Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations
|
|
- Deirdre Charles
- 8 years ago
- Views:
Transcription
1 Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations 11/2010 This document includes the following topics: About this guide (page 2) TeamViewer remote desktop support software (page 3) Security configuration of BD Biosciences workstations (page 9) Organizational security and data privacy measures (page 12) Recommendations for practical security measures (page 14)
2 2 Remote Support Security Guidelines About this guide About this topic This topic describes the information contained in this guide. Guide contents This guide is intended to provide information and recommendations to customers to ensure maximum security when using BD Biosciences workstations and the BD Remote Instrument Support Solution. It describes the security features and operation of the BD Remote Instrument Support solution on BD Biosciences workstations that have BD FACSDiva software, BD FACSCanto Clinical software, BD FACS SPA software or BD FACSArray software. Who should read this guide All IT administrators and users of BD Biosciences workstations which will be connected to the internet for the purpose of enabling the BD Remote Instrument Support solution. Where to store this guide This information should be stored near the BD Biosciences workstation for reference.
3 Remote Support Security Guidelines 3 TeamViewer remote desktop support software About this topic This topic describes the functionality and inherent security features of the TeamViewer remote desktop support software. In addition this topic describes the TeamViewer software installation and subsequent configuration required to maximize security. Details on how to use the application are also provided. Responsibility BD is responsible for the installation of the TeamViewer application on BD Biosciences workstations. During installation BD will apply all TeamViewer configuration options required for safe and secure operation of the software. It is the responsibility of the customer to ensure that the TeamViewer software is used in accordance with the BD guidelines provided in this document to ensure continued security of the solution and to prevent any impact on the routine operation of BD software and instruments. Warranty and liability BD does not provide any warranty with respect to the TeamViewer software. BD recommends that the TeamViewer software is not used during routine operation of BD software on a BD Biosciences workstation or during routine operation of the instrument connected to a BD Biosciences workstation. The TeamViewer application must only be started when instructed to do so by a BD support representative. About TeamViewer TeamViewer is a software solution for desktop sharing, allowing remote access and support over the internet. TeamViewer software is manufactured in accordance with the ISO 9001:2008 quality standard guidelines. The product has passed a security review qualifying it for use on the bank workstations of major banking institutions. Teamviewer is in use in several healthcare institutions. TeamViewer is a widely known tool used today by more than users spread over more than 200 countries.
4 4 Remote Support Security Guidelines TeamViewer security features TeamViewer has the following unique combination of security features: An on-demand connection session of TeamViewer software is hosted on the BD Biosciences workstation. A connection to the BD Biosciences workstation will only be available once the operator has started the TeamViewer application. Connection is established directly over the internet via a Master server hosted by TeamViewer GmbH. Connectivity is established over TCP or UDP and data is transferred via http tunnelling. TeamViewer works with complete encryption based on RSA public/private key exchange and AES (256 bit) session encoding. Data can only be deciphered using the private key of the client application. Since this private key is never communicated during the communication session, interconnecting systems cannot decipher transmitted data. Each TeamViewer client has a unique Partner ID which is automatically generated by TeamViewer based on the hardware characteristics of the BD Biosciences workstation. The Partner ID is validated on a Master TeamViewer server prior to every connection. During each session the TeamViewer client will create a unique password. A two factor authentication consisting of the Partner ID and session password is required for a remote support representative to connect. TeamViewer prevents brute-force attacks by exponentially increasing the amount of time between failed connections. 24 Failed attempts will take 17 Hours. Latency is only reset after entering the correct password. TeamViewer software is signed using VeriSign Code Signing technology, ensuring that the publisher of the software executables can always be identified. TeamViewer servers are located in a highly modern data centre with all the required redundancy features built in to ensure availability of service. Physical access to the data centre is only possible after a thorough identity check through a single entrance gate. CCTV, intrusion detection, 24/7 surveillance and on-site security personnel protect TeamViewer servers against attacks from within. Detailed information on TeamViewer security can be found online at
5 Remote Support Security Guidelines 5 TeamViewer Applications Two TeamViewer applications are used to allow for remote desktop support of BD Biosciences workstations: TeamViewer Manager: This application is installed on the desktops of BD remote support personnel. It is used to store partner details in a database that can be shared with other BD support personnel. In addition the application will keep an audit trail recording the date, time and length of remote support sessions. BD will take proper care to ensure that partner details are only shared with the local BD service organization of the customer. TeamViewer All-In-One: This application is installed on the desktops of BD remote support personnel and on the customer s BD Biosciences workstation. On the BD Biosciences workstation the application will be started in host mode to allow a BD remote support representative remote access to the workstation of the customer. On the desktop of the BD remote support personnel the application is launched in client mode and used to connect to the customer s Biosciences workstation. TeamViewer installation and configuration The following configuration options will be applied during installation of TeamViewer to ensure the application can be used securely: TeamViewer will not be installed as a service but must be launched manually when remote support is required. When the application is closed it will exit as opposed to minimizing to the Windows application tray. TeamViewer will be configured to generate a new unique secure 6 digit password using a mixture of numbers and upper and lowercase letters at the start of each remote support session. It is possible to generate secure 10 digit passwords containing a mixture of numbers, upper and lower case letters and punctuation. However this may make it more difficult for the user to accurately convey the password to the BD remote support representative. Access to other computers in the remote (customer) network can be activated at the discretion of the IT administrator. To minimize user interaction, the option to view and control the remote desktop (instrument workstation) will be automatically enabled after launch of the application by the customer. The customer may choose to change this setting to allow access only after having given confirmation. The ability to transfer files from the customer s workstation to the BD network will be configured as either After confirmation or Denied depending on the preference of the customer and IT administrator. Details of remote control sessions will be automatically logged and stored by BD.
