RULESET DEFINING MANUAL. Manual Version: Software version: 0.6.0

Size: px
Start display at page:

Download "RULESET DEFINING MANUAL. Manual Version: 0.9.1. Software version: 0.6.0"

Transcription

1 RULESET DEFINING MANUAL Manual Version: Software version: Last Revision: June 09, 2011

2 Contents 1 Introduction What is a F-Deets ruleset Where are they located How to modify them Ruleset elements Introduction Parsing rules Rule Detailed Rule Detailed Rule Definition Detailed Rule Reference Rule elements Main regex Check Name Parameters Dummy parameter Special Message parameter Actions Other Color definition Regex definition Load command Comments /26

3 3 Creating rules First rule Using wildcards Categorizing logs Coloring logs Two detailed rules in one rule Removing unwanted log fragments Referencing detailed rule Modifying parameter values Required and defining rules Continue, skip and nomessage actions Using dummy parameters How does the parser work Ruleset loading process Ruleset compilation Parsing process Appendixes Appendix A: A complete list of directives Appendix B: Actions and their behavior Appendix C: Predefined general message parameters Appendix D: Supported date formats /26

4 1 Introduction This document describes the language used to create customized F-Deets parsing rulesets. The rulesets define how the information from log messages transmitted to F-Deets syslog is extracted. While relatively simple and intuitive, the F-Deets ruleset language is a powerful tool that can be utilized to further enhance F-Deets usability. 1.1 What is a F-Deets ruleset F-Deets ruleset is an ordered list of parsing instructions used by the paser to extract information from logs. The rules are processed from top to bottom, one-by-one, until the log message fits one of them. The rule is then applied to this message and the parser proceeds to next log message. There can be more than one ruleset. Parser will process them in the order they are defined in configuration file until one of them recognizes the message. If it is not recognized, the message is stored anyway (and an entry in the application log is created with WARN level informing about unrecognizable event). 1.2 Where are they located All rulesets are stored in {Application directory}/aid/def folder. This is the default location the parser searches. 1.3 How to modify them To modify a ruleset simply use a text editor of your choice. Warning: If there are any syntaxerrors ine the ruleset file the parser service will not start. All errors will be reported at WARN level or greater in parser log file {Application directory}/applog/aid.log. Be sure to keep backup of the original files. In case they get corrupted you may have to reinstall F-Deets completely to restore them. These rulesets may be treated like a simple scripting or markup language. While flexible, there are some restrictions that must be obeyed in order for them to work properly. Even if the parser successfully compiles the rulesets, it may behave in a different way than the rulesets creator intended. Make sure to verify it's behavior after creating rules. 4/26

5 2 Ruleset elements 2.1 Introduction The main element of a ruleset is a rule, which can consist of any number of detailed rules (this includes no detailed rules at all). In a rule or detailed rule actions may appear. They either modify parser's behavior or a value they are related to. Rule and detailed rule may have a check element, which is used to check whether this rule should be applied to given message. Detailed rules may have any number of parameters, which correspond to regex match groups in the order they are defined in detailed rule. The behavior of certain elements may vary depending on where they are defined. The same action may do something for parameter than for a detailed rule. All these elements, their behavior and usage are explained in further sections of this manual. The elements' directives are case insensitive, which means you can either write RD, rd, rd or Rd. Remember that regexes are still case-sensitive! 2.2 Parsing rules There are two types of parsing rules: Rules and Detailed Rules. A rule can consist of any number of detailed rules. Rules contain no parsing information directly, they are used to aggregate detailed rules into one functional entity Rule A rule is the uppermost element of a ruleset. It usually corresponds to one message and is designed to extract all information from this message. Rule should contain an, as simple as possible while still distinctive, check element to increase parsing speed. RD: a name of a rule CH: this regex must be found in the message to match the rule Once a message is matched against a rule, no other rules will be used for this message unless a continue action is encountered Detailed Rule A detailed rule is an element of a rule and it must be declared after a rule. It consists of a regex string, possibly a check instruction, and any number of actions and parameters. The 5/26

6 amount of parameters must be the same as amount of match groups in the regex. If the amounts differ, parser will report error in the log file and will not start. DR: a regex for this rule CH: any check string Detailed Rule Definition A detailed rule definition is a named detailed rule which can be used multiple times. It must contain a name element, and by using this name with Detailed Rule Reference instruction it can be used in any amount of rules. Detailed Rule Definition can occur anywhere, though it is strongly encouraged to define them before all rules. DRD: a regex of the detailed rule definition N: name of the detailed rule Detailed Rule Reference After defining a named detailed rule it can be referenced in any rule. Aprat from having body defined elsewhere, detailed rule references act exactly the same as detailed rules. RD: any rule DRR: an existing detailed rule name 2.3 Rule elements So far only the ruleset logical structure has been covered. The elements of parser rules play a different role they define the data to be extracted and the modifications that will be applied to this data Main regex The main regex is located after the detailed rule directive. It can have any length and any number of matching groups. If the regex is invalid, an error will be reported in the same way. DR: here goes the detailed rule's regex The regex will be matched against the log if any part of the log matches it, i.e. regex cats will be successfully matched against Mike loves cats and dogs. There is no need to 6/26

