Getting the Most out of XMA and XUA from the new Security Bundle
|
|
|
- Sibyl Hudson
- 10 years ago
- Views:
Transcription
1 Getting the Most out of XMA and XUA from the new Security Bundle HP-36, Chynoweth, November 19, 2014, 9:00 AM Customer Experience, TELUS and TELUS Health Speaker: Scott Uroff, XYPRO Content: Mark Wilson, TELUS Health
2 Overview Introduction About TELUS Health The Security Bundle XYGATE Merged Audit XYGATE User Authentication Installing the HP provided XMA software Using Scout and DSMSCM Useful Tricks Generating Alerts with XMA Customizing Daily Reporting with XMA Using XUA for RADIUS Authentication
3 Getting the Most out of XMA and XUA o About TELUS Health
4 About TELUS and TELUS Health TELUS is Canada s fastest-growing national telecommunications company $11.8 billion of annual revenue 13.5 million customer connections 8.0 million wireless subscribers 3.2 million wireline network access lines 1.45 million Internet subscribers 888,000 TELUS TV customers. TELUS provides a wide range of communications products and services, including wireless, data, Internet protocol (IP), voice, television, entertainment and video, and is Canada's largest healthcare IT provider.
5 Getting the Most out of XMA and XUA o o XYGATE Merged Audit XYGATE User Authentication
6 XMA Architecture Overview Safeguard EMS Log Adapters for Enterprise Audit Logging HP ArcSight SIEM XYGATE Filter Processing XMA Database NonStop SQL/MP itp WebServer Plug-Ins Alerts EMS Syslog SNMP Custom GUI Clients for XMA XYGATE Report Manager XYGATE Event Monitor
7 XUA Architecture Overview 100% of NonStop Authentication requests are handled through the Authentication layer Configuration Settings and Authentication Rules Safeguard Users can now access servers through an industry SSO solution. NonStop Programs TACL, OSS, FTP, ODBC, DSM/SCM, SSH, OSM and all others User Authentication Audit Data UserID Info The Authentication layer will trace the user to the associated NonStop user ID for authentication
8 Getting the Most out of XMA and XUA o o o Installing the HP provided XMA software Useful Tricks Generating Alerts with XMA
9 Using Scout and DSMSCM Be thankful for what you have and figure out how to use it in your environments. I hope we can provide you the keys to a successful installation and ability to unlock the wonderful benefits of Merged Audit. This is what you need to know Merged Audit HP product is T0928 your first point for support is GCSC. It comes with Marketing product QSN051 free with systems sold after September The product installed easily. You do have to do it with some thought. Find the space for the audit data to grow. Find the additional support tools to make it a gold standard ( servers and Enterprise Security Event Monitoring tools). Build some custom reports. Run some interactive reports. Have your security teams build some use cases from their Enterprise security tools. HP ArcSight for example. Nothing is ever easy so where possible arrange for HP installation and support services.
10 Using Scout and DSMSCM The things you have to do. Download the latest version from HP Scout. Load it into DSMSCM so that you can keep track of the RVU you are running I like to run the install manually, under my control. So run the obey file from where you placed it. I use $DSMSCM. Stop after install macro and size your SQL database BEFORE running XMA_MANGER the first time. (this requires deciding and editing one or two of the install files) Start your Merged Audit movers pathway via XMA_MANAGER macro
