Agent generated from the Profile is installed. This avoids having to manually configure the Systems Management Agent in each of the User s devices. For mobile platforms (tablets and smartphones), the Profile that the Systems Management Agent belongs to must be entered manually through a configuration file provided by the Systems Management Server. See the section Installing the Systems Management agent on Android and ios platforms later in this chapter Essential information for connecting to the Systems Management server In addition to belonging to the Profile designated by the administrator, the newly installed Systems Management Agent requires Internet connection information in order to communicate with the Systems Management server. On most IT infrastructures, Internet access only requires a basic TCP/IP configuration established by the operating system installed on the User s device, which the Systems Management agent will use for communications. Once this information has been entered, all Systems Management Agents installed from this Profile will have this proxy data.

19 5. Devices Sending the Systems Management Agent via To start sending the Systems Management Agent via to any supported device, go to the General menu, Profiles, select the Profile with the devices you want to manage, in the Tab Bar, Devices, click Add Device. You will see a dialog box with all the platforms supported by the Systems Management Agent: Windows, Mac OS X, Linux, ios and Android. Once you ve selected the platform, you ll be asked for the addresses of the Users of the devices to be managed, separated by a semi-colon ;. Sending the download URL via You can use the same procedure for sending an with the download URL for Windows, Mac OS X and Linux: En este caso el usuario recibirá una URL desde donde podrá iniciar la descarga del Agente Systems Management. Direct download Administrators can download the Systems Management Agent from the Systems Management Console, then distribute it manually or using distribution tools such as Active Directory. To do this, use the same procedure but click the platform icon. Depending on the platform, the User will receive an with the Systems Management Agent in an attachment (Windows, Mac OS X and Linux), or with a link to download it from Google Play or Apple Store.! Unmodified mobile platforms only allow apps to be downloaded from the corresponding app store. For this reason, the only certificated method for delivering the Systems Management Agent to tablets and smartphones is by ing the URL for the app in the app store.

20 5. Devices INSTALLING THE SYSTEMS MANAGEMENT AGENT ON WINDOWS PLATFORMS The Systems Management Agent can be downloaded in three ways: Sending the Systems Management Agent via Sending the download URL via Direct download Once you ve received or downloaded the Systems Management Agent, you only need to double-click the downloaded package. There is no confirmation and the process is completely silent. The installed Systems Management Agent will connect to the Systems Management Server automatically and will appear in the list of managed devices in the Profile selected from the Systems Management Console. Given that remote installation of a Agent is a process that creates services on the device and needs to be configured in order to be launched whenever the operating system is started, remote installation has to be done with administrator (or equivalent) permissions. The domain account used for the installation is configured in the Settings tab of the Profile corresponding to the devices. Enter the user name and password of the domain administrator in the Agent Deployment Credentials section. Given that installing the Systems Management Agent on networks with many devices can be a long and tedious process if you have to do it independently on each device, the process can be streamlined with the Remote deployment function, following the steps below: Send the Systems Management Agent to the first Windows device on the network using any of the methods described. Once installed, use the Remote deployment function to deploy the agent to the rest of the Windows devices on the network from the Systems Management Console. From the Audit tab, select the devices discovered by the installed Agent within the network segment and click the Deploy Agents icon..

21 5. Devices INSTALLING THE SYSTEMS MANAGEMENT AGENT ON MAC OS X AND LINUX PLATFORMS Mac OS X and Linux platforms support the three installation methods described above: Sending the Systems Management Agent via Sending the download URL via Direct download In all cases, Users receive the installation package which downloads all the necessary libraries and dependencies, and the agent will be installed automatically when the operating system is restarted. i Even though the Mobile Device Management component is free, every mobile device with a Systems Management Agent installed will count as a regular license for the purpose of counting the total number of purchased licenses. Once the component is added, the ios and Android operating systems will appear in Add Devices. Import the certificate into the Systems Management Console (for ios-based devices) It will also be necessary to incorporate -into the Systems Management Console- the certificate generated by Apple for ios devices to be able to connect to the Systems Management Server.! Mac OS X and Linux do not support Remote deployment. i Importing the Apple certificate is a mandatory, one-time process for each client/ partner who wants to manage one or multiple ios-based devices. INSTALLING THE SYSTEMS MANAGEMENT AGENT ON ANDROID AND IOS Follow the steps below to manage your mobile devices from the central admin console. i Installing the certificate is a requirement from Apple to ensure the integrity, authenticity and confidentiality of all communications between the Systems Management Server and the User s device. Enable the console s MDM feature: To be able to interact with your mobile devices from the console, you need to enable the MDM feature. To do this, import the free component Mobile Device Management directly from the Comstore. To do so, follow the steps below: Browse to Account, Settings to access the Apple certificate settings (Apple Push Certificate section) Download the certificate signing request (CSR), signed by Panda Security (*_Apple_ CSR.csr) Upload the CSR file to the Apple Push Certificate Portal To access the Apple Push Certificate Portal, you must have an Apple account. Any itunes account will be enough. However, if you want to generate new Apple credentials, go to click Create an Apple ID and follow the instructions on-screen.