7 include start/end wildcard (like ^.* or.*$) in the regex. If the regex is to complex (contains to many.* wildcards), the parser might not be able to use it and will quit and report error in the log Check Check is used to verify whether given rule or detailed rule should process a log message. A rule should contain a check element. Detailed rule may, but doesn't have to. Log message is matched against the check regex and the rule/detailed rule is processed if and only if the matching was successful. RD: a traffic rule CH: traffic Name Name element may occur only in detailed rules. By defining a name we get two benefits: the same rule can be used again by calling detailed rule reference command and, in case there are errors in this rule, it's name appears in the application log. Detailed rule definitions must contain a name. DR: traffic shaping N: a simple name Parameters Parameter elements define the names of data extracted from log messages. Each parameter corresponds to one match group exactly in the order they were defined. For regex: IP=(.*) port=(.*) and two parameters IP and port, the first match group would be assigned to IP and the second to port. The name of the parameter will be available as a column in F-Deets gui as soon as it is encountered in a valid ruleset. DR: param1=(\w+) param2=(\w+) P: param1 P: param Dummy parameter Dummy parameter is a special name which can be used to perform an otherwise impossible modification to the log message. The value of this parameter will not be stored in 7/26

8 the database. The usage of dummy parameters is extensively covered in Creating Rules tutorial later in this document. The example below shows a detailed rule which will remove we don't like this part of log from incoming message. DR: (we don't like this part of log) param2=(.*) P: dummy A: delete P: param Special Message parameter A message parameter will automatically be added to the parsed results and it will contain the part of the log remaining after the rule has been applied (some parts of the log may be cut using actions). If you use a parameter called message, it's value will be overwritten automatically Actions Actions can be used to influence parser's behavior or modify either parameter values or the log messages. Some actions have different behavior depending on the preceding element. Actions can be assigned to rules, detailed rules or parameters. They do not need to appear immediately after these elements, they will be applied to the nearest above defined element of any of these types. An example of action-packed rule: RD: start of line CH: NetScreen device_id A: continue A: defining A: required DR: \w+?: NetScreen device_id=(.*?)\s A: delete P: MachineAlias Some actions require additional parameter, some do not. If they do, the parameter should be added after the action's name and be separated from it by a space. Certain actions can not be applied in certain elements. Consult Appendix B for details. 8/26

9 2.4 Other Either of the following elements can occur anywhere in the ruleset file. It is strongly encouraged, however, to keep their locations logical so the ruleset remains easily readable Color definition Color definitions assign string aliases to RGB colors. The defined strings can then be used in combination with color action. The definition looks like this: color: red #FF0000 Colors do not need to be defined before they are used Regex definition A reusable regex can be defined like this: regex: IP \d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3} The first string (no spaces allowed) is the regex's name and the remaining characters are the regular expression itself. It can then be used in a detailed rule regex (or check regex) in this way: IP address (##IP##) is assigned This can be especially useful for long and error-prone regexes. It also makes modifying often-occurring regexes much simpler. Regexes do not need to be defined before they are used Load command Load command can be used to include a ruleset from file. You may want to have all your regexes or colors defined in different files. Large parsers can be divided into smaller parts for readability's sake. If the file location is not absolute, the parser searches {Application directory}/aid/def folder. Using subdirectories is also possible: load: regexes/regex_set_1.def will try do open {Application directory}/aid/def/regexes/regex_set_1.def file. 9/26

10 The loaded file must be a valid ruleset file. It is not possible to have half of a rule defined in one file, and half in the other. The loaded file can, however, reference regexes, colors and detailed rules from the file which loaded it. The loading file may also use the objects defined in the loaded file Comments Comments can occur anywhere in the ruleset file. They start with # char and always cover the while line. It is not possible to create a comment after an instruction. 10/26

11 3 Creating rules This sections explains in detail how to write rules for F-Deets. We believe in learning by doing, so we will be preparing real rules for parsing messages from screenos devices. 3.1 First rule We will start with something simple. We want to parse the following message. Traffic shaping is turned on Let's create a rule: RD: traffic shaping CH: traffic shaping is turned on DR: traffic shaping is turned (on) P: state Let's go through it line by line. The RD: directive creates a new rule and assigns it the name traffic shaping. The next line contains a check element. It means that the rule will be applied to log message only if the message contains traffic shaping is turned on string. DR: element defines a detailed rule with one match group. We want to extract one information from it the state of the traffic shaping feature so we surround the state value with match group delimeters ( and ) and add one parameter state. If we applied this rule to the message, in F-Deets we would actually receive an entry with two parameters: state with value on and parameter message containing the whole log. 3.2 Using wildcards What would happen if we received a message: Traffic shaping is turned off The rule we've created before would not parse this message, since the check element would not be fulfilled. Let's modify the rule to match the new message: 11/26

12 RD: traffic shaping CH: traffic shaping is turned DR: traffic shaping is turned (.*) P: state We've done two things: shortened the check string by removing on from it. Now the parser will match both messages with this check. Secondly, we switched matching group contents to wildcard.* which means that any string can fit this match group. Now we've got a rule that actually parses two slightly different messages. The state value will be either on or off, and the whole message will still be saved. 3.3 Categorizing logs Category is an important parameter and it can be set in two ways. First, we can simply define a parameter called category and match it against any part of the message we want. For a rule like this: RD: traffic shaping CH: traffic shaping is turned DR: (traffic) shaping is turned (.*) P: category P: state We would get a traffic category. Notice that the category parameter has been inserted before the state, because the match group for traffic is before the match group for state. The second way is to use an action. Our rule would then look like this: RD: traffic shaping A: category traffic CH: traffic shaping is turned DR: traffic shaping is turned (.*) P: state Notice that the action is defined after the rule definition. In this case it could be defined after detailed rule and it would have the same effect. However, if you have many detailed rules in one rule, each detailed rule may define it's own category. If the detailed rule is matched, it's category will replace the earlier category assigned to this log. 12/26

