Symantec ediscovery Platform Security Outline

Size: px
Start display at page:

Download "Symantec ediscovery Platform 7.1.4 Security Outline"

Transcription

1 Symantec ediscovery Platform Security Outline This document is to provide an outline of some of the security aspects of Symantec ediscovery Platform from the view of a security officer If you have any feedback or questions about this document please them to IIG-TFE@symantec.com stating the document title. This document is provided for informational purposes only. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Copyright 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

2

3 Purpose The Symantec ediscovery Platform is the industry leading, single pane of glass application which answers each phase of the ediscovery reference model in an intuitive manner with utilities to consolidate traditional Legal Hold methodology, and agentless and targeted approach Identification and Collections, a powerful and flexible Processing engine, and a rich and robust Review and Analytics solution. The Symantec ediscovery Platform is an appliance based solution with an Oracle MySQL database backend integrated with web services from Apache Tomcat to provide an easy to deploy and manage web based solution for both technology and legal team perspectives. Scanning - tools and validation Qualys and Cenzic Retina Nessus Hyperion (Government Standard Tools) GOVT. Common Process o Deploy Solution o Schedule Scan o Review Vulnerabilities and resolve o Rescan (and repeat as necessary typically this has been a single scan iteration for success, leaving Windows Updates to the customer to apply) Symantec performs vulnerability scanning annually to determine high and medium vulnerabilities and work to remediate any issues found: Vulnerability DB Vulnerabilities OS Vulnerabilities Network Related Vulnerabilities DISA STIG Security Documentation Government Standard delivered by DISA to provide specialized, required application security settings to be met for solution to be approved for addition to production networks regardless of network security classification (unclassified top secret) Page 1

4 OS Level Web Application Level Database level Third Party Application Level o Method of disabling Lotus Notes client until updated to newest version with product. Anti-virus Symantec ediscovery Platform does not bundle an anti-virus solution with its appliances. Furthermore, there does not seem to be such a need in certain configurations. Why does the Symantec ediscovery Platform not need A/V during processing Unlike Worms, viruses need to be activated, for example, by launching an executable or invoking a script. In due processing an , attachment or loose file, we may well encounter an infected document, but so long as we don't actually run the attachment, or attempt to evaluate any embedded javascript during processing we should be safe. Opening an attachment as a file is safe, such as what Stellant would, but asking the OS or JVM to run it is not. Symantec ediscovery Platform does support native file printing, for example printing a spreadsheet by launching MS Excel. Virus protect is a concern for native file printing. See CW Virus Scanning Guidelines for more information on scanning the directory used for native document viewing. Note If the Symantec ediscovery Platform environment is not licensed for native document review the native file printing directory will not exist and therefore is not a potential virus gateway. Symantec ediscovery Platform interacting with Virus o The Symantec ediscovery Platform is compatible with the anti-virus application of choice, but there are a number of exceptions that must be kept in mind to ensure that the appliance is properly protected. One of the basic tenants of ediscovery is the collection, processing, and review of case data. This data comes from many sources such as file shares and . Page 2

5 o Collected and other file types are sometimes found to have phony links and malicious spyware which may be needed for a particular case or matter. To use this data and have it available to be processed and then reviewed by the legal team is necessary but there is a risk that reviews could inadvertently click links or open files containing these types of files within the case data population. o Configuring the Anti-Virus client is simple with a provided Anti-virus setup guide, available on request. o It is possible to configure the path for attachment directory by using the property "esa.altattachmentsdir". By default the value would be empty and it defaults to d:\cw\<current_version>\scratch\temp\esadb\attcachedir\. Protecting our users Although the Symantec ediscovery Platform application should continue to function normally in the presence of viruses, the end users/reviewers are at risk. A user can get infected if he/she downloads an attachment (for example, after a Search) for native viewing such as with MS Word or QuickView Plus. Users responsibility The first responsibility remains with our users. We assume our users have scanned all documents and s provided to Symantec ediscovery Platform for indexing. However, sometimes this is not possible. For example, although many anti-virus software applications will scan zip files, they may not scan PST files, or WINMAIL.DAT files, or CAB files, or various other container files. It is recommended that all user desktops have an anti-virus application actively scanning for any user viewing attachments and loose files natively outside of the Symantec ediscovery Platform. No worms Although this section is not about worms, they do deserve a mention. Worms, unlike viruses, are not activated: they are programs that are self-activated (for example from a startup folder), or trick the user and/or the OS into activating them. Once activated they can cause damage to the local machine and/or propagate themselves outwards through open ports or various tools such as clients. Page 3

