User Management Guide

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "User Management Guide"

Transcription

1 AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide

2 USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat Exchange, AlienVault OTX Reputation Monitor, AlienVault OTX Reputation Monitor Alert, AlienVault OSSIM, and OSSIM are trademarks or service marks of AlienVault, Inc. All other registered trademarks, trademarks or service marks are the property of their respective owners. Revision to This Document Date July 10, 2015 October 20, 2015 Revision Description Original document. Added a note to clarify that the USM allows local authentication and LDAP authentication to co-exist. Modified the screens related to users: new user, modify a user, duplicate selected user and my profile. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 2 of 28

3 Introduction Contents Introduction... 4 About User Management... 4 User Authentication... 4 User Authorization and RBAC... 4 User Accounting... 4 User Management in USM... 4 Creating the Default Admin User... 5 Functions for Admin Users... 6 Configuring User Authentication... 6 Configuring User Authorization Managing Users Monitoring User Activities Functions for All Users Viewing User Settings Modifying a User October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 3 of 28

4 Introduction Introduction Use this document to understand the user management process in AlienVault Unified Security Management (USM) TM. User management in AlienVault USM is a process of controlling access to the system, enforcing administrative policies, and providing information about who accessed the system and what actions they performed in the system. User management is provided by the user authentication, authorization, and accounting (AAA) framework. The document first describes what user management is and why it is important. The document then describes how to implement user authentication, authorization, and role-based access control, and how to monitor user activity. About User Management User Authentication Since AlienVault USM manages important security functions for your organization, the system requires that all users log in with a username and password. The system can store and manage usernames and passwords internally. You can also set up USM to use a remote authentication server to store usernames and passwords. User Authorization and RBAC User authorization determines which portions of AlienVault USM are available to each user. You can assign permissions to access different parts of the AlienVault USM system. Permissions are defined locally on the USM system per user, even if authentication is performed against a remote authentication server. Role-based access control (RBAC) enables delegation of certain functions to specific roles. You can assign users to specific roles, which then determine which features of AlienVault USM a user can access. For example, you might permit an engineer to access all portions of the USM web interface, while you might restrict a security operator to access only the parts of the USM web interface that are used to perform security analysis. User Accounting AlienVault USM collects information on how long a user has been logged into the system and what the user has done. AlienVault USM supports user accounting by logging user activity in the USM web interface. The stored data might be required for auditing or compliance purposes. User Management in USM In the USM system, there are four types of users: October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 4 of 28

5 Root user. The root user is created during USM installation and is used to access the command line shell of the system. A root user can perform all operations in the command line shell and is equivalent to general Linux root users. Default admin user. The default admin user is created when you access the USM web interface for the first time. The username of this user is admin, and it cannot be changed. This is the only admin user whose password can be reset by the root user. The default admin user can create other user accounts and it has complete visibility in the USM system. Admin users. Admin users have complete visibility into the USM web interface and can delegate admin access to other users. Admin users can also configure global authentication settings, such as integration with LDAP database, or change the password policy. They also have complete visibility into the activity of all other users. Normal users. Normal users can access the web interface of the system and have user accounts delegated by admin users. These users are subject to user authorization as defined by authorization parameters. They cannot create other user accounts or change global authentication settings. Normal users can see only the activity of other users who belong to the same entity. Creating the Default Admin User After installation and when connecting to the appliance using the USM web interface for the first time, you are prompted to create the default admin user. When creating the default admin user, you have to provide the following information: Full Name: Full name of the default admin user. Username: Username that is required to access the USM web interface. The username is set to admin and cannot be changed. Password: Credentials that are used to authenticate the user. address of the default admin user. It is used to send notifications, reports, and other system communication to the user. Company Name: Name of the default admin user s company. This parameter is optional. Location: Physical location of the default admin user. This parameter is optional. Note: The option "Send anonymous usage statistics and system data to AlienVault to improve USM" is introduced in version 5.0. It is selected by default, which means telemetry collection will be enabled. See What Is Telemetry Collection And How Does It Work. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 5 of 28

