Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations

Size: px
Start display at page:

Download "Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations"

Transcription

1 Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations 11/2010 This document includes the following topics: About this guide (page 2) TeamViewer remote desktop support software (page 3) Security configuration of BD Biosciences workstations (page 9) Organizational security and data privacy measures (page 12) Recommendations for practical security measures (page 14)

2 2 Remote Support Security Guidelines About this guide About this topic This topic describes the information contained in this guide. Guide contents This guide is intended to provide information and recommendations to customers to ensure maximum security when using BD Biosciences workstations and the BD Remote Instrument Support Solution. It describes the security features and operation of the BD Remote Instrument Support solution on BD Biosciences workstations that have BD FACSDiva software, BD FACSCanto Clinical software, BD FACS SPA software or BD FACSArray software. Who should read this guide All IT administrators and users of BD Biosciences workstations which will be connected to the internet for the purpose of enabling the BD Remote Instrument Support solution. Where to store this guide This information should be stored near the BD Biosciences workstation for reference.

3 Remote Support Security Guidelines 3 TeamViewer remote desktop support software About this topic This topic describes the functionality and inherent security features of the TeamViewer remote desktop support software. In addition this topic describes the TeamViewer software installation and subsequent configuration required to maximize security. Details on how to use the application are also provided. Responsibility BD is responsible for the installation of the TeamViewer application on BD Biosciences workstations. During installation BD will apply all TeamViewer configuration options required for safe and secure operation of the software. It is the responsibility of the customer to ensure that the TeamViewer software is used in accordance with the BD guidelines provided in this document to ensure continued security of the solution and to prevent any impact on the routine operation of BD software and instruments. Warranty and liability BD does not provide any warranty with respect to the TeamViewer software. BD recommends that the TeamViewer software is not used during routine operation of BD software on a BD Biosciences workstation or during routine operation of the instrument connected to a BD Biosciences workstation. The TeamViewer application must only be started when instructed to do so by a BD support representative. About TeamViewer TeamViewer is a software solution for desktop sharing, allowing remote access and support over the internet. TeamViewer software is manufactured in accordance with the ISO 9001:2008 quality standard guidelines. The product has passed a security review qualifying it for use on the bank workstations of major banking institutions. Teamviewer is in use in several healthcare institutions. TeamViewer is a widely known tool used today by more than users spread over more than 200 countries.

4 4 Remote Support Security Guidelines TeamViewer security features TeamViewer has the following unique combination of security features: An on-demand connection session of TeamViewer software is hosted on the BD Biosciences workstation. A connection to the BD Biosciences workstation will only be available once the operator has started the TeamViewer application. Connection is established directly over the internet via a Master server hosted by TeamViewer GmbH. Connectivity is established over TCP or UDP and data is transferred via http tunnelling. TeamViewer works with complete encryption based on RSA public/private key exchange and AES (256 bit) session encoding. Data can only be deciphered using the private key of the client application. Since this private key is never communicated during the communication session, interconnecting systems cannot decipher transmitted data. Each TeamViewer client has a unique Partner ID which is automatically generated by TeamViewer based on the hardware characteristics of the BD Biosciences workstation. The Partner ID is validated on a Master TeamViewer server prior to every connection. During each session the TeamViewer client will create a unique password. A two factor authentication consisting of the Partner ID and session password is required for a remote support representative to connect. TeamViewer prevents brute-force attacks by exponentially increasing the amount of time between failed connections. 24 Failed attempts will take 17 Hours. Latency is only reset after entering the correct password. TeamViewer software is signed using VeriSign Code Signing technology, ensuring that the publisher of the software executables can always be identified. TeamViewer servers are located in a highly modern data centre with all the required redundancy features built in to ensure availability of service. Physical access to the data centre is only possible after a thorough identity check through a single entrance gate. CCTV, intrusion detection, 24/7 surveillance and on-site security personnel protect TeamViewer servers against attacks from within. Detailed information on TeamViewer security can be found online at

