QualysGuard Asset Management
|
|
- Marjorie Hines
- 8 years ago
- Views:
Transcription
1 QualysGuard Asset Management Quick Start Guide January 28, 2014 Dynamic Asset Tagging provides a flexible and scalable way to automatically discover and organize the assets in your environment and make them available for scanning, reporting and ticketing within QualysGuard. The Asset Management application allows you to easily manage your assets using dynamic asset tagging capabilities: Support for multiple hierarchies (by OS, region, line of business, etc.) Custom attributes such as location, business function, owner Dynamic tags automatically assigned based on any detectable attribute Synchronizes your scans and reports with your dynamic business environment By creating Amazon EC2 Asset Data Connectors within the Asset Management application, QualysGuard will continuously import and synchronize your Amazon EC2 and VPC virtual machine Instance inventories into your QualysGuard asset database. See Amazon EC2 Asset Inventory and Scanning. Requirements: The Asset Management application and Dynamic Asset Tagging MUST be enabled for your subscription. Please contact your Technical Account representative or Support representative for assistance. It will take 24 to 48 hours for the Qualys support team to enable this for your account. First Steps Opt in to New Data Security Model A user with the Manager role needs to opt in to the New Data Security Model by going to Users > Setup > Security. After opting in, users will see the Asset Management application in the application picker. (If not, Asset Management has not be added to your subscription yet; please contact Support or your Account Manager). Be sure to scan assets in your account so tags can be assigned to them. Copyright by Qualys, Inc. All Rights Reserved. 1
2 Go to Asset Management Select the Asset Management application. Your Assets Click the Assets tab to view the assets in your account. Your assets list may include a combination of IP addresses, web applications and malware detection sites. Is your assets list empty? A Manager user must opt in to the New Data Security Model. If this is not done you ll notice there aren t any IP addresses in the list. Go to VM > Users > Setup > Security to check this setting and opt in for your subscription (or ask a Manager to do it). Are your IP addresses missing? You (or another user) needs to run scans using the VM application before your IP addresses will appear within the Asset Management application. If you have IP addresses listed under VM > Assets > Host Assets and the IPs are not listed in Asset Management, you should run vulnerability scan(s) of your hosts. Your Tags Click the tag tree icon to display the "Assign tags" list, which displays all the tags currently in your subscription. To display child tags, click the triangle to the left of a parent tag. Tags You Start With We create some initial tags based on the existing objects (configurations) in your account. The tags you start with are not assigned to assets. You can assign these tags to assets manually, and you can also edit the tags to create tagging rules for them. QualysGuard Asset Management Quick Start Guide 2
3 Business Units. We create a Business Units tag and a sub-tag Unassigned Business Unit. For each custom business unit, we create a sub-tag with the business unit's name. For example, if your custom business units are called EU and US, you'll have a tag called Business Units, which will have sub-tags called Unassigned Business Unit, EU and US. Scanned assets in your custom business units will automatically be assigned their business unit tags. Asset Groups. We create an Asset Groups tag and a sub-tag for each of the asset groups defined in your subscription. For example, if you have asset groups called Unix and Windows, you'll have a tag called Asset Groups, which will have sub-tags called Unix and Windows. Scanned assets in your asset groups will automatically be assigned their asset group tags. Powerful Search Capabilities You can always find the assets you're looking for using the search and filter features of the assets list. You ll be searching the assets in your account and the most recent scan data for them. In the field provided use natural syntax to enter search criteria. Examples: "Firefox Excel" finds assets with both Firefox and Excel installed. "Firefox -Excel" finds assets with Firefox installed but excludes those with Excel installed ("-" makes the term an exclusion). "80" Finds assets with port 80 open, or with "80" in their IP address or in their DNS name. Click above search assets field to display the filters. Filters represent field-level information saved in your account as part of the auto scan data (latest host scan results). Filters include tags, attributes, operating system, tracking method and open ports (multiple entries are comma separated). The assets list changes dynamically as you specify filters. QualysGuard Asset Management Quick Start Guide 3
4 View Asset Details Mouse over an asset row and select View host details from the Quick Actions menu. Click the tabs on the left to view the host details: Asset Summary, Open Ports, Installed Software and Vulnerabilities. Add a Tag to an Asset Adding tags to assets enables you to control user access to those assets. When an asset is assigned one or more tags, users with any of those tags in their assigned scopes can access that asset. You can add tags to assets manually in the assets list or automatically by defining tagging rules. Add tags manually by either of these methods: Locate the asset you want to tag, select a tag in the tag tree and then drag and drop the tag onto the asset. Locate the asset you want to tag and click in that asset's row. In the Add tags pop-up type a tag name in the "Search for tag" field. Matching tags appear as you type. Click the tag you want to add to the asset and then click the Add tag button. QualysGuard Asset Management Quick Start Guide 4