6 Figure 1. Creating default admin user account Once the admin user is created, you can log into the system and start using AlienVault. Functions for Admin Users This section describes the user management functions that an admin user can perform: Configuring User Authentication Configuring Local Authentication Configuring LDAP Authentication Configuring User Authorization Configuring User Authorization with Visibility Configuring User Authorization with Menu Templates Configuring User Authentication Authentication of users that are accessing the USM can generally be done using either the local database or Lightweight Directory Access Protocol (LDAP): Local database: The system authenticates a user against the password stored in the local database, which resides on the AlienVault USM system. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 6 of 28

7 LDAP: The system authenticates a user against the password stored in an LDAP database, such as Microsoft Active Directory. LDAP authentication allows users to use their standard domain or corporate credentials to authenticate with AlienVault USM. This can provide simpler user management in larger environments. For example, if a user leaves the organization, you only need to disable the user s account in the LDAP directory in order to prevent the user from accessing the USM system. Note: The USM allows local authentication and LDAP authentication to co-exist. Configuring Local Authentication When configuring local authentication, you have to define users with their usernames and passwords in the local database as described in Managing Users. AlienVault USM has a password policy area that allows you to establish password requirements when local authentication is used. To change the password policy, navigate to Configuration > Administration > Main and expand the Password Policy section. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 7 of 28

8 Figure 2. Changing password policy Password policy allows you to change the following parameters: Minimum password length: Minimum number of characters for a password. Set to 7 by default. Maximum password length: Maximum number of characters for a password. Set to 32 by default. Password history: Enables the system to remember a specified number of previously used passwords in order to prevent the user from reusing them. The value 0 disables password history. By default, password history is disabled. Complexity: Requires the presence of 3 of these characters: lowercase, uppercase, numbers, or special characters. Disabled by default. Minimum password lifetime in minutes: Specifies time before a user can again change a recently changed password. This option prevents users from quickly changing a new password to the previously expired password. The value 0 disables minimum lifetime. By default, minimum lifetime is disabled. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 8 of 28

9 Maximum password lifetime in days: Specifies the time before a user is asked to change current password. The value 0 disables maximum lifetime. By default, maximum lifetime is disabled. Failed logon attempts: Specifies the number of failed logon attempts before the system locks an account. Set to 5 attempts by default. Account lockout duration: Specifies the duration of a locked account. Set to 5 minutes by default. The value 0 disables lockout. After you make changes to the password policy, make sure to save the changes by clicking Update Configuration. Configuring LDAP Authentication In order to use external authentication against an LDAP database, you have to first create a service account in the LDAP database for AlienVault USM to query the database. Figure 3. Creating Microsoft Active Directory user account For Microsoft Active Directory, the service account is configured as a regular user account. A regular user account in Microsoft Active Directory is created in two steps. In the first step, you have to assign a meaningful name and user logon name. In the second step, you set a logon password for the user. You should set the password not to expire and not to request a password change at next logon. After creating the service account in Microsoft Active Directory, you have to modify the configuration in AlienVault USM. By default, users are authenticated via username and password. These are stored in the AlienVault USM database after they have been created. You have to change this configuration in order to use LDAP authentication. To integrate AlienVault USM with a LDAP database 1. Login to the USM web interface. 2. Navigate to Configuration > Administration > Main. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 9 of 28

10 3. Expand the Login Methods/Options section, and enter the following parameters: Set Enable LDAP for login to Yes. For LDAP server address, specify the IP address of the LDAP server. For LDAP server port for unencrypted LDAP, specify 389. Enter 636 if you use SSL. Set the LDAP server SSL to No, unless you use LDAP over SSL. Set the LDAP server TLS to No, unless you use LDAP over TLS. The LDAP server basedn needs to be the LDAP server base distinguished name (DN) in the form of dc=domain,dc=suffix. For LDAP server filter for LDAP users, use (&(cn=%u)( objectclass=account)) for general LDAP, or (&(samaccountname=%u)(objectcategory=person)) for Microsoft Active Directory. For LDAP Username you need to specify the User Principal Name (UPN) of the user you have created in the LDAP database in the following format: For LDAP password for Username specify the password for the account that has been entered in the previous line. Set Require a valid ossim user for login to Yes if you need to control user authorization. This setting requires that you create a user account in the local database with the same login name as the user in the LDAP database. The local username is used to determine user permissions, such as assigning menu templates and entities. A password will be set for the local account during creation. But once LDAP is set up, the local password will not be used for authentication any longer. Set this setting to No if you do not want to create user accounts for authorization. In this case, you have to select a default entity from the Entity for new user drop-down menu and a default menu template from the Menus for new user drop-down menu. The default entity and menu template will then be assigned to users that are authenticated against the LDAP database. 4. Click Update Configuration to save the changes. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 10 of 28

