Getting the Most out of XMA and XUA from the new Security Bundle

Size: px
Start display at page:

Download "Getting the Most out of XMA and XUA from the new Security Bundle"

Transcription

1 Getting the Most out of XMA and XUA from the new Security Bundle HP-36, Chynoweth, November 19, 2014, 9:00 AM Customer Experience, TELUS and TELUS Health Speaker: Scott Uroff, XYPRO Content: Mark Wilson, TELUS Health

2 Overview Introduction About TELUS Health The Security Bundle XYGATE Merged Audit XYGATE User Authentication Installing the HP provided XMA software Using Scout and DSMSCM Useful Tricks Generating Alerts with XMA Customizing Daily Reporting with XMA Using XUA for RADIUS Authentication

3 Getting the Most out of XMA and XUA o About TELUS Health

4 About TELUS and TELUS Health TELUS is Canada s fastest-growing national telecommunications company $11.8 billion of annual revenue 13.5 million customer connections 8.0 million wireless subscribers 3.2 million wireline network access lines 1.45 million Internet subscribers 888,000 TELUS TV customers. TELUS provides a wide range of communications products and services, including wireless, data, Internet protocol (IP), voice, television, entertainment and video, and is Canada's largest healthcare IT provider.

5 Getting the Most out of XMA and XUA o o XYGATE Merged Audit XYGATE User Authentication

6 XMA Architecture Overview Safeguard EMS Log Adapters for Enterprise Audit Logging HP ArcSight SIEM XYGATE Filter Processing XMA Database NonStop SQL/MP itp WebServer Plug-Ins Alerts EMS Syslog SNMP Custom GUI Clients for XMA XYGATE Report Manager XYGATE Event Monitor

7 XUA Architecture Overview 100% of NonStop Authentication requests are handled through the Authentication layer Configuration Settings and Authentication Rules Safeguard Users can now access servers through an industry SSO solution. NonStop Programs TACL, OSS, FTP, ODBC, DSM/SCM, SSH, OSM and all others User Authentication Audit Data UserID Info The Authentication layer will trace the user to the associated NonStop user ID for authentication

8 Getting the Most out of XMA and XUA o o o Installing the HP provided XMA software Useful Tricks Generating Alerts with XMA

9 Using Scout and DSMSCM Be thankful for what you have and figure out how to use it in your environments. I hope we can provide you the keys to a successful installation and ability to unlock the wonderful benefits of Merged Audit. This is what you need to know Merged Audit HP product is T0928 your first point for support is GCSC. It comes with Marketing product QSN051 free with systems sold after September The product installed easily. You do have to do it with some thought. Find the space for the audit data to grow. Find the additional support tools to make it a gold standard ( servers and Enterprise Security Event Monitoring tools). Build some custom reports. Run some interactive reports. Have your security teams build some use cases from their Enterprise security tools. HP ArcSight for example. Nothing is ever easy so where possible arrange for HP installation and support services.

10 Using Scout and DSMSCM The things you have to do. Download the latest version from HP Scout. Load it into DSMSCM so that you can keep track of the RVU you are running I like to run the install manually, under my control. So run the obey file from where you placed it. I use $DSMSCM. Stop after install macro and size your SQL database BEFORE running XMA_MANGER the first time. (this requires deciding and editing one or two of the install files) Start your Merged Audit movers pathway via XMA_MANAGER macro

11 Using Scout and DSMSCM The things you have to do. Download the latest version from HP Scout.

12 Using Scout and DSMSCM The things you have to do. Download the latest version from HP Scout.

13 Using Scout and DSMSCM The things you have to do. Load it into DSMSCM so that you can keep track of the RVU you are running

14 Using Scout and DSMSCM The things you have to do. I like to run the install manually, under my control. So run the obey file from where you placed it. I use $DSMSCM. Stop after install macro and size your SQL database BEFORE running XMA_MANGER the first time. (this requires deciding and editing one or two of the install files) \DNB1 $DSMSCM E0928AAR 53> run insrun You will be asked a series of questions about the installation of XYGATEMA. You may abort the install process at any prompt by hitting the BREAK key. Prompts that end with a string within angle brackets mean that just hitting the return key will use that default value. =*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*= PLEASE READ THE SOFTDOC AS PART OF THE INSTALLATION PROCESS. =*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=