5 Find Assets Associated with a Tag To find assets associated with a specific tag, hover over the tag on the Tags tab and select Find assets from the Quick Actions menu. The assets list appears and displays only the assets with the selected tag. If you click above the assets list, you ll see the tags filter. Click to display the complete assets list. QualysGuard Asset Management Quick Start Guide 5
6 Create Tags Click the Tags tab and then click the Create tag button. The Tag Creation wizard appears. Enter a name for the tag. You have the option to select a color. Colors can be useful for grouping tags with something in common, such as an asset group or business unit. If the tag you re creating a sub-tag, select the parent tag. Static and Dynamic Tags Static. A static tag can be manually assigned to assets in your account. To create the tag as a static tag, just click Continue twice and then click Finish. (Static tags do not have tag rules.) Dynamic. A dynamic tag is automatically assigned to scanned assets in your account according to its tag rule. To create the tag as a dynamic tag, click Continue and define a tag rule. QualysGuard Asset Management Quick Start Guide 6
7 When you define a dynamic tag, you have multiple rule engines to choose from. For example, you may define a rule for tagging hosts that have a specific operating system or a particular software application and version installed. For this example we've selected Operating System Regular Expression. In the Rule Text field, enter a regular expression (Perl format) to identify the operating system to be tagged. In our example we're creating a dynamic tag for assets with a Windows OS. Test Rule Applicability on Selected Assets. (optional) Select assets in your account to test the rule using the Add Asset drop-down menu. The result for each selected asset appears below the Add Asset drop down menu. A check mark indicates a selected asset matches the rule. A red indicates a selected asset does not match the rule. When you click Save, we automatically add the new tag to all scanned assets in your account that match the tag rule. Filter the Assets List. Another way to find the assets for a given tag is to use filters. On the Assets tab, click. Under Tags, select your new tag. The assets list is filtered to show only the assets your new tag has been added to. QualysGuard Asset Management Quick Start Guide 7
8 More Ways to Create Tags You can create a tag based on search criteria you enter. The tag will be created with a rule based on your search criteria. Click the Assets tab, type your search text in the field provided and then click the "Search assets" button. The assets list will display only assets that match your search string. Click and enter a name for the tag. You can create a tag based on asset filters. Click the Assets tab and click to display the filtering options. Define your filters and then click enter a name for the tag. above the assets list. When prompted QualysGuard Asset Management Quick Start Guide 8
9 Create Tags Using VM An easy way to create tags with tagging rules for automatic assignment to assets is through the Asset Search Portal in the VM application. Go to VM > Assets > Asset Search. Specify the host attributes you want to search for and then click Create Tag. When prompted enter a name for the tag and click OK. We create the tag with a tag rule based on your search criteria. Within the Asset Management application, the new tag appears in your tag tree as a sub-tag of the "Asset Search Tags" parent tag. The new tag is automatically added to all scanned assets in your account that match your search criteria. On the Tags tab, hover over the new tag s row and select Find assets from the Quick Actions menu. The assets list is filtered to display only assets that match the new tag. QualysGuard Asset Management Quick Start Guide 9
10 Using Tags to Launch a Scan You have the option to select tags when choosing the hosts to scans. We resolve the tags to host assets at scan time. Only hosts in your account will be scanned. Go to VM > Scans > Scans and select New > Scan. Under Choose Target Hosts from, select Tags and then add tags to identify hosts for the scan. Note: When "Use IP Network Range tags" is selected, only tags with IP address rule defined are shown for selection. In the Include hosts section, click Add Tag to select tags. Select "All" to include hosts that match all of the tags selected. Select "Any" to include hosts that match at least one of the tags. For example, let's say you've selected tags US-West Coast, Windows XP and Port80. If you pick All, only hosts that have all three tags will be included. If you pick Any, hosts that have at least one of the tags will be included. Add tags to the "Do not include" section. For example, you might include a tag called US-West Coast and exclude the tag California. Any host that has the California tag will be excluded from the scan even if it also has the US-West Coast tag. QualysGuard Asset Management Quick Start Guide 10