13 3.4 Coloring logs Coloring logs is achieved through a color action. If we wanted to color our rule blue, it would look like this: RD: traffic shaping A: category traffic A: color #0000FF CH: traffic shaping is turned DR: traffic shaping is turned (.*) P: state We can also define the color earlier as a string, using the color directive: color: blue #0000FF RD: traffic shaping A: category traffic A: color blue CH: traffic shaping is turned DR: traffic shaping is turned (.*) P: state The color name will be converted to the number in while compiling ruleset. If you modify the color's value the change will not propagate to earlier-parsed logs. 3.5 Two detailed rules in one rule One rule may contain more than one detailed rule (or might not contain any at all, the message would only be stored then). To illustrate this we will prepare a rule for such two messages: NTP server is disabled on interface ethernet0/5 NTP server is enabled on interface ethernet0/4, mode: control This message contains two parts. First defines the state of the NTP server, the second defined the server's mode. However, the second part occurs only when the NTP server is enabled. Let's create a rule capable of parsing both of these messages: 13/26

14 RD: NTP server is dis/en abled CH: NTP server is DR: server is (enabled) on interface (.*), mode:?(.*) CH: enabled P: state P: interface P: mode DR: server is (disabled) on interface (.*) CH: disabled P: state P: interface Each of the detailed rules contains a check element. The first is applied only when there is a word enabled inside the message, the second, if disabled occurs. This is a crude way of doing this, but it certainly works. By keeping the checks simple, we ensure that the parser works quickly. Let's try to make a rule doing the same thing, but in a different way: RD: NTP server is dis/en abled CH: NTP server is DR: server is (.*) on interface (.*)(?:$,) CH: enabled disabled P: state P: interface DR: mode:(.*) CH: mode P: mode The first detailed rule gets the state and interface, regardless of whether the server is on or off, and the second detailed rule finds the server's mode if it is specified. Notice the (?:$,) after the interface match group. Since we use a general (and greedy!) wildcard which fits any string, for this message NTP server is enabled on interface ethernet0/4, mode: control the parameter interface would be equal ethernet0/4, mode: control if we hadn't used the (?:$,). It would also be possible to define the interface string in a better way, like this: #regex interface [A-Za-z]+\d/\d Which would allow us to skip the (?:$,) wildcard. 14/26

15 3.6 Removing unwanted log fragments CC Open Computer Systems Ltd. Sometimes we want to remove a part of a message. It can make the log less readable, it can contain redundant information. We received the following message: PASSWORD authentication successful for admin user 'backup' at host ( :01:01) And we want to remove the date time part at the end of the line while saving its value as a parameter. So we prepare a detailed rule to do it: DRD: \((\d{4}-\d{2}-\d{2}\s+\d+:\d+:\d+)\) N: time at the end of line A: delete P: timeserver This is a detailed rule reference, which can be used in any rule. When building the regex we should be as precise as possible to reduce parser's matching time. The most important part of this rule is the delete action. Placing it after the rule definition means, that the part of the log message matched against this regex will be removed from the message. So after applying this rule to our message, the remaining part would be: PASSWORD authentication successful for admin user 'backup' at host So we've gotten rid of the unwanted part. If we didn't want to store the value at the end of the line, we would have to remove the grouping brackets from regular expression and remove the timeserver parameter. 3.7 Referencing detailed rule In the previous example we've defined a named detailed rule which removes a part of a message. How do we use it in a rule? A complete rule parsing the previous message would look like this: 15/26

16 RD: authentication successful for admin CH: authentication successful for admin A: category security DRR: time at the end of line DR: (.*) authentication successful for admin user '(.*)' at host (##IP##)\. P: auth type P: user P: sourceip rule. By using the DRR instruction we include the previously defined detailed rule in this 3.8 Modifying parameter values After each parameter there can be any number of actions that modify it's value. The possible actions are: deletestr <str> - deletes str from the parameter's value replace <str> - replaces the parameter's whole matched value with given string; if used with dummy parameter, will replace the matched string with given string in the message itself insertbefore <str> - inserts the given string before the parameter's value insertafter <str> - inserts the given string after the parameter's value tolowercase converts the parameters value to lowercase characters touppercase converts the parameters value to uppercase characters 3.9 Required and defining rules Some actions can be applied to rules. The required action marks a rule or a detailed rule and causes a parser to finish working when such a rule is not matched. If a message from given device contains some distinguishing elements, such required rule can be used to boost parser's efficiency. Instead of trying to apply all it's rules to a message, it will stop working after not matching a required rule and proceed to next ruleset. 3Defining rules have opposite meaning. If such rule is matched, the parser will permanently assign its ruleset to the IP address of the device that sent this message. It will not try to use other rulesets for this device, therefore improving performance. Great caution must be taken when creating defining and required rules. Making a too restrictive required rule might make some messages unparseable. Making a not restrictive enough defining rule may assign a wrong parser to a device. Here is an example of both defining and required rule: 16/26

17 RD: start of line CH: NetScreen device_id A: continue A: defining A: required DR: \w+?: NetScreen device_id=(.*?)\s A: delete P: MachineAlias 3.10 Continue, skip and nomessage actions A continue action can be defined for either rule or detailed rule. If rule with this action is fulfilled, the parser will not stop processing the ruleset and will continue to next rules. This can be useful for removing constant-syntax parts of the message, like, for example, source IP or time. If a skip action is defined for a rule or detailed rule, then the messages matched against this rule will simply not be saved to F-Deets database. Nomessage action is also defined in rule or detailed rule and, when encountered, will tell the parser not to save the message parameter automatically. By default, the whole message remaining at the end of the parsing will be saved as a message parameter Using dummy parameters A dummy parameter has been mentioned before. It can be used to perform changes on a part of a log message using normal grouping regexes without creating unnecessary parameters. For example, we have such message: Certificate cert1 with expiration date has expired And we want to convert it to: Certificate cert1 has expired on To do this, we can make the following rule: 17/26