22 5. Devices Go to and sign in with your Apple credentials. Click Create Certificate and follow the instructions on-screen. Load the CSR file you downloaded in the previous step. i As the Systems Management Agent is downloaded from the official app store for each mobile platform (Google Play or Apple Store), information about the Profile is not part of the downloaded package, as this would mean changing the content of the package in the store. This information is therefore kept in the.mdm file delivered in the . Associate the device with a Profile After the ios or Android Systems Management Agent has been installed on the client s device, the User must take the following steps to associate it with the selected Profile. There are two ways to associate a device with a Profile: Download the new Apple signed certificate (.PEM) to your computer Option 1: Capturing the QR code using the device s camera. On a PC with the Web console displaying the Profile to be associated with the User s mobile device, click the QR code to enlarge it. Go back to the Systems Management Console. Browse to the Apple signed certificate (.PEM) downloaded from the Apple Push Certificate Portal, and upload it. Once uploaded, the following message will appear in the console. Sending the download URL via Due to security restrictions, clients can only receive an containing the link to download directly from the Apple Store or Google Play and a.mdm file containing the Profile information associated to the device. Then, the User must touch the wheel icon on their device to launch the camera and capture the QR code on the screen

23 5. Devices After reading the code, the Systems Management Agent will display the message Connected on the User s device, and appear on the Systems Management Console. Option 2: Importing into the agent the.mdm file attached to the . On mobile phones without camera it is possible to open the.mdm file from the message by simply touching the file. After loading the.mdm file, the Systems Management Agent will display the message Connected on the User s device, and appear on the Systems Management Console. This tab displays all the non-administered devices found on clients networks where at least one Windows Agent is installed. As the list that is generated may be quite long, the Search field can be used to locate specific devices. Once a device has been located, click Manage printers and the device will appear in the list of the Profile to which it belongs, just as with other administered devices.! MDM file import is only supported from the device s native client. ADMINISTRATION OF DEVICES NOT SUPPORTED BY THE AGENT By using the SNMP protocol, Systems Management can allow visibility of devices on which the Agent can t be installed. SNMP devices can be divided into two large groups: printers, and the rest of the devices: routers, switches, scanners, switchboards, etc. The procedure and requirements differ depending on the group to which a device belongs. Administration of network printers To add this type of device, simply locate it using the device discovery function in the Audit tab. i Each printer-type device added to the Console uses a license from the total number of licenses contracted by the client. See Chapter 12: Assets Audit for more details on the discovery of devices.