11 Using Tags to Schedule a Scan Go to VM > Scans > Schedules and select New > Schedule Scan. Under Target Hosts, select Tags and then add tags to identify hosts to include in the scan and to exclude from the scan. See Using Tags to Launch a Scan above for information about tag selection. Using Tags to Run a Report Many reports now allow asset tag selection to specify report source, including VM reports (except the Map Report) and template based PC reports. Two scorecard reports, the Most Prevalent Vulnerabilities Report and the Most Vulnerable Hosts Report, also allow asset tag selection. Go to VM > Reports > Reports. Select New > Scan Report > Template Based. For Report Source, add tags to identify hosts to include in the report and to exclude from the report. See Using Tags to Launch a Scan above for information about tag selection. QualysGuard Asset Management Quick Start Guide 11
12 The Summary section of the finished report displays the names of the tags used to specify the report source. Amazon EC2 Asset Inventory and Scanning Here s the high level steps for getting started with the Amazon EC2 Pre-Authorized Scanning solution from Qualys, Inc. What are the requirements? The EC2 Scanning feature must be enabled for your account. Please contact your Technical Account Manager or Support if you would like have this feature turned on in your account. You'll need to be a Manager user with full rights. Step 1: Configure and activate a virtual scanner Configure a virtual scanner using Amazon EC2/VPC. If you haven't already done this, log into your account, go to VM > Scans > Appliances, and select New > Virtual Scanner Appliance. Our wizard will walk you through all the steps. Once deployed check to be sure the appliance is connected - you can see this on scanner appliances list (go to VM > Scans > Appliances). You ll see the icon once the appliance is connected and available for scanning. Step 2: Create an EC2 connector Our EC2 Connector wizard walks you through the steps for providing your AWS Access Keys, selecting EC2 Regions and activating your EC2 assets for vulnerability scanning. Go to the Asset Management application, go to the Connectors tab, and then select Actions > Create EC2 Connector. Our wizard will help you with selecting EC2 hosts to scan. You ll be prompted to assign them asset tags as part of this process. QualysGuard Asset Management Quick Start Guide 12
13 Authentication Provide a name and description for the connector and click Continue. You ll be prompted to create an authentication record including your Amazon Web Services (AWS) Access Keys to allow us to connect to the EC2 regions. Click Finish to return to the Create EC2 Connector window. Connect to Your EC2 Regions Select your authentication record and Click Test Connector to make sure we can connect to your EC2 regions. When the test is completed, click Continue. You ll see the EC2 regions list showing the number of assets that you have in each region. Select the regions you want to synchronize, or select All Regions. The assets in the selected regions will be added to your account and synchronized. Click Continue. QualysGuard Asset Management Quick Start Guide 13
14 Activate and Tag Your EC2 Assets Select the Automatically activate check box to activate your EC2 assets for VM scanning. (You can activate them later from your assets list.) Select tags to apply to your EC2 assets discovered by this connector. Tags are required to select EC2 hosts for vulnerability scans within QualysGuard VM. (You can assign tags manually if you wish.) Click Continue to review and confirm. View EC2 Hosts on the Assets List You'll see your EC2 hosts on the Assets Tab. View EC2 Hosts in VM Go to VM > Assets > Host Assets. Under Tracking, the EC2 host icon appears next to each EC2 host that has been activated. QualysGuard Asset Management Quick Start Guide 14
15 Step 3: Launch a vulnerability scan on your EC2 hosts Go to VM > Scans and select New > EC2 Scan. Simply enter your scan settings and click Launch. For the scan settings: 1) Select a virtual scanner appliance you ve configured for Amazon EC2/VPC, 2) Select the EC2 connector for the AWS integration you want to run the scan on, and select the EC2 region or VPC zone, and 3) Add tags to select the EC2 hosts to be scanned. Click Launch to start the scan. The scan process is the same as any vulnerability scan. Once the scan is complete, you ll notice each EC2 scanned host is listed in the scan results, under Detailed Results. For each host you ll see: 1) the host s IP address, and 2) the Amazon host ID(s). Still have questions? Want help with deploying your virtual scanner appliance? Check out the articles below to learn more. From our Community: How to subscribe to the virtual scanner AMI How to configure a virtual scanner appliance using Amazon EC2/VPC What if my EC2 instances have IP address changes? Your EC2 instances may have IP address changes. We can continue to scan your EC2 instances because we scan by EC2 instance ID (not by IP address). Just run a new EC2 scan and we'll look for any IP address changes. If changes are found, you'll see the new IP addresses in your scan results. Once these scan results are processed the new IP addresses are shown in your account and will be included in your scan reports. QualysGuard Asset Management Quick Start Guide 15
How To Tag Assets In A Microsoft Qoq On A Microsq.Com (For Free) On A Pc Or Macbook Or Macsoft.Com On A Macbook (For Paid) On An Ipad Or Ipad (
Dynamic Asset Tagging provides a flexible and scalable way to automatically discover and organize the assets in your environment and make them available for scanning, reporting and ticketing within Qualys.