11 Using Scout and DSMSCM The things you have to do. Download the latest version from HP Scout.
12 Using Scout and DSMSCM The things you have to do. Download the latest version from HP Scout.
13 Using Scout and DSMSCM The things you have to do. Load it into DSMSCM so that you can keep track of the RVU you are running
14 Using Scout and DSMSCM The things you have to do. I like to run the install manually, under my control. So run the obey file from where you placed it. I use $DSMSCM. Stop after install macro and size your SQL database BEFORE running XMA_MANGER the first time. (this requires deciding and editing one or two of the install files) \DNB1 $DSMSCM E0928AAR 53> run insrun You will be asked a series of questions about the installation of XYGATEMA. You may abort the install process at any prompt by hitting the BREAK key. Prompts that end with a string within angle brackets mean that just hitting the return key will use that default value. =*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*= PLEASE READ THE SOFTDOC AS PART OF THE INSTALLATION PROCESS. =*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=
15 Using Scout and DSMSCM The things you have to do. Start your Merged Audit movers pathway via XMA_MANAGER macro XYGATEMA Management Main Menu v2.25 * * * * * * * * * * * * * * * * * * * 1: Pathway 2: Movers 3: Database 4: Uninstall X: Exit Selection?2
16 Useful Tricks Tricks The BIN file from HP is large and a standard WS-FTP creates small file extents. Use a DOS or other FTP client and provide file sizes (i.e. put E0928AAR E0928AAR,991,1000,1000,900) Don t forget code 991 and use SWARCSET (swarcset $dsmscm.rvu.e0928aar,,volume $dsmscm,myid) Decide on your database cleanup time. Watch for performance issues Plan for database maintenance enlist help from your DBA. Protect you XMA FILTERS file once built. I accidently purged one but recovered from another system.
17 Generating Alerts with XMA Generating EMS Alerts Get the easy FILTERS created. Generate viewpoint alerts from SUPER.SUPER logon
18 Generating Alerts with XMA Generating Alerts Get the easy FILTERS created. Where possible other critical alerts to staff. Yes the IP address is bogus. ACTION_BEGIN ACTIONTYPE MAIL MAIL_SRV MAIL_IPPROCESS $ztc0 MAIL_PORT 25 MAIL_FROM (doesn't need to be valid) MAIL_TO MAIL_SUBJECT ALERT - Security logon event MAIL_TEXT "NODE: (INSTALL.SYSTEMNAME) " "Time: (AUDIT.RECORDLCT) " "Event: (AUDIT.SUBJECTLOGIN) altered (AUDIT.OBJECTNAME) " " (AUDIT.RESULT) " "Outcome: (AUDIT.OUTCOME) (Success = 1; Fail = 3)" MAIL_TEXT_END ACTION_END
19 Generating Alerts with XMA Generating Syslog Alerts to a SIEM (HP ArcSight) Get the easy FILTERS created. Where possible get the security data off platform to your Enterprise security even monitoring system. It makes the audit teams happy. FILTERDEFBEGIN $CLW-ALL-EVENTS-EXCEPT-EMS!= This FILTER selects All Audits except EMS STATUS ACTIVE! $CLW-ALL-EVENTS-EXCEPT-EMS ACTIONCOLL_BEGIN ACTION_BEGIN ACTIONTYPE IPALERT IPALERT_IPPROCESS $ZTC0 IPALERT_ADDRESS IPALERT_PORT 515 IPALERT_PREFIX local0 <130> XYGATEMA NonStop (SESSION.RECORDSESSIONKEY) (SESSION.RECORDINSTALLKEY) (SESSION.SESSIONID). ACTION_BEGIN ACTIONTYPE SETDATA AUDIT.USER_DATA syslog ALERT ACTION_END
20 Generating Alerts with XMA Generating Custom Alerts Use the FILTSAMP file for examples. Build some custom TACL macros that are triggered by MA to do some fancy work. Share what you ve learned with your peers and us. ACTION_BEGIN ACTIONTYPE RUNCMD MAXCOMPLETIONTIME 120 RUNCMDDEFBEGIN RUN $SYSTEM.TACLMAC.GOXMAMSG RUNCMDDEFEND ACTION_END
21 Getting the Most out of XMA and XUA o Partitioning the XMA Database
22 Partitioning the XMA Database > $SYSTEM.XYGATEMA.PARSAMP (14/10/30 16:42) < *********************************************************************** -- ** File: PARSAMP ** -- ** This file contains samples of the commands used to partition an ** -- ** SQL Table ** -- ** Procedure: ** -- ** ========== ** -- ** 1) Modify the statements below adding the volume name. You may ** -- ** optionally enter values for EXTENTS & MAXEXTENTS. ** -- ** The default for EXTENTS is (16,64). The default unit type is ** -- ** page. The default for MAXEXTENTS is 160. ** -- ** You may add additional ALTER statements if more partitions ** -- ** are desired. ** -- ** NOTE: During XYGATE/MA processing the partition key values ** -- ** assigned are The value zero is omitted so that ** -- ** a empty partition can be created. The value 1 is ** -- ** reserved for conversion purposes. ** -- ** 2) Stop your XYGATE/MA pathway via XMA_MANAGER ** -- ** 3) run the macro XMA_LOAD_DEFINES ** -- ** 4) Execute the following command: ** -- ** SQLCI/in PARSAMP,out $S.#XMA.PART/ ** -- ** 5) Adding partitions will invalidate the SQL programs. ** -- ** To remedy the situation do the following: ** -- ** run $<vol>.<subvol>.xma install ** -- ** run XMA_SQLCOMPALL ** -- ** 6) Restart your XYGATE/MA pathway via the XMA_MANAGER ** -- ***********************************************************************