5 Remote Support Security Guidelines 5 TeamViewer Applications Two TeamViewer applications are used to allow for remote desktop support of BD Biosciences workstations: TeamViewer Manager: This application is installed on the desktops of BD remote support personnel. It is used to store partner details in a database that can be shared with other BD support personnel. In addition the application will keep an audit trail recording the date, time and length of remote support sessions. BD will take proper care to ensure that partner details are only shared with the local BD service organization of the customer. TeamViewer All-In-One: This application is installed on the desktops of BD remote support personnel and on the customer s BD Biosciences workstation. On the BD Biosciences workstation the application will be started in host mode to allow a BD remote support representative remote access to the workstation of the customer. On the desktop of the BD remote support personnel the application is launched in client mode and used to connect to the customer s Biosciences workstation. TeamViewer installation and configuration The following configuration options will be applied during installation of TeamViewer to ensure the application can be used securely: TeamViewer will not be installed as a service but must be launched manually when remote support is required. When the application is closed it will exit as opposed to minimizing to the Windows application tray. TeamViewer will be configured to generate a new unique secure 6 digit password using a mixture of numbers and upper and lowercase letters at the start of each remote support session. It is possible to generate secure 10 digit passwords containing a mixture of numbers, upper and lower case letters and punctuation. However this may make it more difficult for the user to accurately convey the password to the BD remote support representative. Access to other computers in the remote (customer) network can be activated at the discretion of the IT administrator. To minimize user interaction, the option to view and control the remote desktop (instrument workstation) will be automatically enabled after launch of the application by the customer. The customer may choose to change this setting to allow access only after having given confirmation. The ability to transfer files from the customer s workstation to the BD network will be configured as either After confirmation or Denied depending on the preference of the customer and IT administrator. Details of remote control sessions will be automatically logged and stored by BD.

6 6 Remote Support Security Guidelines Once TeamViewer has been installed on the BD Biosciences workstation, the BD support representative will record the unique Partner ID that was generated for the workstation. The unique Partner ID will be communicated to the data privacy and security administrator for the local BD service organization. The unique Partner ID will be recorded in the TeamViewer Manager database at the customer s local BD service organization. It will therefore not be necessary for BD support personnel to request the unique Partner ID from the customer before initiating a remote support session. If the unique Partner ID should, however, be lost due to unforeseen circumstances, the partner ID should only be communicated to the data privacy and security administrator of the local BD service organization. This should either be done by a BD support representative when visiting the customer s site or by someone within the customer s organization who has been authorized by the organization to deal with Data Privacy and / or remote access security. TeamViewer operation If a remote support intervention is required, a BD remote support representative will contact the customer by phone and instruct the customer to launch the TeamViewer application. A shortcut to the TeamViewer application will be available on the desktop of the BD Biosciences workstation. Figure 1 - TeamViewer shortcut In order to host a remote support session on the workstation, the user must launch the TeamViewer application by double clicking the shortcut. Caution! The TeamViewer application must not be operated while the BD Biosciences workstation software and / or connected instrument are used for routine sample processing. The application should only be launched to allow a BD representative access for remote support. The application must be closed before routine sample processing is performed. Once the TeamViewer application has been launched, a new session password will be generated. The user must communicate the session password by telephone to the BD remote support representative.

7 Remote Support Security Guidelines 7 Figure 2 - TeamViewer application showing the Partner ID and session password Caution! The Partner ID should already be known to the BD remote support representative. If the customer is requested to provide the Partner ID to the BD remote support representative, the customer should only do so if he/she has initiated the telephone call to BD. The Partner ID should not be provided to anyone that has contacted the customer to initiate a remote support session! After the remote support session has been established, the BD remote support representative will take control of the BD Biosciences workstation desktop. The user may receive a prompt from TeamViewer to confirm access for the BD remote support representative to take remote control of the desktop. If the user wants to allow remote control of the BD Biosciences workstation, the user has to click Yes to grant access. Figure 3 - Remote Control confirmation dialog During the remote support session the desktop background of the BD Biosciences workstation will become grey to indicate a remote support session is in progress. The user will be able to see all the actions performed by the BD remote support representative. The TeamViewer application will be minimized above the Windows system tray from where the user will have access at all times to disable input from the remote support representative. To disable remote input, the user can click on the mouse icon within the TeamViewer status window.