More informationSecurity and Compliance Suite
Security and Compliance Suite Quick Tour The Qualys user interface is easy-to-use with powerful Web 2.0 capabilities featuring interactive dashboards, actionable menus and workflows, context-based interactions
More informationQualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
More informationQualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015
QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
More informationPolicy Compliance. Getting Started Guide. January 22, 2016
Policy Compliance Getting Started Guide January 22, 2016 Copyright 2011-2016 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
More informationWeb Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
More informationElastic Detector on Amazon Web Services (AWS) User Guide v5
Elastic Detector on Amazon Web Services (AWS) User Guide v5 This guide is intended for Elastic Detector users on AWS. Elastic Detector is available as SaaS or deployed as a virtual appliance through an
More informationManaging Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
More informationQualys PC/SCAP Auditor
Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS
More informationOverview and Deployment Guide. Sophos UTM on AWS
Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2
More informationKeyControl Installation on Amazon Web Services
KeyControl Installation on Amazon Web Services Contents Introduction Deploying an initial KeyControl Server Deploying an Elastic Load Balancer (ELB) Adding a KeyControl node to a cluster in the same availability
More informationDiscovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
More informationAlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard
AlienVault Unified Security Management (USM) 5.1 Running the Getting Started Wizard USM v5.1 Running the Getting Started Wizard, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault
More informationOffline Scanner Appliance
Offline Scanner Appliance User Guide March 27, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc. All other
More informationSecurity and Compliance Suite Evaluator s Guide. August 11, 2015
Security and Compliance Suite Evaluator s Guide August 11, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
More informationVX 9000E WiNG Express Manager INSTALLATION GUIDE
VX 9000E WiNG Express Manager INSTALLATION GUIDE 2 VX 9000E WiNG Express Manager Service Information If you have a problem with your equipment, contact support for your region. Support and issue resolution
More informationSecurity and Compliance Suite Rollout Guide. August 4, 2015
Security and Compliance Suite Rollout Guide August 4, 2015 Copyright 2005-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
More informationWebSphere Business Monitor V6.2 KPI history and prediction lab
Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...
More informationDeploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10
Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it
More informationPCI Compliance. Network Scanning. Getting Started Guide
PCI Compliance Getting Started Guide Qualys PCI provides businesses, merchants and online service providers with the easiest, most cost effective and highly automated way to achieve compliance with the
More informationUSER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29. Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB
USER CONFERENCE 2011 SAN FRANCISCO APRIL 26 29 Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB Table of Contents UNIT 1: Lab description... 3 Pre-requisites:... 3 UNIT 2: Launching an instance on EC2...
More informationMATLAB on EC2 Instructions Guide
MATLAB on EC2 Instructions Guide Contents Welcome to MATLAB on EC2...3 What You Need to Do...3 Requirements...3 1. MathWorks Account...4 1.1. Create a MathWorks Account...4 1.2. Associate License...4 2.