6 With the use of the Firewall and other measures worms should not be able to infect the network. Open Ports / Protocols / Encryption Standards This is list of ports to manipulate when provisioning an internet-facing or firewalled secured instance of the Symantec ediscovery Platform. Be aware that not all ports are required to stay open after a specific port-related task(s) is complete, for example, Windows activation using port 53 Port Protocol Description Optional Misc. 22 TCP SSH, SCP/SFTP Y 25 TCP SMTP Y 53 TCP/UDP DNS Y 80 TCP HTTP 443 TCP HTTPS 3389 TCP Microsoft RDP Y 21 ftp 626 Ldap-s Y 88 kerberos Y 123 ntp 389 LDAP Y Required by NETBIOS that enables various network related communications: Microsoft file sharing SMB: User Datagram Protocol (UDP) ports and Transmission Control Protocol (TCP) ports Used for File Share Collection & Desktp Collection. Must be Bi-Directional Used by MySQL to enable remote database access. Must be used with a Symantec ediscovery Platform cluster or if a separate MySQL server is being used 445 For File Share and PC Collections we use the SMB or CIFS protocol, which uses TCP port 445 Required for file sharing and needed to allow sharing files across a network. Must be Bi-Directional Symantec ediscovery Platform Page 4

7 application port for inter-appliance communication 135 Used by various windows critical services including the Firewall Service. Symantec ediscovery Platform utilizes the native Windows Firewall on the appliance to "harden" the Symantec ediscovery Platform. Table 1 Auditing & reporting Symantec ediscovery Platform provides a number of logs and auditing services within the User Interface (UI) as well as locally on the appliance. If necessary, these logs are able to be compressed and retained according to local retention and preservation policies. The jobs are listed by name (see below) with the corresponding data and time appended in the name for ease of use and troubleshooting. The location of the logs on the local appliance is: D:\CW\Vx.x\Logs (Vx.x denotes the latest installed version of the Symantec ediscovery Platform if the deployed is version the path would be D:\CW\V714\Logs) o Access Logs Provides information on application access times on login. o Catalina Logs Provides information on the Apache Tomcat webserver jobs as well as any errors for ease in troubleshooting o Server Logs Provides information on server related tasks and errors for ease in troubleshooting o Jobs Logs o Crawler\Retriever These log files are related to collections tasks within the collections module and rendering tasks in the review module. These are listed by specific name such as PSTCrawler, PSTRetriever, etc. Page 5

8 o Processing These logs provide detail into processing tasks within the Collections module. NOTE: Logs are managed by the system and are overwritten Services This section reviews all of the necessary Symantec ediscovery Platform specific services providing descriptions of each. Symantec ediscovery Platform specific services are denoted in the services console with the prefix ESA. For accounts related to running these services, please reference the Accounts section of this document. EsaApplicationService:Firedaemon o Controls the Symantec ediscovery Platform Application Server, which is responsible for indexing the incoming documents and processing search requests. This service depends on the MySQL service. No configuration is required, except in the following cases: To crawl PST files or loose files on a network share that requires a username and password, this service must run under a login account with those permissions. To crawl an Active Directory domain other than the domain of the Symantec ediscovery Platform, this service must run under a login account in that domain (used mainly for lab tests). EsaEvCrawlerService & EsaEvRetrieverService o Responsible for crawling and retrieving documents on Symantec Enterprise Vaults. The login user name must match the name used by the Symantec services (generally the Vault Service Account ). EsaExchangeCrawlerService & EsaExchangeRetrieverService o Responsible for crawling and retrieving documents on Exchange servers. The login user must have the following permissions: Read Execute Read permissions List contents Read properties List objects Open mail send queue Read metabase properties Administer information store Create name properties in the information store Page 6