6 6 Remote Support Security Guidelines Once TeamViewer has been installed on the BD Biosciences workstation, the BD support representative will record the unique Partner ID that was generated for the workstation. The unique Partner ID will be communicated to the data privacy and security administrator for the local BD service organization. The unique Partner ID will be recorded in the TeamViewer Manager database at the customer s local BD service organization. It will therefore not be necessary for BD support personnel to request the unique Partner ID from the customer before initiating a remote support session. If the unique Partner ID should, however, be lost due to unforeseen circumstances, the partner ID should only be communicated to the data privacy and security administrator of the local BD service organization. This should either be done by a BD support representative when visiting the customer s site or by someone within the customer s organization who has been authorized by the organization to deal with Data Privacy and / or remote access security. TeamViewer operation If a remote support intervention is required, a BD remote support representative will contact the customer by phone and instruct the customer to launch the TeamViewer application. A shortcut to the TeamViewer application will be available on the desktop of the BD Biosciences workstation. Figure 1 - TeamViewer shortcut In order to host a remote support session on the workstation, the user must launch the TeamViewer application by double clicking the shortcut. Caution! The TeamViewer application must not be operated while the BD Biosciences workstation software and / or connected instrument are used for routine sample processing. The application should only be launched to allow a BD representative access for remote support. The application must be closed before routine sample processing is performed. Once the TeamViewer application has been launched, a new session password will be generated. The user must communicate the session password by telephone to the BD remote support representative.
7 Remote Support Security Guidelines 7 Figure 2 - TeamViewer application showing the Partner ID and session password Caution! The Partner ID should already be known to the BD remote support representative. If the customer is requested to provide the Partner ID to the BD remote support representative, the customer should only do so if he/she has initiated the telephone call to BD. The Partner ID should not be provided to anyone that has contacted the customer to initiate a remote support session! After the remote support session has been established, the BD remote support representative will take control of the BD Biosciences workstation desktop. The user may receive a prompt from TeamViewer to confirm access for the BD remote support representative to take remote control of the desktop. If the user wants to allow remote control of the BD Biosciences workstation, the user has to click Yes to grant access. Figure 3 - Remote Control confirmation dialog During the remote support session the desktop background of the BD Biosciences workstation will become grey to indicate a remote support session is in progress. The user will be able to see all the actions performed by the BD remote support representative. The TeamViewer application will be minimized above the Windows system tray from where the user will have access at all times to disable input from the remote support representative. To disable remote input, the user can click on the mouse icon within the TeamViewer status window.
8 8 Remote Support Security Guidelines Figure 4 - Remote input disabled To re-enable remote input, the user should click the mouse icon in the TeamViewer status window again. Figure 5 - Remote input enabled The remote session can be terminated at any point by clicking the red cross within the TeamViewer status window. TeamViewer records all remote sessions in an audit log which is stored on the BD Biosciences workstation. In addition, TeamViewer Manager maintains an audit log which records the user name and length of connection for each remote session initiated from BD. The additional TeamViewer Manager log can be supplied to the customer upon request. Once the remote support session is terminated, the BD Biosciences workstation desktop background will be restored. The user must close the TeamViewer application before commencing routine sample processing using BD Biosciences software and / or the instrument connected to the workstation.