More informationAns.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera
Faqs > Spam Monitor General Q1. What is Spam Monitor? Ans.: Spam Monitor is an easy-to-use spam filter that detects and isolates unsolicited junk mail sent to your mailbox. Designed for computer users,
More informationDrobo How-To Guide. Cloud Storage Using Amazon Storage Gateway with Drobo iscsi SAN
The Amazon Web Services (AWS) Storage Gateway uses an on-premises virtual appliance to replicate a portion of your local Drobo iscsi SAN (Drobo B1200i, left below, and Drobo B800i, right below) to cloudbased
More informationEnabling VPN on your VPS
VPS VPN Connections / Enable VPN Access Without FIrewall Page 1 of 8 Enabling VPN on your VPS VPN Setup Part 1 VPN Access to your VPS Environment The first six (6) steps in this configuration guide outline
More informationLync Online Deployment Guide. Version 1.0
Date 28/07/2014 Table of Contents 1. Provisioning Lync Online... 1 1.1 Operating System Requirements... 1 1.2 Browser Requirements Administrative Centre... 1 2. Obtaining your login Credentials & Logging
More informationTechNote. Configuring SonicOS for Amazon VPC
Network Security SonicOS Contents Overview... 1 System or Network Requirements / Prerequisites... 3 Deployment Considerations... 3 Configuring Amazon VPC with a Policy-Based VPN... 4 Configuring Amazon
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationVXOA AMI on Amazon Web Services
2013 Silver Peak Systems, Inc. QUICK START GUIDE VXOA AMI on Amazon Web Services A Silver Peak Virtual Appliance (VX) can be deployed within an Amazon Web Services (AWS) cloud environment to accelerate
More informationStarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users
StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011.
More informationSENDING EMAILS & MESSAGES TO GROUPS
SENDING EMAILS & MESSAGES TO GROUPS Table of Contents What is the Difference between Emails and Selltis Messaging?... 3 Configuring your Email Settings... 4 Sending Emails to Groups Option A: Tasks...
More informationHow To Create A Virtual Private Cloud On Amazon.Com
Amazon Web Services Hands-On Virtual Private Computing 1 Overview Amazon s Virtual Private Cloud (VPC) allows you to launch AWS resources in a virtual network that you define. You can define an environment
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationQuick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
More informationwww.nexuswebsites.co.uk Professional Mailbox Email Software Setup Guide
Professional Mailbox Email Software Setup Guide Table of contents Before you start... 2 Setting up Outlook 2010... 2 Using Autodiscover to configure Outlook 2010... 2 The Autodiscover wizard has not worked...
More informationXMPP Instant Messaging and Active Directory
XMPP Instant Messaging and Active Directory Quick setup of Isode's XMPP Server, M-Link, using Microsoft's Active Directory for user account provisioning Isode Objectives This document is intended for those
More informationFile Management Utility User Guide
File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held
More informationDrobo How-To Guide. Topics. What You Will Need. Prerequisites. Deploy Drobo B1200i with Microsoft Hyper-V Clustering
Multipathing I/O (MPIO) enables the use of multiple iscsi ports on a Drobo SAN to provide fault tolerance. MPIO can also boost performance of an application by load balancing traffic across multiple ports.
More informationA-AUTO 50 for Windows Setup Guide
A-AUTO 50 for Windows Setup Guide 1st Edition 1 A-AUTO is a registered trade mark of UNIRITA Inc. "This product includes software developed by the Apache Software Foundation (http://www.apache.org/)."
More informationEnabling VPN on your VPS
VPS VPN Connections / Enable VPN Access to VPS Environment Page 1 of 9 Enabling VPN on your VPS Part 1 Configuring VPN Access to your VPS Environment The first six (6) steps in this configuration guide
More informationRemote Online Support
Remote Online Support STRONGVON Tournament Management System 1 Overview The Remote Online Support allow STRONGVON support personnel to log into your computer over the Internet to troubleshoot your system
More informationLab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
More informationOnline Backup Guide for the Amazon Cloud: How to Setup your Online Backup Service using Vembu StoreGrid Backup Virtual Appliance on the Amazon Cloud
Online Backup Guide for the Amazon Cloud: How to Setup your Online Backup Service using Vembu StoreGrid Backup Virtual Appliance on the Amazon Cloud Here is a step-by-step set of instructions to get your
More informationInstalling the Panini Universal Scanner Driver
Installing the Panini Universal Scanner Driver The following steps should be followed for installation of a Panini scanner. The user installing the scanner on his/her PC should have local administrative
More informationSet Up E-mail Setup with Microsoft Outlook 2007 using POP3
Page 1 of 14 Help Center Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Learn how to configure Outlook 2007 for use with your 1&1 e-mail account using POP3. Before you begin, you will need
More informationDeploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
More informationMicrosoft Office 365 with MailDefender
(PC) for Microsoft Office 365 with MailDefender V1.0 Contents 1 Logging in to the Office 365 Portal... 3 1.1 Outlook Web Access Exchange & Lync... 3 1.2 Team Site SharePoint Online... 3 2 Configuring your
More informationHosted VoIP Outlook TAPI Integration
Hosted VoIP Outlook TAPI Integration P a g e 1 This Document The purpose of this document is to describe how to download and install the TAPI (Telephony Application Program Interface) available at the
More informationHow to set up Outlook Anywhere on your home system
How to set up Outlook Anywhere on your home system The Outlook Anywhere feature for Microsoft Exchange Server 2007 allows Microsoft Office Outlook 2007 and Outlook 2003 users to connect to their Outlook
More informationCHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
More informationCyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10
Cyberoam Virtual Security Appliance - Installation Guide for XenServer Version 10 Document Version 10.6.1-01/07/2014 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam Virtual
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationConfigure the idrac Remote Access Console
Configure the idrac Remote Access Console If your ExtraHop system is deployed in a data center or other remote environment, you might need to remotely access the console and its power-management features.