24 5. Devices ADMINISTRATION OF OTHER SNMP DEVICES Devices that are not printers and which don t support the installation of the Agent can be managed through a Agent designated in the console as an SNMP monitor. In the list of managed devices displayed in Profiles, Devices, select the computer that will act as the SNMP Monitor in the network by clicking Add as SNMP monitor from the icon bar. i Although not strictly necessary, it is advisable for administrators to familiarize themselves with the basic concepts of SNMP (OID, MIB, NMS, etc.) as well as having an MIB browser to be able to browse the OIDs structure of the device. Mibble is an MIB browser available free from the website.. Which parameters can be monitored in devices managed via SNMP? Most SNMP-compatible devices publish, in their MIB, a lot of detailed status information that allows you to monitor many functionality parameters, for example: Internal resource usage (memory, internal storage, CPU, etc.) Bandwidth consumption. Internal device temperature. Descriptive information about the device and the manufacturer (model, version, latest firmware update, etc.) Detection of specific errors with error codes. Changes to the devices configuration. Changes to the device status: ports enabled or disabled in a switch via STP, lines available on a switchboard, etc Any data published in the device MIB can be read and interpreted by Systems Management, though the manufacturers guide will determine which information can be of use. Similarly, it is important to know the units of measurement used in the published data and to be aware of the thresholds that determine whether a device is in danger of imminent failure and requires intervention from the maintenance department. It is important that the device is always on and that it belongs to the family of Windows operating systems, as the other platforms supported by Systems Management don t allow SNMP monitor functions. i It is advisable to designate one or more Windows servers as SNMP Monitors and check that communication through UDP port 161 between the SNMP Monitor and the monitored device is correct. Once the computer is selected, the installed Agent has to be configured with the devices to monitor and the conditions that will prompt Alerts and Tickets. Preparing the devices to monitor: Practically all devices connected to a network can be monitored via SNMP. To do this it is usually necessary to enable this protocol in the device settings and make a note of the Community it belongs to (usually Public by default). What steps are required to configure SNMP monitoring? Follow the steps below: Designate a device as a SNMP monitor in the Systems Management console: In some devices it will also be necessary to configure the SNMP protocol version to be used (v1/v2) and the IP address from which the device will receive SNMP requests. In this case the IP address will be the device designated as Systems Management Monitor.

25 5. Devices It is important to collect and keep this data as they will be required later when configuring the service. Once SNMP is enabled in the device to monitor, establish the OIDs that need to be monitored. SNMP-compatible devices periodically dump internal status data in the MIB structure. It will be necessary to consult the manufacturer s documentation to see which OID nodes of the MIB structure contain useful information and make a note of them. It is also possible to obtain these OID nodes by browsing the MIB structure with Mibble or similar. Configuring the Agent designated as the SNMP monitor: To access the SNMP settings, connect to the Agent designated as SNMP Monitor and click the icon indicated in the image below: The parameters to configure are: Device Name: Field identifying the device. IP Address: IP address of the monitored device. SNMP version: Version of the protocol used. Community: Community to which the SNMP device belongs. Once the monitor is configured and the changes are saved, you can start to define the SNMP Alerts. An SNMP Alert comprises a field of the MIB of the monitored device, a reference value that you can define, and a comparison criteria. To add an alert to an existing SNMP Monitor, click Add and complete the fields: OID: String of numbers separated by dots which is obtained from the manufacturer s MIB and identifies the monitored object. Description: Text describing the OID. Description (alert): Text describing the comparison criteria. Operator (alert): Comparison criteria to apply to the Value field to identify an alert situation. Value (alert): OID limit or reference value. Once all the fields are completed, click Save and after 60 seconds, or by clicking Refresh, the monitor will begin to operate. If the icon does not appear, check the connection to the Agent designated as SNMP Monitor in the Console and move the panel separator to the right in the Agent. From this screen you can configure SNMP Monitors and SNMP Alerts. Each SNMP Monitor controls one or more values on a single device, so it will be necessary to configure as many SNMP Monitors as there are devices to monitor on the network. When the Agent designated as SNMP Monitor begins to receive information from the SNMP devices, its status switches to Receiving responses and the Value field of each alert changes to green or red depending on whether the alert condition has been met or not. Every 60 seconds the agent launches an SNMP query to the IP, OID and Community items designated in each SNMP alert, collecting the value published in the MIB OID of the device. Using the criteria in the Operator field, this value is compared against the reference Value. If the comparison is successful, the Agent sends the data to the Server so there will be an alert in the Monitor tab and a Ticket with the collected values.

