QualysGuard Asset Management

Size: px
Start display at page:

Download "QualysGuard Asset Management"

Transcription

1 QualysGuard Asset Management Quick Start Guide January 28, 2014 Dynamic Asset Tagging provides a flexible and scalable way to automatically discover and organize the assets in your environment and make them available for scanning, reporting and ticketing within QualysGuard. The Asset Management application allows you to easily manage your assets using dynamic asset tagging capabilities: Support for multiple hierarchies (by OS, region, line of business, etc.) Custom attributes such as location, business function, owner Dynamic tags automatically assigned based on any detectable attribute Synchronizes your scans and reports with your dynamic business environment By creating Amazon EC2 Asset Data Connectors within the Asset Management application, QualysGuard will continuously import and synchronize your Amazon EC2 and VPC virtual machine Instance inventories into your QualysGuard asset database. See Amazon EC2 Asset Inventory and Scanning. Requirements: The Asset Management application and Dynamic Asset Tagging MUST be enabled for your subscription. Please contact your Technical Account representative or Support representative for assistance. It will take 24 to 48 hours for the Qualys support team to enable this for your account. First Steps Opt in to New Data Security Model A user with the Manager role needs to opt in to the New Data Security Model by going to Users > Setup > Security. After opting in, users will see the Asset Management application in the application picker. (If not, Asset Management has not be added to your subscription yet; please contact Support or your Account Manager). Be sure to scan assets in your account so tags can be assigned to them. Copyright by Qualys, Inc. All Rights Reserved. 1

2 Go to Asset Management Select the Asset Management application. Your Assets Click the Assets tab to view the assets in your account. Your assets list may include a combination of IP addresses, web applications and malware detection sites. Is your assets list empty? A Manager user must opt in to the New Data Security Model. If this is not done you ll notice there aren t any IP addresses in the list. Go to VM > Users > Setup > Security to check this setting and opt in for your subscription (or ask a Manager to do it). Are your IP addresses missing? You (or another user) needs to run scans using the VM application before your IP addresses will appear within the Asset Management application. If you have IP addresses listed under VM > Assets > Host Assets and the IPs are not listed in Asset Management, you should run vulnerability scan(s) of your hosts. Your Tags Click the tag tree icon to display the "Assign tags" list, which displays all the tags currently in your subscription. To display child tags, click the triangle to the left of a parent tag. Tags You Start With We create some initial tags based on the existing objects (configurations) in your account. The tags you start with are not assigned to assets. You can assign these tags to assets manually, and you can also edit the tags to create tagging rules for them. QualysGuard Asset Management Quick Start Guide 2

3 Business Units. We create a Business Units tag and a sub-tag Unassigned Business Unit. For each custom business unit, we create a sub-tag with the business unit's name. For example, if your custom business units are called EU and US, you'll have a tag called Business Units, which will have sub-tags called Unassigned Business Unit, EU and US. Scanned assets in your custom business units will automatically be assigned their business unit tags. Asset Groups. We create an Asset Groups tag and a sub-tag for each of the asset groups defined in your subscription. For example, if you have asset groups called Unix and Windows, you'll have a tag called Asset Groups, which will have sub-tags called Unix and Windows. Scanned assets in your asset groups will automatically be assigned their asset group tags. Powerful Search Capabilities You can always find the assets you're looking for using the search and filter features of the assets list. You ll be searching the assets in your account and the most recent scan data for them. In the field provided use natural syntax to enter search criteria. Examples: "Firefox Excel" finds assets with both Firefox and Excel installed. "Firefox -Excel" finds assets with Firefox installed but excludes those with Excel installed ("-" makes the term an exclusion). "80" Finds assets with port 80 open, or with "80" in their IP address or in their DNS name. Click above search assets field to display the filters. Filters represent field-level information saved in your account as part of the auto scan data (latest host scan results). Filters include tags, attributes, operating system, tracking method and open ports (multiple entries are comma separated). The assets list changes dynamically as you specify filters. QualysGuard Asset Management Quick Start Guide 3

