LogLogic Blue Coat ProxySG Syslog Log Configuration Guide

Size: px
Start display at page:

Download "LogLogic Blue Coat ProxySG Syslog Log Configuration Guide"

Transcription

1 LogLogic Blue Coat ProxySG Syslog Log Configuration Guide Document Release: September 2011 Part Number: LL ELS This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic Software Release 5.1 and later until replaced by a new edition.

2 2011 LogLogic, Inc. Proprietary Information Trademarks This document contains proprietary and confidential information of LogLogic, Inc. and its licensors. In accordance with the license, this document may not be copied, disclosed, modified, transmitted, or translated except as permitted in writing by LogLogic, Inc. LogLogic and the LogLogic logo are trademarks or registered trademarks of LogLogic, Inc. in the United States and/or foreign countries. All other company or product names are trademarks or registered trademarks of their respective owners. Notice The information contained in this document is subject to change at any time without notice. All warranties with respect to the software and accompanying documentation are set our exclusively in the Software License Agreement or in the Product Purchase Agreement that covers the documentation. LogLogic, Inc. 110 Rose Orchard Way, Suite 200 San Jose, CA Tel: Fax: U.S. Toll Free:

3 Contents Preface About This Guide Technical Support Documentation Support Conventions Chapter 1 Configuring LogLogic s Blue Coat ProxySG Syslog Log Collection Introduction to Blue Coat Syslog Prerequisites Standard Configuration for Blue Coat Syslog Configuring Blue Coat Syslog for Syslog Using the CLI Configure Event Logging Using Advanced Web Configuration Configure Event Logging Using the CLI Advanced Configuration for Blue Coat Syslog Enabling the LogLogic Appliance to Capture Data Adding a Blue Coat Syslog Syslog Device Verifying the Configuration Chapter 2 How LogLogic Supports Blue Coat ProxySG Syslog How LogLogic Captures Blue Coat Syslog Log Data LogLogic Real-Time Reports Chapter 3 Troubleshooting and FAQ Troubleshooting Frequently Asked Questions (FAQ) Appendix A Event Reference LogLogic Support for Blue Coat ProxySG Syslog Events Blue Coat ProxySG Syslog Log Configuration Guide 3

4 4 Blue Coat ProxySG Syslog Log Configuration Guide

5 Preface About This Guide The LogLogic Appliance-based solution lets you capture and manage log data from all types of og sources in your enterprise. The LogLogic support for Blue Coat ProxySG enables LogLogic Appliances to capture logs from Blue Coat ProxySG via Syslog. Technical Support LogLogic is committed to the success of our customers and to ensuring our products improve customers' ability to maintain secure, reliable networks. Although LogLogic products are easy to use and maintain, occasional assistance might be necessary. LogLogic provides timely and comprehensive customer support and technical assistance from highly knowledgeable, experienced engineers who can help you maximize the performance of your LogLogic Appliances. To reach LogLogic Customer Support: Telephone: Toll Free LOGS Local EMEA or APAC: + 44 (0) or +44 (0) [email protected] You can also visit the LogLogic Support website at: When contacting Customer Support, be prepared to provide: Your name, address, phone number, and fax number Your company name and company address Your machine type and release version A description of the problem and the content of pertinent error messages (if any) Documentation Support Your feedback on LogLogic documentation is important to us. Send to [email protected] if you have questions or comments. Your comments will be reviewed and addressed by the LogLogic technical writing team. In your message, please indicate the software name and version you are using, as well as the title and document date of your documentation. Blue Coat ProxySG Syslog Log Configuration Guide 5

6 Conventions LogLogic documentation uses the following conventions to highlight code and command-line elements: A monospace font is used for programming elements (such as code fragments, objects, methods, parameters, and HTML tags) and system elements (such as filenames, directories, paths, and URLs). A monospace bold font is used to distinguish system prompts or screen output from user responses, as in this example: username: system home directory: home\app A monospace italic font is used for placeholders, which are general names that you replace with names specific to your site, as in this example: LogLogic_home_directory\upgrade\ Straight brackets signal options in command-line syntax. For example: ls [-AabCcdFfgiLlmnopqRrstux1] [-X attr] [path...] 6 Blue Coat ProxySG Syslog Log Configuration Guide