15 Using Scout and DSMSCM The things you have to do. Start your Merged Audit movers pathway via XMA_MANAGER macro XYGATEMA Management Main Menu v2.25 * * * * * * * * * * * * * * * * * * * 1: Pathway 2: Movers 3: Database 4: Uninstall X: Exit Selection?2

16 Useful Tricks Tricks The BIN file from HP is large and a standard WS-FTP creates small file extents. Use a DOS or other FTP client and provide file sizes (i.e. put E0928AAR E0928AAR,991,1000,1000,900) Don t forget code 991 and use SWARCSET (swarcset $dsmscm.rvu.e0928aar,,volume $dsmscm,myid) Decide on your database cleanup time. Watch for performance issues Plan for database maintenance enlist help from your DBA. Protect you XMA FILTERS file once built. I accidently purged one but recovered from another system.

17 Generating Alerts with XMA Generating EMS Alerts Get the easy FILTERS created. Generate viewpoint alerts from SUPER.SUPER logon

18 Generating Alerts with XMA Generating Alerts Get the easy FILTERS created. Where possible other critical alerts to staff. Yes the IP address is bogus. ACTION_BEGIN ACTIONTYPE MAIL MAIL_SRV MAIL_IPPROCESS $ztc0 MAIL_PORT 25 MAIL_FROM (doesn't need to be valid) MAIL_TO MAIL_SUBJECT ALERT - Security logon event MAIL_TEXT "NODE: (INSTALL.SYSTEMNAME) " "Time: (AUDIT.RECORDLCT) " "Event: (AUDIT.SUBJECTLOGIN) altered (AUDIT.OBJECTNAME) " " (AUDIT.RESULT) " "Outcome: (AUDIT.OUTCOME) (Success = 1; Fail = 3)" MAIL_TEXT_END ACTION_END

19 Generating Alerts with XMA Generating Syslog Alerts to a SIEM (HP ArcSight) Get the easy FILTERS created. Where possible get the security data off platform to your Enterprise security even monitoring system. It makes the audit teams happy. FILTERDEFBEGIN $CLW-ALL-EVENTS-EXCEPT-EMS!= This FILTER selects All Audits except EMS STATUS ACTIVE! $CLW-ALL-EVENTS-EXCEPT-EMS ACTIONCOLL_BEGIN ACTION_BEGIN ACTIONTYPE IPALERT IPALERT_IPPROCESS $ZTC0 IPALERT_ADDRESS IPALERT_PORT 515 IPALERT_PREFIX local0 <130> XYGATEMA NonStop (SESSION.RECORDSESSIONKEY) (SESSION.RECORDINSTALLKEY) (SESSION.SESSIONID). ACTION_BEGIN ACTIONTYPE SETDATA AUDIT.USER_DATA syslog ALERT ACTION_END

20 Generating Alerts with XMA Generating Custom Alerts Use the FILTSAMP file for examples. Build some custom TACL macros that are triggered by MA to do some fancy work. Share what you ve learned with your peers and us. ACTION_BEGIN ACTIONTYPE RUNCMD MAXCOMPLETIONTIME 120 RUNCMDDEFBEGIN RUN $SYSTEM.TACLMAC.GOXMAMSG RUNCMDDEFEND ACTION_END