4 View Asset Details Mouse over an asset row and select View host details from the Quick Actions menu. Click the tabs on the left to view the host details: Asset Summary, Open Ports, Installed Software and Vulnerabilities. Add a Tag to an Asset Adding tags to assets enables you to control user access to those assets. When an asset is assigned one or more tags, users with any of those tags in their assigned scopes can access that asset. You can add tags to assets manually in the assets list or automatically by defining tagging rules. Add tags manually by either of these methods: Locate the asset you want to tag, select a tag in the tag tree and then drag and drop the tag onto the asset. Locate the asset you want to tag and click in that asset's row. In the Add tags pop-up type a tag name in the "Search for tag" field. Matching tags appear as you type. Click the tag you want to add to the asset and then click the Add tag button. QualysGuard Asset Management Quick Start Guide 4

5 Find Assets Associated with a Tag To find assets associated with a specific tag, hover over the tag on the Tags tab and select Find assets from the Quick Actions menu. The assets list appears and displays only the assets with the selected tag. If you click above the assets list, you ll see the tags filter. Click to display the complete assets list. QualysGuard Asset Management Quick Start Guide 5

6 Create Tags Click the Tags tab and then click the Create tag button. The Tag Creation wizard appears. Enter a name for the tag. You have the option to select a color. Colors can be useful for grouping tags with something in common, such as an asset group or business unit. If the tag you re creating a sub-tag, select the parent tag. Static and Dynamic Tags Static. A static tag can be manually assigned to assets in your account. To create the tag as a static tag, just click Continue twice and then click Finish. (Static tags do not have tag rules.) Dynamic. A dynamic tag is automatically assigned to scanned assets in your account according to its tag rule. To create the tag as a dynamic tag, click Continue and define a tag rule. QualysGuard Asset Management Quick Start Guide 6

7 When you define a dynamic tag, you have multiple rule engines to choose from. For example, you may define a rule for tagging hosts that have a specific operating system or a particular software application and version installed. For this example we've selected Operating System Regular Expression. In the Rule Text field, enter a regular expression (Perl format) to identify the operating system to be tagged. In our example we're creating a dynamic tag for assets with a Windows OS. Test Rule Applicability on Selected Assets. (optional) Select assets in your account to test the rule using the Add Asset drop-down menu. The result for each selected asset appears below the Add Asset drop down menu. A check mark indicates a selected asset matches the rule. A red indicates a selected asset does not match the rule. When you click Save, we automatically add the new tag to all scanned assets in your account that match the tag rule. Filter the Assets List. Another way to find the assets for a given tag is to use filters. On the Assets tab, click. Under Tags, select your new tag. The assets list is filtered to show only the assets your new tag has been added to. QualysGuard Asset Management Quick Start Guide 7

8 More Ways to Create Tags You can create a tag based on search criteria you enter. The tag will be created with a rule based on your search criteria. Click the Assets tab, type your search text in the field provided and then click the "Search assets" button. The assets list will display only assets that match your search string. Click and enter a name for the tag. You can create a tag based on asset filters. Click the Assets tab and click to display the filtering options. Define your filters and then click enter a name for the tag. above the assets list. When prompted QualysGuard Asset Management Quick Start Guide 8

9 Create Tags Using VM An easy way to create tags with tagging rules for automatic assignment to assets is through the Asset Search Portal in the VM application. Go to VM > Assets > Asset Search. Specify the host attributes you want to search for and then click Create Tag. When prompted enter a name for the tag and click OK. We create the tag with a tag rule based on your search criteria. Within the Asset Management application, the new tag appears in your tag tree as a sub-tag of the "Asset Search Tags" parent tag. The new tag is automatically added to all scanned assets in your account that match your search criteria. On the Tags tab, hover over the new tag s row and select Find assets from the Quick Actions menu. The assets list is filtered to display only assets that match the new tag. QualysGuard Asset Management Quick Start Guide 9

10 Using Tags to Launch a Scan You have the option to select tags when choosing the hosts to scans. We resolve the tags to host assets at scan time. Only hosts in your account will be scanned. Go to VM > Scans > Scans and select New > Scan. Under Choose Target Hosts from, select Tags and then add tags to identify hosts for the scan. Note: When "Use IP Network Range tags" is selected, only tags with IP address rule defined are shown for selection. In the Include hosts section, click Add Tag to select tags. Select "All" to include hosts that match all of the tags selected. Select "Any" to include hosts that match at least one of the tags. For example, let's say you've selected tags US-West Coast, Windows XP and Port80. If you pick All, only hosts that have all three tags will be included. If you pick Any, hosts that have at least one of the tags will be included. Add tags to the "Do not include" section. For example, you might include a tag called US-West Coast and exclude the tag California. Any host that has the California tag will be excluded from the scan even if it also has the US-West Coast tag. QualysGuard Asset Management Quick Start Guide 10