23 Getting the Most out of XMA and XUA o Using XUA for RADIUS Authentication
24 Using XUA for RADIUS Authentication Objective Telus wished to move all ID s to use AD Based User IDs in order to keep all user provisioning centralized. Challenge Existing Pathway application using application based user ID s. No source code. Solution Professional Services Developed a simple server to accept application authentication requests and mapped to AD user ID s. XYGATE User Authentication Application authentication requests routed by XUA to the RADIUS server
25 The XYGATE Report Manager (XRM) XRM is a comprehensive and easyto-use report writer for XMA data Pre-configured reports for out-of-thebox use Modify existing report definitions for custom requirements. Design new reports Perform ad-hoc queries View saved report output Schedule recurring reports Auto-deliver to multiple location options and in multiple format options
26 The XYGATE Report Manager (XRM) Tabbed pages allow for easy access to common functions Environment information displayed Links to frequents tasks make for easy navigation
27 The XYGATE Report Manager (XRM) XRM provides a full-function report designer Attributes and Criteria are menu driven with the option for direct input Query columns allow for efficient retrieval of only desired data Query nodes allow for the selection of one, more, or all configured nodes for a single source for audit reporting Retrieved data returns a grid of all audit records for ease of analysis and report design Report columns provide for custom naming, sizing, and wrapping properties of fields Grouping, Sorting, and layout are all customizable.
28 The XYGATE Report Manager (XRM) XRM provides a full-function report scheduler Frequency, Start date, and Run time allow for any needed schedule Multiple delivery methods and formats are supported Notification, , FTP and File types PDF, RTF, HTML, TXT TSV formats
29 The XYGATE Report Manager (XRM) Sample Report Output in PDF format
30 The XYGATE Event Monitor (XEM) Similar in design to XRM Event Monitors are like reports Pre-Populated with many useful monitors Edit existing or design new Can run for realtime or historically Links to common tasks
31 The XYGATE Event Monitor (XEM) Monitors may contain any audit data from XMA All products, some products or one product Selection criteria allows for narrow subject matter Installation Selection allows for the selection of one, more, or all configured nodes for a single source for audit monitoring Define window layouts to suit and fit desktop or command room needs
32 The XYGATE Event Monitor (XEM) Fully customizable looks and actions Select subset data to differentiate from expected data using criteria Choose text fonts and colors as well as backgrounds for contrast Select from 5 action types Sound, , Pop-Up, SNMP, Syslog Include configurable actions
33 The XYGATE Event Monitor (XEM) Sample XEM Filter Monitor Window SUPER.SUPER failed access attempts are displayed in in red with bold yellow text
34 XMA Log Adapters o o o HP ArcSight SIEM RSA envision and RSA Security Analytics Others such as Q-Radar, LogLogic, Splunk
35 XMA Log Adapters Additional Add-On Products and Services for XMA XMA is delivered with 1 log adapter HP ArcSight SIEM SIEM specific log adapters can be added as products RSA envision RSA Security Analytics SIEM specific log adapters can be added through professional services Q-Radar LogLogic Others
36 XMA Log Adapters Additional Add-On Products and Services for XMA Log Adapters The XYPRO pre-defined Filter Definitions have been designed to select, categorize and format the Merged Audit data so that it is compatible with the configuration of the SIEM that is receiving the data. Step 1. Configure XMA to Collect the Desired Data. Step 2. Determine the Transport Method. Step 3. Apply the Log Adapter to Your FILTERS File. Step 4. Start and Monitor Your MOVERs.