11 Figure 4. Integrating AlienVault USM with LDAP Configuring User Authorization You can configure user authorization in AlienVault USM by assigning different parameters to a user account that is created in the local user database. The parameters that influence what a user can access in AlienVault USM system are as follows: Visibility. Use this option to associate a user with entities within the structure tree. Allowed assets. This option lets you choose which assets the user should see. Menu templates. This option authorizes access to different parts of the web interface. Note: Associating users with authorization parameters will be explained in the Managing Users section of the document Configuring User Authorization with Visibility The first way to configure user authorization is to limit a user s visibility of assets and events to an entity. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 11 of 28

12 Entities are used to group assets and sensors from similar functional areas of an organization, so that you can treat them differently, because assignment of an entity limits visibility of events and assets in the web interface. For example, each department within a company can be a different entity, as they have different assets and you may not want them to see each other s assets. By separating them into different entities, you can limit the users to only see their department s assets and the events associated with those assets. If you re using local authentication and authorization, you can assign an entity to an individual user in the AlienVault USM local database. If you re using LDAP authentication without a local user, the system uses a default entity. Important: The visibility configuration does not apply to Availability Monitoring, HIDS, Wireless IDS, or Vulnerability Scans. This is because these functional areas are tied to each USM Sensor. You cannot limit their visibility to a subset of assets. You can create, modify, and delete correlation contexts and entities. Navigate to Configuration > Administration > Users > Structure to create an entity. Figure 5. Entities and assets structure tree The upper part of the screen includes the following options: New Entity: Allows you to create a new entity. New Correlation Context: Allows you to create a new correlation context. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 12 of 28

13 Show Users: Toggles the display of users in the entities and asset structure. Show AlienVault Components: Toggles the display of AlienVault components in the entities and asset structure. The lower part of the screes is divided into two columns. The left one contains an asset structure tree, which displays assets, asset groups, networks, and network groups. Assets are organized into entities and correlation contexts. By default, you will find one correlation context named My Company that contains all assets and networks. There are no entities by default. The right column displays the inventory of all assets. They are organized by properties, such as operating system, role, and department. To create a new entity 1. Click New Entity. Figure 6. Creating a new entity 2. Specify the name of the entity in the Name input field. 3. Optionally, specify the address of the entity in the Address input field. 4. Select a parent correlation context or an entity from the Parent drop-down menu. 5. Select the time zone from the Timezone drop-down menu. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 13 of 28

14 6. Associate assets or networks with the entity by selecting assets or networks from the asset tree. Once you have added the assets, you can remove them by selecting an asset and clicking the [X] button. You can also remove all assets by clicking Remove All Assets. 7. Associate USM Sensor with the entity by selecting a sensor from the Sensor list tree. Once you have added the sensors, you can remove them by selecting a sensor and clicking the [X] button. You can also remove all sensors by clicking Remove All Sensors. 8. Click Save to save the changes. Configuring User Authorization with Menu Templates The second way to configure user authorization is by using menu templates, which limit availability of the web interface to users. A menu template is a reusable object that specifies which parts of the web interface are displayed to users. If you use local authentication and authorization, you can assign a template to an individual user in the AlienVault USM local database. If you use LDAP authentication without a local user, the system uses a default template. You can create a new template, edit an existing one, or delete a template. Navigate to Configuration > Administration > Users > Templates in order to work with templates. Figure 7. Listing the menu templates The Templates section of the configuration screen includes the following fields: Action bar, which includes the buttons New, Modify and Delete Selected, and a drop-down menu which allows a user to configure the number of templates that will be displayed. Name: Refers to the template name. Users Assigned: Displays which users are assigned to an individual template. Sections Allowed: Displays the percentage of sections that the system displays in a template. You can also search for templates by clicking the search icon ( ). October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 14 of 28

