Ensuring end-to-end protection of video integrity

Size: px
Start display at page:

Download "Ensuring end-to-end protection of video integrity"

Transcription

1 White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015

2 Milestne Systems Ensuring end-t-end prtectin f vide integrity Table f Cntents Intrductin... 3 Purpse and target audience... 3 Vide flw and inherent security risks... 3 Addressing security cncerns and risks Vide captured by camera Vide streamed t the Recrding Server Vide stred in the Recrding Server database Live r recrded vide is send t a client ver a netwrk Live r recrded vide viewed and exprted t a media Exprted evidence media is transprted frm the surveillance site t plice r a curt The exprted evidence is viewed by plice r a judge in a curt Benefits and summary Page2 f 15

3 Intrductin Milestne Systems Ensuring end-t-end prtectin f vide integrity In applicatins and installatins where vide plays a critical rle as evidence material, it is paramunt that the vide is transmitted, stred and in general handled in a secure way; frm the time it is captured by the camera t the time it is used as evidence, fr example in a curt f law. Milestne XPrtect Crprate and XPrtect Smart Client prvide a series f security mechanisms that enable users t maintain full end-t-end security and integrity f recrded vide data. Vide database encryptin, digital signing f vide databases and a functin t prevent re-exprt f the exprted material are cre cmpnents f Milestne s vide management slutin fr ensuring and prtecting the integrity f the vide evidence. Purpse and target audience The purpse f this white paper is t give a general verview f hw vide is transmitted frm the camera and stred securely in the XPrtect Crprate Recrding Server databases, as well as hw exprted recrdings are secured and validated in the XPrtect Smart Client Player when used as evidence. The primary audience fr this white paper is individuals r rganizatins with surveillance prjects/installatins where vide and evidence handling is critical. The target grup might include (but is nt limited t) the fllwing audiences: surveillance system architects/designers and surveillance prject cnsultants security fficers cmpanies rganizatins and law enfrcement bdies This white paper shuld enable the reader t understand hw recrdings are secured frm transmissin frm the camera t viewing exprted recrdings as evidence, as well as hw t implement and use the extended security in the mst ptimal way. The reader is assumed t have a general understanding f Milestne XPrtect Crprate and IP vide management slutins in general. Vide flw and inherent security risks In any vide surveillance system, analg r digital, there is an inherent security risk in the different parts, cmpnents r data/vide transprtatin media used. These Page3 f 15

4 Milestne Systems Ensuring end-t-end prtectin f vide integrity elements f the system may be tampered with r the security f them can be cmprmised. In digital vide surveillance systems, the vide flw is typically as illustrated belw. Each functin and cmpnent has its wn inherent risks, examples f which are listed here: 1. Vide is captured by a camera Camera may be discnnected, stlen r simply vandalized Camera may be tampered with by turning it r by cvering the lens 2. Vide is streamed ver the netwrk t a Recrding Server The netwrk may be discnnected r flded with unwanted data due t a distributed denial-f-service (DDOS) attack The netwrk may be cmprmised giving unauthrized persns access t tapping int the transmitted vide 3. The Recrding Server stres the vide in its vide database The Recrding Server may be turned ff r fail Micrsft Windws security culd be cmprmised giving lcal r remte access t the vide database files 4. Live r recrded vide is sent ver a netwrk t a client Page4 f 15

5 Milestne Systems Ensuring end-t-end prtectin f vide integrity The netwrk may be discnnected r flded with unwanted data due t a DDOS attack The netwrk may be cmprmised giving unauthrized persns access t tapping int the transmitted vide 5. The client decdes the vide and displays it n the mnitr and ffers a functin t exprt vide recrdings fr evidence Unauthrized persns may try t hack r therwise btain lgin credentials t gain unauthrized access t viewing and exprting vide Authenticated surveillance users may try t tamper with exprted material 6. Exprted evidence media is transprted frm the surveillance site t plice r a curt The exprted vide may be viewed and cpied by unauthrized persns The exprted vide may be tampered with remving critical sequences f the recrded vide r be mdified t give anther impressin f the recrded evidence 7. The exprted evidence is viewed by plice r a judge in curt The exprted vide may have been tampered with remving critical sequences f the recrded vide r be mdified t give anther impressin f the recrded evidence Page5 f 15