37 XMA Plug-Ins o o o BASE24 and BASE24 eps HLR AJB
38 XMA Plug-Ins Additional Add-On Products for XMA XMA is delivered with 4 data mover types Safeguard EMS XYGATE itp WebServer Application specific data mover types can be added as XMA Plug-Ins BASE24 BASE24 eps HLR AJB
39 XMA Plug-Ins Additional Add-On Products for XMA BASE24 OMF (type E) BASE24 eps Logins/Logoffs/File operations (inserts, updates, deletes, etc.) Sec file updates AULOGD (type K) Logins/Logoffs, security config changes (deletes, inserts, updates) XML based audit configuration
40 XMA Plug-Ins Additional Add-On Products for XMA HLR AJB dpa_audit_<start date/time>_<close date/time>.log (OSS) Tokens (ResultCode, Domain, Text, Command, CLIP-ACT, ALT-IMSI- DIGITS, GSM-O-CSI-ACTIVE, ECMN- SMS-CSI-ACTIVE, CLIR-AUTH, etc. Audit File (OSS) Connects, disconnects, etc.
HP NonStop Server Security and HP ArcSight SIEM
HP NonStop Customer Technical Talk HP NonStop Server Security and HP ArcSight SIEM 04/12/2012 HP NonStop Karen Copeland HP Enterprise Security Morgan DeRodeff XYPRO Barry Forbes NonStop Enterprise Division
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do?
McAfee SIEM Alarms Setting up and Managing Alarms Introduction McAfee SIEM provides the ability to send alarms on a multitude of conditions. These alarms allow for users to be notified in near real time
User Guide. Trade Finance Global. Reports Centre. October 2015. nordea.com/cm OR tradefinance Name of document 8/8 2015/V1
User Guide Trade Finance Global Reports Centre October 2015 nordea.com/cm OR tradefinance Name of document 2015/V1 8/8 Table of Contents 1 Trade Finance Global (TFG) Reports Centre Overview... 4 1.1 Key
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
ORACLE BUSINESS INTELLIGENCE WORKSHOP
ORACLE BUSINESS INTELLIGENCE WORKSHOP Integration of Oracle BI Publisher with Oracle Business Intelligence Enterprise Edition Purpose This tutorial mainly covers how Oracle BI Publisher is integrated with
Operation Error Management
S&C IntelliTeam CNMS Communication Network Management System Operation Error Management Table of Contents Section Page Section Page Overview.... 2 Error Management Alarms... 4 Viewing Alarms.... 5 Editing
Deciding When to Deploy Microsoft Windows SharePoint Services and Microsoft Office SharePoint Portal Server 2003. White Paper
Deciding When to Deploy Microsoft Windows SharePoint Services and Microsoft Office SharePoint Portal Server 2003 White Paper Published: October, 2003 Table of Contents Introduction 4 Relationship between
Installation and configuration of Real-Time Monitoring Tool (RTMT)
Installation and configuration of Real-Time Monitoring Tool (RTMT) How to install and upgrade RTMT, page 1 Services, servlets, and service parameters on server, page 5 Navigation of RTMT, page 6 Nonconfigurable
SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server.
Contents For Administrators... 3 Set up SourceAnywhere... 3 SourceAnywhere Service Configurator... 3 Start Service... 3 IP & Port... 3 SQL Connection... 4 SourceAnywhere Server Manager... 4 Add User...
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
You may be PCI DSS compliant but are you really secure?