7 Chapter 1 Configuring LogLogic s Blue Coat ProxySG Syslog Log Collection This chapter describes the configuration steps involved to enable a LogLogic Appliance to capture Blue Coat Syslog Syslog. The configuration steps assume that you have a functioning LogLogic Appliance that can be configured to capture Blue Coat Syslog related log data. Introduction to Blue Coat Syslog Prerequisites Standard Configuration for Blue Coat Syslog Configuring Blue Coat Syslog for Syslog Using the CLI Verifying the Configuration Introduction to Blue Coat Syslog The Blue Coat Syslog range of appliances provide points of control that accelerate and secure business applications for users across the distributed organization. Prerequisites Prior to configuring the Blue Coat Syslog and LogLogic Appliance, ensure that you meet the following prerequisites: LogLogic v5.1 Appliance or later installed with the Blue Coat Syslog Log Source Package. Blue Coat Syslog SGOS version 5.4 Administrator access on the LogLogic Appliance. Standard Configuration for Blue Coat Syslog Blue Coat has native syslog support for event logs, not access logs. In addition to event logs, it is possible to send access logs continuously via TCP port 514 (syslog port) by defining a custom client to send access logs as text. However, this does not alter the log format to allow for the individual messages to be properly identified. Thus the basic level of support for Blue Coat syslog messages allows for identification and collection of event logs, not access logs. 1 The recommended configuration is to use the Standard Configuration. In this configuration the Proxy will send only event logs via syslog, and requires using the standard methods described in the LogLogic Blue Coat ProxySG Log Configuration Guide for access logs collection and reporting. For customers who cannot use the standard methods for collection of access logs, the Advanced Configuration for Blue Coat Syslog allows for use of a custom client to transport the access logs over the syslog port (TCP only). To collect access logs over port 514, modification of the log formats and instantiation of a specific policy is required. This configuration option is covered in the next section. 1. Event logs are operational logs and do not contain information about proxy access. Blue Coat ProxySG Syslog Log Configuration Guide 7

8 For the Syslog event logging, there are five event log levels. They are: Severe errors Configuration events Policy messages Informational Verbose The proxysg will send events that are in accordance to those various levels. Each level can be turned on or off but events within a level are not configurable. Configuring Blue Coat Syslog for Syslog Using the CLI You must enable and configure Syslog on Blue Coat Syslog prior to configuring the LogLogic Appliance. Note: This document does not describe all features and functionality within Blue Coat Syslog regarding configuration and Syslog. For more information on these areas, see Blue Coat Syslog Product Documentation. Configure Event Logging Using Advanced Web Configuration Using the Advanced Configuration window, select Maintenance > Event Logging. Under the sub-tab Syslog, click the Enable syslog check box. Click the New button to add a Syslog host by hostname or IP address. Up to four hosts can be defined. 8 Blue Coat ProxySG Syslog Log Configuration Guide

9 Next, choose the logging level desired. Click the Level sub-tab and check the box for the desired level. Checking "Verbose" will automatically check the lower levels. Configure Event Logging Using the CLI It is possible to configure the syslog hosts and event levels using the CLI. For more information on this configuration option consult Configuration and Management Suite Volume 11: Command Line Interface Reference in the Blue Coat documentation. Advanced Configuration for Blue Coat Syslog The preferred configuration uses the standard methods as described in the LogLogic Blue Coat ProxySG Log Configuration Guide for access logs collection and the standard configuration for event log collection. Prerequisites and Considerations Deciding Which Collection Method to Use for Access Logs This method of access log collection has important differences from LogLogic's standard file based (non-syslog) support for Blue Coat Access Logs. The recommended configuration is to use the standard collection methods described in Blue Coat Log Source Configuration Guide. Those methods provide for support of more log formats as well as encryption and digital signatures that cannot be offered using syslog. The advanced configuration for collection of access logs over syslog should only be used when the standard methods cannot be used. The collection methods over syslog are provided primarily as a work-around for environments where firewalls deny the protocols used by the traditional file collection method. The standard methods of collection treat the Blue Coat access logs as a file. This is a more natural approach as the access logs are file based. This allows for the parser to use the header line to reliably map the fields to their positions in the individual messages. Using syslog therefore entails a loss of reliability and flexibility in that the exact field order cannot be determined but is prescribed. This is a necessary loss; syslog is based on messages rather than files. Furthermore, any deviation from the prescribed field order will cause either a failure to parse or will improperly map the field data. Therefore this method is more prone to error due to misconfiguration than the standard collection methods. Blue Coat ProxySG Syslog Log Configuration Guide 9