15 Figure 8. Searching for a template The system uses one template by default, which allows 100 percent access to the web interface. The name of the template is All Sections. Creating a New Template To create a new template 1. Click New. Figure 9. Creating a new menu template 2. Specify a name for the template. 3. Select the menu sections you want to include in the template by checking the appropriate box to the left of each web interface section. You can use the Select All and Unselect All options to select or unselect all web interface sections at the same time. 4. Click Save Template to save the template or click Cancel to discard the changes. Editing a Template To modify a template 1. Select the template you want to modify by doing one of following: Click on the row of that template and click Modify. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 15 of 28

16 Double-click on the row of that template. Click on the name of that template. 2. Select the menu sections you want to include in the template by checking the appropriate box to the left of each web interface section. You can use the Select / Unselect All options to select or unselect all web interface sections at the same time. 3. If you change the template name, the button Save As will be active. 4. Click Save Template to save the template or click Cancel to discard the changes. Deleting a Template To delete a template, select the template you want to delete by clicking the line of that template and clicking Delete Selected. The system will ask for a confirmation. Managing Users If you are using local user authentication, you have to create user accounts in the local database. You can create, modify, delete, duplicate, or disable user accounts: Creating a New User Modifying a User Deleting a User Duplicating a User Enabling or Disabling a User Viewing User Hierarchy Resetting a Password Navigate to Configuration > Administration > Users to manage users that can access the AlienVault USM web interface. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 16 of 28

17 Figure 10. Managing local users This User information section of the configuration screen includes the following parts: Action bar, which includes the buttons New, Modify, Delete Selected, Duplicate Selected, Multilevel Tree, and a drop-down menu which allows a user to configure the number of users that will be displayed. A list of configured users, which contains the following fields: Table 1. Local users account information Field Login Name Visibility Status Language Creation Date Last Login Date Description Username required to access the AlienVault USM. It refers to the username the user uses to open a session in the system. The real name of that user in the system. The address of the user. It is used to send notifications or reports to the user. The correlation context or entity the user belongs to. User account can be either enabled or disabled. The interface is available in either English or Spanish. Date the user account was created. Last date the user logged into the system. You can also search for templates by clicking the search icon ( user you are searching for. ) and specify the name of the October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 17 of 28

18 Figure 11. Searching for local users Creating a New User To create a new user 1. Click New. 2. Enter a username into User Login field. The user can access the AlienVault USM web interface with this username. 3. Enter the user s real name into the User Name field. 4. Enter the user's into the User field. 5. Select the language of the user interface from the User Language drop-down menu. 6. Select a time zone from the Timezone drop-down menu. 7. Enter your current password in the Enter Your Current Password field. The user needs this password to log into the AlienVault USM system. Figure 12. Creating a new user account 8. Choose a login method for the new user between LDAP and password. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 18 of 28

19 9. Configure the user as a global admin user by selecting the Yes radio button next to Make This User a Global Admin. Leave the setting set to No to configure the user as a normal user. 10. Select a template from the Menu Template drop-down menu to associate this user with a menu template. You can also view a template or create a new template from this window. 11. Select an entity or correlation from the Visibility menu. This option is mandatory and it is used to associate a user with an entity or correlation contexts within the structure tree. 12. Assign assets that will be visible to the user by expanding the Allowed Assets option and selecting assets. This option is not mandatory and it works as a filter within an entity or a correlation context. 13. Click Save to save changes. Note: For global admin users, menu templates, visibility, and allowed assets settings do not apply. You can set them but they have no effect. Modifying a User To modify an existing user account 1. Select the user you want to modify by doing one of the following: Click on the row of that user and click Modify. Double-click on the row of that user. Click on the name of that user. Figure 13. Modifying a user account 2. Change the parameters of the user account as needed, such as a password, for example. Parameters are the same as when creating a user account. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 19 of 28

20 3. Click Save to save changes. Deleting a User To delete an existing user account, select the user you want to delete by clicking the row of that user and click Delete Selected. The system will ask you for a confirmation. Duplicating a User To duplicate an existing user account 1. Select the user account you want to duplicate by clicking the row of that user, and click Duplicate Selected. 2. Change the parameters of the user account as needed. Parameters are the same as when creating a user account. Notice that the system has added _duplicated to the User Login field in order to distinguish the new user from the one that is being duplicated. 3. Click Save to save changes. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 20 of 28