11 Using Tags to Schedule a Scan Go to VM > Scans > Schedules and select New > Schedule Scan. Under Target Hosts, select Tags and then add tags to identify hosts to include in the scan and to exclude from the scan. See Using Tags to Launch a Scan above for information about tag selection. Using Tags to Run a Report Many reports now allow asset tag selection to specify report source, including VM reports (except the Map Report) and template based PC reports. Two scorecard reports, the Most Prevalent Vulnerabilities Report and the Most Vulnerable Hosts Report, also allow asset tag selection. Go to VM > Reports > Reports. Select New > Scan Report > Template Based. For Report Source, add tags to identify hosts to include in the report and to exclude from the report. See Using Tags to Launch a Scan above for information about tag selection. QualysGuard Asset Management Quick Start Guide 11

12 The Summary section of the finished report displays the names of the tags used to specify the report source. Amazon EC2 Asset Inventory and Scanning Here s the high level steps for getting started with the Amazon EC2 Pre-Authorized Scanning solution from Qualys, Inc. What are the requirements? The EC2 Scanning feature must be enabled for your account. Please contact your Technical Account Manager or Support if you would like have this feature turned on in your account. You'll need to be a Manager user with full rights. Step 1: Configure and activate a virtual scanner Configure a virtual scanner using Amazon EC2/VPC. If you haven't already done this, log into your account, go to VM > Scans > Appliances, and select New > Virtual Scanner Appliance. Our wizard will walk you through all the steps. Once deployed check to be sure the appliance is connected - you can see this on scanner appliances list (go to VM > Scans > Appliances). You ll see the icon once the appliance is connected and available for scanning. Step 2: Create an EC2 connector Our EC2 Connector wizard walks you through the steps for providing your AWS Access Keys, selecting EC2 Regions and activating your EC2 assets for vulnerability scanning. Go to the Asset Management application, go to the Connectors tab, and then select Actions > Create EC2 Connector. Our wizard will help you with selecting EC2 hosts to scan. You ll be prompted to assign them asset tags as part of this process. QualysGuard Asset Management Quick Start Guide 12

13 Authentication Provide a name and description for the connector and click Continue. You ll be prompted to create an authentication record including your Amazon Web Services (AWS) Access Keys to allow us to connect to the EC2 regions. Click Finish to return to the Create EC2 Connector window. Connect to Your EC2 Regions Select your authentication record and Click Test Connector to make sure we can connect to your EC2 regions. When the test is completed, click Continue. You ll see the EC2 regions list showing the number of assets that you have in each region. Select the regions you want to synchronize, or select All Regions. The assets in the selected regions will be added to your account and synchronized. Click Continue. QualysGuard Asset Management Quick Start Guide 13

14 Activate and Tag Your EC2 Assets Select the Automatically activate check box to activate your EC2 assets for VM scanning. (You can activate them later from your assets list.) Select tags to apply to your EC2 assets discovered by this connector. Tags are required to select EC2 hosts for vulnerability scans within QualysGuard VM. (You can assign tags manually if you wish.) Click Continue to review and confirm. View EC2 Hosts on the Assets List You'll see your EC2 hosts on the Assets Tab. View EC2 Hosts in VM Go to VM > Assets > Host Assets. Under Tracking, the EC2 host icon appears next to each EC2 host that has been activated. QualysGuard Asset Management Quick Start Guide 14