More informationQuick Start Guide: Utilizing Nessus to Secure Microsoft Azure
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system
More informationEnterprise. Insights. Active Directory Integration: Installation and Setup Guide. v1.0.5
Enterprise Insights Active Directory Integration: Installation and Setup Guide v1.0.5 This guide explains how to install and configure the Active Directory Components provisioned and maintained from the
More informationInformatica Cloud & Redshift Getting Started User Guide
Informatica Cloud & Redshift Getting Started User Guide 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording
More informationCreating Reports with Microsoft Dynamics AX SQL Reporting Services
Creating Reports with Microsoft Dynamics AX SQL Reporting Services. Table of Contents Lab 1: Building a Report... 1 Lab Objective... 1 Pre-Lab Setup... 1 Exercise 1: Familiarize Yourself with the Setup...
More informationODBC Client Driver Help. 2015 Kepware, Inc.
2015 Kepware, Inc. 2 Table of Contents Table of Contents 2 4 Overview 4 External Dependencies 4 Driver Setup 5 Data Source Settings 5 Data Source Setup 6 Data Source Access Methods 13 Fixed Table 14 Table
More informationNessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)
Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning
More informationescan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
More informationSetting up Remote Desktop
Setting up Remote Desktop Terminology: Host PC the computer you want to access remotely; the destination Client PC the computer you are actually using to access another PC; the source IP Address the numerical
More informationSHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE
SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE Contents Introduction... 3 Step 1 Create Azure Components... 5 Step 1.1 Virtual Network... 5 Step 1.1.1 Virtual Network Details... 6 Step 1.1.2 DNS Servers
More informationStrategic Asset Tracking System User Guide
Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data
More informationInstalling Intercloud Fabric Firewall
This chapter contains the following sections: Information About the Intercloud Fabric Firewall, page 1 Prerequisites, page 1 Guidelines and Limitations, page 2 Basic Topology, page 2 Intercloud Fabric
More informationOneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
More informationInstalling the TAPI Support Software
Installing the TAPI Support Software To install and set up the TAPI 2.1-compliant software, use the following steps: 1. Start Web Portal. 2. Click the Options tab. 3. Click the PC Integration tab. 4. Click
More informationSetting up Hyper-V for 2X VirtualDesktopServer Manual
Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein
More informationFreshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
More informationSetting up a Virtual Private Network (VPN) connection Windows 8
Setting up a Virtual Private Network (VPN) connection Windows 8 A Virtual Private Network (VPN) is best described as a tunnel to MAASnet, the university network. After having configured the VPN connection,
More informationV Series Rapid Deployment Version 7.5
V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationYSU Secure Wireless Connect Guide Windows XP Home/Professional/Media Center/Tablet PC Edition
YSU Secure Wireless Connect Guide Windows XP Home/Professional/Media Center/Tablet PC Edition Required Items: Windows XP Home, Professional, Media Center, or Tablet PC Edition Any 802.11b, g, b/g, or a/b/g
More informationQuick Start Guide v4.0 Client Outlook Connection
Quick Start Guide v4.0 Client Outlook Connection Contents Chapter 1 Outlook Anywhere - Outlook Anywhere 3 - Setting up Outlook Anywhere for PC 4 - Setting up Outlook for Mac 9 CLIENT OUTLOOK CONNECTION
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationGuide to Setting up Internet Connection Sharing for Windows
Guide to Setting up Internet Connection Sharing for Windows Document Date: December 20, 2005 Document Version: Version: 1.0 Disclaimer: Please note that this document is provided on an as is where is basis
More informationMARKETO LEAD MANAGEMENT APP INSTALLATION AND SYNCHRONIZATION WITH SALESFORCE. Installation Guide Version 1.2
MARKETO LEAD MANAGEMENT APP INSTALLATION AND SYNCHRONIZATION WITH SALESFORCE Installation Guide Version 1.2 CONTENTS INSTALLATION AND SYNCHRONIZATION OVERVIEW... 2 STEP 1: SET UP REQUIRED PERMISSIONS IN