8 8 Remote Support Security Guidelines Figure 4 - Remote input disabled To re-enable remote input, the user should click the mouse icon in the TeamViewer status window again. Figure 5 - Remote input enabled The remote session can be terminated at any point by clicking the red cross within the TeamViewer status window. TeamViewer records all remote sessions in an audit log which is stored on the BD Biosciences workstation. In addition, TeamViewer Manager maintains an audit log which records the user name and length of connection for each remote session initiated from BD. The additional TeamViewer Manager log can be supplied to the customer upon request. Once the remote support session is terminated, the BD Biosciences workstation desktop background will be restored. The user must close the TeamViewer application before commencing routine sample processing using BD Biosciences software and / or the instrument connected to the workstation.

9 Remote Support Security Guidelines 9 Security configuration of BD Biosciences workstations About this topic This topic describes the configuration of the BD Biosciences workstation to ensure a reasonable level of security for systems connected to the internet. Before getting started Please refer to the Information Security Guidelines document ( REV. 01) for recommendations on how to manage Antivirus software and Microsoft Updates on BD Biosciences workstations. This document can be downloaded at urity Responsibility and liability BD is responsible for configuring the BD Biosciences workstation to ensure reasonable security is applied when connecting to the internet. It is the responsibility of the customer to ensure that the guidelines stipulated in the Information Security Guidelines document are implemented to ensure that Antivirus and Windows Updates are installed and maintained on the BD Biosciences workstation. It is the customer s responsibility to ensure that all routine users have a limited Windows user account to access the BD Biosciences workstation. The use of Windows Administrator accounts should be restricted for the use of customer s IT administrator(s) and BD service personnel. BD strongly advises against the installation of additional security related software above and beyond Antivirus and Microsoft Security Updates on the BD Biosciences workstation. Doing so will invalidate any regulatory or quality marking the system may carry. BD will not be liable for any impact of additional software on the quality of the results produced by BD Biosciences software and / or instrumentation if any additional software has been installed on the BD Biosciences workstation. Workstation configuration In order to allow users to operate BD Biosciences software using standard Windows user accounts, the following user account configuration will be performed on the BD Biosciences workstation by BD: A standard Windows account is created for each operator of the BD Biosciences workstation / instrument. Operator accounts are added to a local user group. Access permissions for BD Biosciences software and 3 rd Party programs are configured to allow full access for all members of the local user group.

10 10 Remote Support Security Guidelines In order to allow users to operate BD Biosciences software using standard Windows user accounts, the following user account configuration will be performed on the BD Biosciences workstation by BD: A standard Windows account is created for each operator of the BD Biosciences workstation / instrument. Operator accounts are added to a local user group. Access permissions for BD Biosciences software and 3 rd Party programs are configured to allow full access for all members of the local user group. The following local Account Policies may be enforced as required by the customer s IT administrator: Enforce password history 3 passwords remembered or a setting that conforms to the Group policy in use by the customer. Maximum password age 60 days or a setting that conforms to the Group policy in use by the customer. Minimum password age 1 day or a setting that conforms to the Group policy in use by the customer. Minimum password length 8 characters or a setting that conforms to the Group policy in use by the customer. Password must meet complexity requirements Enabled. Can be disabled at the discretion of the customer and / or local IT administrator. The following Account Lockout Policies may be enforced as required by the customer s IT administrator: Account lockout duration 30 minutes or a setting that conforms to the Group policy in use by the customer. Account lockout threshold 5 invalid logon attempts or a setting that conforms to the Group policy in use by the customer. Reset account lockout counter after 10 minutes or a setting that conforms to the Group policy in use by the customer. The following local security Audit policies may be enforced as required by the customer s IT administrator: Audit account logon events Success and Failure Audit account management - Success and Failure Audit logon events Success and Failure Audit object access Success and Failure Audit policy change Success and Failure Audit privilege use Success and Failure Audit system events Success and Failure