18 RD: simple convert rule CH: with expiration date.* has expired DR: (with expiration date).*( has expired) P: dummy A: replace has expired on P: dummy A: delete The first match group will be replaces with has expired on string, and the second (after the date) will be deleted. Neither matching group will be saved as a separate field for this log message. The whole text, after modification, will be saved as message by default. 18/26

19 4 How does the parser work In order to process log messages, the rulesets first need to be loaded. The parser opens devices.cfg file from config directory and loads all the rulesets defined there. Also, it may associate the ruleset with an IP address if one is defined in the config file. After the configration file has been read, all the rulesets are loaded and pre-parsed. If there are any syntax errors, an appropriate message will be appended to aid.log in applog directory and the parser will stop working. When there are no syntax errors the ruleset will be compiled. All regexes will be prepared, regex, color and detailed rule references will be resolved. If any of these stages fails, the parser will append a message to log and quit. After all rulesets have been successfully loaded, the parsing commences. All errors will cause the parser to quit. If you modified a ruleset and the parser process doesn't start, consult aid.log for details. 4.1 Ruleset loading process When the file is successfully opened and read, each line is parsed one by one. Comment lines are silently skipped, so are empty lines. The order of instructions is verified (parameter must be defined after a detailed rule, detailed rule can not be defined without a rule, etc). The actions locations are also validated some of them must be assigned to parameters, some to rules. If there is a misplaced action it will be reported in this stage. The same goes for unrecognized instructions, unrecognized actions and actions lacking required parameters. 4.2 Ruleset compilation In this stage all dynamic elements are resolved. This includes colors, regexes and detailed rules. After resolving regular expressions references, the resulting expressions are also validated. This operation takes place after executing all load commands, so cross-file references are possible and will not cause an error. Unrecognized references and invalid regexes will result in the parser not running. All errors will be reported in aid.log file. When the ruleset is verified, the encountered parameters are synchronized with the database. If you have used your own, new parameter names, they will be available in F-Deets GUI after compiling was successful. 19/26

20 4.3 Parsing process A log message is processed by all rulesets until one of them reports that it recognized the message. Inside one ruleset, the message is matched against all rules. If the message fulfills the rule's check, then all of this rule's detailed rules are applied to the message. Detailed rule may contain a check element and if it does, the message is matched against it. If it passes or there is no such element specified, the detailed rule's main regex is used to extract information from the message, modify the message, etc. If the rule or any of it's detailed rules contains continue action, then parsing is continued in the same ruleset. If there are not non-continue rules that matched against this message, the parser proceeds to the next ruleset. The parsed message is isolated for each ruleset, so even if it has been modified by any rules in one of the rulesets, the message will return to original for next rulesets. If a skip action has been applied, the log message will not be saved into F-Deets database. For a defining action the devices.cfg configuration file will be updated with new IP/ruleset mapping. 20/26

21 5 Appendixes 5.1 Appendix A: A complete list of directives Direct ive RD Name Parameters Location Action Comment Rule Definition Name Anywhere Create a new rule DR Detailed Rule Regex After RD Create a new detailed rule DRD DRR Detailed Rule Definition Detailed Rule Reference Regex Anywhere Create a new, named, detailed rule Name After RD Reference a previously defined detailed rule CH Check Regex After RD or DR N Name Name After DR or DRD P Parameter Name After DR or DRD A Action Name parameter regex Regex definition load Load file instruction color Color definition After RD, DR, DRD or P Check if rule applies to message Associates a detailed rule with a name Associates a matching group with a name Creates an action for given element Required N directive Should be as simple as possible Necessary for DRD, for DR useful for debugging log files Name regex Anywhere Creates a regex alias Preferably defined at the beginning of a file Filename Anywhere Loads a definitions file Preferably defined at the beginning of a file name #RRGGBB Anywhere Creates a color alias Preferably defined at the beginning of a file 21/26

22 5.2 Appendix B: Actions and their behavior defining if a rule with this action is fullfilled, the currently processed log is marked as defining, which means that the IP address of the device will be permanently associated with the parser that contains this action. Applies to: RD, DR, DRD required if a rule with this action is not fulfilled, the parser stops execution and the log message processing proceeds to next parser. Applies to: RD, DR, DRD continue if a rule with this action is fulfilled, the parser will still process next rules. Useful for cutting unchanging elements of the message. Applies to: RD, DR, DRD nomessage if a rule with this action is fulfilled, the parser will not save the message parameter to the database. Applies to: RD, DR, DRD skip - if a rule with this action is fulfilled, the parser will not save any information about this message to the database. Applies to: RD, DR, DRD category - if a rule with this action is fulfilled, the category of the message is set to action's parameter. Applies to: RD, DR, DRD color - if a rule with this action is fulfilled, the color of the message is set to action's parameter. The parameter can be either #RRGGBB code or an alias defined through color instruction Applies to: RD, DR, DRD delete the action depends on the place if was used: DR, DRD: removes the whole matched regex from the log string. For a message: Admin user backup has logged on via SSH from :36933 and a rule: 22/26