10 The standard file based collection methods and the methods described here are mutually exclusive at the level of the log format. It is technically possible to mix use of the standard methods with the advanced configuration for syslog but if the standard methods can be used at all then it is recommended that they be used exclusively. Requirements on the Proxy In order to use the Advanced Configuration you must override the value of a standard Blue Coat access log field. Usually there is one available to use. Our example uses the field cs-auth-group. If you are already using this field for other purposes you must choose another standard field, preferably one that is not used by the three supported formats (or that fields information will be lost). If you cannot find a standard ELFF field to override and insert in the correct position then the Advanced configuration option cannot be used. It is recommended to use the cs-auth-group field if possible. The advanced configuration option requires modifying three log formats to a prescribed standard and implementing a Web Access Policy on the Proxy. As in traditional support access logging must be configured. Unlike traditional support, the advanced configuration for syslog requires a custom client to be defined. Support is limited to three message formats: main, im and streaming. These formats are modified from their default. The fields and field order configuration must be exact and are defined in this document. Decide whether to overload the overridden field The configuration requires that a standard Blue Coat access log field be overridden. This can be optionally overloaded to also contain an identifier, such as the name of the proxy. Configuring Log Formats Supported Log Formats The main, im, and streaming log formats are all supported with a specific field order that is a slight modification of the default field order found in SGOS 5.4 (and later). Within the Configuration tab, select Access Logging, Formats. For each log format you wish to collect among main, im, and streaming, select view/edit, clear the format line of all data, and paste the format string provided below according to log format name into the format line. Click Test Format to validate your change. 10 Blue Coat ProxySG Syslog Log Configuration Guide

11 These are the ELFF strings to use per log format: main: cs-auth-group date time time-taken cs-auth-groups c-ip sc-status s-action sc-bytes cs-bytes cs-method cs-uri-scheme cs-host cs-uri-port cs-uri-path cs-uri-query cs-username s-hierarchy s-supplier-name rs(content-type) cs(referer) cs(user-agent) sc-filter-result cs-categories x-virus-id s-ip im: date time c-ip cs-auth-group cs-auth-groups cs-username cs-protocol x-im-method x-im-user-id x-im-user-name x-im-user-state x-im-client-info x-im-buddy-id x-im-buddy-name x-im-buddy-state x-im-chat-room-id x-im-chat-room-type x-im-chat-room-members x-im-message-text x-im-message-size x-im-message-route x-im-message-type x-im-file-path x-im-file-size s-action streaming: date time cs-auth-group c-ip cs-auth-groups c-dns cs-uri-scheme cs-host cs-uri-port cs-uri-path cs-uri-query c-starttime x-duration c-rate c-status c-playerid c-playerversion c-playerlanguage cs(user-agent) cs(referer) c-hostexe c-hostexever c-os c-osversion c-cpu filelength filesize avgbandwidth protocol transport audiocodec videocodec channelurl sc-bytes c-bytes s-pkts-sent c-pkts-received c-pkts-lost-client c-pkts-lost-net c-pkts-lost-cont-net c-resendreqs c-pkts-recovered-ecc c-pkts-recovered-resent c-buffercount c-totalbuffertime c-quality s-ip s-dns s-totalclients s-cpu-util x-cache-user s-session-id x-cache-info x-client-address s-action Click Apply to save your configuration changes. The Proxy should indicate success. Note: Make sure there are no spaces before the field names. Configuring the Custom Client Within the Configuration > Access Logging, select Logs. If necessary choose the first tab within this section, also called 'Logs'. Note that each Name maps to the Format with the same name for main, im, and streaming. In any case that they do not match, delete the mapping and create a new one that does. 1. Select Configuration > Access Logging > Logs > Upload Client. 2. Select Custom Client from the Client type drop-down list. Click the Settings button. Blue Coat ProxySG Syslog Log Configuration Guide 11

12 3. From the Settings for drop-down list, select to configure the primary or alternate custom server. 4. Fill in the server fields, as appropriate: a. Host: Enter the hostname or IP address of the upload destination. b. Port: This must be set to 514. c. Use secure connections (SSL): Off. 5. Click OK. 6. Click Apply. For each log format you wish to use among main, im, and streaming, select the log, assign the Upload Client to be the custom client. Choose <No Encryption> and <No Signing> and save the log file as text file. Configuring a Web Access Layer Policy Note: In our example we define a Web Access Layer policy with an Override Access Log Field object that uses the cs-auth-group field. If you choose another field to override then configure your policy using that field. Add the Policy to the Proxy Use the Blue Coat Management Console Visual Policy Manager (VPM) on the proxy to create the new policy. 1. In the VPM, click Policy in the menu at top and then select Add Web Access Layer. The Web Access Layer is the broadest layer and most likely to gather data and is recommended as the layer for this policy. An Add New Layer text box prompts you to name the layer; this example names the layer LogLogic. 12 Blue Coat ProxySG Syslog Log Configuration Guide

13 2. Click OK. After a moment the Visual Policy Manager window displays the new layer. 3. Choose Edit->New Rule. Leave Any as the rule for the Source, Destination, Service, and Time objects. For the Action object, right-click Deny and choose Set. A Set Action Object window opens. In the Show drop-down list at top, select Override Access Log Field Objects. The window changes to show defined Override Access Log Field Objects. Blue Coat ProxySG Syslog Log Configuration Guide 13