21 Figure 14. Duplicating a user account Enabling or Disabling a User To disable a user account, click the green check mark in the row of the user you would like to disable. Figure 15. Disabling a user account A disabled account is indicated by a red cross. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 21 of 28

22 To re-enable a disabled user account, click the red cross in the row of the user you would like to enable. Figure 16. Enabling a user account Viewing User Hierarchy To see how users are organized into entities and correlation contexts, you can examine user hierarchy by clicking the Multilevel Tree option. Figure 17. Viewing user hierarchy Resetting a Password For any user other than the default admin user, you can reset the user s password by logging into the system as the default admin user. You reset the password by editing the user account as discussed in Modifying a User. If the default admin user forgets his or her password, you have to recover it. You can do this by accessing the AlienVault USM command prompt shell and using the AlienVault Setup menu. To reset the default admin password, complete the following steps 1. Access the AlienVault USM command line shell and log in as root user. In the AlienVault Setup menu, navigate to System Preferences > Change Password > Reset UI Admin Password. A similar menu allows you to change the password of the root user as well. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 22 of 28

23 Figure 18. Changing admin password in the AlienVault Setup menu 2. Press Enter to confirm that you want to reset the admin password. The system will display a new password. 3. Launch the AlienVault USM web interface to log in. 4. Change the password when prompted. Figure 19. Changing admin password when prompted Note: If you forget the root user password and have to reset it, see Recovering Lost Root Password on AlienVault Appliances. Monitoring User Activities AlienVault USM allows you to monitor user activity and actions that are performed by users in the web interface. The system allows you to change general user activity settings and change which actions are being monitored. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 23 of 28

24 Changing User Activity Configuration To change general user activity settings, navigate to Configuration > Administration > Main and expand the User Activity option. Figure 20. Changing user activity logging configuration In the User Activity section, you can change the following settings: Change session timeout by entering a number into the Session Timeout input field. Session timeout specifies how many minutes an AlienVault USM web interface session lasts. By default, session timeout is set to 15 minutes. Change user lifetime by entering a number into the User Life Time input field. This setting specifies the number of days that a user account is active. The value 0 means that the account does not expire. Toggle user activity logging on or off by selecting Yes or No from the Enable User Log drop-down menu. Typically, you will choose Yes. Toggle sending user activity logs to syslog by selecting Yes or No from the Log to syslog drop-down menu. Toggle telemetry collection, which gathers data on how users are using the AlienVault USM system, by selecting Yes or No from the Send anonymous usage statistics and system data to AlienVault to improve USM drop-down menu. Click on Learn More to if you want to know more about this option. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 24 of 28

25 AlienVault USM system by default monitors all activities performed by individual users (if enabled globally). If you do not want to monitor all activity, you can change the user activity configuration. To change the user activity configuration 1. Navigate to Configuration > Administration > Users > Activity. The table that is displayed has two columns. The left column shows the logged actions. The right column shows the actions that are not logged. By default, all actions are in the left column, which means that all actions are logged. Figure 21. Changing user actions logging configuration 2. Pass actions from one side to the other by using drag-and-drop or by using the links [+] or [-] located next to each item. You can pass all items from one side to the other by clicking Remove all or Add all. If you have any items in the column on the right, you can use the search box at the top of that column to search for actions not logged. 3. Click Update Configuration to apply the changes. Monitoring User Activity In order to verify who is logged into the AlienVault USM system, navigate to Settings > Current Sessions. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 25 of 28

26 Figure 22. Monitoring logged in users For each user, you can see the following features: the IP address the user is connecting from, name of the asset in the AlienVault USM inventory the user is connecting from, user agent of the client, session ID, logon time, and elapsed time since last activity. You also have an option to log out a specific user by clicking the door ( ) icon. In order to monitor the activity that was performed by an individual user, navigate to Settings > User Activity. On the upper part of the screen, you can filter displayed activities by selecting Date Range, User, or Action. Click View after you specify filters to see only activities that are related to the search filters. On the lower part of the screen, you see all actions that were performed by users and that match the filters. The default admin user sees activities of all users, while other users see activities of users belonging to the same entity. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 26 of 28