You may be PCI DSS compliant but are you really secure? Greg Swedosh Knightcraft Technology Knightcraft Technology HP NonStop Security and PCI Compliance Specialists Agenda * PCI DSS Limitations and Strengths
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER USER GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from NetWrix
Plug-In for Informatica Guide
HP Vertica Analytic Database Software Version: 7.0.x Document Release Date: 2/20/2015 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements
Unified Security Management (USM) 5.2 Vulnerability Assessment Guide
AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Ajera 7 Installation Guide
Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services
Info-Alert Guide. Version 7.5
Info-Alert Guide Version 7.5 1995 2008 Open Systems Holdings Corp. All rights reserved. Document Number 2290.IA020 No part of this manual may be reproduced by any means without the written permission of
Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide
Embedded Document Accounting Solution (edas) for Cost Recovery Administrator's Guide September 2013 www.lexmark.com Contents 2 Contents Overview...4 Getting started...5 Understanding installation requirements...5
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
Management, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
Reporting User Guide. Version Oct 2011 Page 1 of 65
Version Oct 2011 Page 1 of 65 Table of Contents Purpose...3 1. Quick Balances...3 1.1. Quick Balances Setup...3 2. Scheduled Statement Reporting...5 2.1. Scheduled Daily Operating Account Statement...5
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
User Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19
CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface User Guidance
DDM Distributed Database Manager for SQL and ODBC. Installation and User Guide Version 5.27.xx
DDM Distributed Database Manager for SQL and ODBC Installation and User Guide Version 5.27.xx Communication Devices Inc. 85 Fulton St. Boonton, NJ 07005 USA Phone: 800 359 8561 Fax: 973 334 0545 Internet:
XYGATE & PCI COMPLIANCE PCI DSS VERSION 3.0
XYGATE & PCI COMPLIANCE PCI DSS VERSION 3.0 A SOLUTION PAPER MARCH 2015 XYPRO TECHNOLOGY CORPORATION 4100 GUARDIAN STREET, SUITE 100 SIMI VALLEY, CALIFORNIA 93063 U.S.A. WWW.XYPRO.COM TELEPHONE: +1 805-583-2874
Results CRM 2012 User Manual
Results CRM 2012 User Manual A Guide to Using Results CRM Standard, Results CRM Plus, & Results CRM Business Suite Table of Contents Installation Instructions... 1 Single User & Evaluation Installation
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
FirewallTM. isecurity. Out-of-the Box. The Network Security Component of. Version 15. Copyright Raz-Lee Security Ltd.
FirewallTM The Network Security Component of isecurity Out-of-the Box Version 15 Copyright Raz-Lee Security Ltd. Updated: 02/09/2011 This guide is intended to provide as a quick beginning to the principal
Administrator s Guide
Administrator s Guide Citrix Network Manager for MetaFrame XPe Version 1.0 Citrix Systems, Inc. Information in this document is subject to change without notice. Companies, names, and data used in examples
Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102
Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Interneer, Inc. Updated on 2/22/2012 Created by Erika Keresztyen Fahey 2 Workflow - A102 - Basic HelpDesk Ticketing System
FileMaker 12. ODBC and JDBC Guide
FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.
Manual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
Audit TM. The Security Auditing Component of. Out-of-the-Box
Audit TM The Security Auditing Component of Out-of-the-Box This guide is intended to provide a quick reference and tutorial to the principal features of Audit. Please refer to the User Manual for more
Novell ZENworks Asset Management
Novell ZENworks Asset Management Administrative Best Practices and Troubleshooting www.novell.com APRIL 19, 2005 2 GETTING THE MOST OUT OF NOVELL ZENWORKS ASSET MANAGEMENT The award-winning asset tracking
DiskBoss. File & Disk Manager. Version 2.0. Dec 2011. Flexense Ltd. www.flexense.com [email protected]. File Integrity Monitor
DiskBoss File & Disk Manager File Integrity Monitor Version 2.0 Dec 2011 www.flexense.com [email protected] 1 Product Overview DiskBoss is an automated, rule-based file and disk manager allowing one to
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright
CSP & PCI DSS Compliance on HP NonStop systems
CSP & PCI DSS Compliance on HP NonStop systems July 23, 2014 For more information about Computer Security Products Inc., contact us at: 200 Matheson Blvd. West Suite 200 Mississauga, Ontario, Canada L5R
User s Manual. Management Software for ATS
ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.
GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.
GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
alternative solutions, including: STRONG SECURITY for managing these security concerns. PLATFORM CHOICE LOW TOTAL COST OF OWNERSHIP
9.0 Welcome to FirstClass 9.0, the latest and most powerful version of the one of the industry s leading solutions for communication, collaboration, content management, and online networking. This document
FileMaker Server 13. FileMaker Server Help
FileMaker Server 13 FileMaker Server Help 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
VMware vrealize Operations for Horizon Administration
VMware vrealize Operations for Horizon Administration vrealize Operations for Horizon 6.1 This document supports the version of each product listed and supports all subsequent versions until the document
NovaBACKUP Storage Server User Manual NovaStor / April 2013
NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change
Installation and Administration Guide
Installation and Administration Guide Release 8 This installation guide will walk you through how to install and deploy Conga Composer, including recommended settings for the application. Contact Support:
ADP Workforce Now V3.0
ADP Workforce Now V3.0 Manual What s New Checks in and Custom ADP Reporting Grids V12 Instructor Handout Manual Guide V10171180230WFN3 V09171280269ADPR12 2011 2012 ADP, Inc. ADP s Trademarks The ADP Logo
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
System Administrator Training Guide. Reliance Communications, Inc. 603 Mission Street Santa Cruz, CA 95060 888-527-5225 www.schoolmessenger.
System Administrator Training Guide Reliance Communications, Inc. 603 Mission Street Santa Cruz, CA 95060 888-527-5225 www.schoolmessenger.com Contents Contents... 2 Before You Begin... 4 Overview... 4
Option Network Management Software for UPS UNMS II
Option Network Management Software for UPS UNMS II AEG Power Supply Systems GmbH Department: PSS E1 Name: Brandt/Rogge Revision: 00 Date: 20.05.2006 Operating Instructions...6000004951 BAL, en Legal Information
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.
Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.
SQL EXPRESS INSTALLATION...
Contents SQL EXPRESS INSTALLATION... 1 INSTALLING SQL 2012 EXPRESS... 1 SQL EXPRESS CONFIGURATION... 7 BILLQUICK DATABASE... 9 SQL Express Installation The Microsoft SQL Server 2012 Express software is
RSA Event Source Configuration Guide. Microsoft Exchange Server
Configuration Guide Microsoft Exchange Server Last Modified: Tuesday, March 11, 2014 Event Source (Device) Product Information Vendor Microsoft Event Source (Device) Exchange Server Supported Versions
Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.
chair John Chiang member Jerome E. Horton member Ana J. Matosantos August 27, 2012 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event
WhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
The same as the Bold convention (see above) but with the intent of providing a greater emphasis.
Document Conventions Our documents use certain types of document conventions to help you distinguish language elements from keyboard sequences, and so on. The following table clarifies the new conventions
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10
LabTech Commands COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 Overview Commands in the LabTech Control Center send specific instructions
FileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
Operation Tools. S&C IntelliTeam CNMS Communication Network Management System. Table of Contents. Overview... 2 Tools. Section Page Section Page
S&C IntelliTeam CNMS Communication Network Management System Operation Tools Table of Contents Section Page Section Page Overview.... 2 Tools Database Administration.... 4 User Triggered Database-Backup....
MT4 Multiterminal USER MANUAL
MT4 Multiterminal USER MANUAL MT4 MultiTerminal User Manual 1. Getting Started... 3 1.1 General... 3 1.2 Security System... 3 1.3 Live Update... 3 1.4 Terminal Settings... 4 2. Client Accounts... 9 2.1
Server Manager Help 10/6/2014 1
Server Manager Help 10/6/2014 1 Table of Contents Server Manager Help... 1 Getting Started... 7 About SpectorSoft Server Manager... 8 Client Server Architecture... 9 System Requirements... 10 Screencasts...
FileMaker Server 12. FileMaker Server Help
FileMaker Server 12 FileMaker Server Help 2010-2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.
McAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide
Pandora FMS 3.0 Quick User's Guide April 27th, 2009 1 Contents How to monitor a network computer/device?...3 Concepts...3 What's an agent?...3 What's a module?...3 Data transfer modes...3 What is an alert?...3
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
ACR Triad Web Client. User s Guide. Version 2.5. 20 October 2008. American College of Radiology 2007 All rights reserved.
