LANDesk Management Suite 8, v8.1 Creating Custom Vulnerabilities
|
|
- Felix Daniels
- 8 years ago
- Views:
Transcription
1 LANDesk Management Suite 8, v8.1 Creating Custom Vulnerabilities Revision 1.0 Rex Moffitt May 26, 2004
2 Information in this document is provided in connection with LANDesk Software products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in terms and conditions for such products, LANDesk Software assumes no liability whatsoever, and LANDesk Software disclaims any express or implied warranty, relating to sale and/or use of LANDesk Software products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. LANDesk Software products are not intended for use in medical, life saving, or life sustaining applications. The reader is advised that third parties can have intellectual property rights that can be relevant to this document and the technologies discussed herein, and is advised to seek the advice of competent legal counsel, without obligation of LANDesk Software. LANDesk Software retains the right to make changes to this document or related product specifications and descriptions, at any time, without notice. LANDesk Software makes no warranty for the use of this document and assumes no responsibility for any errors that can appear in the document nor does it make a commitment to update the information contained herein. Copyright 2004, LANDesk Software, Ltd., All rights reserved. LANDesk, Targeted Multicast, and Peer Download are registered trademarks or trademarks of LANDesk Software, Ltd. or its affiliates in the United States and/or other countries. *Other brands and names may be claimed as the property of others. 2
3 Table of Contents Introduction... 4 Possible Implementations... 4 Assumptions... 4 Creating a Custom Vulnerability... 4 Creating a Custom Detection Rule... 7 Scanning the Managed Device Conclusion
4 Introduction In LANDesk Patch Manager 8, v8.1, the ability to create a user defined vulnerability provides an extremely flexible and powerful tool used to implement and maintain patch security on the LANDesk Management Suite network. Users can create Custom Vulnerabilities (and detection rules) to scan managed devices for any Operating System, application, single file, or registry condition to be termed vulnerability. For vulnerable devices, there is the ability to remediate that vulnerability by configuring the appropriate response, such as deploying a patch file, replacing files on the managed devices hard drives, or updating installed applications. Possible Implementations Implementations of the Custom Vulnerabilities are almost limitless. Custom Vulnerabilities can be used to update any application on managed devices. Custom Vulnerabilities can also be used to apply any single file executable to a managed device based on detection rules defined by the LANDesk Management Suite administrator. The following step-by-step procedure is an example of how to create a Custom Vulnerability to update the LANDesk Management Suite client to the same patch level that is on the Core Server. Assumptions Readers need be able to install LANDesk Management Suite 8, v8.1, with the Patch Manager add-on. Managed devices need to be configured with the latest versions of the LANDesk Management Suite Inventory Scanner and Vulnerability Scanner. The reader also needs to be able to create an Enhanced Software Distribution (ESWD) package of a client configuration, used for updating the client. Creating a Custom Vulnerability Creating a Custom Vulnerability allows users to detect the vulnerability of the client not having the latest version of LANDesk Management Suite installed. How to create a Custom Vulnerability: 1. From the Management Suite Console, click Tools Patch Manager. The Patch Manager window appears. 2. Click on the Create New Vulnerability toolbar icon. The General tab appears on the Properties for <Vulnerability> window. 4
5 Figure 1. General Tab for Properties for <Vulnerability> 3. Type any unique Vulnerability ID number in the Vulnerability ID field. The system generated Vulnerability ID code can be edited. The default entry for the Vulnerability ID is CDateTimestam. The Publish Date is the date the vulnerability is created and cannot be edited. 4. Type any descriptive title for the vulnerability in the Title field. This is the title that is displayed on the Vulnerabilities List. 5. From the Severity drop down list, click Medium. For this vulnerability, a severity of Medium is sufficient, but any option can be selected. 5