27 Figure 23. Monitoring user actions Functions for All Users This section describes functions that are available to all users. Viewing User Settings Each user in the AlienVault USM system can examine the following information: User profile: Includes basic settings about a user, such as login name, user name, , language, time zone, and password. Each user can change his or her profile as described in the Modifying a User topic. Current sessions: Displays users that are logged into the system. Global admin users (including default admin) can see accounts from all users, while normal users can see only their own account. User activity: displays user activity. Default admin can see activity of all users, while other global admin users and normal users can only see activity of users belonging to the same entity. Note: Refer to Monitoring User Activity about examining current sessions and user activity. Modifying a User Users can change their own settings or user profile. October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 27 of 28

28 To change your user profile 1. Do one of the following: Navigate to Configuration > Administration > User Information, select the row of the user you would like to modify, and click Modify. Alternatively, double-click the row of the user you would like to modify. For normal users, as opposed to global admin users, Modify is the only option. Navigate to Settings > My Profile. 2. Change user settings as desired. Settings are the same as when creating a new user. 3. Click Save to save the settings. Figure 24. Modifying user profile October 20, 2015 USM v4.x-5.x User Management Guide, rev 1 Page 28 of 28

AlienVault Unified Security Management for Government v4.12 & RT Logic CyberC4:Alert v4.12 User Management Guide

AlienVault Unified Security Management for Government v4.12 & RT Logic CyberC4:Alert v4.12 User Management Guide & RT Logic CyberC4:Alert v4.12 Copyright 2016 AlienVault. All rights reserved. DOCUMENT HISTORY AND VERSION CONTROL Edition Date of Issue Description of Change(s) 01 08/01/15 Initial Version AlienVault,

More information

AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard

AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard AlienVault Unified Security Management (USM) 5.1 Running the Getting Started Wizard USM v5.1 Running the Getting Started Wizard, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault

More information

AlienVault. Unified Security Management 5.x Configuring a VPN Environment

AlienVault. Unified Security Management 5.x Configuring a VPN Environment AlienVault Unified Security Management 5.x Configuring a VPN Environment USM 5.x Configuring a VPN Environment, rev. 3 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

AlienVault. Unified Security Management 5.x Configuration Backup and Restore

AlienVault. Unified Security Management 5.x Configuration Backup and Restore AlienVault Unified Security Management 5.x Configuration Backup and Restore USM 5.x Configuration Backup and Restore Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

AlienVault Unified Security Management (USM) 4.15-5.x. Configuring High Availability (HA)

AlienVault Unified Security Management (USM) 4.15-5.x. Configuring High Availability (HA) AlienVault Unified Security Management (USM) 4.15-5.x Configuring High Availability (HA) USM v4.15-5.x Configuring High Availability (HA), rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

Assets, Groups & Networks

Assets, Groups & Networks Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

How to send emails triggered by events

How to send emails triggered by events Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

Strategic Asset Tracking System User Guide

Strategic Asset Tracking System User Guide Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data

More information

account multiple solutions

account multiple solutions Quick Start Guide 1 Our easy to use guide will get you up and running in no time! The guide will assist you with: Generating your Sage Pay login Navigation Creating contacts Creating system users Setting

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without

More information

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Device Integration: Citrix NetScaler

Device Integration: Citrix NetScaler Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Group Management Server User Guide

Group Management Server User Guide Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring

More information

HelpSystems Web Server User Guide

HelpSystems Web Server User Guide HelpSystems Web Server User Guide Copyright Copyright HelpSystems, LLC. Robot is a division of HelpSystems. HelpSystems Web Server, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot

More information

Monitoring VMware ESX Virtual Switches

Monitoring VMware ESX Virtual Switches Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Module 2: AlienVault USM Basic Configuration and Verifying Operations

Module 2: AlienVault USM Basic Configuration and Verifying Operations Course Introduction Module 1: Overview The Course Introduction provides learners with the course objectives and prerequisite learner skills and knowledge. The Course Introduction presents the course flow

More information

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,

More information

LDAP User Guide PowerSchool Premier 5.1 Student Information System

LDAP User Guide PowerSchool Premier 5.1 Student Information System PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011

More information

Chapter 3 Authenticating Users

Chapter 3 Authenticating Users Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

MultiSite Manager. User Guide

MultiSite Manager. User Guide MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.