11 Remote Support Security Guidelines 11 The following Security Options may be enforced as required by the customer s IT administrator: Interactive logon: Do not display last user name Enabled or a setting that conforms to the Group policy in use by the customer. Interactive logon: Do not require CTRL+ALT+DEL Disabled or a setting that conforms to the Group policy in use by the customer. Interactive logon: Prompt user to change password before expiration 14 days or a setting that conforms to the Group policy in use by the customer. At the discretion of the customer and / or local IT administrator, access to USB storage devices can be disabled.

12 12 Remote Support Security Guidelines Organizational security and data privacy measures About this topic This topic describes the organizational security measures implemented by BD to ensure reasonable security for the BD Remote Instrument Support Solution. Data Privacy BD has defined and implemented an Instrument Remote Support Privacy Procedure to comply with applicable privacy laws and to ensure that: Remote access to a customer s network and instrumentation will only be implemented in agreement with the customer. Training is provided for all BD support personnel to understand and comply with BD s internal data privacy policy. All BD personnel that may inadvertently be exposed to Protected Health Information (PHI) as a consequence of supporting our customers understand their responsibility to maintain such information in confidence. All BD support personnel sign a non-disclosure of PHI agreement. Auditable records are kept of each customer with whom remote service has been agreed upon, detailing the end and termination of the agreement. Records will also be kept in the event of remote service being provided by a third party if agreed with the customer. Organizational Security Measures BD has implemented a range of organizational measures to ensure information access and control can be managed in a secure fashion. These measures include, but are not limited to: A comprehensive security management system to ensure users are only given access to information and information systems as required by their role in the organization. User training and awareness on data privacy and confidentiality. Physical security measures to ensure that non-authorized users cannot enter BD premises. This includes physical access restrictions to data servers and data hosting environments for non-authorized personnel. Access to and permissions on BD business desktops, laptops and data and application servers are controlled through a mixture of two factor authentication and Microsoft Group policies. Additionally Virtual Private Network (VPN) authentication is required for users accessing the systems from outside the BD network. Password complexity and expiration policies are in place to ensure that passwords cannot be easily compromised. Systems connected to the BD network are protected from external security risks with a combination of hardware firewalls, Antivirus software, Intrusion Prevention Systems and regular updating with Microsoft Security Updates.

13 Remote Support Security Guidelines 13 Hard disks of decommissioned computers are erased using DOD compliant software. This software will erase the contents of the hard disk multiple times to ensure no remaining data remains on the hard disk. Access and use of BD information systems is auditable. BD personnel is trained on and expected to comply with the Acceptable Use policy of BD business systems and Information Systems. Random checks are carried out by BD to ensure all personnel act according to this policy. BD conducts random audits to ensure that the internal data privacy policy is respected and that any deviations from the policy are addressed in a timely manner.

14 14 Remote Support Security Guidelines Recommendations for practical security measures About this topic This topic describes additional practical security measures that can be implemented by the customer s organization to improve the overall security of BD Biosciences workstations that may be connected to the customer s network and the internet. Practical security measures The guidelines outlined in this document do not prevent the customer from implementing any of the following security or organizational measures to safeguard the data on BD Biosciences workstations provided they do not involve the installation of third party components on the workstation. 1. Information Security Management System/Privacy and Data Protection Management System 2. Physical Security 3. Access Controls 4. Security and Privacy Technologies 5. Awareness, training and security checks in relation to personnel 6. Incident/Response Management/Business Continuity 7. Audit Controls/Due Diligence