9 View information store status Receive As EsaPstCrawlerService & EsaPstRetrieverService o Responsible for crawling and retrieving PST data stores. Note the following: If the PST files are on a network share that requires a username and password, these services must run under a login account with read and write access to the network share. If the PST files are on a storage device attached to the Symantec ediscovery Platform, then only local permissions are required. The Symantec ediscovery Platform requires different accounts but similar privileges for each of the PST crawler, and retriever services. Setting up separate accounts avoids potential memory contention and management issues with Microsoft s MAPI interface which could result in sub-optimal performance. EsaNsfCrawlerService & EsaNsfRetrieverService o Responsible for crawling and retrieving NSF data stores. These services must be configured with the permissions needed to access NSF files over the network. Note the following: If the NSF files are on a network share that requires a username and password, these services must run under a login account with read and write access to the network share. If the NSF files are on a storage device attached to the Symantec ediscovery Platform appliance, then only local permissions are required. Make sure that these two services are configured to use the same account. Notes client must be activated to work with this account. o EsaRissCrawlerService & EsaRissRetrieverService Responsible for crawling and retrieving documents on the Hewlett-Packard IntegratedArchive Platform (IAP), formerly called the Reference Information Storage System (RISS). To properly start and run, the account used for this service must be setup with access the RISS shares. o MySQL Services Services operate in a traditional manner, providing for operation stability of the Symantec ediscovery Platform MySQL database. Processes BDLGenServer.exe BelsService.exe CWJava.exe Services EsaApplicationService : FireDaemon EsaIGCBravaLicenseSrvice EsaIGCJobProcessor Page 7

10 EVCrawler.exe EVRetriever.exe ExchangeCrawler.exe ExchangeRetriever.exe FileFilter.exe FireDaemon.exe Java.exe JPConsole.exe JPService.exe MySqld-nt.exe Mysqldump.exe NSFCrawler.exe NSFRetriever.exe NSFScan.exe PSTCrawler.exe PSTRetriever.exe PSTScan.exe PSTWriter.exe RISSCrawler.exe RISSRetriever.exe fragmon.exe cscript.exe perl.exe EsaNsfCrawlerService EsaNsfRetrieverService EsaPstCrawlerService EsaPstRetrieverService Table 2 There are some specific rights needed to be granted to services within the Symantec ediscovery Platform prior to the installation. A comprehensive list of these is available in the installation guide which can be found here Page 8

11 Identification and collections The Symantec ediscovery Platform was created with an all in one, very intuitive ease of use in mind to provide a more efficient workflow for ediscovery needs. The Identification and Collection module was created with a targeted and agentless approach. There are no agents to be installed and then repeatedly managed and QC ed throughout the infrastructure. Symantec ediscovery Platform is able to directly collect from a multitude of sources out of the box, with the only requirement being a managed user account with proper access to the targeted source for collection purposes. Accounts typically need a higher level of access to properly collect necessary case data such as: Read Read rights are necessary for the designated account to see the data that is to be requested to be collected. List List Rights are needed for the designated account to present the data to the Symantec ediscovery Platform. Write Write rights are necessary for the destination account so that the data requested to be collected can be written in a forensically sound manner (very much like ROBOCOPY) to the designated data store and keep the content and metadata sound an in its original format. Accounts Traditionally, software will come shipped with default username and password credentials out of the box, and the Symantec ediscovery Platform is no different. These accounts are completely configurable and the passwords are able to updated, renamed, and changed on the fly as needed. Local Accounts Symantec ediscovery Platform comes configured out the box ready for immediate use with local accounts (listed below); these credentials are able to be renamed and passwords changed to fit the needs and policies of our customer environment. CWAppAdmin o One of the default accounts that comes as a default configuration of the Symantec ediscovery Platform. If using this local account, it MUST be a local administrator as it is used to run necessary ESA Services (see ESA service description above) and will need Page 9