15 Step 3: Launch a vulnerability scan on your EC2 hosts Go to VM > Scans and select New > EC2 Scan. Simply enter your scan settings and click Launch. For the scan settings: 1) Select a virtual scanner appliance you ve configured for Amazon EC2/VPC, 2) Select the EC2 connector for the AWS integration you want to run the scan on, and select the EC2 region or VPC zone, and 3) Add tags to select the EC2 hosts to be scanned. Click Launch to start the scan. The scan process is the same as any vulnerability scan. Once the scan is complete, you ll notice each EC2 scanned host is listed in the scan results, under Detailed Results. For each host you ll see: 1) the host s IP address, and 2) the Amazon host ID(s). Still have questions? Want help with deploying your virtual scanner appliance? Check out the articles below to learn more. From our Community: How to subscribe to the virtual scanner AMI How to configure a virtual scanner appliance using Amazon EC2/VPC What if my EC2 instances have IP address changes? Your EC2 instances may have IP address changes. We can continue to scan your EC2 instances because we scan by EC2 instance ID (not by IP address). Just run a new EC2 scan and we'll look for any IP address changes. If changes are found, you'll see the new IP addresses in your scan results. Once these scan results are processed the new IP addresses are shown in your account and will be included in your scan reports. QualysGuard Asset Management Quick Start Guide 15

How To Tag Assets In A Microsoft Qoq On A Microsq.Com (For Free) On A Pc Or Macbook Or Macsoft.Com On A Macbook (For Paid) On An Ipad Or Ipad (

How To Tag Assets In A Microsoft Qoq On A Microsq.Com (For Free) On A Pc Or Macbook Or Macsoft.Com On A Macbook (For Paid) On An Ipad Or Ipad ( Dynamic Asset Tagging provides a flexible and scalable way to automatically discover and organize the assets in your environment and make them available for scanning, reporting and ticketing within Qualys.

More information

Security and Compliance Suite

Security and Compliance Suite Security and Compliance Suite Quick Tour The Qualys user interface is easy-to-use with powerful Web 2.0 capabilities featuring interactive dashboards, actionable menus and workflows, context-based interactions

More information

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014 QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015 QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

Policy Compliance. Getting Started Guide. January 22, 2016

Policy Compliance. Getting Started Guide. January 22, 2016 Policy Compliance Getting Started Guide January 22, 2016 Copyright 2011-2016 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Elastic Detector on Amazon Web Services (AWS) User Guide v5

Elastic Detector on Amazon Web Services (AWS) User Guide v5 Elastic Detector on Amazon Web Services (AWS) User Guide v5 This guide is intended for Elastic Detector users on AWS. Elastic Detector is available as SaaS or deployed as a virtual appliance through an

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

Qualys PC/SCAP Auditor

Qualys PC/SCAP Auditor Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS

More information

Overview and Deployment Guide. Sophos UTM on AWS

Overview and Deployment Guide. Sophos UTM on AWS Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2

More information

KeyControl Installation on Amazon Web Services

KeyControl Installation on Amazon Web Services KeyControl Installation on Amazon Web Services Contents Introduction Deploying an initial KeyControl Server Deploying an Elastic Load Balancer (ELB) Adding a KeyControl node to a cluster in the same availability

More information

Discovery Guide. Secret Server. Table of Contents

Discovery Guide. Secret Server. Table of Contents Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...

More information

AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard

AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard AlienVault Unified Security Management (USM) 5.1 Running the Getting Started Wizard USM v5.1 Running the Getting Started Wizard, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault

More information

Offline Scanner Appliance

Offline Scanner Appliance Offline Scanner Appliance User Guide March 27, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc. All other

More information

Security and Compliance Suite Evaluator s Guide. August 11, 2015

Security and Compliance Suite Evaluator s Guide. August 11, 2015 Security and Compliance Suite Evaluator s Guide August 11, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

VX 9000E WiNG Express Manager INSTALLATION GUIDE

VX 9000E WiNG Express Manager INSTALLATION GUIDE VX 9000E WiNG Express Manager INSTALLATION GUIDE 2 VX 9000E WiNG Express Manager Service Information If you have a problem with your equipment, contact support for your region. Support and issue resolution

More information

Security and Compliance Suite Rollout Guide. August 4, 2015

Security and Compliance Suite Rollout Guide. August 4, 2015 Security and Compliance Suite Rollout Guide August 4, 2015 Copyright 2005-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

WebSphere Business Monitor V6.2 KPI history and prediction lab

WebSphere Business Monitor V6.2 KPI history and prediction lab Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...

More information

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it

More information

PCI Compliance. Network Scanning. Getting Started Guide

PCI Compliance. Network Scanning. Getting Started Guide PCI Compliance Getting Started Guide Qualys PCI provides businesses, merchants and online service providers with the easiest, most cost effective and highly automated way to achieve compliance with the

More information

USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB

USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29 Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB Table of Contents UNIT 1: Lab description... 3 Pre-requisites:... 3 UNIT 2: Launching an instance on EC2...