15 2010, Becton, Dickinson and Company. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in retrieval systems, or translated into any language or computer language, in any form or by any means: electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without prior written permission from BD Biosciences. The information in this document is subject to change without notice. BD Biosciences reserves the right to change its products and services at any time to incorporate the latest technological developments. Although this guide has been prepared with every precaution to ensure accuracy, BD Biosciences assumes no liability for any errors or omissions or for any damages resulting from the application or use of this information. BD Biosciences welcomes customer input on corrections and suggestions for improvement. TeamViewer is a registered trademark of TeamViewer GmbH and/or its affiliates in Germany and/or other countries. Microsoft and Windows are registered trademarks of Microsoft Corporation in the Unites States and/or other countries. BD, BD Logo and all other trademarks are property of Becton, Dickinson and Company BD EUR SPP /2010 BD Biosciences European Customer Support Tel Fax help.biosciences@europe.bd.com

White Paper. BD Assurity Linc Software Security. Overview

White Paper. BD Assurity Linc Software Security. Overview Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about

More information

Information security guidelines

Information security guidelines Information security guidelines BD Biosciences workstations 8/2014 This document includes the following topics: About this guide (page 2) Software policies (page 3) Virus protection setup and operation

More information

Preparing BD Systems for Data Migration. Summary of the Upgrade Process on page 6. Copying User Data Files onto an Upgraded System on page 7

Preparing BD Systems for Data Migration. Summary of the Upgrade Process on page 6. Copying User Data Files onto an Upgraded System on page 7 Windows 7 Upgrade Instructions 8/2014 Preparing BD Systems for Data Migration Contents Overview Backing Up Your Data on page 2 Summary of the Upgrade Process on page 6 Copying User Data Files onto an Upgraded

More information

TeamViewer Security Information

TeamViewer Security Information TeamViewer Security Information 2009 TeamViewer GmbH, Stand 7/2009 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical

More information

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive. SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,

More information

Quick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software. Published: February 2013 Software version: 5.

Quick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software. Published: February 2013 Software version: 5. Quick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software Published: February 2013 Software version: 5.0 Contents Introduction... 1 Safe AutoLogon solution... 2 Installation

More information

BOWMAN SYSTEMS SECURING CLIENT DATA

BOWMAN SYSTEMS SECURING CLIENT DATA BOWMAN SYSTEMS SECURING CLIENT DATA 2012 Bowman Systems L.L.C. All Rights Reserved. This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered

More information

TeamViewer Security Information

TeamViewer Security Information TeamViewer Security Information 2014 TeamViewer GmbH, Last update: 05/2014 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical

More information

TeamViewer Security Information

TeamViewer Security Information TeamViewer Security Information 2015 TeamViewer GmbH, Last update: 06/2015 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical

More information

TeamViewer Security Information

TeamViewer Security Information TeamViewer Security Information 2013 TeamViewer GmbH, Last update: 11/2013 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Endpoint Security VPN for Windows 32-bit/64-bit

Endpoint Security VPN for Windows 32-bit/64-bit Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

Manual to Access SAP Training Systems Technical Description for Customer On-Site Training

Manual to Access SAP Training Systems Technical Description for Customer On-Site Training Manual to Access SAP Training Systems Technical Description for Customer On-Site Training 2.0 draft version available as of Jan. 5th 2015. The final version will be available in January 2015 after valuable

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

DHHS Information Technology (IT) Access Control Standard

DHHS Information Technology (IT) Access Control Standard DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

Rohos Logon Key for Windows Remote Desktop logon with YubiKey token

Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Step-by-Step Integration Guide. Tesline-Service S.R.L. 10 Calea Iesilor str., Chisinau, MD-2069, Moldova. Tel: +373-22-740-242 www.rohos.com

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Table of Contents. Page 1 of 6 (Last updated 30 July 2015) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

RevShield Software Suite Network Security Review

RevShield Software Suite Network Security Review Summary This document is aimed at professional network administrators. The information in this document is of a rather technical nature and very detailed. Based on this information, IT professionals can

More information

Installing Act! for New Users

Installing Act! for New Users Installing Act! for New Users Installing Act! for New Users 2014 Swiftpage ACT! LLC. All Rights Reserved. Swiftpage, Act!, and the Swiftpage product and service names mentioned herein are registered trademarks