14 4. Click New and select Override Access Log Field Objects from the drop-down list. An Add Access Log Field Override Object window opens. This is where you insert the identifier string that allows the LogLogic Appliance to identify the log type. 5. Make these specifications: a. Provide a name that makes sense for the rule name or accept the default name. b. For Log Name, select [ALL]. This insures the field is altered in all three supported log formats. c. For Field Name, select the field you have identified to override, in this example, cs-auth-group. d. Click Rewrite value to and put the exact text 'ProxySG:[identifier]' where [identifier] is an optional place to provide the name of the proxy. 6. Click OK. The Add Access Log Field Override Object window closes. 7. Click OK. The Set Action Object window closes. 14 Blue Coat ProxySG Syslog Log Configuration Guide

15 8. In the Visual Policy Manager window, click Install Policy. The View Generated CPL and Current SG Appliance VPM Policy Files windows display. You can close the windows after verifying the generated CPL (content policy language). Close the Visual Policy Manager by clicking the window close icon. Enabling the LogLogic Appliance to Capture Data The following sections describe how to enable the LogLogic Appliance to capture Blue Coat Syslog Syslog messages. With the auto-identification feature, the LogLogic Appliance recognizes Blue Coat Syslog Syslog messages by default. As the Syslog messages come into the Appliance, they are automatically identified and a new Blue Coat Syslog is added to the log source device list. Default values are used for certain properties, such as the device name. To enable auto-identification in the LogLogic Appliance: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Administration > System Settings. The General tab appears. 3. For Auto-identify Log Sources, select Yes. 4. Click Update. 5. Once the automatically identified device is added, you can edit its properties. IMPORTANT! Do not change the auto-identified Device Type and Host IP information. Blue Coat ProxySG Syslog Log Configuration Guide 15

16 To edit an existing Blue Coat Syslog device: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Management > Devices. The Devices tab appears. 3. Click on the link of an existing Blue Coat Syslog device in the list. The Modify Device tab appears. 4. Edit the device fields as needed, then click Update Device. Adding a Blue Coat Syslog Syslog Device If you do not want to utilize the auto-identification feature, you can manually add a Blue Coat Syslog device to the LogLogic Appliance before you redirect the logs. IMPORTANT! LogLogic highly recommends using the auto-identification feature for all supported devices. If you want to add devices manually, make sure that the Auto-identify Log Sources setting is not enabled on the LogLogic Appliance. If the auto-identification setting is enabled and you manually add devices, duplicate device entries might appear on the Appliance. To add Blue Coat Syslog as a new device: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Management > Devices. The Devices tab appears. 16 Blue Coat ProxySG Syslog Log Configuration Guide

17 3. Click Add New. The Add Device tab appears. 4. Type in the following information for the device: Name Name for the Blue Coat Syslog device Description (optional) Description of the Blue Coat Syslog device Device Type Select Blue Coat Syslog from the drop-down menu Host IP IP address of the Blue Coat Syslog host machine Enable Data Collection Select the Yes radio button Refresh Device Name through DNS Lookups (optional) Select this checkbox to enable the Name field to be automatically updated. The name is obtained using a reverse DNS lookup on the configured refresh interval. The DNS name overrides any manual name you assign. 5. Click Add. 6. Verify that your new device appears in the Devices tab and that Enabled is set to Yes. When the logs arrive from the specified Blue Coat Syslog host machine, the LogLogic Appliance uses the device you just added if the hostname or IP match. Verifying the Configuration The section describes how to verify that the configuration changes made to Blue Coat Syslog and the LogLogic Appliance are applied correctly. To verify the configuration: 1. Log in to the LogLogic Appliance. 2. From the navigation menu, select Dashboards > Log Source Status. The Log Source Status tab appears. 3. Locate the IP address for each Blue Coat Syslog device. If the device name (Blue Coat Proxy) appears in the list of devices, then the configuration is correct. Blue Coat ProxySG Syslog Log Configuration Guide 17

18 Figure 1 Blue Coat Syslog Device Added 18 Blue Coat ProxySG Syslog Log Configuration Guide

19 Chapter 2 How LogLogic Supports Blue Coat ProxySG Syslog This chapter describes LogLogic s support for Blue Coat Syslog Syslog. LogLogic enables you to capture Blue Coat Syslog Syslog data to monitor Blue Coat Syslog events. How LogLogic Captures Blue Coat Syslog Log Data LogLogic Real-Time Reports How LogLogic Captures Blue Coat Syslog Log Data Blue Coat Syslog generates Syslog messages which are sent, to the Syslog Listener on the LogLogic Appliance where they are processed, stored, and made available for alerting and searching. The following figure shows how Blue Coat Syslog logs are captured and forwarded to the LogLogic Appliance for further processing. Figure 2 Blue Coat ProxySG and LogLogic Appliance Once the data is captured, it can be used for generating search reports such as Index search and Regular Expression search. Blue Coat ProxySG Syslog Log Configuration Guide 19