6 6. From the Status drop down list, click on a status. Available options include: Disabled, Enabled, and Unassigned. When a status is specified, the vulnerability is placed in the corresponding group in the Patch Manager Tree view. If the vulnerability is to be part of the next vulnerability scan, click on Enabled, or the vulnerability can be moved to the Enabled Vulnerabilities group after the vulnerability is created. The language setting is automatically set to International or Language neutral (INTL), indicating that the vulnerability can be applied to any language version of the available Operating Systems and/or applications. The Detection Rules field displays all the rules to be used by this vulnerability definition. Create one or more detection rules that tell the Vulnerability Scanner what information to look for on the target clients when they are scanned to determine if they are vulnerable. For this custom vulnerability, the condition (i.e., Vulnerability) to scan for is the presence and version of an application in this case the LANDesk Management Suite client on managed devices. The easiest way to do this is to create a detection rule that scans for a specific representative of LANDesk Management Suite client file (a file that would reside on any device that can be managed via the LANDesk Management Suite console, no matter how basic the client configuration). 7. Click on the Description Tab and type any additional comments in the provided text field that may give a better description of this vulnerability. 8. To create a Detection Rule, comtinue withythe Creating a Custom Detection Rule procedure. 6
7 Creating a Custom Detection Rule This creates a Custom Detection rule that scans for the LANDesk Management Suite client, and performs the remediation by updating the client files to the desired version. How to create a Custom Detection Rule: 1. From the Properties for <Vulnerability> window, click the Add button. The General tab appears in the Properties for Rule 1 window. Figure 2. General tab for Properties for Rule 1 2. Click on the Remediate radio button. When the Remediate radio button is selected, the Commands tab appears to the right of the Comments tab and the Patch File Name and Patch URL fields become activated for editing. 7
8 This rule detects the vulnerability and remediates it by updating the LANDesk Management Suite client on the managed device. In this example, the LANDesk Management Suite client is updated to the latest version on managed devices by deploying an Enhanced Software Distribution (ESWD) package as a Patch file. 3. Type the name of the ESWD package in the Patch File Name field, to deploy to the LANDesk Management Suite client to affected computers 4. Type the path for the location of the ESWD patch file in the Patch URL field. 5. Click Generate MD5 Hash to ensure patch file integrity. LANDesk Software strongly recommends always generating a hash file for a patch that needs to be installed on managed devices. A hash file is used to ensure the integrity of the patch file during remediation. The Vulnerability Scanner does this by comparing the hash code the Vulnerability Scanner generates immediately before it attempts to install the patch. If the two hash codes match, remediation proceeds. If they do not match, indicating the patch file has changed in someway since being downloaded to the patch repository, the remediation process quits. 6. Click on the platform(s) in the Affected Platforms field that the Vulnerability Scanner will run on to scan for the LANDesk Management Suite client version. At least one platform must be selected. The list of available platforms is determined by the vulnerabilities that have been updated from the LANDesk Patch Manager Service. If no platforms appear in the list, first update vulnerabilities with the Update Vulnerabilities Settings window. 8
9 7. Click on the Files tab. The Files tab allows the configuration of specific file condition that the Vulnerability Scanner searches for on managed devices. Figure 3. Files Tab for Properties for Rule 1 8. Click Add to add a new file to scan for. This makes the fields editable. 9. From the Verify Using drop down list, click File Version. The scanner determines if the file is at the same level defined in this rule. The representative LANDesk Management Suite client file that the Vulnerability Scanner searches for on the managed devices is the LANDesk Management Suite Inventory Scanner agent file (LDSISCN32.EXE). VULSCAN.EXE should not be used. In Patch Manager 8, v8.1 the VULSCAN.EXE updates itself to the same version that is in the LDLOGON directory when VULSCAN.EXE is run. 9
10 10. Type the path the file is located in on the managed device in the Path field. The default path for the Inventory Scanner file is: C:\ldclient\LDISCN32.EXE. Unlike the Inventory Scanner the Vulnerability Scanner only looks in the path specified for the file. It does not search the entire drive for the file. 11. Click Gather Data to obtain the latest version number of the Inventory Scanner agent file. The Select File Representing Target Path Filepath Goes Here window appears. 12. Browse to the Core Server s \LDLOGON directory. 13. Click on the LDISCN32.EXE file. 14. Click Open. The file s version number automatically appears in the Minimum Version field. This is the version number needed on the managed devices. If the version number of the LDISCN32.EXE file currently residing on the managed device is lesser, then the vulnerability is considered to be detected. In order for the vulnerability to be remediate the auto-fix option must be turned on, a scheduled task or a policy must be run to deploy the patch to remediate the vulnerability. 15. From the Requirements drop down list, click File must exist. 16. Click Update. The changes are saved. 17. Click OK. Additional comments can be entered to help describe this detection rule, click the Comments tab and type the desired comments. The detection rule is saved and the Properties for window appears. 18. Click OK. The vulnerability is saved. 10