More information

MATLAB on EC2 Instructions Guide

MATLAB on EC2 Instructions Guide MATLAB on EC2 Instructions Guide Contents Welcome to MATLAB on EC2...3 What You Need to Do...3 Requirements...3 1. MathWorks Account...4 1.1. Create a MathWorks Account...4 1.2. Associate License...4 2.

More information

Ans.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera

Ans.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera Faqs > Spam Monitor General Q1. What is Spam Monitor? Ans.: Spam Monitor is an easy-to-use spam filter that detects and isolates unsolicited junk mail sent to your mailbox. Designed for computer users,

More information

Drobo How-To Guide. Cloud Storage Using Amazon Storage Gateway with Drobo iscsi SAN

Drobo How-To Guide. Cloud Storage Using Amazon Storage Gateway with Drobo iscsi SAN The Amazon Web Services (AWS) Storage Gateway uses an on-premises virtual appliance to replicate a portion of your local Drobo iscsi SAN (Drobo B1200i, left below, and Drobo B800i, right below) to cloudbased

More information

Enabling VPN on your VPS

Enabling VPN on your VPS VPS VPN Connections / Enable VPN Access Without FIrewall Page 1 of 8 Enabling VPN on your VPS VPN Setup Part 1 VPN Access to your VPS Environment The first six (6) steps in this configuration guide outline

More information

Lync Online Deployment Guide. Version 1.0

Lync Online Deployment Guide. Version 1.0 Date 28/07/2014 Table of Contents 1. Provisioning Lync Online... 1 1.1 Operating System Requirements... 1 1.2 Browser Requirements Administrative Centre... 1 2. Obtaining your login Credentials & Logging

More information

TechNote. Configuring SonicOS for Amazon VPC

TechNote. Configuring SonicOS for Amazon VPC Network Security SonicOS Contents Overview... 1 System or Network Requirements / Prerequisites... 3 Deployment Considerations... 3 Configuring Amazon VPC with a Policy-Based VPN... 4 Configuring Amazon

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

VXOA AMI on Amazon Web Services

VXOA AMI on Amazon Web Services 2013 Silver Peak Systems, Inc. QUICK START GUIDE VXOA AMI on Amazon Web Services A Silver Peak Virtual Appliance (VX) can be deployed within an Amazon Web Services (AWS) cloud environment to accelerate

More information

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011.

More information

SENDING EMAILS & MESSAGES TO GROUPS

SENDING EMAILS & MESSAGES TO GROUPS SENDING EMAILS & MESSAGES TO GROUPS Table of Contents What is the Difference between Emails and Selltis Messaging?... 3 Configuring your Email Settings... 4 Sending Emails to Groups Option A: Tasks...

More information

How To Create A Virtual Private Cloud On Amazon.Com

How To Create A Virtual Private Cloud On Amazon.Com Amazon Web Services Hands-On Virtual Private Computing 1 Overview Amazon s Virtual Private Cloud (VPC) allows you to launch AWS resources in a virtual network that you define. You can define an environment

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Quick Start Guide to Logging in to Online Banking

Quick Start Guide to Logging in to Online Banking Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s

More information

www.nexuswebsites.co.uk Professional Mailbox Email Software Setup Guide

www.nexuswebsites.co.uk Professional Mailbox Email Software Setup Guide Professional Mailbox Email Software Setup Guide Table of contents Before you start... 2 Setting up Outlook 2010... 2 Using Autodiscover to configure Outlook 2010... 2 The Autodiscover wizard has not worked...

More information

XMPP Instant Messaging and Active Directory

XMPP Instant Messaging and Active Directory XMPP Instant Messaging and Active Directory Quick setup of Isode's XMPP Server, M-Link, using Microsoft's Active Directory for user account provisioning Isode Objectives This document is intended for those

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Drobo How-To Guide. Topics. What You Will Need. Prerequisites. Deploy Drobo B1200i with Microsoft Hyper-V Clustering

Drobo How-To Guide. Topics. What You Will Need. Prerequisites. Deploy Drobo B1200i with Microsoft Hyper-V Clustering Multipathing I/O (MPIO) enables the use of multiple iscsi ports on a Drobo SAN to provide fault tolerance. MPIO can also boost performance of an application by load balancing traffic across multiple ports.