23 DR: Admin user (.*) has A: delete P: user The message would be transformed to: logged on via SSH from :36933 P: removes the parameter's value from the log string. The parameter is still assigned the proper value. For a message: Admin user backup has logged on via SSH from :36933 and a rule: DR: Admin user (.*) has P: user A: delete The message would be transformed to: Admin user has logged on via SSH from :36933 Applies to: DR, DRD, P deletestr removes the given string from associated element. DR, DRD: removes a string from a message. For a message: Admin user backup has logged on via SSH from :36933 and a rule: DR: Admin user (.*) has A: deletestr Admin user P: user The message would be transformed to: backup has logged on via SSH from :36933 P: removes a string from a the parameter value message. The log message remains unchanged. For a message: Admin user backup has logged on via SSH from :36933 and a rule: 23/26

24 DR: Admin user (.*) has P: user A: deletestr bac The user parameter's value would be kup The action would change if one used the dummy parameter. Consider this rule: DR: Admin user (.*) has P: dummy A: deletestr bac It would transform the message, in the same way as in the first case, to: Admin user kup has logged on via SSH from :36933 Applies to: DR, DRD, P replace replaces the associated parameter's value with given string. For a message: Admin user backup has logged on via SSH from :36933 and a rule: DR: Admin user (.*) has P: user A: replace AN USER The user parameter value wolud be AN USER. However, for a message: Admin user backup has logged on via SSH from :36933 and a rule: DR: Admin user (.*) has P: dummy A: replace AN USER It would transform the message to: Admin user AN USER has logged on via SSH from :36933 insertbefore insets the given string before the associated element. DR: inserts the string before the whole matched message. For a message: Admin user backup has logged on via SSH from :36933 and a rule: 24/26

25 DR: from ##IP## A: insertbefore _protocol The resulting message would be: Admin user backup has logged on via SSH protocol from :36933 Remember, that for action values the _ character will be translated into space. A space at the start/end of a value will be trimmed. P: inserts the string before the matched parameter's value. Affects only the parameter itself. For a message: Admin user backup has logged on via SSH from :36933 and a rule: DR: Admin user (.*) has P: user A: insertbefore mr. The user parameter's value would be : mr.backup Have we used dummy parameter instead of user, the behavior would be different - the log message would be modified. For exactly the same message and rule like this: DR: Admin user (.*) has P: dummy A: insertbefore mr. The resulting message would be: Admin user mr.backup has logged on via SSH protocol from :36933 And, of course, the dummy parameter would not be stored. insertafter behaves exactly like insertbefore, except that it inserts the value after matched string or at the end of parameter. tolowercase converts the related string value to lowercase Applies to: RD, DR, DRD, P touppercase converts the related string value to uppercase Applies to: RD, DR, DRD, P 25/26

26 5.3 Appendix C: Predefined general message parameters All these names are case-insensitive. They can not, however, contain any spaces. If they do, they will be treated as different parameters. DeviceName DeviceIp TimeSource TimeServer SourceIp SourceDnsName SourcePort DestinationIp DestinationDnsName DestinationPort SourceXlatedIp SourceXlatedPort DestinationXlatedIp DestinationXlatedPort Action Category MessageNumber MessageType MachineAlias Message 5.4 Appendix D: Supported date formats syslogd format: month d HH:MM:SS, examples: Oct 17 14:52:13, Dec 1 01:34:51 ISO 601: YYYY-MM-DDTHH:MM:SS+HH:MM, examples: T21:46:18+02:00, T01:11:34 simple date time format, examples: :59:01, :13:48 26/26

Handle Tool. User Manual

Handle Tool. User Manual User Manual Corporation for National Research Initiatives Version 2 November 2015 Table of Contents 1. Start the Handle Tool... 3 2. Default Window... 3 3. Console... 5 4. Authentication... 6 5. Lookup...

More information

Eventia Log Parsing Editor 1.0 Administration Guide

Eventia Log Parsing Editor 1.0 Administration Guide Eventia Log Parsing Editor 1.0 Administration Guide Revised: November 28, 2007 In This Document Overview page 2 Installation and Supported Platforms page 4 Menus and Main Window page 5 Creating Parsing

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Configuring Logging. Information About Logging CHAPTER

Configuring Logging. Information About Logging CHAPTER 52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page

More information

FileBench's Multi-Client feature

FileBench's Multi-Client feature FileBench's Multi-Client feature Filebench now includes facilities to synchronize workload execution on a set of clients, allowing higher offered loads to the server. While primarily intended for network

More information

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Configuration Syslog server add and check Configure SNMP on

More information

Rational Rational ClearQuest

Rational Rational ClearQuest Rational Rational ClearQuest Version 7.0 Windows Using Project Tracker GI11-6377-00 Rational Rational ClearQuest Version 7.0 Windows Using Project Tracker GI11-6377-00 Before using this information, be

More information

FTP Service Reference

FTP Service Reference IceWarp Server FTP Service Reference Version 10 Printed on 12 August, 2009 i Contents FTP Service 1 V10 New Features... 2 FTP Access Mode... 2 FTP Synchronization... 2 FTP Service Node... 3 FTP Service

More information

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

Installing, Uninstalling, and Upgrading Service Monitor

Installing, Uninstalling, and Upgrading Service Monitor CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page

More information

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on

More information

BlueJ Teamwork Tutorial

BlueJ Teamwork Tutorial BlueJ Teamwork Tutorial Version 2.0 for BlueJ Version 2.5.0 (and 2.2.x) Bruce Quig, Davin McCall School of Engineering & IT, Deakin University Contents 1 OVERVIEW... 3 2 SETTING UP A REPOSITORY... 3 3

More information

Setting Up Your FTP Server

Setting Up Your FTP Server Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This

More information

NovaBACKUP Storage Server User Manual NovaStor / April 2013

NovaBACKUP Storage Server User Manual NovaStor / April 2013 NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

IP Configuration Manual

IP Configuration Manual IP Configuration Manual Safety precautions and warnings Thank you for deciding to use a Frama Franking System. The information in this guide is intended to support you during the configuration of the franking

More information

How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)

How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook) MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

After you have created your text file, see Adding a Log Source.