20 LogLogic Real-Time Reports LogLogic provides pre-configured Real-Time Reports for Blue Coat ProxySG log data. The following Real-Time Reports are available: All Unparsed Events Displays data for all events retrieved from the Blue Coat ProxySG log for a specified time interval Web Cache Activity Displays locally-stored web cache information served during a specified time interval To access LMI 5 Real-Time Reports: 1. In the top navigation pane, click Reports. 2. Click Network Activity. The following Real-Time Report is available: Web Cache Activity 3. Click Operational. The following Real-Time Reports is available: All Unparsed Events You can create custom reports from the existing Real-Time Report templates. For more information, see the LogLogic User Guide and LogLogic Online Help. 20 Blue Coat ProxySG Syslog Log Configuration Guide

21 Chapter 3 Troubleshooting and FAQ This chapter contains troubleshooting regarding the configuration and/or use of log collection for Blue Coat Proxy. It also contains an FAQ, providing quick answers to common questions. Troubleshooting Frequently Asked Questions (FAQ) Troubleshooting Is your version of Blue Coat Syslog logs supported? For more information, see Prerequisites on page 7. Is your LogLogic Appliance running Release 5.1 or later? If you are running a release prior to 5.1, you must upgrade. Contact LogLogic Support for more information. Is the appropriate Log Source Package (LSP) installed properly? Check to make sure that the LSP that is installed includes support for Blue Coat Syslog. Also make sure that the package was installed successfully. For more information on LSP installation procedures, see the LogLogic Log Source Package Release Notes. If Blue Coat Syslog events are not appearing on the LogLogic Appliance... Blue Coat Syslog might not be configured correctly. Make sure that Blue Coat Syslog is configured correctly, that syslog logging is enabled, and that a Syslog Server (i.e., the LogLogic Appliance) has been defined. For more information see Configuring Blue Coat Syslog for Syslog Using the CLI on page 8. Frequently Asked Questions (FAQ) How does the LogLogic Appliance collect logs from Blue Coat Proxy? Blue Coat Syslog sends the logs via Syslog to the LogLogic Appliance which captures the logs using the syslog listener. For more information see How LogLogic Captures Blue Coat Syslog Log Data on page 19. What is the supported log format for Blue Coat Syslog? Please see Supported Log Formats on page 10. Blue Coat ProxySG Syslog Log Configuration Guide 21

22 22 Blue Coat ProxySG Syslog Log Configuration Guide

23 Appendix A Event Reference This appendix lists the LogLogic-supported Blue Coat ProxySG Syslog events. The LogLogic Blue Coat ProxySG Syslog event table identifies event formats that can be analyzed through LogLogic Agile Reports, as well as a sample log message. LogLogic Support for Blue Coat ProxySG Syslog Events The following list describes the contents of the sample below. Event ID Not Applicable (N/A) Agile Reports/Search Not Applicable (N/A) Title Not Applicable (N/A) Event Category The category of the event can be either Operational or Audit Event Type Type of events, IM, Main & Streaming Sample Log Message Sample Blue Coat ProxySG Syslog log messages LogLogic supports all "Main", IM and Streaming events if enabled to log on the Blue Coat ProxySG Syslog device in the supported log format. These events are supported by the Web Cache Activity report. Example IM Event: :59: ProxySG:LogLabsBC - ford yahoo-im RECEIVE michaelploglogic - Online "Yahoo! Messenger " mperrone ":( :-*" 6 service text - - ALLOWED Example Main Event: ProxySG:LogLabsBC :59: TCP_TUNNELED TUNNEL tcp / - - DIRECT PROXIED "unavailable;unavailable" Example Streaming Event: :00:28 ProxySG:LogLabsBC rtmp / "Shockwave Flash" rtmp tcp f607eb4497a UNKNOWN DENIED Symantec Endpoint Protection Log Configuration Guide 23

LogLogic Trend Micro OfficeScan Log Configuration Guide

LogLogic Trend Micro OfficeScan Log Configuration Guide LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and

More information

LogLogic Cisco IPS Log Configuration Guide

LogLogic Cisco IPS Log Configuration Guide LogLogic Cisco IPS Log Configuration Guide Document Release: March 2011 Part Number: LL600072-00ELS090000 This manual supports LogLogic Cisco IPS Release 1.0 and later, and LogLogic Software Release 4.9.1

More information

LogLogic Cisco NetFlow Log Configuration Guide

LogLogic Cisco NetFlow Log Configuration Guide LogLogic Cisco NetFlow Log Configuration Guide Document Release: September 2011 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 1.0, and LogLogic Software Release

More information

LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide

LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide LogLogic General Database Collector for Microsoft SQL Server Log Configuration Guide Document Release: Septembere 2011 Part Number: LL600066-00ELS100000 This manual supports LogLogic General Database Collector