More information

A-AUTO 50 for Windows Setup Guide

A-AUTO 50 for Windows Setup Guide A-AUTO 50 for Windows Setup Guide 1st Edition 1 A-AUTO is a registered trade mark of UNIRITA Inc. "This product includes software developed by the Apache Software Foundation (http://www.apache.org/)."

More information

Enabling VPN on your VPS

Enabling VPN on your VPS VPS VPN Connections / Enable VPN Access to VPS Environment Page 1 of 9 Enabling VPN on your VPS Part 1 Configuring VPN Access to your VPS Environment The first six (6) steps in this configuration guide

More information

Remote Online Support

Remote Online Support Remote Online Support STRONGVON Tournament Management System 1 Overview The Remote Online Support allow STRONGVON support personnel to log into your computer over the Internet to troubleshoot your system

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Online Backup Guide for the Amazon Cloud: How to Setup your Online Backup Service using Vembu StoreGrid Backup Virtual Appliance on the Amazon Cloud

Online Backup Guide for the Amazon Cloud: How to Setup your Online Backup Service using Vembu StoreGrid Backup Virtual Appliance on the Amazon Cloud Online Backup Guide for the Amazon Cloud: How to Setup your Online Backup Service using Vembu StoreGrid Backup Virtual Appliance on the Amazon Cloud Here is a step-by-step set of instructions to get your

More information

Installing the Panini Universal Scanner Driver

Installing the Panini Universal Scanner Driver Installing the Panini Universal Scanner Driver The following steps should be followed for installation of a Panini scanner. The user installing the scanner on his/her PC should have local administrative

More information

Set Up E-mail Setup with Microsoft Outlook 2007 using POP3

Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Page 1 of 14 Help Center Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Learn how to configure Outlook 2007 for use with your 1&1 e-mail account using POP3. Before you begin, you will need

More information

Deploy Remote Desktop Gateway on the AWS Cloud

Deploy Remote Desktop Gateway on the AWS Cloud Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4

More information

Microsoft Office 365 with MailDefender

Microsoft Office 365 with MailDefender (PC) for Microsoft Office 365 with MailDefender V1.0 Contents 1 Logging in to the Office 365 Portal... 3 1.1 Outlook Web Access Exchange & Lync... 3 1.2 Team Site SharePoint Online... 3 2 Configuring your

More information

Hosted VoIP Outlook TAPI Integration

Hosted VoIP Outlook TAPI Integration Hosted VoIP Outlook TAPI Integration P a g e 1 This Document The purpose of this document is to describe how to download and install the TAPI (Telephony Application Program Interface) available at the

More information

How to set up Outlook Anywhere on your home system

How to set up Outlook Anywhere on your home system How to set up Outlook Anywhere on your home system The Outlook Anywhere feature for Microsoft Exchange Server 2007 allows Microsoft Office Outlook 2007 and Outlook 2003 users to connect to their Outlook

More information

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account? Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply

More information

Cyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10

Cyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10 Cyberoam Virtual Security Appliance - Installation Guide for XenServer Version 10 Document Version 10.6.1-01/07/2014 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam Virtual

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Configure the idrac Remote Access Console

Configure the idrac Remote Access Console Configure the idrac Remote Access Console If your ExtraHop system is deployed in a data center or other remote environment, you might need to remotely access the console and its power-management features.

More information

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system

More information

Enterprise. Insights. Active Directory Integration: Installation and Setup Guide. v1.0.5

Enterprise. Insights. Active Directory Integration: Installation and Setup Guide. v1.0.5 Enterprise Insights Active Directory Integration: Installation and Setup Guide v1.0.5 This guide explains how to install and configure the Active Directory Components provisioned and maintained from the

More information

Informatica Cloud & Redshift Getting Started User Guide

Informatica Cloud & Redshift Getting Started User Guide Informatica Cloud & Redshift Getting Started User Guide 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording

More information

Creating Reports with Microsoft Dynamics AX SQL Reporting Services

Creating Reports with Microsoft Dynamics AX SQL Reporting Services Creating Reports with Microsoft Dynamics AX SQL Reporting Services. Table of Contents Lab 1: Building a Report... 1 Lab Objective... 1 Pre-Lab Setup... 1 Exercise 1: Familiarize Yourself with the Setup...