6 Milestne Systems Ensuring end-t-end prtectin f vide integrity Addressing security cncerns and risks As highlighted in the previus sectin, there are several places where security can be breached. T address these security cncerns and inherent risks, Milestne has implemented several security functins in additin t the standard security measures that can be used t increase the security f the verall vide system and its recrdings. The belw illustratin shws the pssible security measures t cunter tampering and fraud in each f the vide flw steps. 1. Vide captured by camera Risk: Camera may be discnnected, stlen r simply vandalized Milestne XPrtect Crprate will autmatically detect if the camera is nt respnding r stps streaming vide t the system. Once the system detects this it issues a cmmunicatin errr event, which triggers alarms r rules that ntifies the right peple f the issue. Risk: Camera may be tampered with by turning it r by cvering the lens Many cameras can detect tampering events f different kinds, such as tampering, vide lss, and temperature. These events can be received by the XPrtect Crprate system that triggers alarms r rules, which ntifies the right peple f the issue. Page6 f 15

7 2. Vide streamed t the Recrding Server Milestne Systems Ensuring end-t-end prtectin f vide integrity Risk: The netwrk may be discnnected r flded with unwanted data due t a DDOS attack Milestne XPrtect Crprate will autmatically detect if the camera is nt respnding r stps streaming vide t the system. Once the system detects this it issues a cmmunicatin errr event, which triggers alarms r rules that ntifies the right peple f the issue. In additin t creating alarms r ntificatins via s, XPrtect Crprate als supprts Edge Strage n select devices. Edge Strage ffers the functin t recrd vide in the camera itself and let the Recrding Server retrieve these recrdings after a netwrk failure, effectively ensuring vide recrding even fr perids with n cnnectin t the camera. Fr mre infrmatin n Edge Strage supprt in XPrtect Crprate: with_flexible_retrieval.pdf Risk: The netwrk may be cmprmised giving unauthrized persns access t tapping int the transmitted vide Tw methds can be used t prtect the transmitted vide: VPN tunneling and HTTPS. A virtual private netwrk (VPN) tunnel can be set up between the camera and Recrding Server using standard equipment r sftware. The VPN will encrypt all data transmitted thrugh the tunnel and thus prtect against unauthrized access t the vide. Using a VPN is a generic slutin that can be used with any camera. In additin t a VPN, XPrtect Crprate als supprts HTTP Secure (HTTPS) fr a subset f cameras. HTTPS uses Secure Scket Layer (SSL) and ffers encrypted cmmunicatin directly with the camera withut a VPN tunnel. Fr mre infrmatin abut VPN, HTTPS and SSL: Vide stred in the Recrding Server database Risk: The Recrding Server may be turned ff r fail Page7 f 15

8 Milestne Systems Ensuring end-t-end prtectin f vide integrity XPrtect Crprate supprts Recrding Server failver, which is a functin where ne r mre dedicated Failver Recrding Servers mnitr the state f the primary Recrding Servers. If the primary Recrding Servers stp respnding, due t failure r being turned ff, fr example fr maintenance, the Failver Recrding Servers take ver the task f recrding the vide. In additin t the failver supprt, Edge Strage can als help because, as described in the previus sectin, it can recrd vide in the camera, allwing the Recrding Server t retrieve the vide nce it is up and running again. Risk: Windws (the perating system) security culd be cmprmised giving lcal r remte access t the vide database files T prevent unauthrized access t the vide database files several layers f security can be implemented: Physical security Access t the rm with the physical Recrding Server shuld be limited t a few authrized peple nly Windws Server security Lcal cnsle and remte desktp access t the server running the Recrding Server shuld be limited t a few authrized peple Windws shuld be set t autmatically lgut after a shrt time f inactivity Windws shuld be kept updated with the newest service releases Recrding Server database The database can be cnfigured t encrypt the recrdings in tw mdes: Light and Strng The database can be set t sign the recrdings digitally t prevent tampering Bth f the database encryptin mdes Light and Strng are secure and use the same DES-56 encryptin technlgy. The difference is hw much f the recrdings are encrypted. Strng encrypts all parts f the vide data stred in the database but requires mre prcessing pwer t d s because everything needs t be encrypted Light nly encrypts the first part f the JPEG r MPEG-4/H.264 vide data called the header, and because f this, it uses less prcessing pwer t encrypt the vide. The vide will still be secure if smene tries t hack the database Page8 f 15

9 Milestne Systems Ensuring end-t-end prtectin f vide integrity because the vide cannt be decded withut the infrmatin cntained in the encrypted header The digital signature is created by calculating a Message-Digest 5 (MD5) algrithm hash f the recrdings. The hash is then signed with a Digital Signature Algrithm (DSA) and stred with the recrdings. If the cntent later n is changed r parts f the recrdings are remved, the MD5 hash and signature will n lnger match, making it pssible t detect that the recrdings have been tampered with. Enabling encryptin and digital signature f the recrdings des nt alter the actual recrded audi r vide cntent in any way. If the recrded audi r vide cntains sme frm f embedded watermark infrmatin, it will still be pssible t verify the authenticity f the audi r vide, either by the camera vendr r by a methd/tl prvided by the camera vendr. Fr mre infrmatin n MD5 and DSA: Cnfiguratin f the database is dne in the XPrtect Crprate Management Client, and it is a simple matter f selecting the Signing check bx and selecting either Light r Strng in the Encryptin field. 4. Live r recrded vide is send t a client ver a netwrk Risk: The netwrk may be discnnected r flded with unwanted data due t a DDOS attack In case the netwrk is flded with unwanted data, the cnnectin t the client may be discnnected r rendered inperable. In this case the peratr will immediately see this and can alert the administratr abut the issue. Page9 f 15