More information

Citrix Receiver. Configuration and User Guide. For Macintosh Users

Citrix Receiver. Configuration and User Guide. For Macintosh Users Citrix Receiver Configuration and User Guide For Macintosh Users rev: 25.03.2015 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP

More information

Installing Sage ACT! 2013 for New Users

Installing Sage ACT! 2013 for New Users Installing Sage ACT! 2013 for New Users Installing Sage ACT! 2013 for New Users Copyright 2012 Sage Software, Inc. All Rights Reserved. Sage, the Sage logos, ACT!, and the Sage product and service names

More information

Activity 1: Scanning with Windows Defender

Activity 1: Scanning with Windows Defender Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders

More information

BeamYourScreen Security

BeamYourScreen Security BeamYourScreen Security Table of Contents BeamYourScreen Security... 1 The Most Important Facts in a Nutshell... 3 Content Security... 3 User Interface Security... 3 Infrastructure Security... 3 In Detail...

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

SOS Suite Installation Guide

SOS Suite Installation Guide SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing

More information

Endpoint Security Client for Mac

Endpoint Security Client for Mac Endpoint Security Client for Mac E80.60 User Guide 23 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are

More information

Windows 7 Hula POS Server Installation Guide

Windows 7 Hula POS Server Installation Guide Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3

More information

MIKOGO SECURITY DOCUMENT

MIKOGO SECURITY DOCUMENT MIKOGO SECURITY DOCUMENT Table of Contents Page 2. 6. 6. The Most Important Facts in a Nutshell In Detail Application Firewall Compatibility Quality Management: ISO 9001 Certification Data Compression

More information

Windows OS Security/Critical Patch List for BD Workstations

Windows OS Security/Critical Patch List for BD Workstations Last Updated January, 2015 Below is the list of Microsoft Windows OS Security/Critical Patches that customers can install on their BD workstations with minimal impact on the performance or functionality

More information

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Securing Remote Desktop for Windows XP

Securing Remote Desktop for Windows XP Securing Remote Desktop for Windows XP http://www.mobydisk.com/./techres/securing_remote_desktop.html Remote Desktop, Unsafely Many people use the Windows XP Professional remote desktop feature to gain

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

WebEx Remote Access White Paper. The CBORD Group, Inc.

WebEx Remote Access White Paper. The CBORD Group, Inc. WebEx Remote Access White Paper The CBORD Group, Inc. Document Revision: 1 Last revised: October 30, 2007 Changes are periodically made to the information contained in this document. While every effort

More information

Remote Access End User Guide (Cisco VPN Client)

Remote Access End User Guide (Cisco VPN Client) Remote Access End User Guide (Cisco VPN Client) Contents 1 INTRODUCTION... 3 2 AUDIENCE... 3 3 CONNECTING TO N3 VPN (N3-12-1) OR EXTENDED VPN CLIENT... 3 4 DISCONNECTING FROM N3 VPN (N3-12-1) AND EXTENDED

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10 Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between

More information

Online Backup by Mozy. Common Questions

Online Backup by Mozy. Common Questions Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup

More information

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011.

More information

How To Install Help Desk Premier

How To Install Help Desk Premier Help Desk Premier Installation Guide 2012 BrightBox Solutions All rights reserved. Last Updated October, 2012 Help Desk Premier is a trademark of BrightBox Solutions. Help Desk Premier software and the

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0 ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,

More information

TeamViewer 9 Manual Remote Control

TeamViewer 9 Manual Remote Control TeamViewer 9 Manual Remote Control Rev 9.2-07/2014 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About TeamViewer... 6 1.1 About the software... 6 1.2 About the

More information

How To Set Up Dataprotect

How To Set Up Dataprotect How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact

More information

Remote Maintenance, Support, Home Office and Presentations

Remote Maintenance, Support, Home Office and Presentations More than 100 million users The friendly All-In-One solution for Remote Maintenance, Support, Home Office and Presentations Simple, fast and secure over the Internet 1 Simple and fast over the Internet