21 Getting the Most out of XMA and XUA o Partitioning the XMA Database

22 Partitioning the XMA Database > $SYSTEM.XYGATEMA.PARSAMP (14/10/30 16:42) < *********************************************************************** -- ** File: PARSAMP ** -- ** This file contains samples of the commands used to partition an ** -- ** SQL Table ** -- ** Procedure: ** -- ** ========== ** -- ** 1) Modify the statements below adding the volume name. You may ** -- ** optionally enter values for EXTENTS & MAXEXTENTS. ** -- ** The default for EXTENTS is (16,64). The default unit type is ** -- ** page. The default for MAXEXTENTS is 160. ** -- ** You may add additional ALTER statements if more partitions ** -- ** are desired. ** -- ** NOTE: During XYGATE/MA processing the partition key values ** -- ** assigned are The value zero is omitted so that ** -- ** a empty partition can be created. The value 1 is ** -- ** reserved for conversion purposes. ** -- ** 2) Stop your XYGATE/MA pathway via XMA_MANAGER ** -- ** 3) run the macro XMA_LOAD_DEFINES ** -- ** 4) Execute the following command: ** -- ** SQLCI/in PARSAMP,out $S.#XMA.PART/ ** -- ** 5) Adding partitions will invalidate the SQL programs. ** -- ** To remedy the situation do the following: ** -- ** run $<vol>.<subvol>.xma install ** -- ** run XMA_SQLCOMPALL ** -- ** 6) Restart your XYGATE/MA pathway via the XMA_MANAGER ** -- ***********************************************************************

23 Getting the Most out of XMA and XUA o Using XUA for RADIUS Authentication

24 Using XUA for RADIUS Authentication Objective Telus wished to move all ID s to use AD Based User IDs in order to keep all user provisioning centralized. Challenge Existing Pathway application using application based user ID s. No source code. Solution Professional Services Developed a simple server to accept application authentication requests and mapped to AD user ID s. XYGATE User Authentication Application authentication requests routed by XUA to the RADIUS server

25 The XYGATE Report Manager (XRM) XRM is a comprehensive and easyto-use report writer for XMA data Pre-configured reports for out-of-thebox use Modify existing report definitions for custom requirements. Design new reports Perform ad-hoc queries View saved report output Schedule recurring reports Auto-deliver to multiple location options and in multiple format options

26 The XYGATE Report Manager (XRM) Tabbed pages allow for easy access to common functions Environment information displayed Links to frequents tasks make for easy navigation

27 The XYGATE Report Manager (XRM) XRM provides a full-function report designer Attributes and Criteria are menu driven with the option for direct input Query columns allow for efficient retrieval of only desired data Query nodes allow for the selection of one, more, or all configured nodes for a single source for audit reporting Retrieved data returns a grid of all audit records for ease of analysis and report design Report columns provide for custom naming, sizing, and wrapping properties of fields Grouping, Sorting, and layout are all customizable.

28 The XYGATE Report Manager (XRM) XRM provides a full-function report scheduler Frequency, Start date, and Run time allow for any needed schedule Multiple delivery methods and formats are supported Notification, , FTP and File types PDF, RTF, HTML, TXT TSV formats

29 The XYGATE Report Manager (XRM) Sample Report Output in PDF format

30 The XYGATE Event Monitor (XEM) Similar in design to XRM Event Monitors are like reports Pre-Populated with many useful monitors Edit existing or design new Can run for realtime or historically Links to common tasks

31 The XYGATE Event Monitor (XEM) Monitors may contain any audit data from XMA All products, some products or one product Selection criteria allows for narrow subject matter Installation Selection allows for the selection of one, more, or all configured nodes for a single source for audit monitoring Define window layouts to suit and fit desktop or command room needs

32 The XYGATE Event Monitor (XEM) Fully customizable looks and actions Select subset data to differentiate from expected data using criteria Choose text fonts and colors as well as backgrounds for contrast Select from 5 action types Sound, , Pop-Up, SNMP, Syslog Include configurable actions

33 The XYGATE Event Monitor (XEM) Sample XEM Filter Monitor Window SUPER.SUPER failed access attempts are displayed in in red with bold yellow text

34 XMA Log Adapters o o o HP ArcSight SIEM RSA envision and RSA Security Analytics Others such as Q-Radar, LogLogic, Splunk

35 XMA Log Adapters Additional Add-On Products and Services for XMA XMA is delivered with 1 log adapter HP ArcSight SIEM SIEM specific log adapters can be added as products RSA envision RSA Security Analytics SIEM specific log adapters can be added through professional services Q-Radar LogLogic Others

36 XMA Log Adapters Additional Add-On Products and Services for XMA Log Adapters The XYPRO pre-defined Filter Definitions have been designed to select, categorize and format the Merged Audit data so that it is compatible with the configuration of the SIEM that is receiving the data. Step 1. Configure XMA to Collect the Desired Data. Step 2. Determine the Transport Method. Step 3. Apply the Log Adapter to Your FILTERS File. Step 4. Start and Monitor Your MOVERs.