9 Remote Support Security Guidelines 9 Security configuration of BD Biosciences workstations About this topic This topic describes the configuration of the BD Biosciences workstation to ensure a reasonable level of security for systems connected to the internet. Before getting started Please refer to the Information Security Guidelines document ( REV. 01) for recommendations on how to manage Antivirus software and Microsoft Updates on BD Biosciences workstations. This document can be downloaded at urity Responsibility and liability BD is responsible for configuring the BD Biosciences workstation to ensure reasonable security is applied when connecting to the internet. It is the responsibility of the customer to ensure that the guidelines stipulated in the Information Security Guidelines document are implemented to ensure that Antivirus and Windows Updates are installed and maintained on the BD Biosciences workstation. It is the customer s responsibility to ensure that all routine users have a limited Windows user account to access the BD Biosciences workstation. The use of Windows Administrator accounts should be restricted for the use of customer s IT administrator(s) and BD service personnel. BD strongly advises against the installation of additional security related software above and beyond Antivirus and Microsoft Security Updates on the BD Biosciences workstation. Doing so will invalidate any regulatory or quality marking the system may carry. BD will not be liable for any impact of additional software on the quality of the results produced by BD Biosciences software and / or instrumentation if any additional software has been installed on the BD Biosciences workstation. Workstation configuration In order to allow users to operate BD Biosciences software using standard Windows user accounts, the following user account configuration will be performed on the BD Biosciences workstation by BD: A standard Windows account is created for each operator of the BD Biosciences workstation / instrument. Operator accounts are added to a local user group. Access permissions for BD Biosciences software and 3 rd Party programs are configured to allow full access for all members of the local user group.
10 10 Remote Support Security Guidelines In order to allow users to operate BD Biosciences software using standard Windows user accounts, the following user account configuration will be performed on the BD Biosciences workstation by BD: A standard Windows account is created for each operator of the BD Biosciences workstation / instrument. Operator accounts are added to a local user group. Access permissions for BD Biosciences software and 3 rd Party programs are configured to allow full access for all members of the local user group. The following local Account Policies may be enforced as required by the customer s IT administrator: Enforce password history 3 passwords remembered or a setting that conforms to the Group policy in use by the customer. Maximum password age 60 days or a setting that conforms to the Group policy in use by the customer. Minimum password age 1 day or a setting that conforms to the Group policy in use by the customer. Minimum password length 8 characters or a setting that conforms to the Group policy in use by the customer. Password must meet complexity requirements Enabled. Can be disabled at the discretion of the customer and / or local IT administrator. The following Account Lockout Policies may be enforced as required by the customer s IT administrator: Account lockout duration 30 minutes or a setting that conforms to the Group policy in use by the customer. Account lockout threshold 5 invalid logon attempts or a setting that conforms to the Group policy in use by the customer. Reset account lockout counter after 10 minutes or a setting that conforms to the Group policy in use by the customer. The following local security Audit policies may be enforced as required by the customer s IT administrator: Audit account logon events Success and Failure Audit account management - Success and Failure Audit logon events Success and Failure Audit object access Success and Failure Audit policy change Success and Failure Audit privilege use Success and Failure Audit system events Success and Failure
11 Remote Support Security Guidelines 11 The following Security Options may be enforced as required by the customer s IT administrator: Interactive logon: Do not display last user name Enabled or a setting that conforms to the Group policy in use by the customer. Interactive logon: Do not require CTRL+ALT+DEL Disabled or a setting that conforms to the Group policy in use by the customer. Interactive logon: Prompt user to change password before expiration 14 days or a setting that conforms to the Group policy in use by the customer. At the discretion of the customer and / or local IT administrator, access to USB storage devices can be disabled.