26 5. Devices Specific factors for monitoring devices via SNMP Even if devices are not approved, they will still be included in the inventory processes and it will be possible to access them via remote desktop. Unlike printer-type devices or those supported directly by the Agent, SNMP-managed devices are not integrated in the Console and therefore do not have visibility and cannot be grouped in Groups or Filters or managed using normal procedures (Audits, Monitors, Reports, etc.). In forthcoming versions there will be greater integration in order to offer the same functions as devices managed directly with the Agent. That s why the configuration of all settings for SNMP monitoring is carried out through the Systems Management Agent designated as the SNMP Monitor. Devices managed with the procedure described in this section do not consume licenses.!! Non-approved devices will still use up licenses. Non-approved devices will not receive Jobs nor deployed components. APPROVING DEVICES Service administrators can also ask for manual approval of devices when integrating a new one with the recently installed Agent. This process may be necessary to monitor which devices are added to the service, particularly in environments where the Agent is freely accessed from within the company (mapped drive or shared resource). To configure manual approval of devices go to the General menu, Account, Settings. When a device is waiting approval a message will appear in the corresponding Profile s list of devices. CONFIGURING A CONNECTION BROKER A Connection Broker is a Windows device with an Agent installed and which is responsible for performing a series of additional tasks aimed at minimizing traffic on clients networks, as well as supporting connectivity of the remote desktop on neighboring devices. By default on each network segment there will be an Agent that automatically takes the role of Connection Broker. It will be responsible for maintaining centralized communication with the Server and the administered devices in order to minimize bandwidth consumption. The Connection Broker also discovers devices on the same network segment, even if they are devices without an Agent installed, printers, routers or others. Once manual approval of devices is activated, they will appear under the Approve Devices option as the Agents are installed on the computers. The administrator will then be able to approve the devices to be included in the service. If you have problems starting a remote desktop session on a network segment, restart the computer acting as the Connection Broker and try again.

27 5. Devices Assigning the role of Connection Broker to a device Even though promoting a device to Connection Broker is an automatic process performed on the basis of the characteristics of each device (the time it is switched on, available bandwidth, CPU power, etc.), in some cases it may be advisable to promote a specific network device manually. Make sure you assign the role of Connection Broker to a server-type device on each network segment, to ensure it has sufficient resources and it is always in service.. Other Connection Broker Parameters If you want to change the Connection Broker settings, from the General menu, Account, Settings you can set the connection parameters:! With the exception of NetAssets Subnet Limit these parameters should only be altered with the express permission of the Panda Security Support dept. Any modification could result in the loss of connection with the Agents.. To do this, go to the settings of the Agent that you want to act as Connection Broker, right-click and select Settings, Preferences. Disabling the use of Connection Brokers Given that when an Agent is promoted to a Connection Broker it requires resources on the device CPU and on the client s local network which may not be available, it is possible to completely disable this feature from the General menu, Account, Settings in Custom Agent Settings or from Profile, Settings if you only want to disable this feature for a specific Profile.. Field Control Channel Address Control Channel Port1: Control Channel Port2 Web Service Address: Tunnel Server Address:: NetAssets Subnet Limit Description Use restricted to the Panda Security Support Dept. Use restricted to the Panda Security Support Dept Use restricted to the Panda Security Support Dept Use restricted to the Panda Security Support Dept Use restricted to the Panda Security Support Dept Restricts the device scanning range of the Connection Broker to the specified number ( ) within a network segment.

panda cloud systems management

panda cloud systems management panda cloud systems management Partners and Network Managers Guide www.pandasecurity.com PROLOGUE Audience. Icons. 03 introduction Main features of Panda Cloud Systems Management. Panda Cloud Systems Management

More information

panda cloud systems management

panda cloud systems management panda cloud systems management Partners and Network Managers Guide www.pandasecurity.com PROLOGUE Audience. Icons. introduction Main features of Panda Cloud Systems Management. Panda Cloud Systems Management

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

The day-to-day of the IT department. What is Panda Cloud Systems Management? Benefits of Panda Cloud Systems Management

The day-to-day of the IT department. What is Panda Cloud Systems Management? Benefits of Panda Cloud Systems Management 1 INDEX The day-to-day of the IT department What is Panda Cloud Systems Management? 'The virtuous circle' Benefits of Panda Cloud Systems Management Necessary resources and infrastructure 2 The day-to-day

More information

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Trend Micro KASEYA INTEGRATION GUIDE

Trend Micro KASEYA INTEGRATION GUIDE Trend Micro KASEYA INTEGRATION GUIDE INTRODUCTION Trend Micro Worry-Free Business Security Services is a server-free security solution that provides protection anytime and anywhere for your business data.