37 XMA Plug-Ins o o o BASE24 and BASE24 eps HLR AJB

38 XMA Plug-Ins Additional Add-On Products for XMA XMA is delivered with 4 data mover types Safeguard EMS XYGATE itp WebServer Application specific data mover types can be added as XMA Plug-Ins BASE24 BASE24 eps HLR AJB

39 XMA Plug-Ins Additional Add-On Products for XMA BASE24 OMF (type E) BASE24 eps Logins/Logoffs/File operations (inserts, updates, deletes, etc.) Sec file updates AULOGD (type K) Logins/Logoffs, security config changes (deletes, inserts, updates) XML based audit configuration

40 XMA Plug-Ins Additional Add-On Products for XMA HLR AJB dpa_audit_<start date/time>_<close date/time>.log (OSS) Tokens (ResultCode, Domain, Text, Command, CLIP-ACT, ALT-IMSI- DIGITS, GSM-O-CSI-ACTIVE, ECMN- SMS-CSI-ACTIVE, CLIR-AUTH, etc. Audit File (OSS) Connects, disconnects, etc.

HP NonStop Server Security and HP ArcSight SIEM

HP NonStop Server Security and HP ArcSight SIEM HP NonStop Customer Technical Talk HP NonStop Server Security and HP ArcSight SIEM 04/12/2012 HP NonStop Karen Copeland HP Enterprise Security Morgan DeRodeff XYPRO Barry Forbes NonStop Enterprise Division

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do?

McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do? McAfee SIEM Alarms Setting up and Managing Alarms Introduction McAfee SIEM provides the ability to send alarms on a multitude of conditions. These alarms allow for users to be notified in near real time

More information

User Guide. Trade Finance Global. Reports Centre. October 2015. nordea.com/cm OR tradefinance Name of document 8/8 2015/V1

User Guide. Trade Finance Global. Reports Centre. October 2015. nordea.com/cm OR tradefinance Name of document 8/8 2015/V1 User Guide Trade Finance Global Reports Centre October 2015 nordea.com/cm OR tradefinance Name of document 2015/V1 8/8 Table of Contents 1 Trade Finance Global (TFG) Reports Centre Overview... 4 1.1 Key

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

ORACLE BUSINESS INTELLIGENCE WORKSHOP

ORACLE BUSINESS INTELLIGENCE WORKSHOP ORACLE BUSINESS INTELLIGENCE WORKSHOP Integration of Oracle BI Publisher with Oracle Business Intelligence Enterprise Edition Purpose This tutorial mainly covers how Oracle BI Publisher is integrated with

More information

Operation Error Management

Operation Error Management S&C IntelliTeam CNMS Communication Network Management System Operation Error Management Table of Contents Section Page Section Page Overview.... 2 Error Management Alarms... 4 Viewing Alarms.... 5 Editing

More information

Deciding When to Deploy Microsoft Windows SharePoint Services and Microsoft Office SharePoint Portal Server 2003. White Paper

Deciding When to Deploy Microsoft Windows SharePoint Services and Microsoft Office SharePoint Portal Server 2003. White Paper Deciding When to Deploy Microsoft Windows SharePoint Services and Microsoft Office SharePoint Portal Server 2003 White Paper Published: October, 2003 Table of Contents Introduction 4 Relationship between

More information

Installation and configuration of Real-Time Monitoring Tool (RTMT)

Installation and configuration of Real-Time Monitoring Tool (RTMT) Installation and configuration of Real-Time Monitoring Tool (RTMT) How to install and upgrade RTMT, page 1 Services, servlets, and service parameters on server, page 5 Navigation of RTMT, page 6 Nonconfigurable

More information

SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server.

SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server. Contents For Administrators... 3 Set up SourceAnywhere... 3 SourceAnywhere Service Configurator... 3 Start Service... 3 IP & Port... 3 SQL Connection... 4 SourceAnywhere Server Manager... 4 Add User...

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

You may be PCI DSS compliant but are you really secure?