12 12 Remote Support Security Guidelines Organizational security and data privacy measures About this topic This topic describes the organizational security measures implemented by BD to ensure reasonable security for the BD Remote Instrument Support Solution. Data Privacy BD has defined and implemented an Instrument Remote Support Privacy Procedure to comply with applicable privacy laws and to ensure that: Remote access to a customer s network and instrumentation will only be implemented in agreement with the customer. Training is provided for all BD support personnel to understand and comply with BD s internal data privacy policy. All BD personnel that may inadvertently be exposed to Protected Health Information (PHI) as a consequence of supporting our customers understand their responsibility to maintain such information in confidence. All BD support personnel sign a non-disclosure of PHI agreement. Auditable records are kept of each customer with whom remote service has been agreed upon, detailing the end and termination of the agreement. Records will also be kept in the event of remote service being provided by a third party if agreed with the customer. Organizational Security Measures BD has implemented a range of organizational measures to ensure information access and control can be managed in a secure fashion. These measures include, but are not limited to: A comprehensive security management system to ensure users are only given access to information and information systems as required by their role in the organization. User training and awareness on data privacy and confidentiality. Physical security measures to ensure that non-authorized users cannot enter BD premises. This includes physical access restrictions to data servers and data hosting environments for non-authorized personnel. Access to and permissions on BD business desktops, laptops and data and application servers are controlled through a mixture of two factor authentication and Microsoft Group policies. Additionally Virtual Private Network (VPN) authentication is required for users accessing the systems from outside the BD network. Password complexity and expiration policies are in place to ensure that passwords cannot be easily compromised. Systems connected to the BD network are protected from external security risks with a combination of hardware firewalls, Antivirus software, Intrusion Prevention Systems and regular updating with Microsoft Security Updates.
13 Remote Support Security Guidelines 13 Hard disks of decommissioned computers are erased using DOD compliant software. This software will erase the contents of the hard disk multiple times to ensure no remaining data remains on the hard disk. Access and use of BD information systems is auditable. BD personnel is trained on and expected to comply with the Acceptable Use policy of BD business systems and Information Systems. Random checks are carried out by BD to ensure all personnel act according to this policy. BD conducts random audits to ensure that the internal data privacy policy is respected and that any deviations from the policy are addressed in a timely manner.
14 14 Remote Support Security Guidelines Recommendations for practical security measures About this topic This topic describes additional practical security measures that can be implemented by the customer s organization to improve the overall security of BD Biosciences workstations that may be connected to the customer s network and the internet. Practical security measures The guidelines outlined in this document do not prevent the customer from implementing any of the following security or organizational measures to safeguard the data on BD Biosciences workstations provided they do not involve the installation of third party components on the workstation. 1. Information Security Management System/Privacy and Data Protection Management System 2. Physical Security 3. Access Controls 4. Security and Privacy Technologies 5. Awareness, training and security checks in relation to personnel 6. Incident/Response Management/Business Continuity 7. Audit Controls/Due Diligence
15 2010, Becton, Dickinson and Company. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in retrieval systems, or translated into any language or computer language, in any form or by any means: electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without prior written permission from BD Biosciences. The information in this document is subject to change without notice. BD Biosciences reserves the right to change its products and services at any time to incorporate the latest technological developments. Although this guide has been prepared with every precaution to ensure accuracy, BD Biosciences assumes no liability for any errors or omissions or for any damages resulting from the application or use of this information. BD Biosciences welcomes customer input on corrections and suggestions for improvement. TeamViewer is a registered trademark of TeamViewer GmbH and/or its affiliates in Germany and/or other countries. Microsoft and Windows are registered trademarks of Microsoft Corporation in the Unites States and/or other countries. BD, BD Logo and all other trademarks are property of Becton, Dickinson and Company BD EUR SPP /2010 BD Biosciences European Customer Support Tel Fax help.biosciences@europe.bd.com
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
More informationInformation security guidelines
Information security guidelines BD Biosciences workstations 8/2014 This document includes the following topics: About this guide (page 2) Software policies (page 3) Virus protection setup and operation
More informationPreparing BD Systems for Data Migration. Summary of the Upgrade Process on page 6. Copying User Data Files onto an Upgraded System on page 7
Windows 7 Upgrade Instructions 8/2014 Preparing BD Systems for Data Migration Contents Overview Backing Up Your Data on page 2 Summary of the Upgrade Process on page 6 Copying User Data Files onto an Upgraded
More informationTeamViewer Security Information
TeamViewer Security Information 2009 TeamViewer GmbH, Stand 7/2009 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical
More informationThis document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.
SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,
More informationQuick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software. Published: February 2013 Software version: 5.