After you have created your text file, see Adding a Log Source. TECHNICAL UPLOADING TEXT FILES INTO A REFERENCE SET MAY 2012 This technical note provides information on how to upload a text file into a STRM reference set. You need to be comfortable with writing regular

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part

More information

Chapter 2 Connecting the FVX538 to the Internet

Chapter 2 Connecting the FVX538 to the Internet Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.

More information

How To Backup A Database In Navision

How To Backup A Database In Navision Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft

More information

NovaBACKUP. User Manual. NovaStor / November 2011

NovaBACKUP. User Manual. NovaStor / November 2011 NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without

More information

Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting

Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting 1 Active Directory Overview SS4200-E Active Directory is based on the Samba 3 implementation The SS4200-E will function

More information

Using the Radmind Command Line Tools to. Maintain Multiple Mac OS X Machines

Using the Radmind Command Line Tools to. Maintain Multiple Mac OS X Machines Using the Radmind Command Line Tools to Maintain Multiple Mac OS X Machines Version 0.8.1 This document describes how to install, configure and use the radmind client and server tools to maintain a small

More information

VTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00

VTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00 VTLBackup4i Backup your IBM i data to remote location automatically Quick Reference and Tutorial Version 02.00 Manufacture and distributed by VRTech.Biz LTD Last Update:16.9.2013 Contents 1. About VTLBackup4i...

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

orrelog SNMP Trap Monitor Software Users Manual

orrelog SNMP Trap Monitor Software Users Manual orrelog SNMP Trap Monitor Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SNMP Trap Monitor Software Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No

More information

VMware vcenter Discovered Machines Import Tool User's Guide Version 5.3.0.25 for vcenter Configuration Manager 5.3

VMware vcenter Discovered Machines Import Tool User's Guide Version 5.3.0.25 for vcenter Configuration Manager 5.3 VMware vcenter Discovered Machines Import Tool User's Guide Version 5.3.0.25 for vcenter Configuration Manager 5.3 This document supports the version of each product listed and supports all subsequent

More information

Evaluator s Guide. PC-Duo Enterprise HelpDesk v5.0. Copyright 2006 Vector Networks Ltd and MetaQuest Software Inc. All rights reserved.

Evaluator s Guide. PC-Duo Enterprise HelpDesk v5.0. Copyright 2006 Vector Networks Ltd and MetaQuest Software Inc. All rights reserved. Evaluator s Guide PC-Duo Enterprise HelpDesk v5.0 Copyright 2006 Vector Networks Ltd and MetaQuest Software Inc. All rights reserved. All third-party trademarks are the property of their respective owners.

More information

MPP Manager Users Guide

MPP Manager Users Guide MPP Manager Users Guide Spam Quarantine and Email Archive Administration \ August, 2008 MPP Mable of Contents 1 About This Guide 4 1.1 MPP Manager Overview 4 1.2 Other Documentation 4 2 Mppserver MPP Manager

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

SSL Tunnels. Introduction

SSL Tunnels. Introduction SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,

More information

Wakanda Studio Features

Wakanda Studio Features Wakanda Studio Features Discover the many features in Wakanda Studio. The main features each have their own chapters and other features are documented elsewhere: Wakanda Server Administration Data Browser

More information

Ingenious Testcraft Technical Documentation Installation Guide

Ingenious Testcraft Technical Documentation Installation Guide Ingenious Testcraft Technical Documentation Installation Guide V7.00R1 Q2.11 Trademarks Ingenious, Ingenious Group, and Testcraft are trademarks of Ingenious Group, Inc. and may be registered in the United

More information

Monitoring the Firewall Services Module

Monitoring the Firewall Services Module 24 CHAPTER This chapter describes how to configure logging and SNMP for the FWSM. It also describes the contents of system log messages and the system log message format. This chapter does not provide

More information

Migrating to vcloud Automation Center 6.1

Migrating to vcloud Automation Center 6.1 Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

XCloner Official User Manual

XCloner Official User Manual XCloner Official User Manual Copyright 2010 XCloner.com www.xcloner.com All rights reserved. xcloner.com is not affiliated with or endorsed by Open Source Matters or the Joomla! Project. What is XCloner?

More information

DMP V2.0.1 Installation and Upgrade Reference

DMP V2.0.1 Installation and Upgrade Reference DMP V2.0.1 Installation and Upgrade Reference Page 1 of 40 Table of Contents Overview... 3 Compatibility Issues with Previous DMP Versions... 3 DMP V2.0.1 Installation... 3 Sybase CD... 3 Installed Components...