More information

ODBC Client Driver Help. 2015 Kepware, Inc.

ODBC Client Driver Help. 2015 Kepware, Inc. 2015 Kepware, Inc. 2 Table of Contents Table of Contents 2 4 Overview 4 External Dependencies 4 Driver Setup 5 Data Source Settings 5 Data Source Setup 6 Data Source Access Methods 13 Fixed Table 14 Table

More information

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9) Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning

More information

escan SBS 2008 Installation Guide

escan SBS 2008 Installation Guide escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.

More information

Setting up Remote Desktop

Setting up Remote Desktop Setting up Remote Desktop Terminology: Host PC the computer you want to access remotely; the destination Client PC the computer you are actually using to access another PC; the source IP Address the numerical

More information

SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE

SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE Contents Introduction... 3 Step 1 Create Azure Components... 5 Step 1.1 Virtual Network... 5 Step 1.1.1 Virtual Network Details... 6 Step 1.1.2 DNS Servers

More information

Strategic Asset Tracking System User Guide

Strategic Asset Tracking System User Guide Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data

More information

Installing Intercloud Fabric Firewall

Installing Intercloud Fabric Firewall This chapter contains the following sections: Information About the Intercloud Fabric Firewall, page 1 Prerequisites, page 1 Guidelines and Limitations, page 2 Basic Topology, page 2 Intercloud Fabric

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Installing the TAPI Support Software

Installing the TAPI Support Software Installing the TAPI Support Software To install and set up the TAPI 2.1-compliant software, use the following steps: 1. Start Web Portal. 2. Click the Options tab. 3. Click the PC Integration tab. 4. Click

More information

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Setting up Hyper-V for 2X VirtualDesktopServer Manual Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

Setting up a Virtual Private Network (VPN) connection Windows 8

Setting up a Virtual Private Network (VPN) connection Windows 8 Setting up a Virtual Private Network (VPN) connection Windows 8 A Virtual Private Network (VPN) is best described as a tunnel to MAASnet, the university network. After having configured the VPN connection,

More information

V Series Rapid Deployment Version 7.5

V Series Rapid Deployment Version 7.5 V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

YSU Secure Wireless Connect Guide Windows XP Home/Professional/Media Center/Tablet PC Edition

YSU Secure Wireless Connect Guide Windows XP Home/Professional/Media Center/Tablet PC Edition YSU Secure Wireless Connect Guide Windows XP Home/Professional/Media Center/Tablet PC Edition Required Items: Windows XP Home, Professional, Media Center, or Tablet PC Edition Any 802.11b, g, b/g, or a/b/g

More information

Quick Start Guide v4.0 Client Outlook Connection

Quick Start Guide v4.0 Client Outlook Connection Quick Start Guide v4.0 Client Outlook Connection Contents Chapter 1 Outlook Anywhere - Outlook Anywhere 3 - Setting up Outlook Anywhere for PC 4 - Setting up Outlook for Mac 9 CLIENT OUTLOOK CONNECTION

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Guide to Setting up Internet Connection Sharing for Windows

Guide to Setting up Internet Connection Sharing for Windows Guide to Setting up Internet Connection Sharing for Windows Document Date: December 20, 2005 Document Version: Version: 1.0 Disclaimer: Please note that this document is provided on an as is where is basis

More information

MARKETO LEAD MANAGEMENT APP INSTALLATION AND SYNCHRONIZATION WITH SALESFORCE. Installation Guide Version 1.2

MARKETO LEAD MANAGEMENT APP INSTALLATION AND SYNCHRONIZATION WITH SALESFORCE. Installation Guide Version 1.2 MARKETO LEAD MANAGEMENT APP INSTALLATION AND SYNCHRONIZATION WITH SALESFORCE Installation Guide Version 1.2 CONTENTS INSTALLATION AND SYNCHRONIZATION OVERVIEW... 2 STEP 1: SET UP REQUIRED PERMISSIONS IN

More information

XStream Remote Control: Configuring DCOM Connectivity

XStream Remote Control: Configuring DCOM Connectivity XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation

More information

Installing Policy Patrol on a separate machine

Installing Policy Patrol on a separate machine Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the