You may be PCI DSS compliant but are you really secure? You may be PCI DSS compliant but are you really secure? Greg Swedosh Knightcraft Technology Knightcraft Technology HP NonStop Security and PCI Compliance Specialists Agenda * PCI DSS Limitations and Strengths

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER USER GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from NetWrix

More information

Plug-In for Informatica Guide

Plug-In for Informatica Guide HP Vertica Analytic Database Software Version: 7.0.x Document Release Date: 2/20/2015 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements

More information

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Ajera 7 Installation Guide

Ajera 7 Installation Guide Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services

More information

Info-Alert Guide. Version 7.5

Info-Alert Guide. Version 7.5 Info-Alert Guide Version 7.5 1995 2008 Open Systems Holdings Corp. All rights reserved. Document Number 2290.IA020 No part of this manual may be reproduced by any means without the written permission of

More information

Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide

Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide Embedded Document Accounting Solution (edas) for Cost Recovery Administrator's Guide September 2013 www.lexmark.com Contents 2 Contents Overview...4 Getting started...5 Understanding installation requirements...5

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Reporting User Guide. Version Oct 2011 Page 1 of 65

Reporting User Guide. Version Oct 2011 Page 1 of 65 Version Oct 2011 Page 1 of 65 Table of Contents Purpose...3 1. Quick Balances...3 1.1. Quick Balances Setup...3 2. Scheduled Statement Reporting...5 2.1. Scheduled Daily Operating Account Statement...5

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

User Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19

User Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19 CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface User Guidance

More information

DDM Distributed Database Manager for SQL and ODBC. Installation and User Guide Version 5.27.xx

DDM Distributed Database Manager for SQL and ODBC. Installation and User Guide Version 5.27.xx DDM Distributed Database Manager for SQL and ODBC Installation and User Guide Version 5.27.xx Communication Devices Inc. 85 Fulton St. Boonton, NJ 07005 USA Phone: 800 359 8561 Fax: 973 334 0545 Internet:

More information

XYGATE & PCI COMPLIANCE PCI DSS VERSION 3.0

XYGATE & PCI COMPLIANCE PCI DSS VERSION 3.0 XYGATE & PCI COMPLIANCE PCI DSS VERSION 3.0 A SOLUTION PAPER MARCH 2015 XYPRO TECHNOLOGY CORPORATION 4100 GUARDIAN STREET, SUITE 100 SIMI VALLEY, CALIFORNIA 93063 U.S.A. WWW.XYPRO.COM TELEPHONE: +1 805-583-2874

More information

Results CRM 2012 User Manual

Results CRM 2012 User Manual Results CRM 2012 User Manual A Guide to Using Results CRM Standard, Results CRM Plus, & Results CRM Business Suite Table of Contents Installation Instructions... 1 Single User & Evaluation Installation

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

FirewallTM. isecurity. Out-of-the Box. The Network Security Component of. Version 15. Copyright Raz-Lee Security Ltd.

FirewallTM. isecurity. Out-of-the Box. The Network Security Component of. Version 15. Copyright Raz-Lee Security Ltd. FirewallTM The Network Security Component of isecurity Out-of-the Box Version 15 Copyright Raz-Lee Security Ltd. Updated: 02/09/2011 This guide is intended to provide as a quick beginning to the principal

More information

Administrator s Guide

Administrator s Guide Administrator s Guide Citrix Network Manager for MetaFrame XPe Version 1.0 Citrix Systems, Inc. Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102

Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Interneer, Inc. Updated on 2/22/2012 Created by Erika Keresztyen Fahey 2 Workflow - A102 - Basic HelpDesk Ticketing System

More information

FileMaker 12. ODBC and JDBC Guide

FileMaker 12. ODBC and JDBC Guide FileMaker 12 ODBC and JDBC Guide 2004 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker, Inc.