More information

This technical note provides information on how to customize your email notifications. This section includes the following topics:

This technical note provides information on how to customize your email notifications. This section includes the following topics: TECHNICAL NOTE CONFIGURING CUSTOM EMAIL NOTIFICATIONS AUGUST 2012 When configuring rules in STRM, you can specify that each time the rule generates a response, an email notification is sent to recipients

More information

VoipSwitch Security Audit

VoipSwitch Security Audit VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM 10.00 PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : 11.11.11.11 Server has

More information

Integrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP

Integrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP Integrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP Introducing the CoroSoft BIG-IP Solution Configuring the CoroSoft BIG-IP Solution Optimizing the BIG-IP configuration Introducing

More information

2 SQL in iseries Navigator

2 SQL in iseries Navigator 2 SQL in iseries Navigator In V4R4, IBM added an SQL scripting tool to the standard features included within iseries Navigator and has continued enhancing it in subsequent releases. Because standard features

More information

Log Analyzer Reference

Log Analyzer Reference IceWarp Unified Communications Log Analyzer Reference Version 10.4 Printed on 27 February, 2012 Contents Log Analyzer 1 Quick Start... 2 Required Steps... 2 Optional Steps... 3 Advanced Configuration...

More information

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc. Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4

More information

Pharos Uniprint 8.4. Maintenance Guide. Document Version: UP84-Maintenance-1.0. Distribution Date: July 2013

Pharos Uniprint 8.4. Maintenance Guide. Document Version: UP84-Maintenance-1.0. Distribution Date: July 2013 Pharos Uniprint 8.4 Maintenance Guide Document Version: UP84-Maintenance-1.0 Distribution Date: July 2013 Pharos Systems International Suite 310, 80 Linden Oaks Rochester, New York 14625 Phone: 1-585-939-7000

More information

Managing Users and Identity Stores

Managing Users and Identity Stores CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting

More information

An Introduction To The Web File Manager

An Introduction To The Web File Manager An Introduction To The Web File Manager When clients need to use a Web browser to access your FTP site, use the Web File Manager to provide a more reliable, consistent, and inviting interface. Popular

More information

DC Agent Troubleshooting

DC Agent Troubleshooting DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation

More information

EdgeCast Networks Inc. Token-Based Authentication Administration Guide

EdgeCast Networks Inc. Token-Based Authentication Administration Guide EdgeCast Networks Inc. Token-Based Authentication Administration Guide Disclaimer Care was taken in the creation of this guide. However, EdgeCast Networks Inc. cannot accept any responsibility for errors

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

VX Search File Search Solution. VX Search FILE SEARCH SOLUTION. User Manual. Version 8.2. Jan 2016. www.vxsearch.com info@flexense.com. Flexense Ltd.

VX Search File Search Solution. VX Search FILE SEARCH SOLUTION. User Manual. Version 8.2. Jan 2016. www.vxsearch.com info@flexense.com. Flexense Ltd. VX Search FILE SEARCH SOLUTION User Manual Version 8.2 Jan 2016 www.vxsearch.com info@flexense.com 1 1 Product Overview...4 2 VX Search Product Versions...8 3 Using Desktop Product Versions...9 3.1 Product

More information

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1 The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)

More information

Diamond II v2.3 Service Pack 4 Installation Manual

Diamond II v2.3 Service Pack 4 Installation Manual Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance

More information

WEB2CS INSTALLATION GUIDE

WEB2CS INSTALLATION GUIDE WEB2CS INSTALLATION GUIDE FOR CPANEL / WHM XandMail 32, rue de Cambrai 75019 PARIS - FRANCE Tel : +33 (0)1 40 388 700 - http://www.xandmail.com TABLE OF CONTENTS 1. INSTALLING WEB2CS 4 1.1. ADDING XANDMAIL

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

High Availability Solutions & Technology for NetScreen s Security Systems

High Availability Solutions & Technology for NetScreen s Security Systems High Availability Solutions & Technology for NetScreen s Security Systems Features and Benefits A White Paper By NetScreen Technologies Inc. http://www.netscreen.com INTRODUCTION...3 RESILIENCE...3 SCALABLE

More information

Eventlog to Syslog v4.5 Release 4.5 Last revised September 29, 2013

Eventlog to Syslog v4.5 Release 4.5 Last revised September 29, 2013 Eventlog to Syslog v4.5 Release 4.5 Last revised September 29, 2013 This product includes software developed by Purdue University. The Eventlog to Syslog utility is a windows service originally created

More information

Tracking Network Changes Using Change Audit

Tracking Network Changes Using Change Audit CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

RealPresence Platform Director

RealPresence Platform Director RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director

More information

Mailgate Ltd. MailGate Spam Filter User Manual

Mailgate Ltd. MailGate Spam Filter User Manual Mailgate Ltd. MailGate Spam Filter User Manual Microsoft is a registered trademark and Windows 95, Windows 98 and Windows NT are trademarks of Microsoft Corporation. Copyright 2001 Mailgate Ltd. All rights

More information

E-mail Settings 1 September 2015

E-mail Settings 1 September 2015 Training Notes 1 September 2015 PrintBoss can be configured to e-mail the documents it processes as PDF attachments. There are limitations to embedding documents in standard e-mails. PrintBoss solves these

More information

IPedge Feature Desc. 5/25/12

IPedge Feature Desc. 5/25/12 OVERVIEW IPedge Enterprise Manager Active Directory Sync (ADSync) is a feature that automatically configures telephone users in the IPedge system based on data entry in the Active Directory service. Active

More information

Gigabyte Content Management System Console User s Guide. Version: 0.1

Gigabyte Content Management System Console User s Guide. Version: 0.1 Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...