10 Milestne Systems Ensuring end-t-end prtectin f vide integrity While the clients may nt be able t view live r recrded vide, the Recrding Server can cntinue t recrd vide unaffected if the netwrk has been designed as tw separate netwrks; ne fr clients and ne fr cameras. Risk: The netwrk may be cmprmised giving unauthrized persns access t tapping int the transmitted vide As with the netwrk cnnectin frm the cameras t the Recrding Server, the transmitted vide frm the Recrding Server t the client can be prtected by using VPN tunneling. In additin t VPN tunneling, XPrtect Web Client and XPrtect Mbile als supprt HTTPS. 5. Live r recrded vide viewed and exprted t a media Risk: Unauthrized persns may try t hack r therwise btain lg-in credentials t gain unauthrized access t viewing and exprting vide T prevent smene frm hacking int the system, XPrtect Crprate relies n secure Windws Active Directry (AD) authenticatin that ffers strng prtectin against hacking. In extensin t the built-in technical security in Windws AD, it is imprtant that all users f the system have their wn separate Windws AD accunt because a single accunt, r just a few shared accunts, will make it hard t cntrl wh knws the user name and passwrd and thus wh can access the system. Using separate accunts fr each user will als make it easier t investigate in the XPrtect Crprate audit lg wh lgged in, viewed live r recrded vide r wh exprted vide frm the system. In additin t securing access t the client, XPrtect Crprate ffers centrally cntrlled security settings with time prfiles that set when and which cameras can be viewed live, played back and exprted by the user. Furthermre, XPrtect Crprate can cntrl all exprt settings available in the XPrtect Smart Client via a s-called XPrtect Smart Client prfile. Belw is highlighted a few f the XPrtect Smart Client prfile s exprt settings with the recmmended value fr the mst secure exprt. Page10 f 15

11 Milestne Systems Ensuring end-t-end prtectin f vide integrity Exprt t set t T media burner XPrtect frmat set t Available Media player and Still image frmats set t Unavailable Include XPrtect Smart Client Player set t Yes Prevent re-exprt set t Yes Passwrd prtect data set t Yes Passwrd set t a predefined passwrd Encryptin strength set t 256-bit AES Manage prject cmments set t Required Include digital signature set t Yes The Lcked check bx must be selected fr all f the abve settings t ensure that an XPrtect Smart Client user cannt verride them. The full list f the XPrtect Smart Client prfile s exprt settings can be seen in the screensht t the right n the previus page. 6. Exprted evidence media is transprted frm the surveillance site t plice r a curt T prevent unauthrized persns frm viewing r cpying exprted vide, Milestne s XPrtect Smart Client supprt three levels f security n the exprted vide database: 1. Database encryptin with passwrd prtectin 2. Disable re-exprt 3. Digital signature Risk: The exprted vide may be viewed and cpied by unauthrized persns The database encryptin supprts up t 256-bit advanced encryptin standard (AES) and access is prtected by a passwrd. Page11 f 15

12 Milestne Systems Ensuring end-t-end prtectin f vide integrity XPrtect Smart Client ffers the ptin t prevent the exprted vide frm being reexprted when viewed again in the XPrtect Smart Client Player. This ensures that the vide cannt be exprted in anther frmat r be exprted t the XPrtect frmat again but withut encryptin and digital signing. Risk: The exprted vide may be tampered with remving critical sequences f the recrded vide r be mdified t give anther impressin f the recrded evidence When vide that shuld be exprted is prtected with a digital signature n the Recrding Server, the signature f the recrded vide will be checked during the exprt t ensure that the vide has nt been tampered with n the Recrding Server. If the recrded vide passes the signature check, including the riginal digital signature, the vide is exprted t a new database created by XPrtect Smart Client n the client PC. During the exprt, XPrtect Smart Client adds its wn signature s the vide is prtected by tw signatures the riginal ne made during recrding and the ne created by XPrtect Smart Client during the exprt. 7. The exprted evidence is viewed by plice r a judge in a curt Risk: The exprted vide may have been tampered with remving critical sequences f the recrded vide r be mdified t give anther impressin f the recrded evidence When the exprted recrdings prtected by encryptin and digital signing are viewed again by plice r a judge in curt, the XPrtect Smart Client Player will request the user t enter the passwrd t decrypt the recrdings. Once the crrect passwrd has been entered, the client infrms the user that the vide is signed and can be verified by clicking the Verify Signatures buttn. This indicates fr the persn viewing the vide that the recrdings have been prtected by an encryptin and in additin t this have a digital signature that can be verified fr authenticity. Activating the digital signing verificatin will pen a new windw and may take sme time t cmplete depending n the size f the recrdings and amunt f cameras in the exprt. When cmpleted, it will display if the recrdings have been tampered with r if the integrity is intact. Page12 f 15