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

Audit TM. The Security Auditing Component of. Out-of-the-Box

Audit TM. The Security Auditing Component of. Out-of-the-Box Audit TM The Security Auditing Component of Out-of-the-Box This guide is intended to provide a quick reference and tutorial to the principal features of Audit. Please refer to the User Manual for more

More information

Novell ZENworks Asset Management

Novell ZENworks Asset Management Novell ZENworks Asset Management Administrative Best Practices and Troubleshooting www.novell.com APRIL 19, 2005 2 GETTING THE MOST OUT OF NOVELL ZENWORKS ASSET MANAGEMENT The award-winning asset tracking

More information

DiskBoss. File & Disk Manager. Version 2.0. Dec 2011. Flexense Ltd. www.flexense.com [email protected]. File Integrity Monitor

DiskBoss. File & Disk Manager. Version 2.0. Dec 2011. Flexense Ltd. www.flexense.com info@flexense.com. File Integrity Monitor DiskBoss File & Disk Manager File Integrity Monitor Version 2.0 Dec 2011 www.flexense.com [email protected] 1 Product Overview DiskBoss is an automated, rule-based file and disk manager allowing one to

More information

IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide

IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright

More information

CSP & PCI DSS Compliance on HP NonStop systems

CSP & PCI DSS Compliance on HP NonStop systems CSP & PCI DSS Compliance on HP NonStop systems July 23, 2014 For more information about Computer Security Products Inc., contact us at: 200 Matheson Blvd. West Suite 200 Mississauga, Ontario, Canada L5R

More information

User s Manual. Management Software for ATS

User s Manual. Management Software for ATS ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

alternative solutions, including: STRONG SECURITY for managing these security concerns. PLATFORM CHOICE LOW TOTAL COST OF OWNERSHIP

alternative solutions, including: STRONG SECURITY for managing these security concerns. PLATFORM CHOICE LOW TOTAL COST OF OWNERSHIP 9.0 Welcome to FirstClass 9.0, the latest and most powerful version of the one of the industry s leading solutions for communication, collaboration, content management, and online networking. This document

More information

FileMaker Server 13. FileMaker Server Help

FileMaker Server 13. FileMaker Server Help FileMaker Server 13 FileMaker Server Help 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,

More information

VMware vrealize Operations for Horizon Administration

VMware vrealize Operations for Horizon Administration VMware vrealize Operations for Horizon Administration vrealize Operations for Horizon 6.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

NovaBACKUP Storage Server User Manual NovaStor / April 2013

NovaBACKUP Storage Server User Manual NovaStor / April 2013 NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change

More information

Installation and Administration Guide

Installation and Administration Guide Installation and Administration Guide Release 8 This installation guide will walk you through how to install and deploy Conga Composer, including recommended settings for the application. Contact Support:

More information

ADP Workforce Now V3.0

ADP Workforce Now V3.0 ADP Workforce Now V3.0 Manual What s New Checks in and Custom ADP Reporting Grids V12 Instructor Handout Manual Guide V10171180230WFN3 V09171280269ADPR12 2011 2012 ADP, Inc. ADP s Trademarks The ADP Logo

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

System Administrator Training Guide. Reliance Communications, Inc. 603 Mission Street Santa Cruz, CA 95060 888-527-5225 www.schoolmessenger.

System Administrator Training Guide. Reliance Communications, Inc. 603 Mission Street Santa Cruz, CA 95060 888-527-5225 www.schoolmessenger. System Administrator Training Guide Reliance Communications, Inc. 603 Mission Street Santa Cruz, CA 95060 888-527-5225 www.schoolmessenger.com Contents Contents... 2 Before You Begin... 4 Overview... 4

More information

Option Network Management Software for UPS UNMS II

Option Network Management Software for UPS UNMS II Option Network Management Software for UPS UNMS II AEG Power Supply Systems GmbH Department: PSS E1 Name: Brandt/Rogge Revision: 00 Date: 20.05.2006 Operating Instructions...6000004951 BAL, en Legal Information

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

SQL EXPRESS INSTALLATION...

SQL EXPRESS INSTALLATION... Contents SQL EXPRESS INSTALLATION... 1 INSTALLING SQL 2012 EXPRESS... 1 SQL EXPRESS CONFIGURATION... 7 BILLQUICK DATABASE... 9 SQL Express Installation The Microsoft SQL Server 2012 Express software is

More information

RSA Event Source Configuration Guide. Microsoft Exchange Server

RSA Event Source Configuration Guide. Microsoft Exchange Server Configuration Guide Microsoft Exchange Server Last Modified: Tuesday, March 11, 2014 Event Source (Device) Product Information Vendor Microsoft Event Source (Device) Exchange Server Supported Versions

More information

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project. chair John Chiang member Jerome E. Horton member Ana J. Matosantos August 27, 2012 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

The same as the Bold convention (see above) but with the intent of providing a greater emphasis.