Quick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software Published: February 2013 Software version: 5.0 Contents Introduction... 1 Safe AutoLogon solution... 2 Installation
More informationBOWMAN SYSTEMS SECURING CLIENT DATA
BOWMAN SYSTEMS SECURING CLIENT DATA 2012 Bowman Systems L.L.C. All Rights Reserved. This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered
More informationTeamViewer Security Information
TeamViewer Security Information 2014 TeamViewer GmbH, Last update: 05/2014 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical
More informationTeamViewer Security Information
TeamViewer Security Information 2015 TeamViewer GmbH, Last update: 06/2015 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical
More informationTeamViewer Security Information
TeamViewer Security Information 2013 TeamViewer GmbH, Last update: 11/2013 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationEndpoint Security VPN for Windows 32-bit/64-bit
Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
More informationManual to Access SAP Training Systems Technical Description for Customer On-Site Training
Manual to Access SAP Training Systems Technical Description for Customer On-Site Training 2.0 draft version available as of Jan. 5th 2015. The final version will be available in January 2015 after valuable
More informationEstate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
More informationDHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
More informationFile and Printer Sharing with Microsoft Windows
Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of
More informationMAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationRohos Logon Key for Windows Remote Desktop logon with YubiKey token
Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Step-by-Step Integration Guide. Tesline-Service S.R.L. 10 Calea Iesilor str., Chisinau, MD-2069, Moldova. Tel: +373-22-740-242 www.rohos.com
More informationHIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
More informationTable of Contents. Page 1 of 6 (Last updated 30 July 2015)
Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational
More informationRevShield Software Suite Network Security Review
Summary This document is aimed at professional network administrators. The information in this document is of a rather technical nature and very detailed. Based on this information, IT professionals can
More informationInstalling Act! for New Users
Installing Act! for New Users Installing Act! for New Users 2014 Swiftpage ACT! LLC. All Rights Reserved. Swiftpage, Act!, and the Swiftpage product and service names mentioned herein are registered trademarks
More informationCitrix Receiver. Configuration and User Guide. For Macintosh Users
Citrix Receiver Configuration and User Guide For Macintosh Users rev: 25.03.2015 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP
More informationInstalling Sage ACT! 2013 for New Users
Installing Sage ACT! 2013 for New Users Installing Sage ACT! 2013 for New Users Copyright 2012 Sage Software, Inc. All Rights Reserved. Sage, the Sage logos, ACT!, and the Sage product and service names
More informationActivity 1: Scanning with Windows Defender
Activity 1: Scanning with Windows Defender 1. Click on Start > All Programs > Windows Defender 2. Click on the arrow next to Scan 3. Choose Custom Scan Page 1 4. Choose Scan selected drives and folders
More informationBeamYourScreen Security
BeamYourScreen Security Table of Contents BeamYourScreen Security... 1 The Most Important Facts in a Nutshell... 3 Content Security... 3 User Interface Security... 3 Infrastructure Security... 3 In Detail...
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationStarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationSOS Suite Installation Guide
SOS Suite Installation Guide rev. 8/31/2010 Contents Overview Upgrading from SOS 2009 and Older Pre-Installation Recommendations Network Installations System Requirements Preparing for Installation Installing
More informationEndpoint Security Client for Mac
Endpoint Security Client for Mac E80.60 User Guide 23 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are
More informationWindows 7 Hula POS Server Installation Guide
Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3
More informationMIKOGO SECURITY DOCUMENT
MIKOGO SECURITY DOCUMENT Table of Contents Page 2. 6. 6. The Most Important Facts in a Nutshell In Detail Application Firewall Compatibility Quality Management: ISO 9001 Certification Data Compression
More informationWindows OS Security/Critical Patch List for BD Workstations
Last Updated January, 2015 Below is the list of Microsoft Windows OS Security/Critical Patches that customers can install on their BD workstations with minimal impact on the performance or functionality
More informationXcalibur Global Version 1.2 Installation Guide Document Version 3.0
Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.
More informationResearch Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
More informationVeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
More informationClient Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
More informationSecuring Remote Desktop for Windows XP
Securing Remote Desktop for Windows XP http://www.mobydisk.com/./techres/securing_remote_desktop.html Remote Desktop, Unsafely Many people use the Windows XP Professional remote desktop feature to gain
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationWebEx Remote Access White Paper. The CBORD Group, Inc.
WebEx Remote Access White Paper The CBORD Group, Inc. Document Revision: 1 Last revised: October 30, 2007 Changes are periodically made to the information contained in this document. While every effort
More informationRemote Access End User Guide (Cisco VPN Client)
Remote Access End User Guide (Cisco VPN Client) Contents 1 INTRODUCTION... 3 2 AUDIENCE... 3 3 CONNECTING TO N3 VPN (N3-12-1) OR EXTENDED VPN CLIENT... 3 4 DISCONNECTING FROM N3 VPN (N3-12-1) AND EXTENDED
More informationNETWRIX IDENTITY MANAGEMENT SUITE
NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationMicrosoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
More informationOnline Backup by Mozy. Common Questions
Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup
More informationStarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users
StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011.