13 Milestne Systems Ensuring end-t-end prtectin f vide integrity The belw screensht shws an example f crrectly validated databases. Bth signatures can be validated directly in the Player. If the validatin fails, the dialg bx will display the time f the first failed segment f the database as seen in the screen sht belw. Page13 f 15

14 Milestne Systems Ensuring end-t-end prtectin f vide integrity Benefits and summary By cmbining a set f standard security functins and cncepts with a set f slutin unique functins, Milestne XPrtect Crprate enables users t deply vide surveillance slutins with full end-t-end security. With the encryptin and signing features in XPrtect Crprate and XPrtect Smart Client, it is pssible t keep streamed and recrded vide secure and prve the integrity f recrdings all the way frm the riginal stream frm the camera and t the pint where it is viewed, fr example in a curt f law. Fr cmpanies that require strict cntrl f the exprt frmat and security settings, the XPrtect Smart Client prfile can be used t cntrl exprt settings and parameters strictly frm a central pint. Milestne XPrtect Crprate and XPrtect Smart Client ffers secure handling f vide all the way frm the pint where it is captured and streamed frm the camera t the vide surveillance system and t the time it is viewed as evidence. Page14 f 15

15 Abut Milestne Systems Funded in 1998, Milestne Systems is the glbal industry leader in pen platfrm IP vide management sftware. The XPrtect platfrm delivers pwerful surveillance that is easy t manage, reliable and prven in thusands f custmer installatins arund the wrld. With supprt fr the widest chice in netwrk hardware and integratin with ther systems, XPrtect prvides best-in-class slutins t vide enable rganizatins managing risks, prtecting peple and assets, ptimizing prcesses and reducing csts. Milestne sftware is sld thrugh authrized and certified partners. Fr mre infrmatin, visit Milestne Systems Headquarters, DK Tel: Milestne Systems US Tel:

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

Mobile Device Manager Admin Guide. Reports and Alerts

Mobile Device Manager Admin Guide. Reports and Alerts Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview

More information

ISAM TO SQL MIGRATION IN SYSPRO

ISAM TO SQL MIGRATION IN SYSPRO 118 ISAM TO SQL MIGRATION IN SYSPRO This dcument is aimed at assisting yu in the migratin frm an ISAM data structure t an SQL database. This is nt a detailed technical dcument and assumes the reader has

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

BackupAssist SQL Add-on

BackupAssist SQL Add-on WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

Configuring BMC AREA LDAP Using AD domain credentials for the BMC Windows User Tool

Configuring BMC AREA LDAP Using AD domain credentials for the BMC Windows User Tool Cnfiguring BMC AREA LDAP Using AD dmain credentials fr the BMC Windws User Tl Versin 1.0 Cnfiguring the BMC AREA LDAP Plugin fr Dmain Username and Passwrds Intrductin...3 LDAP Basics...4 What is LDAP and

More information

LogMeIn Rescue Web SSO via SAML 2.0 Configuration Guide

LogMeIn Rescue Web SSO via SAML 2.0 Configuration Guide LgMeIn Rescue Web SSO via SAML 2.0 LgMeIn Rescue Web SSO via SAML 2.0 Cnfiguratin Guide 02-19-2014 Cpyright 2015 LgMeIn, Inc. 1 LgMeIn Rescue Web SSO via SAML 2.0 Cntents 1 Intrductin... 3 1.1 Dcument

More information

HOWTO: How to configure SSL VPN tunnel gateway (office) to gateway

HOWTO: How to configure SSL VPN tunnel gateway (office) to gateway HOWTO: Hw t cnfigure SSL VPN tunnel gateway (ffice) t gateway Hw-t guides fr cnfiguring VPNs with GateDefender Integra Panda Security wants t ensure yu get the mst ut f GateDefender Integra. Fr this reasn,

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

FUJITSU Software ServerView Suite ServerView PrimeCollect

FUJITSU Software ServerView Suite ServerView PrimeCollect User Guide - English FUJITSU Sftware ServerView Suite ServerView PrimeCllect Editin February 2015 Cmments Suggestins Crrectins The User Dcumentatin Department wuld like t knw yur pinin f this manual. Yur

More information

User Manual Brainloop Outlook Add-In. Version 3.4

User Manual Brainloop Outlook Add-In. Version 3.4 User Manual Brainlp Outlk Add-In Versin 3.4 Cntent 1. Summary... 3 2. Release Ntes... 3 2.1 Prerequisites... 3 2.2 Knwn Restrictins... 4 3. Installatin and Cnfiguratin... 4 3.1 The installatin prgram...