The same as the Bold convention (see above) but with the intent of providing a greater emphasis. Document Conventions Our documents use certain types of document conventions to help you distinguish language elements from keyboard sequences, and so on. The following table clarifies the new conventions

More information

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.

More information

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 LabTech Commands COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 Overview Commands in the LabTech Control Center send specific instructions

More information

FileMaker Server 14. FileMaker Server Help

FileMaker Server 14. FileMaker Server Help FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Operation Tools. S&C IntelliTeam CNMS Communication Network Management System. Table of Contents. Overview... 2 Tools. Section Page Section Page

Operation Tools. S&C IntelliTeam CNMS Communication Network Management System. Table of Contents. Overview... 2 Tools. Section Page Section Page S&C IntelliTeam CNMS Communication Network Management System Operation Tools Table of Contents Section Page Section Page Overview.... 2 Tools Database Administration.... 4 User Triggered Database-Backup....

More information

MT4 Multiterminal USER MANUAL

MT4 Multiterminal USER MANUAL MT4 Multiterminal USER MANUAL MT4 MultiTerminal User Manual 1. Getting Started... 3 1.1 General... 3 1.2 Security System... 3 1.3 Live Update... 3 1.4 Terminal Settings... 4 2. Client Accounts... 9 2.1

More information

Server Manager Help 10/6/2014 1

Server Manager Help 10/6/2014 1 Server Manager Help 10/6/2014 1 Table of Contents Server Manager Help... 1 Getting Started... 7 About SpectorSoft Server Manager... 8 Client Server Architecture... 9 System Requirements... 10 Screencasts...

More information

FileMaker Server 12. FileMaker Server Help

FileMaker Server 12. FileMaker Server Help FileMaker Server 12 FileMaker Server Help 2010-2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.

More information

McAfee Content Security Reporter 2.0.0

McAfee Content Security Reporter 2.0.0 Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide Pandora FMS 3.0 Quick User's Guide April 27th, 2009 1 Contents How to monitor a network computer/device?...3 Concepts...3 What's an agent?...3 What's a module?...3 Data transfer modes...3 What is an alert?...3

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

ACR Triad Web Client. User s Guide. Version 2.5. 20 October 2008. American College of Radiology 2007 All rights reserved.

ACR Triad Web Client. User s Guide. Version 2.5. 20 October 2008. American College of Radiology 2007 All rights reserved. ACR Triad Web Client Version 2.5 20 October 2008 User s Guide American College of Radiology 2007 All rights reserved. CONTENTS ABOUT TRIAD...3 USER INTERFACE...4 LOGIN...4 REGISTER REQUEST...5 PASSWORD

More information

ShoreTel Enterprise Contact Center Using Agent Toolbar

ShoreTel Enterprise Contact Center Using Agent Toolbar ShoreTel Enterprise Contact Center Using Agent Toolbar USER GUIDES RELEASE 7 Document and Software Copyrights Copyright 1998 2011 ShoreTel, Inc. All rights reserved. Printed in the United States of America.

More information

ENABLE LOGON/LOGOFF AUDITING

ENABLE LOGON/LOGOFF AUDITING Lepide Software LepideAuditor Suite ENABLE LOGON/LOGOFF AUDITING This document explains the steps required to enable the auditing of logon and logoff events for a domain. Table of Contents 1. Introduction...