More information

LogLogic Symantec Endpoint Protection Log Configuration Guide

LogLogic Symantec Endpoint Protection Log Configuration Guide LogLogic Symantec Endpoint Protection Log Configuration Guide Document Release: September 2011 Part Number: LL60005-00ELS100001 This manual supports LogLogic Symantec Endpoint Protection Release 1.0 and

More information

Juniper Secure Access SSL VPN Log Configuration Guide

Juniper Secure Access SSL VPN Log Configuration Guide Juniper Secure Access SSL VPN Log Configuration Guide Document Release: March 2012 Part Number: LL600049-00ELS01000000 This manual supports LogLogic Juniper Secure Access SSL VPN Release 1.0 and later,

More information

LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide

LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide LogLogic Microsoft Dynamic Host Configuration Protocol (DHCP) Log Configuration Guide Document Release: September 2011 Part Number: LL600026-00ELS090000 This manual supports LogLogic Microsoft DHCP Release

More information

LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide

LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide Document Release: September 2011 Part Number: LL600027-00ELS090000 This manual supports LogLogic Microsoft DNS Release 1.0 and later,

More information

LogLogic Blue Coat ProxySG Log Configuration Guide

LogLogic Blue Coat ProxySG Log Configuration Guide LogLogic Blue Coat ProxySG Log Configuration Guide Document Release: September 2011 Part Number: LL600012-00ELS100001 This manual supports LogLogic Blue Coat ProxySG Release 1.0 and later, and LogLogic

More information

LogLogic Cisco NetFlow Log Configuration Guide

LogLogic Cisco NetFlow Log Configuration Guide LogLogic Cisco NetFlow Log Configuration Guide Document Release: March 2012 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 2.0, and LogLogic Software Release 5.1

More information

LogLogic Microsoft Internet Information Services (IIS) Log Configuration Guide

LogLogic Microsoft Internet Information Services (IIS) Log Configuration Guide LogLogic Microsoft Internet Information Services (IIS) Log Configuration Guide Document Release: September 2011 Part Number: LL60001-00ELS090000 This manual supports LogLogic Microsoft IIS Release 1.0

More information

LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide

LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide Document Release: September 2011 Part Number: LL600015-00ELS090000 This manual supports LogLogic Juniper Networks

More information

Blue Coat Systems SG Appliance

Blue Coat Systems SG Appliance Blue Coat Systems SG Appliance Configuration and Management Guide Volume 9: Access Logging Version SGOS 5.1.x Volume 9: Access Logging Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale,

More information

LogLogic Microsoft SQL Server Log Configuration Guide

LogLogic Microsoft SQL Server Log Configuration Guide LogLogic Microsoft SQL Server Log Configuration Guide Document Release: March 2012 Part Number: LL600028-00ELS090002 This manual supports LogLogic Microsoft SQL Server Release 2.0 and later, and LogLogic

More information

Microsoft Active Directory (AD) Service Log Configuration Guide

Microsoft Active Directory (AD) Service Log Configuration Guide Microsoft Active Directory (AD) Service Log Configuration Guide Document Release: October 2011 Part Number: LL600011-00ELS090000 This manual supports LogLogic Microsoft AD Service Release 1.0 and above,

More information

LogLogic Check Point Management Station Log Configuration Guide

LogLogic Check Point Management Station Log Configuration Guide LogLogic Check Point Management Station Log Configuration Guide Document Release: September 2011 Part Number: LL600013-00ELS090000 This manual supports LogLogic Check Point Management Station Release 2.0

More information

LogLogic Apache Web Server Log Configuration Guide

LogLogic Apache Web Server Log Configuration Guide LogLogic Apache Web Server Log Configuration Guide Document Release: September 2011 Part Number: LL60009-00ELS090001 This manual supports LogLogic Apache Web Server Release 1.0 and later, and LogLogic

More information

Blue Coat Systems ProxySG Appliance

Blue Coat Systems ProxySG Appliance Blue Coat Systems ProxySG Appliance Configuration and Management Suite Volume 8: Access Logging Version SGOS 5.4.x Volume 8: Access Logging Contact Information Americas: Blue Coat Systems Inc. 420 North

More information

LogLogic McAfee Firewall Enterprise (Sidewinder) Log Configuration Guide

LogLogic McAfee Firewall Enterprise (Sidewinder) Log Configuration Guide LogLogic McAfee Firewall Enterprise (Sidewinder) Log Configuration Guide Document Release: September 2011 Part Number: LL600046-00ELS900001 This manual supports LogLogic Sidewinder Release 1.2 and later,

More information

LogLogic IBM i5/os Collector Guide

LogLogic IBM i5/os Collector Guide LogLogic IBM i5/os Collector Guide Software Release: 1.0 Document Release: December 2010 Part Number: LL600020-00EI5010001 This manual supports LogLogic IBM i5/os Collector Release 1.0 and later, and LogLogic