More information

Password Reset for Remote Users

Password Reset for Remote Users 1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console INSTALLATION GUIDE Marshal Reprting Cnsle Installatin Guide Marshal Reprting Cnsle March, 2009 Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 3 Sftware Prerequisites 3 Installatin

More information

Using PayPal Website Payments Pro UK with ProductCart

Using PayPal Website Payments Pro UK with ProductCart Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...

More information

Integrating With incontact dbprovider & Screen Pops

Integrating With incontact dbprovider & Screen Pops Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint

More information

AVG AntiVirus Business Edition

AVG AntiVirus Business Edition AVG AntiVirus Business Editin User Manual Dcument revisin AVG.02 (30.9.2015) C pyright AVG Technlgies C Z, s.r.. All rights reserved. All ther trademarks are the prperty f their respective wners. Cntents

More information

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010 OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages

More information

Intel Hybrid Cloud Management Portal Update FAQ. Audience: Public

Intel Hybrid Cloud Management Portal Update FAQ. Audience: Public Intel Hybrid Clud Management Prtal Update FAQ Audience: Public Purpse: Prepare fr the launch f the Intel Hybrid Clud Platfrm multi-user/multi-tier update Versin: Final FAQs What s new in the Intel Hybrid

More information

Sage 100 What s New in 2013. Tracey Brinkman Senior Consultant BKD Technologies tbrinkman@bkd.com

Sage 100 What s New in 2013. Tracey Brinkman Senior Consultant BKD Technologies tbrinkman@bkd.com Sage 100 What s New in 2013 Tracey Brinkman Senir Cnsultant BKD Technlgies tbrinkman@bkd.cm Presenter Tracey Brinkman Senir Cnsultant BKD Technlgies 2013 Overview Glbal Enhancements Accunts Payable Enhancements

More information

Configuring an Email Client for your Hosting Support POP/IMAP mailbox

Configuring an Email Client for your Hosting Support POP/IMAP mailbox Cnfiguring an Email Client fr yur Hsting Supprt POP/IMAP mailbx This article lists the email settings and prt numbers fr pp and imap cnfiguratins, as well as fr SSL. It cntains instructins fr setting up

More information

Connector for Microsoft Dynamics Installation Guide

Connector for Microsoft Dynamics Installation Guide Micrsft Dynamics Cnnectr fr Micrsft Dynamics Installatin Guide June 2014 Find updates t this dcumentatin at the fllwing lcatin: http://g.micrsft.cm/fwlink/?linkid=235139 Micrsft Dynamics is a line f integrated,

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Implementing SQL Manage Quick Guide

Implementing SQL Manage Quick Guide Implementing SQL Manage Quick Guide The purpse f this dcument is t guide yu thrugh the quick prcess f implementing SQL Manage n SQL Server databases. SQL Manage is a ttal management slutin fr Micrsft SQL

More information

Adobe Sign. Enabling Single Sign-On with SAML Reference Guide

Adobe Sign. Enabling Single Sign-On with SAML Reference Guide Enabling Single Sign-On with SAML Reference Guide 2016 Adbe Systems Incrprated. All Rights Reserved. Prducts mentined in this dcument, such as the services f identity prviders Micrsft Active Directry Federatin,

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Readme File. Purpose. What is Translation Manager 9.3.1? Hyperion Translation Manager Release 9.3.1 Readme

Readme File. Purpose. What is Translation Manager 9.3.1? Hyperion Translation Manager Release 9.3.1 Readme Hyperin Translatin Manager Release 9.3.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 What is Translatin Manager 9.3.1?... 1 Cmpatible Sftware... 2 Supprted Internatinal Operating

More information

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1 Preparing t Deply Reflectin : A Guide fr System Administratrs Versin 14.1 Table f Cntents Table f Cntents... 2 Preparing t Deply Reflectin 14.1:... 3 A Guide fr System Administratrs... 3 Overview f the

More information

CallRex 4.2 Installation Guide

CallRex 4.2 Installation Guide CallRex 4.2 Installatin Guide This dcument describes hw t install CallRex 4.2. It cvers the fllwing: CallRex 4.2 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex

More information

FINRA Regulation Filing Application Batch Submissions

FINRA Regulation Filing Application Batch Submissions FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s

More information

STIOffice Integration Installation, FAQ and Troubleshooting

STIOffice Integration Installation, FAQ and Troubleshooting STIOffice Integratin Installatin, FAQ and Trubleshting Installatin Steps G t the wrkstatin/server n which yu have the STIDistrict Net applicatin installed. On the STI Supprt page at http://supprt.sti-k12.cm/,

More information

HP Connected Backup Online Help. Version 8.7.1 04 October 2012

HP Connected Backup Online Help. Version 8.7.1 04 October 2012 HP Cnnected Backup Online Help Versin 8.7.1 04 Octber 2012 Legal Ntices Warranty The nly warranties fr Hewlett-Packard prducts and services are set frth in the express statements accmpanying such prducts

More information

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free. 990 e-pstcard FAQ Fr frequently asked questins abut filing the e-pstcard that are nt listed belw, brwse the FAQ at http://epstcard.frm990.rg/frmtsfaq.asp# (cpy and paste this link t yur brwser). General

More information

Customers FAQs for Webroot SecureAnywhere Identity Shield

Customers FAQs for Webroot SecureAnywhere Identity Shield Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt

More information

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved. Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and

More information

Webalo Pro Appliance Setup

Webalo Pro Appliance Setup Webal Pr Appliance Setup 1. Dwnlad the Webal virtual appliance apprpriate fr yur virtualizatin infrastructure, using the link yu were emailed. The virtual appliance is delivered as a.zip file that is n

More information

HP Email Archiving software for Microsoft Exchange

HP Email Archiving software for Microsoft Exchange HP Email Archiving sftware fr Micrsft Exchange PST Imprt Tls Cmpnents and Deplyment Best Practices Table f Cntents Overview... 2 Prerequisites... 2 Cmpnents... 2 Archive Credentials... 2 PST Lader... 2

More information

Using Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors

Using Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors Using Sentry-g Enterprise/ASPX fr Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, February, 2014 http://www.sentry-g.cm Be Practive, Nt Reactive! Intrductin Sentry-g Enterprise Reprting is a self-cntained

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

Cloud Services MDM. Windows 8 User Guide

Cloud Services MDM. Windows 8 User Guide Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad

More information

BIOS-enabled security features in HP business notebooks

BIOS-enabled security features in HP business notebooks Technical white paper BIOS-enabled security features in HP business ntebks Table f cntents Basics f security prtectin 2 Prtectin against unauthrized access 2 Prebt authenticatin using BIOS 2 Frgtten passwrds

More information

FAQs for Webroot SecureAnywhere Identity Shield

FAQs for Webroot SecureAnywhere Identity Shield FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt

More information

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

Helpdesk Support Tickets & Knowledgebase

Helpdesk Support Tickets & Knowledgebase Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate

More information

Electronic Signatures Overview

Electronic Signatures Overview White Paper Electrnic Signatures Overview Versin 1.0 Last Updated: 20-09-2010 www.sutisft.cm Histry f Electrnic Signatures Over 100 years ag, peple were using Mrse cde and the telegraph t electrnically

More information

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn

How To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn SlarWinds Technical Reference Preparing an Orin Failver Engine Installatin Intrductin t the Orin Failver Engine... 1 General... 1 Netwrk Architecture Optins and... 3 Server Architecture Optins and... 4

More information

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email:

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: AML Internet Manr Curt, Manr Farm Huse, Lndn Rad, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: Backup@AmlInternet.c.uk Cntents Page Situatin Analysis 3 AML Internet - The Slutin

More information

ScaleIO Security Configuration Guide

ScaleIO Security Configuration Guide ScaleIO Security Cnfiguratin Guide 1 Intrductin This sectin prvides an verview f the settings available in ScaleIO t ensure secure peratin f the prduct: Security settings are divided int the fllwing categries:

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

CSAT Account Management

CSAT Account Management CSAT Accunt Management User Guide March 2011 Versin 2.1 U.S. Department f Hmeland Security 1 CSAT Accunt Management User Guide Table f Cntents 1. Overview... 1 1.1 CSAT User Rles... 1 1.2 When t Update

More information

Telelink 6. Installation Manual

Telelink 6. Installation Manual Telelink 6 Installatin Manual Table f cntents 1. SYSTEM REQUIREMENTS... 3 1.1. Hardware Requirements... 3 1.2. Sftware Requirements... 3 1.2.1. Platfrm... 3 1.2.1.1. Supprted Operating Systems... 3 1.2.1.2.