More information

StarTeam/CaliberRM LDAP QuickStart Manager 2009. Administration Guide

StarTeam/CaliberRM LDAP QuickStart Manager 2009. Administration Guide StarTeam/CaliberRM LDAP QuickStart Manager 2009 Administration Guide Borland Software Corporation 8310 N Capital of Texas Bldg 2, Ste 100 Austin, TX 78731 USA http://www.borland.com Borland Software Corporation

More information

Configuring a VPN Environment in USM v4.x

Configuring a VPN Environment in USM v4.x Complete. Simple. Affordable Copyright 2015 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

End User Configuration

End User Configuration CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.

More information

FileCruiser. VA2600 SR1 Quick Configuration Guide

FileCruiser. VA2600 SR1 Quick Configuration Guide FileCruiser VA2600 SR1 Quick Configuration Guide Contents About this guide 1 Setup FileCruiser 2 Get IP address 2 Login to the Administration Portal 3 Basic configuration with Setup Wizard 4 Step 1: Configure

More information

EMC Smarts Network Configuration Manager

EMC Smarts Network Configuration Manager EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015

More information

AlienVault. Unified Security Management (USM) 4.8-5.x Initial Setup Guide

AlienVault. Unified Security Management (USM) 4.8-5.x Initial Setup Guide AlienVault Unified Security Management (USM) 4.8-5.x Initial Setup Guide Contents USM v4.8-5.x Initial Setup Guide Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault, AlienVault

More information

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

econtrol 3.5 for Active Directory & Exchange Administrator Guide

econtrol 3.5 for Active Directory & Exchange Administrator Guide econtrol 3.5 for Active Directory & Exchange Administrator Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Administrator Guide. This guide is for system administrators and

More information

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7 ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management AT&T Business Messaging Account Management Admin User Guide December 2015 1 Copyright 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein

More information

Enterprise Toolbar User s Guide. Revised March 2015

Enterprise Toolbar User s Guide. Revised March 2015 Revised March 2015 Copyright Notice Trademarks Copyright 2007 DSCI, LLC All rights reserved. Any technical documentation that is made available by DSCI, LLC is proprietary and confidential and is considered

More information

TRITON Unified Security Center Help

TRITON Unified Security Center Help TRITON Unified Security Center Help Websense TRITON Unified Security Center v7.7 2011-2012, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2012 Printed

More information

SonicWALL SSL VPN 3.5: Virtual Assist

SonicWALL SSL VPN 3.5: Virtual Assist SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Using LDAP with Sentry Firmware and Sentry Power Manager (SPM)

Using LDAP with Sentry Firmware and Sentry Power Manager (SPM) Using LDAP with Sentry Firmware and Sentry Power Manager (SPM) Table of Contents Purpose LDAP Requirements Using LDAP with Sentry Firmware (GUI) Initiate a Sentry GUI Session Configuring LDAP for Active

More information

Sample Configuration: Cisco UCS, LDAP and Active Directory

Sample Configuration: Cisco UCS, LDAP and Active Directory First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are

More information

Configuring User Identification via Active Directory

Configuring User Identification via Active Directory Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based

More information

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services

More information

Device Integration: CyberGuard SG565

Device Integration: CyberGuard SG565 Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

Integrating Webalo with LDAP or Active Directory

Integrating Webalo with LDAP or Active Directory Integrating Webalo with LDAP or Active Directory Webalo can be integrated with an external directory to identify valid Webalo users and then authenticate them to the Webalo appliance. Integration with

More information

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the

More information

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009 Application Note AN-10233 June 2009 ShoreTel 9: Active Directory Integration This application note outlines the configuration required to prepare a customer s Microsoft Active Directory environment for

More information

SharePoint AD Information Sync Installation Instruction

SharePoint AD Information Sync Installation Instruction SharePoint AD Information Sync Installation Instruction System Requirements Microsoft Windows SharePoint Services V3 or Microsoft Office SharePoint Server 2007. License management Click the trial link

More information

Enterprise Self-Service Portal FAQ

Enterprise Self-Service Portal FAQ Enterprise Self-Service Portal FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