More information

Configure Single Sign on Between Domino and WPS

Configure Single Sign on Between Domino and WPS Configure Single Sign on Between Domino and WPS What we are doing here? Ok now we have the WPS server configured and running with Domino as the LDAP directory. Now we are going to configure Single Sign

More information

ProgressBook ParentAccess Web Site Administration Guide

ProgressBook ParentAccess Web Site Administration Guide ProgressBook ParentAccess Web Site Administration Guide ProgressBook ParentAccess Web Site Administration Guide (This document is current for ProgressBook v12.3 or later.) 2012 Software Answers, Inc. All

More information

Adding ObserveIT video audit logs to your SIEM

Adding ObserveIT video audit logs to your SIEM PRODUCT FACT SHEET Adding ObserveIT video audit logs to your SIEM At a Glance Adding ObserveIT s user activity video logs and user activity text logs to your SIEM or Log Analysis platform gives you all

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

STIDistrict Server Replacement

STIDistrict Server Replacement STIDistrict Server Replacement Major Steps Defined This document addresses how to migrate data and applications from an existing STIDistrict (SQL) Server to a new machine. There will be 8 major steps:

More information

Welcome to MaxMobile. Introduction. System Requirements

Welcome to MaxMobile. Introduction. System Requirements MaxMobile 10.5 for Windows Mobile Smartphone Welcome to MaxMobile Introduction MaxMobile 10.5 for Windows Mobile Smartphone provides you with a way to take your customer information on the road. You can

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics Event Source Log Configuration Guide Microsoft SQL Server Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event Source: SQL Server Versions:

More information

NetFlow Analytics for Splunk

NetFlow Analytics for Splunk NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...

More information

MAS 500 Intelligence Tips and Tricks Booklet Vol. 1

MAS 500 Intelligence Tips and Tricks Booklet Vol. 1 MAS 500 Intelligence Tips and Tricks Booklet Vol. 1 1 Contents Accessing the Sage MAS Intelligence Reports... 3 Copying, Pasting and Renaming Reports... 4 To create a new report from an existing report...

More information

Welcome to MaxMobile. Introduction. System Requirements. MaxMobile 10.5 for Windows Mobile Pocket PC

Welcome to MaxMobile. Introduction. System Requirements. MaxMobile 10.5 for Windows Mobile Pocket PC MaxMobile 10.5 for Windows Mobile Pocket PC Welcome to MaxMobile Introduction MaxMobile 10.5 for Windows Mobile Pocket PC provides you with a way to take your customer information on the road. You can

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom

More information

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide October 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator

More information

AlienVault. Unified Security Management 5.x Configuration Backup and Restore

AlienVault. Unified Security Management 5.x Configuration Backup and Restore AlienVault Unified Security Management 5.x Configuration Backup and Restore USM 5.x Configuration Backup and Restore Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc. User s Guide Software Version 3.1 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Web: http://www.ipswitch.com Lexington, MA 02421-3127 The information in this document is subject to

More information

Administering Cisco ISE

Administering Cisco ISE CHAPTER 8 This chapter describes the administrative activities for the Cisco Identity Services Engine (ISE) and how to perform them. The following topics are covered: Logging In, page 8-1 System Time and

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics Event Source Log Configuration Guide Microsoft Exchange Server Last Modified: Monday, August 17, 2015 Event Source Product Information: Vendor: Microsoft Event Source: Exchange Server

More information

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

XMailer Reference Guide

XMailer Reference Guide XMailer Reference Guide Version 7.00 Wizcon Systems SAS Information in this document is subject to change without notice. SyTech assumes no responsibility for any errors or omissions that may be in this

More information

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13 Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV

More information

Vantage Report. Quick Start Guide

Vantage Report. Quick Start Guide Vantage Report Quick Start Guide Version 2.2 7/2005 Overview Vantage Report is an application that collects and analyzes logs sent by ZyXEL devices to the Vantage Report syslog server. See the User s Guide

More information

Network Event Viewer now supports real-time monitoring enabling system administrators to be notified immediately when critical events are logged.

Network Event Viewer now supports real-time monitoring enabling system administrators to be notified immediately when critical events are logged. About Network Event Viewer is a network wide event log monitoring, consolidation, auditing and reporting tool enabling System Administrators to satisfy Sarbanes-Oxley auditing requirements while proactively

More information

Manual. 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0

Manual. 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0 Manual 3CX Phone System integration with Microsoft Outlook and Salesforce Version 1.0 Copyright 2006-2009, 3CX ltd. http:// E-mail: [email protected] Information in this document is subject to change without

More information