More information

Professional Mailbox Email Software Setup Guide

Professional Mailbox Email Software Setup Guide Professional Mailbox Email Software Setup Guide Table of contents Download and Install Microsoft Outlook 2010 or 2011... 2 Enabling access from email software... 4 Setting up Outlook 2010... 6 Before you

More information

Installing Remote Desktop Connection

Installing Remote Desktop Connection SETTING UP YOUR REMOTE DESKTOP This section will assist you in setting you Remote Desktop Connection. This will allow you to create an icon for easy access to your virtual desktop. DISCLAIMER: All images

More information

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Installation & Configuration Guide Professional Edition

Installation & Configuration Guide Professional Edition Installation & Configuration Guide Professional Edition Version 2.3 Updated January 2014 Table of Contents Getting Started... 3 Introduction... 3 Requirements... 3 Support... 4 Recommended Browsers...

More information

The service note describes the basic steps to install a ip camera for the DVR670

The service note describes the basic steps to install a ip camera for the DVR670 Tech note Description Adding IP camera to DVR670 General The service note describes the basic steps to install a ip camera for the DVR670 Steps involved: 1) Configuration Manager application 2) Camera

More information

This is a training module for Maximo Asset Management V7.1. It demonstrates how to use the E-Audit function.

This is a training module for Maximo Asset Management V7.1. It demonstrates how to use the E-Audit function. This is a training module for Maximo Asset Management V7.1. It demonstrates how to use the E-Audit function. Page 1 of 14 This module covers these topics: - Enabling audit for a Maximo database table -

More information

How-to setup a proxy in the cloud

How-to setup a proxy in the cloud This article describes the setup of a proxy-server in a cloud. You can use a proxy like this from everywhere through the internet. Reasons to do this could be: Your internet access is filtered but you

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

IQSweb Reference G. ROSS Migration/Registration

IQSweb Reference G. ROSS Migration/Registration ROSS Migration/Registration Contents IQSweb V3.0.1 ROSS Connection Requirements... 2 Test Agency Network Connectivity to ROSS... 3 FIREWALL Exceptions... 3 FIREWALL Exception Justification... 4 ROSS Interface

More information

Accessing the Online Meeting Room (Blackboard Collaborate)

Accessing the Online Meeting Room (Blackboard Collaborate) Step 1: Check your System and Install Required Software NOTE: Make sure you are on the computer you will be using to access the online meeting room AND that you are using the internet browser (ie: firefox,

More information

Scan to E-mail Quick Setup Guide

Scan to E-mail Quick Setup Guide Xerox WorkCentre M118i Scan to E-mail Quick Setup Guide 701P42574 This guide provides a quick reference for setting up the Scan to E-mail feature on the Xerox WorkCentre M118i. It includes procedures for:

More information

Xerox Global Print Driver. Installation Guide

Xerox Global Print Driver. Installation Guide Xerox 2010 Xerox Corporation. All Rights Reserved. Unpublished rights reserved under the copyright laws of the United States. Contents of this publication may not be reproduced in any form without permission

More information

Email client configuration guide. Business Email

Email client configuration guide. Business Email Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server

More information

Lumension Endpoint Management and Security Suite

Lumension Endpoint Management and Security Suite Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module

More information

Aeries.net Teacher Portal User Documentation July 31, 2015. 1. Access Teacher Portal. 2. Utilizing the Navigation Tree

Aeries.net Teacher Portal User Documentation July 31, 2015. 1. Access Teacher Portal. 2. Utilizing the Navigation Tree Aeries.net Teacher Portal User Documentation July 31, 2015 1. Access Teacher Portal 2. Utilizing the Navigation Tree 3. Attendance Attendance Add/Dropped Students ** SSA (Safe Schools Act) Attendance Notes

More information

Eucalyptus 3.4.2 User Console Guide

Eucalyptus 3.4.2 User Console Guide Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure

More information

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks

More information

The steps will take about 4 hours to fully execute, with only about 60 minutes of user intervention. Each of the steps is discussed below.

The steps will take about 4 hours to fully execute, with only about 60 minutes of user intervention. Each of the steps is discussed below. Setup Guide for the XenApp on AWS CloudFormation Template This document walks you through the steps of using the Citrix XenApp on AWS CloudFormation template (v 4.1.5) available here to create a fully

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information