11 Scanning the Managed Device Once the Vulnerability and Detection Rule is created, the managed devices need to be scanned to find the vulnerable devices. The Vulnerability Scanner needs to be run on the managed device manually or from a Scheduled Task. Once the vulnerability is detected the Patch needs to be applied by setting the patch to an Auto-Fix state, an Application Policy, or a Scheduled Task to deploy the patch to the vulnerable devices. Conclusion A limitless number of vulnerabilities and remediation tasks, based on a file or registry key values, can be created by following the steps in this document and following the example provided. A managed device can be scanned to apply any single file executable as a Patch for a Custom Vulnerability. 11
Software License Monitoring
LANDESK Quick Start Guide Software License Monitoring VERSION 2 Introduction This guide was designed to help those users new to Software License Monitoring (SLM) introduced in LANDESK Management Suite
More informationLANDesk Management Suite 8.7 Extended Device Discovery
LANDesk Management Suite 8.7 Extended Device Discovery Revision 1.0 Roy Meyer Feb. 7, 2007 Information in this document is provided in connection with LANDesk Software products. No license, express or
More informationLANDesk Management Suite 9.0. Getting started with Patch Manager
LANDesk Management Suite 9.0 Getting started with Patch Manager DOWNLOAD PATCH CONTENT TO THE CORE SERVER INTRODUCTION This document is intended to assist LANDesk Management Suite administrators with implementing
More informationLANDESK SOLUTION BRIEF. Patch Management
Patch Management Increase the safety, security and efficiency of critical IT systems so IT can spend less time maintaining the computing environment and more time improving it. Develop and maintain patch
More informationALTIRIS Notification Connector Configuration Guide
ALTIRIS Notification Connector Configuration Guide Notice Altiris Notification Connector Configuration Guide 2007 Altiris, Inc. All rights reserved. Document Date: February 27, 2007 Information in this
More informationResolving the Top Three Patch Management Challenges
LANDesk Technical White Paper Resolving the Top Three Patch Management Challenges Technical White Paper Visit www.landesk.com for more information. To the maximum extent permitted under applicable law,
More informationLANDESK Service Desk. Desktop Manager
LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,
More informationSage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
More informationTech Brief Q&A: Implementing Endpoint Security in 9.6 SP 2. Presented by Martin Gannon June 21, 2015
Tech Brief Q&A: Implementing Endpoint Security in 9.6 SP 2 Presented by Martin Gannon June 21, 2015 Contents Questions and Answers from the Live Webinar... 3 About LANDesk Software... 5 To the maximum
More informationALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide
ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide Notice Altiris Software Delivery Solution for Windows 6.1 SP3 Product Guide 2007 Altiris, Inc. All rights reserved. Document Date: February
More informationCustom Vulnerabilities. NA Channel SE Team Lead John.Wyckoff @ landesk.com 802-825-5863
Custom Vulnerabilities NA Channel SE Team Lead John.Wyckoff @ landesk.com 802-825-5863 LANDesk Solutions Systems Lifecycle Management Power & Infrastructure Management Endpoint Security & Compliance Virtualization
More informationEvent Manager. LANDesk Service Desk
Event Manager LANDesk Service Desk LANDESK SERVICE DESK EVENT MANAGER GUIDE This document contains information that is the proprietary and confidential property of LANDesk Software, Inc. and/or its affiliated
More informationLANDesk Patch and Compliance. Common Troubleshooting steps for Vulnerability Remediation.
LANDesk Patch and Compliance Common Troubleshooting steps for Vulnerability Remediation. Contents Introduction... 3 Scope... 3 Assumptions... 3 Logs used in Troubleshooting... 4 Vulscan Switches... 4 The
More informationAdobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service
Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service white paper TABLE OF CONTENTS 1. Document overview......... 1 2. References............. 1 3. Product overview..........
More informationDeploying Dell OpenManage Server Administrator on VMware ESXi Using Dell Online Depot and VMware Update Manager
Deploying Dell OpenManage Server Administrator on VMware ESXi Using Dell Online Depot and VMware Update Manager July 2013 Deepti Madhu Krishnaprasad K Deploying Dell OpenManage Server Administrator on
More informationMobility Manager 9.5. Installation Guide
Mobility Manager 9.5 Installation Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or
More informationUser Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory
Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property
More informationDell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationCopy Tool For Dynamics CRM 2013
Copy Tool For Dynamics CRM 2013 Page 1 of 15 Copy Tool 2013 Copyright Warranty disclaimer Limitation of liability License agreement Copyright 2013 Dynamics Professional Solutions. All rights reserved.
More informationLANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client
LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled
More informationResetting USB drive using Windows Diskpart command
Resetting USB drive using Windows Diskpart command Simon Huang Technical Product Manager simon.huang@supertalent.com Super Talent Technology October, 2013 Release 1.00 1 Legal Disclaimer INFORMATION IN
More informationHELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE
HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationMobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
More informationSOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012
SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse
More informationIBM Endpoint Manager Version 9.2. Software Use Analysis Upgrading Guide
IBM Endpoint Manager Version 9.2 Software Use Analysis Upgrading Guide IBM Endpoint Manager Version 9.2 Software Use Analysis Upgrading Guide Upgrading Guide This edition applies to IBM Endpoint Manager
More informationIBM Connections Plug-In for Microsoft Outlook Installation Help
IBM Connections Version 5 IBM Connections Plug-In for Microsoft Outlook Installation Help Edition Notice Note: Before using this information and the product it supports, read the information in "Notices."
More informationProduct Support Notice. FTP backup MSS to a Windows 2003 Server
Product Support Notice 2007 Avaya Inc. All Rights Reserved. PSN# PSN001698u Original publication date: 05-Dec-2007. This is Issue #1, published 07- Dec-2007. Severity/risk level Medium Name of problem
More informationDirectory Integration in LANDesk Management Suite
Directory Integration in LANDesk Management Suite A white-paper detailing the use of an LDAP Directory in an LANDesk Management Suite environment LANDesk Software Inc. Sam Merrill Technical Marketing Engineer
More informationLANDesk Data Analytics
LANDesk White Paper LANDesk Data Analytics An innovative, comprehensive approach to managing software and hardware assets Visit www.landesk.com for more information. To the maximum extent permitted under
More informationLANDesk Management Suite 9. Best Practices for Agent Configuration and Deployment (BKM)
LANDesk Management Suite 9 Best Practices for Agent Configuration and Deployment (BKM) Revision 1.00 Don White Dec 10, 2009 Copyright 2002-2009 Avocent Corporation. All rights reserved. Avocent, LANDesk,
More informationIntel Storage System SSR212CC Enclosure Management Software Installation Guide For Red Hat* Enterprise Linux
Intel Storage System SSR212CC Enclosure Management Software Installation Guide For Red Hat* Enterprise Linux Order Number: D58855-002 Disclaimer Information in this document is provided in connection with
More informationEventTracker: Configuring DLA Extension for AWStats Report AWStats Reports
EventTracker: Configuring DLA Extension for AWStats Report AWStats Reports Publication Date: Oct 18, 2011 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationCreating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide
Creating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide Microsoft Corporation Published: January 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step
More informationOracle Enterprise Manager. Description. Versions Supported
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory 10g Release 2 (10.2.0.2) B28044-02 June 2006 This document provides a brief description about the Oracle
More informationIntel RAID Volume Recovery Procedures
Intel RAID Volume Recovery Procedures Revision 1.0 12/20/01 Revision History Date Revision Number 12/20/01 1.0 Release Modifications Disclaimers Information in this document is provided in connection with
More informationSyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System
SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System with Internal Storage Focusing on IPMI Out of Band Management Recipe ID: 19SYAM190000000011-01 Contents Hardware Components...3
More informationInstallation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.
More informationInstalling and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management
IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo
More informationRecovery BIOS Update Instructions for Intel Desktop Boards
Recovery BIOS Update Instructions for Intel Desktop Boards All BIOS update files for Intel Desktop Boards are available on Intel's Download Center at http://downloadcenter.intel.com/. Important Notes:
More informationDell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide
Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationIntel HTML5 Development Environment. Tutorial Building an Apple ios* Application Binary
Intel HTML5 Development Environment Tutorial Building an Apple ios* Application Binary V1.02 : 08.08.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO
More informationIntel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration
Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012 Revision History Revision Revision History
More informationOracle Enterprise Manager
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory Release 12.1.0.1.0 E28548-04 February 2014 Microsoft Active Directory, which is included with Microsoft
More informationPatch Management for Red Hat Enterprise Linux. User s Guide
Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,
More informationLANDesk Patch Manager. Strategic and Tactical Implementation Guide
LANDesk Patch Manager Strategic and Tactical Implementation Guide Contents Using this Guide... 4 Quick Start... 4 Technical High-Level Overview... 5 Discovering your environment... 5 Using Inventory...