More information

Getting Started Guide

Getting Started Guide fr SQL Server www.lgbinder.cm Getting Started Guide Dcument versin 1 Cntents Installing LOGbinder fr SQL Server... 3 Step 1 Select Server and Check Requirements... 3 Select Server... 3 Sftware Requirements...

More information

SMART Active Directory Migrator 9.0.2. Requirements

SMART Active Directory Migrator 9.0.2. Requirements SMART Active Directry Migratr 9.0.2 January 2016 Table f Cntents... 3 SMART Active Directry Migratr Basic Installatin... 3 Wrkstatin and Member Server System... 5 Netwrking... 5 SSL Certificate... 6 Service

More information

Montana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management

Montana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management Mntana Acquisitin & Cntracting System (emacs) emacs Handbk Vendr Registratin and Data Management Welcme The purpse f this emacs Handbk fr Vendr Registratin and Data Management is t prvide vendrs with the

More information

Configuring SSL and TLS Decryption in ngeniusone

Configuring SSL and TLS Decryption in ngeniusone Cnfiguring SSL and TLS Decryptin in ngeniusone The cnfigure SSL Decryptin feature supprts real-time capture f ASI and ASR traffic flws as well as decding f Secure Scket Link (SSL) and Transprt Layer Security

More information

Instant Chime for IBM Sametime Quick Start Guide

Instant Chime for IBM Sametime Quick Start Guide Instant Chime fr IBM Sametime Quick Start Guide Fall 2014 Cpyright 2014 Instant Technlgies. All rights reserved. Cpyright and Disclaimer This dcument, as well as the sftware described in it, is furnished

More information

Durango Merchant Services QuickBooks SyncPay

Durango Merchant Services QuickBooks SyncPay Durang Merchant Services QuickBks SyncPay Gateway Plug-In Dcumentatin April 2011 Durang-Direct.cm 866-415-2636-1 - QuickBks Gateway Plug-In Dcumentatin... - 3 - Installatin... - 3 - Initial Setup... -

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

NEC CLOUD STORAGE. User Guide. Version: R03.1

NEC CLOUD STORAGE. User Guide. Version: R03.1 NEC CLOUD STORAGE User Guide Versin: R03.1 2013 1 INTRODUCTION... 5 1.1 GOALS OF THIS DOCUMENT... 5 1.2 TERMS, ACRONYMS AND ABBREVIATIONS... 5 2 INTRODUCTION TO NEC CLOUD STORAGE... 6 2.1 WHAT IS NEEDED

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

Best Practice - Pentaho BA for High Availability

Best Practice - Pentaho BA for High Availability Best Practice - Pentah BA fr High Availability This page intentinally left blank. Cntents Overview... 1 Pentah Server High Availability Intrductin... 2 Prerequisites... 3 Pint Each Server t Same Database

More information

KronoDesk Migration and Integration Guide Inflectra Corporation

KronoDesk Migration and Integration Guide Inflectra Corporation / KrnDesk Migratin and Integratin Guide Inflectra Crpratin Date: September 24th, 2015 0B Intrductin... 1 1B1. Imprting frm Micrsft Excel... 2 6B1.1. Installing the Micrsft Excel Add-In... 2 7B1.1. Cnnecting

More information

WatchDox Server. Administrator's Guide. Version 3.8.5

WatchDox Server. Administrator's Guide. Version 3.8.5 WatchDx Server Administratr's Guide Versin 3.8.5 Cnfidentiality This dcument cntains cnfidential material that is prprietary WatchDx. The infrmatin and ideas herein may nt be disclsed t any unauthrized

More information

IM, Presence, and Contacts

IM, Presence, and Contacts Find smene Lync 2013 Quick Reference IM, Presence, and Cntacts The quickest way t find smene via Lync is t launch a search by typing the persn s name r IM address in the search bx n the Lync main windw.

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Introduction to Mindjet MindManager Server

Introduction to Mindjet MindManager Server Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights

More information

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.

Readme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2. Oracle s Hyperin Data Integratin Management Release 9.2.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 Intrductin t Data Integratin Management... 1 Data Integratin Management Adapters...