ACR Triad Web Client Version 2.5 20 October 2008 User s Guide American College of Radiology 2007 All rights reserved. CONTENTS ABOUT TRIAD...3 USER INTERFACE...4 LOGIN...4 REGISTER REQUEST...5 PASSWORD
ShoreTel Enterprise Contact Center Using Agent Toolbar
ShoreTel Enterprise Contact Center Using Agent Toolbar USER GUIDES RELEASE 7 Document and Software Copyrights Copyright 1998 2011 ShoreTel, Inc. All rights reserved. Printed in the United States of America.
ENABLE LOGON/LOGOFF AUDITING
Lepide Software LepideAuditor Suite ENABLE LOGON/LOGOFF AUDITING This document explains the steps required to enable the auditing of logon and logoff events for a domain. Table of Contents 1. Introduction...
Configure Single Sign on Between Domino and WPS
Configure Single Sign on Between Domino and WPS What we are doing here? Ok now we have the WPS server configured and running with Domino as the LDAP directory. Now we are going to configure Single Sign
ProgressBook ParentAccess Web Site Administration Guide
ProgressBook ParentAccess Web Site Administration Guide ProgressBook ParentAccess Web Site Administration Guide (This document is current for ProgressBook v12.3 or later.) 2012 Software Answers, Inc. All
Adding ObserveIT video audit logs to your SIEM
PRODUCT FACT SHEET Adding ObserveIT video audit logs to your SIEM At a Glance Adding ObserveIT s user activity video logs and user activity text logs to your SIEM or Log Analysis platform gives you all
TSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
STIDistrict Server Replacement
STIDistrict Server Replacement Major Steps Defined This document addresses how to migrate data and applications from an existing STIDistrict (SQL) Server to a new machine. There will be 8 major steps:
Welcome to MaxMobile. Introduction. System Requirements
MaxMobile 10.5 for Windows Mobile Smartphone Welcome to MaxMobile Introduction MaxMobile 10.5 for Windows Mobile Smartphone provides you with a way to take your customer information on the road. You can
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft SQL Server Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event Source: SQL Server Versions:
NetFlow Analytics for Splunk
NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...
MAS 500 Intelligence Tips and Tricks Booklet Vol. 1
MAS 500 Intelligence Tips and Tricks Booklet Vol. 1 1 Contents Accessing the Sage MAS Intelligence Reports... 3 Copying, Pasting and Renaming Reports... 4 To create a new report from an existing report...
Welcome to MaxMobile. Introduction. System Requirements. MaxMobile 10.5 for Windows Mobile Pocket PC
MaxMobile 10.5 for Windows Mobile Pocket PC Welcome to MaxMobile Introduction MaxMobile 10.5 for Windows Mobile Pocket PC provides you with a way to take your customer information on the road. You can
Hyper-V Protection. User guide
Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom
TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide
TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide October 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator
AlienVault. Unified Security Management 5.x Configuration Backup and Restore
AlienVault Unified Security Management 5.x Configuration Backup and Restore USM 5.x Configuration Backup and Restore Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.
User s Guide Software Version 3.1 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Web: http://www.ipswitch.com Lexington, MA 02421-3127 The information in this document is subject to
Administering Cisco ISE
CHAPTER 8 This chapter describes the administrative activities for the Cisco Identity Services Engine (ISE) and how to perform them. The following topics are covered: Logging In, page 8-1 System Time and
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft Exchange Server Last Modified: Monday, August 17, 2015 Event Source Product Information: Vendor: Microsoft Event Source: Exchange Server
IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
XMailer Reference Guide
XMailer Reference Guide Version 7.00 Wizcon Systems SAS Information in this document is subject to change without notice. SyTech assumes no responsibility for any errors or omissions that may be in this
EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13
Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV
Vantage Report. Quick Start Guide
Vantage Report Quick Start Guide Version 2.2 7/2005 Overview Vantage Report is an application that collects and analyzes logs sent by ZyXEL devices to the Vantage Report syslog server. See the User s Guide
Network Event Viewer now supports real-time monitoring enabling system administrators to be notified immediately when critical events are logged.
About Network Event Viewer is a network wide event log monitoring, consolidation, auditing and reporting tool enabling System Administrators to satisfy Sarbanes-Oxley auditing requirements while proactively
Manual. 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0
Manual 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0 Copyright 2006-2009, 3CX ltd. http:// E-mail: [email protected] Information in this document is subject to change without