More information

LogLogic Microsoft Windows Server 2000/2003 Log Configuration Guide

LogLogic Microsoft Windows Server 2000/2003 Log Configuration Guide LogLogic Microsoft Windows Server 2000/2003 Log Configuration Guide Document Release: September 2011 Part Number: LL600029-00ELS090002 This manual supports LogLogic Microsoft Windows Server 2000/2003 Release

More information

LogLogic Juniper Networks JunOS Log Configuration Guide

LogLogic Juniper Networks JunOS Log Configuration Guide LogLogic Juniper Networks JunOS Log Configuration Guide Document Release: September 2011 Part Number: LL600052-00EL01000000 This manual supports LogLogic s Juniper Networks JunOS Release 1.0 and above,

More information

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy

Blue Coat Security First Steps Solution for Deploying an Explicit Proxy Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,

More information

Microsoft Internet Information Services (IIS)

Microsoft Internet Information Services (IIS) McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Microsoft Internet Information Services (IIS) September 30, 2014 Microsoft IIS Page 1 of 11 Important Note: The information

More information

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Reverse Proxy with SSL - ProxySG Technical Brief

Reverse Proxy with SSL - ProxySG Technical Brief SGOS 5 Series Reverse Proxy with SSL - ProxySG Technical Brief What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the functionality for a robust and flexible reverse proxy solution. In addition

More information

Implementing Exception Pages

Implementing Exception Pages Technical Brief: Implementing Exception Pages Implementing Exception Pages SGOS 5 Series Developed using SGOS 5.3.1.4 What are Exception Pages? Exception pages are Web pages (messages sent to users under

More information

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic SOX and COBIT Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE.

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Blue Coat Security First Steps Transparent Proxy Deployments

Blue Coat Security First Steps Transparent Proxy Deployments Transparent Proxy Deployments SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,

More information

TIBCO LogLogic Log Management Intelligence (LMI) Configuration and Upgrade Guide

TIBCO LogLogic Log Management Intelligence (LMI) Configuration and Upgrade Guide TIBCO LogLogic Log Management Intelligence (LMI) Configuration and Upgrade Guide Software Release 5.4.2 November 2013 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference

Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector 3.6 for Blue Coat Proxy Quick Reference Symantec Event Collector for Blue Coat Proxy Quick Reference The software described in this book is furnished under a license agreement

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Parallels Plesk Control Panel

Parallels Plesk Control Panel Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,

More information

Blue Coat Security First Steps Solution for Integrating Authentication

Blue Coat Security First Steps Solution for Integrating Authentication Solution for Integrating Authentication using IWA Direct SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER, CACHEOS, CACHEPULSE,

More information

Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6

Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 INTEGRATION GUIDE May 2014 3725-75304-001 Rev B Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved.

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Plesk for Windows Copyright Notice

Plesk for Windows Copyright Notice 2 Plesk for Windows Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd.

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

HTTP Reverse Proxy Scenarios

HTTP Reverse Proxy Scenarios Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Note Before using this information and the product it supports, read the information

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: 3.5.0. December 2012. Two-Second Advantage TIBCO LogLogic HIPAA Compliance Suite Quick Start Guide Software Release: 3.5.0 December 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE

More information

Patented hosting technology protected by U.S.Patents 7,0909,948; 7,076,633. Patents pending in the U.S.

Patented hosting technology protected by U.S.Patents 7,0909,948; 7,076,633. Patents pending in the U.S. Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright 1999-2007, SWsoft Holdings, Ltd. All rights reserved

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

CA NetQoS Performance Center

CA NetQoS Performance Center CA NetQoS Performance Center Install and Configure SSL for Windows Server 2008 Release 6.1 (and service packs) This Documentation, which includes embedded help systems and electronically distributed materials,

More information

Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0

Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for BT Wholesale/HIPCOM SIP Trunk Service and Avaya IP Office 8.0 Issue 1.0 Abstract These Application Notes describe the procedures for configuring

More information

ProxySG ICAP Integration

ProxySG ICAP Integration ProxySG ICAP Integration Blue Coat s proxies can utilize the Internet Content Adaptation Protocol (ICAP) to hand off HTTP requests and/or responses to an external server for configured processing and transformation.