More informationEventTracker: Configuring DLA Extension for AWStats report AWStats Reports
EventTracker: Configuring DLA Extension for AWStats report AWStats Reports Prism Microsystems Corporate Headquarter Date: October 18, 2011 8815 Centre Park Drive Columbia MD 21045 (+1) 410.953.6776 (+1)
More informationDocument Exchange Server 2.5
KOFAX Document Exchange Server 2.5 Administrator s Guide for Fujitsu Network Scanners 10001820-000 2008-2009 Kofax, Inc., 16245 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved.
More informationBusiness Portal for Microsoft Dynamics GP 2010. Field Service Suite
Business Portal for Microsoft Dynamics GP 2010 Field Service Suite Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views
More informationDEPLOYING EMC DOCUMENTUM BUSINESS ACTIVITY MONITOR SERVER ON IBM WEBSPHERE APPLICATION SERVER CLUSTER
White Paper DEPLOYING EMC DOCUMENTUM BUSINESS ACTIVITY MONITOR SERVER ON IBM WEBSPHERE APPLICATION SERVER CLUSTER Abstract This white paper describes the process of deploying EMC Documentum Business Activity
More informationIBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment
IBM TRIRIGA Anywhere Version 10 Release 4 Installing a development environment Note Before using this information and the product it supports, read the information in Notices on page 9. This edition applies
More informationPrint Management. User's Guide
Print Management User's Guide November 2014 www.lexmark.com Contents 2 Contents Overview...3 Performing user authentication...4 Using standard authentication...4 Using Single Sign On authentication...4
More informationIntel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration
Intel vpro Technology How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Revision 1.4 March 10, 2015 Revision History Revision Revision History Date 1.0 First
More informationTrend Micro PC-cillin Internet Security 2006
Trend Micro PC-cillin Internet Security 2006 I. How to modify Trend Micro PC-cillin Internet Security 2006 to prompt you for applications attempting to access your network and the internet. 1) Right-click
More informationIntegrate Cisco IronPort Web Security Appliance (WSA)
Integrate Cisco IronPort Web Security Appliance (WSA) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides
More informationBasic. Exchange Server. Backup and Restoration. A step by step guide to backing up and restoring
Basic Exchange Server Backup and Restoration A step by step guide to backing up and restoring Exchange Server 2000 and 2003 COPYRIGHT Copyright 2003 Cortex I.T. Pty. Ltd. All rights reserved. This document
More informationTroubleshooting File and Printer Sharing in Microsoft Windows XP
Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows
More informationNovell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
More informationMicrosoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
More informationDefender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationAG MacOS Standalone Array Client Administration Guide
AG MacOS Standalone Array Client Administration Guide Copyright Statement Copyright Statement Copyright 2015 Array Networks, Inc., 1371 McCarthy Blvd, Milpitas, California 95035, USA. All rights reserved.
More informationIdera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013
Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager Install Guide Idera Inc., Published: April 2013 Contents Introduction to the Idera SQL Diagnostic Manager Management
More informationMicrosoft Dynamics GP 2010. SQL Server Reporting Services Guide
Microsoft Dynamics GP 2010 SQL Server Reporting Services Guide April 4, 2012 Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information
More informationIntegrate Check Point Firewall
Integrate Check Point Firewall EventTracker Enterprise Publication Date: Oct.26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is
More informationInstructions for Recovery BIOS Update
Instructions for Recovery BIOS Update In the unlikely event that a BIOS update is interrupted, it is possible the BIOS may be left in an unusable state. The recovery process requires the chassis to be
More informationManaging Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
More informationConfiguring the SST DeviceNet OPC Server
Overview This application note describes the steps necessary to configure the SST DeviceNet OPC Server for use under Windows NT (Service Pack 3 or higher). This example shows how to set up a configuration
More informationFront-Office Server 2.7
This release connector is deprecated. Use Kofax Capture and the appropriate Kofax Capture release script to release documents to a specific destination. KOFAX Front-Office Server 2.7 Configuration Guide
More informationEventTracker: Support to Non English Systems
EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to
More informationIBM Tivoli Provisioning Manager V 7.1
IBM Tivoli Provisioning Manager V 7.1 Preparing for patch management in a small environment 2011 IBM Corporation Welcome to the training module for Tivoli Provisioning Manager version 7.1, preparing for
More informationLab 05: Deploying Microsoft Office Web Apps Server
Lab 05: Deploying Microsoft Office Web Apps Server DISCLAIMER 2013 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Hyper-V, Internet Explorer, Lync, PowerPoint, Silverlight, SQL