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

Sophos Mobile Control Administrator guide. Product version: 3.6

Sophos Mobile Control Administrator guide. Product version: 3.6 Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

ManageEngine Desktop Central. Mobile Device Management User Guide

ManageEngine Desktop Central. Mobile Device Management User Guide ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Installation Guide. Live Maps 7.4 for System Center 2012

Installation Guide. Live Maps 7.4 for System Center 2012 Installation Guide Live Maps 7.4 for System Center 2012 1 Introduction... 4 1.1 1.2 About This Guide... 4 Supported Products... 4 1.3 1.4 Related Documents... 4 Understanding Live Maps... 4 1.5 Upgrade

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

Providing Patch Management With N-central. Version 7.2

Providing Patch Management With N-central. Version 7.2 Providing Patch Management With N-central Version 7.2 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

Propalms TSE Deployment Guide

Propalms TSE Deployment Guide Propalms TSE Deployment Guide Version 7.0 Propalms Ltd. Published October 2013 Overview This guide provides instructions for deploying Propalms TSE in a production environment running Windows Server 2003,

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

User's Manual. Intego Remote Management Console User's Manual Page 1

User's Manual. Intego Remote Management Console User's Manual Page 1 User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written

More information

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration

More information

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9) Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Getting Started Guide: Getting the most out of your Windows Intune cloud

Getting Started Guide: Getting the most out of your Windows Intune cloud Getting Started Guide: Getting the most out of your Windows Intune cloud service Contents Overview... 3 Which Configuration is Right for You?... 3 To Sign up or Sign in?... 4 Getting Started with the Windows

More information

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection

More information

Actualtests.C2010-508.40 questions

Actualtests.C2010-508.40 questions Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual

2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: info@2x.com Information in this document

More information

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014

Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014 Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products

More information

LEVEL PLATFORMS INTEGRATION GUIDE

LEVEL PLATFORMS INTEGRATION GUIDE LEVEL PLATFORMS INTEGRATION GUIDE Trend Micro LEVEL PLATFORMS INTEGRATION GUIDE Introduction Trend Micro Worry-Free Business Security Services is a server-free security solution that provides protection

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

LogMeIn Hamachi. Getting Started Guide

LogMeIn Hamachi. Getting Started Guide LogMeIn Hamachi Getting Started Guide Contents What Is LogMeIn Hamachi?...3 Who Should Use LogMeIn Hamachi?...3 The LogMeIn Hamachi Client...4 About the Relationship Between the Client and Your LogMeIn

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Online Help StruxureWare Data Center Expert

Online Help StruxureWare Data Center Expert Online Help StruxureWare Data Center Expert Version 7.2.1 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.

More information

AV Management Dashboard

AV Management Dashboard LabTech AV Management Dashboard AV MANAGEMENT DASHBOARD... 1 Overview... 1 Requirements... 1 Dashboard Overview... 2 Clients/Groups... 2 Offline AV Agents... 3 Threats... 3 AV Product... 4 Sync Agent Data

More information

Novell ZENworks Asset Management

Novell ZENworks Asset Management Novell ZENworks Asset Management Administrative Best Practices and Troubleshooting www.novell.com APRIL 19, 2005 2 GETTING THE MOST OUT OF NOVELL ZENWORKS ASSET MANAGEMENT The award-winning asset tracking

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Providing Patch Management With N-central. Version 7.1

Providing Patch Management With N-central. Version 7.1 Providing Patch Management With N-central Version 7.1 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central

More information

HP Server Management Packs for Microsoft System Center Essentials User Guide

HP Server Management Packs for Microsoft System Center Essentials User Guide HP Server Management Packs for Microsoft System Center Essentials User Guide Part Number 460344-001 September 2007 (First Edition) Copyright 2007 Hewlett-Packard Development Company, L.P. The information

More information

Network Monitoring with SNMP

Network Monitoring with SNMP Network Monitoring with SNMP This paper describes how SNMP is used in WhatsUp- Professional and provides specific examples on how to configure performance, active, and passive monitors. Introduction SNMP

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information