More information

Mobile Deployment Guide For Apple ios

Mobile Deployment Guide For Apple ios Fr Apple ios Cpyright This dcument is prtected by the United States cpyright laws, and is prprietary t Zscaler Inc. Cpying, reprducing, integrating, translating, mdifying, enhancing, recrding by any infrmatin

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

Attunity RepliWeb SSL Guide

Attunity RepliWeb SSL Guide Attunity RepliWeb SSL Guide Sftware Versin 5.2 June 25, 2012 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm, Supprt: http://supprt.repliweb.cm

More information

AvePoint Privacy Impact Assessment 1

AvePoint Privacy Impact Assessment 1 AvePint Privacy Impact Assessment 1 User Guide Cumulative Update 2 Revisin E Issued February 2015 Table f Cntents Table f Cntents... 2 Abut AvePint Privacy Impact Assessment... 5 Submitting Dcumentatin

More information

Connecting to Email: Live@edu

Connecting to Email: Live@edu Cnnecting t Email: Live@edu Minimum Requirements fr Yur Cmputer We strngly recmmend yu upgrade t Office 2010 (Service Pack 1) befre the upgrade. This versin is knwn t prvide a better service and t eliminate

More information

ABELMed Platform Setup Conventions

ABELMed Platform Setup Conventions ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require

More information

HarePoint HelpDesk for SharePoint. For SharePoint Server 2010, SharePoint Foundation 2010. User Guide

HarePoint HelpDesk for SharePoint. For SharePoint Server 2010, SharePoint Foundation 2010. User Guide HarePint HelpDesk fr SharePint Fr SharePint Server 2010, SharePint Fundatin 2010 User Guide Prduct versin: 14.1.0 04/10/2013 2 Intrductin HarePint.Cm (This Page Intentinally Left Blank ) Table f Cntents

More information

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers) Firewall/Prxy Server Settings t Access Hsted Envirnment Client firewall settings in mst cases depend n whether the firewall slutin uses a Stateful Inspectin prcess r ne that is cmmnly referred t as an

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U

More information

Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel

Traffic monitoring on ProCurve switches with sflow and InMon Traffic Sentinel An HP PrCurve Netwrking Applicatin Nte Traffic mnitring n PrCurve switches with sflw and InMn Traffic Sentinel Cntents 1. Intrductin... 3 2. Prerequisites... 3 3. Netwrk diagram... 3 4. sflw cnfiguratin

More information

TaskCentre v4.5 Send Message (SMTP) Tool White Paper

TaskCentre v4.5 Send Message (SMTP) Tool White Paper TaskCentre v4.5 Send Message (SMTP) Tl White Paper Dcument Number: PD500-03-17-1_0-WP Orbis Sftware Limited 2010 Table f Cntents COPYRIGHT 1 TRADEMARKS 1 INTRODUCTION 2 Overview 2 FEATURES 2 GLOBAL CONFIGURATION

More information

RSA SecurID Software Token Security Best Practices Guide. Version 3

RSA SecurID Software Token Security Best Practices Guide. Version 3 RSA SecurID Sftware Tken Security Best Practices Guide Versin 3 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA, the RSA Lg

More information

Title: How Do You Handle Exchange Mailboxes for Employees Who Are No Longer With the Company

Title: How Do You Handle Exchange Mailboxes for Employees Who Are No Longer With the Company Dean Suzuki Blg Title: Hw D Yu Handle Exchange Mailbxes fr Emplyees Wh Are N Lnger With the Cmpany Created: 1/21/2013 Descriptin: I asked by ne f my custmers, hw d yu handle mailbxes fr emplyees wh are

More information

E2E Express 3.0. Requirements

E2E Express 3.0. Requirements E2E Express 3.0 Requirements February 2016 Table f Cntents Requirements... 3 Hardware Prerequisites... 3 General Installatin Requirements... 3 Netwrk Requirement... 4 SQL Server Installatin Requirements...

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This

More information

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3 EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.

More information

Datawatch Server Administrator's Guide

Datawatch Server Administrator's Guide Datawatch Server Administratr's Guide Datawatch Server Web Admin by Datawatch Datawatch Server Web Admin prgram cpyright 2015 by Datawatch Crpratin. Datawatch Server Web Admin Administratr's Guide cpyright

More information

This guide is intended for administrators, who want to install, configure, and manage SAP Lumira, server for BI Platform

This guide is intended for administrators, who want to install, configure, and manage SAP Lumira, server for BI Platform Hw T install SAP Lumira, server n SAP BusinessObjects BI platfrm Distributed Install Applies t: SAP Lumira, server versin fr the SAP BusinessObjects BI platfrm Summary This guide is intended fr administratrs,

More information

KIK s GUIDE FOR LAW ENFORCEMENT

KIK s GUIDE FOR LAW ENFORCEMENT Thanks fr checking ut ur law enfrcement guide. Kik takes the safety f ur users very seriusly, and we hpe this guide will be a useful tl fr yu. It includes infrmatin abut ur app; the features and functins

More information

Licensing Windows Server 2012 for use with virtualization technologies

Licensing Windows Server 2012 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This

More information

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8 McAfee Enterprise Security Manager Data Surce Cnfiguratin Guide Data Surce: Infblx NIOS September 2, 2014 Infblx NIOS Page 1 f 8 Imprtant Nte: The infrmatin cntained in this dcument is cnfidential and

More information