More informationfor Small and Medium Business Quick Start Guide
for Small and Medium Business Quick Start Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described herein without notice. Before using
More informationServer Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
More informationHow to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
More informationDell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationOracle Enterprise Manager. Description. Versions Supported. Prerequisites
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft SQL Server 10g Release 2 (10.2) B28049-01 January 2006 This document provides a brief description about the Oracle System
More informationCanaveral iq WBT Add-on for Windows CE 2.12-based Wyse Terminals
Canaveral iq WBT Add-on for Windows CE 2.12-based Wyse Terminals Release 1.5 Installation Guide Abstract This document addresses an administrator s and the user s interactions with Canaveral iq. In addition,
More informationDell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS
Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationProven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
More informationHP Quality Center. Software Version: 10.00. Microsoft Word Add-in Guide
HP Quality Center Software Version: 10.00 Microsoft Word Add-in Guide Document Release Date: February 2012 Software Release Date: January 2009 Legal Notices Warranty The only warranties for HP products
More informationIntegrating Symantec Endpoint Protection
Integrating Symantec Endpoint Protection EventTracker Version 7.x Publication Date: Nov 8, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About this Guide This guide provides
More informationActive Directory Synchronization with Lotus ADSync
Redbooks Paper Active Directory Synchronization with Lotus ADSync Billy Boykin Tommi Tulisalo The Active Directory Synchronization tool, or ADSync, allows Active Directory administrators to manage (register,
More informationPromotion Model. CVS SUITE QUICK GUIDE 2009 Build 3701 February 2010. March Hare Software Ltd
CVS SUITE QUICK GUIDE 2009 Build 3701 February 2010 March Hare Software Ltd Legal Notices Legal Notices There are various product or company names used herein that are the trademarks, service marks, or
More informationAutomating client deployment
Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark
More informationDocAve 6 Service Pack 1 Job Monitor
DocAve 6 Service Pack 1 Job Monitor Reference Guide Revision C Issued September 2012 1 Table of Contents About Job Monitor... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin... 5
More informationSymantec NetBackup for Lotus Notes Administrator's Guide
Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished
More informationDecommissioning the original Microsoft Exchange
Decommissioning the original Microsoft Exchange Originally posted: March 2002 Affected software versions BlackBerry Enterprise Server version 2.0 and version 2.1 for Microsoft Exchange (all service pack
More informationDell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
More informationIntel HTML5 Development Environment. Tutorial Test & Submit a Microsoft Windows Phone 8* App (BETA)
Intel HTML5 Development Environment Tutorial Test & Submit a Microsoft Windows Phone 8* App v1.00 : 04.09.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.
More informationAltiris Task Server 6.0 Help
Altiris Task Server 6.0 Help Notice Altiris Task Server 6.0 Help 2000-2006 Altiris, Inc. All rights reserved. Document Date: December 27, 2006 Information in this document: (i) is provided for informational
More informationRSA Security Analytics Netflow Collection Configuration Guide
RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks
More informationGood Share Client User Guide for ios Devices
Good Share Client User Guide for ios Devices Product Version: 3.1.3 Doc Rev 3.1 Last Updated: 24-Feb-15 Good Share TM Table of Contents Introducing Good Share 1 Installing the Good Share App 1 Getting
More informationRSA Security Analytics Netflow Collection Configuration Guide
RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks
More informationArchive One Policy V4.2 Quick Start Guide October 2005
Archive One Policy V4.2 Quick Start Guide October 2005 Archive One Policy Quick Start Guide V4.2 Page 1 of 33 CONTENTS Introduction... 3 Components...3 Before You Start...4 System Requirements...5 Prerequisites...7
More informationGFI Product Manual. Outlook Connector User Manual
GFI Product Manual Outlook Connector User Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no
More informationDeploying Business Objects Crystal Reports Server on IBM InfoSphere Balanced Warehouse C-Class Solution for Windows
Deploying Business Objects Crystal Reports Server on IBM InfoSphere Balanced Warehouse C-Class Solution for Windows I Installation & Configuration Guide Author: Thinh Hong Business Partner Technical Enablement
More information4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationSage 300 ERP 2012. Sage CRM 7.1 Integration Guide
Sage 300 ERP 2012 Sage CRM 7.1 Integration Guide This is a publication of Sage Software, Inc. Version 2012 Copyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product
More information