AlienVault. Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures

AlienVault. Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures AlienVault Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures USM 4.4-5.x Offline Update and Software Restoration Procedures Copyright 2015 AlienVault, Inc. All rights

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

Customer admin guide. UC Management Centre

Customer admin guide. UC Management Centre Customer admin guide UC Management Centre June 2013 Contents 1. Introduction 1.1 Logging into the UC Management Centre 1.2 Language Options 1.3 Navigating Around the UC Management Centre 4 4 5 5 2. Customers

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

NETWRIX ACCOUNT LOCKOUT EXAMINER

NETWRIX ACCOUNT LOCKOUT EXAMINER NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

LDAP Directory Integration with Cisco Unity Connection

LDAP Directory Integration with Cisco Unity Connection CHAPTER 6 LDAP Directory Integration with Cisco Unity Connection The Lightweight Directory Access Protocol (LDAP) provides applications like Cisco Unity Connection with a standard method for accessing

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Active Directory integration with CloudByte ElastiStor

Active Directory integration with CloudByte ElastiStor Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level

More information

System Administration and Log Management

System Administration and Log Management CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,

More information

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these

More information

HP Device Manager 4.7

HP Device Manager 4.7 Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Broker Portal Tutorial Broker Portal Basics

Broker Portal Tutorial Broker Portal Basics Broker Portal Tutorial Broker Portal Basics Create Agent Connect Link Forgotten Password Change Your Broker Portal Password Delegate View Application Status Create Agent Connect Link Log in to your Producer

More information

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc. Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,

More information

Managing users. Account sources. Chapter 1

Managing users. Account sources. Chapter 1 Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright

More information

Polycom RealPresence Resource Manager System Getting Started Guide

Polycom RealPresence Resource Manager System Getting Started Guide [Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks

More information

eopf Release E Administrator Training Manual

eopf Release E Administrator Training Manual eopf Release E Administrator Training Manual i The United States Office Of Personnel Management eopf Administrator Training Manual for eopf v5 eopf Version 4.1, July 2007, March 2008, March 2009; eopf

More information

Nexxis User Management

Nexxis User Management User Manual Version 5.0 Nexxis User Management Nexxis User Management v5.0 User Manual Copyright 2011 Labtronics Inc. Printed in Canada. Windows is a registered trademark of Microsoft Corporation. Microsoft

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Configuring User Authentication...

More information

NeoMail Guide. Neotel (Pty) Ltd

NeoMail Guide. Neotel (Pty) Ltd NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.

More information

Evaluator s Guide. PC-Duo Enterprise HelpDesk v5.0. Copyright 2006 Vector Networks Ltd and MetaQuest Software Inc. All rights reserved.

Evaluator s Guide. PC-Duo Enterprise HelpDesk v5.0. Copyright 2006 Vector Networks Ltd and MetaQuest Software Inc. All rights reserved. Evaluator s Guide PC-Duo Enterprise HelpDesk v5.0 Copyright 2006 Vector Networks Ltd and MetaQuest Software Inc. All rights reserved. All third-party trademarks are the property of their respective owners.

More information

Corporate Telephony Toolbar User Guide

Corporate Telephony Toolbar User Guide Corporate Telephony Toolbar User Guide 1 Table of Contents 1 Introduction...6 1.1 About Corporate Telephony Toolbar... 6 1.2 About This Guide... 6 1.3 Accessing The Toolbar... 6 1.4 First Time Login...

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410

800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410 800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment

More information

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration Module 1: Overview This module provides an overview of the AlienVault Unified Security Management (USM) solution. Upon completing this module, you will meet these objectives: Describe the goal of network

More information

Getting Started With Scholastic Achievement Manager

Getting Started With Scholastic Achievement Manager Getting Started With Scholastic Achievement Manager For use with Scholastic Achievement Manager version 2.3.1 or later Copyright 2014 by Scholastic Inc. All rights reserved. Published by Scholastic Inc.

More information

Document OwnCloud Collaboration Server (DOCS) User Manual. How to Access Document Storage

Document OwnCloud Collaboration Server (DOCS) User Manual. How to Access Document Storage Document OwnCloud Collaboration Server (DOCS) User Manual How to Access Document Storage You can connect to your Document OwnCloud Collaboration Server (DOCS) using any web browser. Server can be accessed

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information