More informationXStream Remote Control: Configuring DCOM Connectivity
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
More informationInstalling Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
More informationProfessional Mailbox Email Software Setup Guide
Professional Mailbox Email Software Setup Guide Table of contents Download and Install Microsoft Outlook 2010 or 2011... 2 Enabling access from email software... 4 Setting up Outlook 2010... 6 Before you
More informationInstalling Remote Desktop Connection
SETTING UP YOUR REMOTE DESKTOP This section will assist you in setting you Remote Desktop Connection. This will allow you to create an icon for easy access to your virtual desktop. DISCLAIMER: All images
More informationLegal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationInstallation & Configuration Guide Professional Edition
Installation & Configuration Guide Professional Edition Version 2.3 Updated January 2014 Table of Contents Getting Started... 3 Introduction... 3 Requirements... 3 Support... 4 Recommended Browsers...
More informationThe service note describes the basic steps to install a ip camera for the DVR670
Tech note Description Adding IP camera to DVR670 General The service note describes the basic steps to install a ip camera for the DVR670 Steps involved: 1) Configuration Manager application 2) Camera
More informationThis is a training module for Maximo Asset Management V7.1. It demonstrates how to use the E-Audit function.
This is a training module for Maximo Asset Management V7.1. It demonstrates how to use the E-Audit function. Page 1 of 14 This module covers these topics: - Enabling audit for a Maximo database table -
More informationHow-to setup a proxy in the cloud
This article describes the setup of a proxy-server in a cloud. You can use a proxy like this from everywhere through the internet. Reasons to do this could be: Your internet access is filtered but you
More informationDefender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
More informationIQSweb Reference G. ROSS Migration/Registration
ROSS Migration/Registration Contents IQSweb V3.0.1 ROSS Connection Requirements... 2 Test Agency Network Connectivity to ROSS... 3 FIREWALL Exceptions... 3 FIREWALL Exception Justification... 4 ROSS Interface
More informationAccessing the Online Meeting Room (Blackboard Collaborate)
Step 1: Check your System and Install Required Software NOTE: Make sure you are on the computer you will be using to access the online meeting room AND that you are using the internet browser (ie: firefox,
More informationScan to E-mail Quick Setup Guide
Xerox WorkCentre M118i Scan to E-mail Quick Setup Guide 701P42574 This guide provides a quick reference for setting up the Scan to E-mail feature on the Xerox WorkCentre M118i. It includes procedures for:
More informationXerox Global Print Driver. Installation Guide
Xerox 2010 Xerox Corporation. All Rights Reserved. Unpublished rights reserved under the copyright laws of the United States. Contents of this publication may not be reproduced in any form without permission
More informationEmail client configuration guide. Business Email
Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server
More informationLumension Endpoint Management and Security Suite
Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module
More informationAeries.net Teacher Portal User Documentation July 31, 2015. 1. Access Teacher Portal. 2. Utilizing the Navigation Tree
Aeries.net Teacher Portal User Documentation July 31, 2015 1. Access Teacher Portal 2. Utilizing the Navigation Tree 3. Attendance Attendance Add/Dropped Students ** SSA (Safe Schools Act) Attendance Notes
More informationEucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
More informationTRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE
TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks
More informationThe steps will take about 4 hours to fully execute, with only about 60 minutes of user intervention. Each of the steps is discussed below.
Setup Guide for the XenApp on AWS CloudFormation Template This document walks you through the steps of using the Citrix XenApp on AWS CloudFormation template (v 4.1.5) available here to create a fully
More informationInventoryControl for use with QuoteWerks Quick Start Guide
InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY
More information1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
More information