More information

CRM Global Search: Installation & Configuration

CRM Global Search: Installation & Configuration Installation ***Important: It is highly recommended that you first take a backup of your current CRM Application Ribbons prior to importing this solution. Please do so by navigating to Settings > Solutions

More information

Software License Registration Guide

Software License Registration Guide Software License Registration Guide When you have purchased new software Chapter 2 Authenticating a License When you would like to use the software on a different PC Chapter 3 Transferring a License to

More information

FTP Service Reference

FTP Service Reference IceWarp Unified Communications Reference Version 11.3 Published on 1/6/2015 Contents... 3 About... 4 Reference... 5 General Tab... 5 Dialog... 6 FTP Site... 6 Users... 7 Groups... 11 Options... 14 Access...

More information

WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM

WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create

More information

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection. TECHNICAL NOTE FORWARDING LOGS USING TAIL2SYSLOG MARCH 2013 The Tail2Syslog support script provides a method for monitoring and forwarding events to STRM using syslog for real-time correlation. Tail2Syslog

More information

TICO-EN. TiXML-Console TICO. User Manual V1.4.0.8

TICO-EN. TiXML-Console TICO. User Manual V1.4.0.8 TICO-EN TiXML-Console TICO User Manual V1.4.0.8 2008 Tixi.Com GmbH, Berlin Publication close: September 2008, v.1.4.0.8 This manual is protected by copyright. Any further sale is prohibited without the

More information

NETASQ ACTIVE DIRECTORY INTEGRATION

NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos

More information

Introduction. How does FTP work?

Introduction. How does FTP work? Introduction The µtasker supports an optional single user FTP. This operates always in active FTP mode and optionally in passive FTP mode. The basic idea of using FTP is not as a data server where a multitude

More information

Address Synchronization Tool Administrator Guide

Address Synchronization Tool Administrator Guide Address Synchronization Tool Administrator Guide This guide is for systems administrators configuring the Address Synchronization Tool to update the information used by MessageLabs in the provision of

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

McAfee Enterprise Security Manager 9.3.2

McAfee Enterprise Security Manager 9.3.2 Release Notes McAfee Enterprise Security Manager 9.3.2 Contents About this release New features for 9.3.2 Upgrade instructions for 9.3.2 Find product documentation About this release This document contains

More information

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.

More information

Configuring Failover

Configuring Failover Configuring Failover 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Perforce 2014.1 Defect Tracking Gateway Guide

Perforce 2014.1 Defect Tracking Gateway Guide Perforce 2014.1 Defect Tracking Gateway Guide November 2014 This manual copyright 2006-2014 Perforce Software. All rights reserved. Perforce software and documentation is available from http://www.perforce.com.

More information

USER GUIDE MANTRA WEB EXTRACTOR. www.altiliagroup.com

USER GUIDE MANTRA WEB EXTRACTOR. www.altiliagroup.com USER GUIDE MANTRA WEB EXTRACTOR www.altiliagroup.com Page 1 of 57 MANTRA WEB EXTRACTOR USER GUIDE TABLE OF CONTENTS CONVENTIONS... 2 CHAPTER 2 BASICS... 6 CHAPTER 3 - WORKSPACE... 7 Menu bar 7 Toolbar

More information

SuperLumin Nemesis. Administration Guide. February 2011

SuperLumin Nemesis. Administration Guide. February 2011 SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

Nesstar Server Nesstar WebView Version 3.5

Nesstar Server Nesstar WebView Version 3.5 Unlocking data creating knowledge Version 3.5 Release Notes November 2006 Introduction These release notes contain general information about the latest version of the Nesstar products and the new features

More information

IceWarp to IceWarp Server Migration

IceWarp to IceWarp Server Migration IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone

More information

Mailbox Recovery for Microsoft Exchange 2000 Server. Published: August 2000 Updated: July 2002 Applies To: Microsoft Exchange 2000 Server SP3

Mailbox Recovery for Microsoft Exchange 2000 Server. Published: August 2000 Updated: July 2002 Applies To: Microsoft Exchange 2000 Server SP3 Mailbox Recovery for Microsoft Exchange 2000 Server Published: August 2000 Updated: July 2002 Applies To: Microsoft Exchange 2000 Server SP3 Copyright The information contained in this document represents

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records

More information

Installation Instructions

Installation Instructions Installation Instructions 25 February 2014 SIAM AST Installation Instructions 2 Table of Contents Server Software Requirements... 3 Summary of the Installation Steps... 3 Application Access Levels... 3

More information

System Administration Guide

System Administration Guide www.novell.com/documentation System Administration Guide Data Synchronizer 1.2 August 22, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this

More information

LICENSE4J FLOATING LICENSE SERVER USER GUIDE

LICENSE4J FLOATING LICENSE SERVER USER GUIDE LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux

More information

Backing Up and Restoring Data

Backing Up and Restoring Data Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application

More information

Smart Card Authentication Client. Administrator's Guide

Smart Card Authentication Client. Administrator's Guide Smart Card Authentication Client Administrator's Guide April 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Smart Card Authentication Client...4 Configuring printer settings for use

More information

Using DC Agent for Transparent User Identification

Using DC Agent for Transparent User Identification Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

PROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein

PROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein PROJECTIONS SUITE Database Setup Utility (and Prerequisites) Installation and General Instructions v0.9 draft prepared by David Weinstein Introduction These are the instructions for installing, updating,

More information

How to Configure Dynamic DNS on a Virtual Access Router

How to Configure Dynamic DNS on a Virtual Access Router How to Configure Dynamic DNS on a Virtual Access Router Issue 1.0 Date 03 April 2012 Table of contents 1 About this document... 3 1.1 Scope... 3 1.2 Readership... 3 1.3 Terminology... 3 2 Introduction...

More information