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

TeamViewer 8 Manual Remote Control

TeamViewer 8 Manual Remote Control TeamViewer 8 Manual Remote Control Rev 8.1-12/2012 TeamViewer GmbH Kuhnbergstraße 16 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About TeamViewer... 6 1.1 About the software... 6 1.2 About

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

Diamond II v2.3 Service Pack 4 Installation Manual

Diamond II v2.3 Service Pack 4 Installation Manual Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance

More information

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage. Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

HIPAA: The Role of PatientTrak in Supporting Compliance

HIPAA: The Role of PatientTrak in Supporting Compliance HIPAA: The Role of PatientTrak in Supporting Compliance The purpose of this document is to describe the methods by which PatientTrak addresses the requirements of the HIPAA Security Rule, as pertaining

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Network Setup Instructions

Network Setup Instructions Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical

More information

Cyber Security: Software Security and Hard Drive Encryption

Cyber Security: Software Security and Hard Drive Encryption Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright

More information

UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106

UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106 UCLH VPN User Guide January 2009 VPN User Guide v1.3 20090106 1. What is the VPN? The VPN (Virtual Private Network) provides users with secure access, using a web browser, to a standard terminal screen

More information

ecstudent-ts Terminal Server How to Use

ecstudent-ts Terminal Server How to Use ecstudent-ts Terminal Server How to Use Connect to Cisco Any Connect Connect to Terminal Server, Set Options to Use Home Computer Files, Printers, Clipboard Use Network Folders Copy Files from Network

More information

Project management integrated into Outlook

Project management integrated into Outlook y Project management integrated into Outlook InLoox PM 7.x Help for the configuration for MySQL-Server An InLoox Whitepaper Published: October 2011 Copyright: InLoox GmbH 2011 You find up-to-date information

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

Verizon Remote Access User Guide

Verizon Remote Access User Guide Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

ViPNet ThinClient 3.3. Quick Start

ViPNet ThinClient 3.3. Quick Start ViPNet ThinClient 3.3 Quick Start 1991 2014 Infotecs Americas. All rights reserved. Version: 00060-07 34 02 ENU This document is included in the software distribution kit and is subject to the same terms

More information

ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access

ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

How to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection

How to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection How to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection Revised 09/2014 These instructions presume that you already have the Cisco AnyConnect Secure

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005 Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department

More information

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central.

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central. POLICIES Campus Data Security Policy Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central Policy Statement Policy In the course of its operations, Minot State University

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

White Paper. Software version: 5.0 www.wmsoftware.com

White Paper. Software version: 5.0 www.wmsoftware.com Safe AutoLogon Password Server Using Safe AutoLogon Password Server to manage Safe AutoLogon clients for seamless and centrally managed automatic logons White Paper Software version: 5.0 www.wmsoftware.com

More information

AT&T Global Network Client Client Features Guide. Version 9.6

AT&T Global Network Client Client Features Guide. Version 9.6 Version 9.6 AT&T Global Network Client Client Features Guide 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual

More information

CITY OF BOULDER *** POLICIES AND PROCEDURES

CITY OF BOULDER *** POLICIES AND PROCEDURES CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of

More information

IPSec VPN Client Installation Guide. Version 4

IPSec VPN Client Installation Guide. Version 4 IPSec VPN Client Installation Guide Version 4 Document version - 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation. eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as

More information

The City of New York

The City of New York The Policy All passwords and personal identification numbers (PINs) used to protect City of New York systems shall be appropriately configured, periodically changed, and issued for individual use. Scope

More information

BorderGuard Client. Version 4.4. November 2013

BorderGuard Client. Version 4.4. November 2013 BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

This guide provides all of the information necessary to connect to MoFo resources from outside of the office

This guide provides all of the information necessary to connect to MoFo resources from outside of the office REMOTE ACCESS GUIDE INTRODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office Links to topics in this document Connect remotely from your

More information

Procedure Title: TennDent HIPAA Security Awareness and Training

Procedure Title: TennDent HIPAA Security Awareness and Training Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary

More information