More informationHow To Install Help Desk Premier
Help Desk Premier Installation Guide 2012 BrightBox Solutions All rights reserved. Last Updated October, 2012 Help Desk Premier is a trademark of BrightBox Solutions. Help Desk Premier software and the
More informationCHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
More informationStarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core
StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.
More informationPolicy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0
ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,
More informationTeamViewer 9 Manual Remote Control
TeamViewer 9 Manual Remote Control Rev 9.2-07/2014 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About TeamViewer... 6 1.1 About the software... 6 1.2 About the
More informationHow To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
More informationRemote Maintenance, Support, Home Office and Presentations
More than 100 million users The friendly All-In-One solution for Remote Maintenance, Support, Home Office and Presentations Simple, fast and secure over the Internet 1 Simple and fast over the Internet
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationCentran Version 4 Getting Started Guide KABA MAS. Table Of Contents
Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationTeamViewer 8 Manual Remote Control
TeamViewer 8 Manual Remote Control Rev 8.1-12/2012 TeamViewer GmbH Kuhnbergstraße 16 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About TeamViewer... 6 1.1 About the software... 6 1.2 About
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
More informationDiamond II v2.3 Service Pack 4 Installation Manual
Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance
More informationImportant. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.
Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS
More informationSupplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
More informationHIPAA: The Role of PatientTrak in Supporting Compliance
HIPAA: The Role of PatientTrak in Supporting Compliance The purpose of this document is to describe the methods by which PatientTrak addresses the requirements of the HIPAA Security Rule, as pertaining
More informationBlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
More informationNetwork Setup Instructions
Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical
More informationCyber Security: Software Security and Hard Drive Encryption
Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright
More informationUCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106
UCLH VPN User Guide January 2009 VPN User Guide v1.3 20090106 1. What is the VPN? The VPN (Virtual Private Network) provides users with secure access, using a web browser, to a standard terminal screen
More informationecstudent-ts Terminal Server How to Use
ecstudent-ts Terminal Server How to Use Connect to Cisco Any Connect Connect to Terminal Server, Set Options to Use Home Computer Files, Printers, Clipboard Use Network Folders Copy Files from Network
More informationProject management integrated into Outlook
y Project management integrated into Outlook InLoox PM 7.x Help for the configuration for MySQL-Server An InLoox Whitepaper Published: October 2011 Copyright: InLoox GmbH 2011 You find up-to-date information
More informationNetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
More informationBlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
More informationContents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
More informationGuide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
More informationVerizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
More informationSecurity Analytics Engine 1.0. Help Desk User Guide
2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationGetting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described
More informationViPNet ThinClient 3.3. Quick Start
ViPNet ThinClient 3.3 Quick Start 1991 2014 Infotecs Americas. All rights reserved. Version: 00060-07 34 02 ENU This document is included in the software distribution kit and is subject to the same terms
More informationADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access
Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information
More informationSection 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
More informationHow to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection
How to Connect to Remote Desktop & How to Use Cisco AnyConnect Secure Mobility Client Secure VPN Connection Revised 09/2014 These instructions presume that you already have the Cisco AnyConnect Secure
More informationAccessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
More informationBrazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
More informationPOLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central.
POLICIES Campus Data Security Policy Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central Policy Statement Policy In the course of its operations, Minot State University
More informationStep-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
More informationWhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationWhite Paper. Software version: 5.0 www.wmsoftware.com
Safe AutoLogon Password Server Using Safe AutoLogon Password Server to manage Safe AutoLogon clients for seamless and centrally managed automatic logons White Paper Software version: 5.0 www.wmsoftware.com
More informationAT&T Global Network Client Client Features Guide. Version 9.6
Version 9.6 AT&T Global Network Client Client Features Guide 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual
More informationCITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
More informationIPSec VPN Client Installation Guide. Version 4
IPSec VPN Client Installation Guide Version 4 Document version - 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationTroubleshooting File and Printer Sharing in Microsoft Windows XP
Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows
More informationSecurity from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
More informationThe City of New York
The Policy All passwords and personal identification numbers (PINs) used to protect City of New York systems shall be appropriately configured, periodically changed, and issued for individual use. Scope
More informationBorderGuard Client. Version 4.4. November 2013
BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED
More informationSECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
More informationThis guide provides all of the information necessary to connect to MoFo resources from outside of the office
REMOTE ACCESS GUIDE INTRODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office Links to topics in this document Connect remotely from your
More informationProcedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
More information