More information

ProxySG TechBrief Enabling Transparent Authentication

ProxySG TechBrief Enabling Transparent Authentication ProxySG TechBrief Enabling Transparent Authentication What is Transparent Authentication? Authentication is a key factor when defining a web access policy. When the Blue Coat ProxyxSG is configured for

More information

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1 First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Parallels Plesk Control Panel

Parallels Plesk Control Panel Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,

More information

User Identification and Authentication

User Identification and Authentication User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included

More information

Wakanda Studio Features

Wakanda Studio Features Wakanda Studio Features Discover the many features in Wakanda Studio. The main features each have their own chapters and other features are documented elsewhere: Wakanda Server Administration Data Browser

More information

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief ProxySG TechBrief Reverse Proxy with SSL What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the basis for a robust and flexible reverse proxy solution. In addition to web policy management,

More information

Using IIS Application Request Routing to Publish Lync Server 2013 Web Services

Using IIS Application Request Routing to Publish Lync Server 2013 Web Services Using IIS Application Request Routing to Publish Lync Server 2013 Web Services DISCLAIMER 2014 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Hyper-V, Internet Explorer, Lync,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Sample Configuration: Cisco UCS, LDAP and Active Directory

Sample Configuration: Cisco UCS, LDAP and Active Directory First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

Blue Coat Systems SG Appliance

Blue Coat Systems SG Appliance Blue Coat Systems SG Appliance Configuration and Management Guide Volume 6: Advanced Networking Version SGOS 5.1.x Volume 6: Advanced Networking Contact Information Blue Coat Systems Inc. 420 North Mary

More information

Configuring the Avaya B179 SIP Conference Phone with Avaya Aura Communication Manager and Avaya Aura Session Manager Issue 1.0

Configuring the Avaya B179 SIP Conference Phone with Avaya Aura Communication Manager and Avaya Aura Session Manager Issue 1.0 Avaya Solution & Interoperability Test Lab Configuring the Avaya B179 SIP Conference Phone with Avaya Aura Communication Manager and Avaya Aura Session Manager Issue 1.0 Abstract These Application Notes

More information

Adeptia Suite 6.2. Application Services Guide. Release Date October 16, 2014

Adeptia Suite 6.2. Application Services Guide. Release Date October 16, 2014 Adeptia Suite 6.2 Application Services Guide Release Date October 16, 2014 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 Document Information DOCUMENT INFORMATION

More information

SuperLumin Nemesis. Administration Guide. February 2011

SuperLumin Nemesis. Administration Guide. February 2011 SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

Legal and Copyright Notice

Legal and Copyright Notice Parallels Helm Legal and Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 2008, Parallels, Inc.

More information

ProxySG TechBrief Implementing a Reverse Proxy

ProxySG TechBrief Implementing a Reverse Proxy ProxySG TechBrief Implementing a Reverse Proxy What is a reverse proxy? The Blue Coat ProxySG provides the basis for a robust and flexible Web communications solution. In addition to Web policy management,

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

A10 Networks Load Balancer

A10 Networks Load Balancer McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: A10 Networks Load Balancer January 26, 2015 A10 Networks Load Balancer Page 1 of 8 Important Note: The information contained

More information

LDAP Authentication and Authorization

LDAP Authentication and Authorization LDAP Authentication and Authorization What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned to centralized

More information

Accellion Secure File Transfer

Accellion Secure File Transfer McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Accellion Secure File Transfer January 26, 2015 Accellion Secure File Transfer Page 1 of 7 Important Note: The information

More information

Quick Start Guide. for Installing vnios Software on. VMware Platforms

Quick Start Guide. for Installing vnios Software on. VMware Platforms Quick Start Guide for Installing vnios Software on VMware Platforms Copyright Statements 2010, Infoblox Inc. All rights reserved. The contents of this document may not be copied or duplicated in any form,

More information

Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2

Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2 [1]JD Edwards EnterpriseOne Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2 E61545-01 October 2015 Describes the configuration of the Application

More information

Deploying the SSL Proxy

Deploying the SSL Proxy Blue Coat Systems Deployment Guide Deploying the SSL Proxy For SGOS 5.1.4 Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html

More information

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide Note Before using this

More information

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010 DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration

More information

AG MacOS Standalone Array Client Administration Guide

AG MacOS Standalone Array Client Administration Guide AG MacOS Standalone Array Client Administration Guide Copyright Statement Copyright Statement Copyright 2015 Array Networks, Inc., 1371 McCarthy Blvd, Milpitas, California 95035, USA. All rights reserved.

More information

Blue Coat Security First Steps Solution for Streaming Media

Blue Coat Security First Steps Solution for Streaming Media Blue Coat Security First Steps Solution for Streaming Media SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

Integrate Check Point Firewall

Integrate Check Point Firewall Integrate Check Point Firewall EventTracker Enterprise Publication Date: Oct.26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Change Management for Rational DOORS User s Guide

Change Management for Rational DOORS User s Guide Change Management for Rational DOORS User s Guide Before using this information, read the general information under Appendix: Notices on page 58. This edition applies to Change Management for Rational

More information

Nimsoft Monitor. dns_response Guide. v1.6 series

Nimsoft Monitor. dns_response Guide. v1.6 series Nimsoft Monitor dns_response Guide v1.6 series CA Nimsoft Monitor Copyright Notice This online help system (the "System") is for your informational purposes only and is subject to change or withdrawal

More information

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP

More information