12 admin level access locally on the appliance to access all of the necessary directories to ensure that each module and function within the Symantec ediscovery Platform will operate at optimum levels. The username and password are able to be configured to necessary security standards and policies as needed, and on the fly. CWPSTRetriever o One of the default accounts that comes as a default configuration of the Symantec ediscovery Platform. If using this local account, it MUST be a local administrator as it is used to run necessary ESA Services (see ESA service description above) and will need admin level access locally on the appliance to access all of the necessary directories to ensure that each module and function within the Symantec ediscovery Platform will operate at optimum levels. The username and password are able to be configured to necessary security standards and policies as needed, and on the fly. This account is typically used to run the ESAPSTRetriever service, as a requirement for the Symantec ediscovery Platform is to have a separate account running the ESAPST Crawler service to prevent MAPI profile corruption. IGCAdmin o This account is used typically used to allow the BRAVA IGC third party application to run in conjunction with the Symantec ediscovery Platform. o This account is also used to install the Symantec ediscovery Platform and all necessary updates and upgrades. This is necessary as during the installation phase, if IGC Services (BRAVA) are being updated this will allow for a very simple update of the application, without the need for running a separate installation package to update these credentials. o If the IGCAdmin credentials are to be used for running the IGC Services there are very specific steps that must be followed to update the username and password as if this account is assigned to run these services changes of the credentials must be done in a specific concentrated effort to ensure that services can be successfully restarted. Symantec ediscovery Platform default usernames o Superuser This is the out of the box application administrator account that comes with the Symantec ediscovery Platform. This should be utilized as the backup administrator Page 10

13 o account for the Symantec ediscovery Platform User Interface and cannot be deleted. The password is able to be updated to align with security standards and should be changed once the installation of the appliance is complete and management of the appliance is transferred to local staff. It is imperative that the account credentials are maintained to ensure that in case of loss of LDAP connection, the superuser can be used to login locally. This is considered to be like a windows local admin account and used in last case circumstances. Default Password These are available upon request to the support team, account representative, or system engineer. Domain Accounts Symantec ediscovery Platform has the capacity to use domain accounts within an existing infrastructure to increase scalability, provide better ease of management, and provide additional auditing with existing tools and infrastructure. Default Roles Symantec ediscovery Platform comes with a list of default roles which in most cases are suitable for the majority of uses. Custom roles can be created by the system administrator as required. Role Description Default Assigned Rights Case Admin Administrator-level access to one or more cases (includes case admin capabilities plus all case user rights) General Rights Allow analysis tags dashboard access Allow access to management charts Allow reports access Allow mobile access Document Access Rights Allow viewing Allow tagging Allow move or removing from folders Allow bulk tagging Allow smart tagging Allow viewing of prediction ranks Allow predictive coding actions Allow access to tag event comments Allow access to item notes Page 11

14 Allow redacting Prompt for reason code Allow tag history viewing Allow tag history searching Allow exporting Allow printing Allow native download Allow caching for review Allow searching and filtering by processing flags Case Administration Rights All case admin rights System Administrative Settings Case Manager Manager-level access to one or more cases (includes case admin capabilities (except source setup rights) plus all case user rights) General Rights Allow integrated analytics access Allow analysis tags dashboard access Allow access to management charts Allow reports access Allow mobile access Collection Rights Legal Holds Rights Allow Legal Hold access Legal Hold management Document Access Rights Allow viewing Allow tagging Allow move or removing from folders Allow bulk tagging Allow smart tagging Allow viewing of prediction ranks Allow predictive coding actions Allow access to tag event comments Allow access to item notes Allow redacting Prompt for reason code Allow tag history viewing Allow tag history searching Allow exporting Allow printing Allow native download Allow caching for review Page 12

15 Allow searching and filtering by processing flags Case Administration Rights Allow case status access Allow user management Allow activity report access Allow group and topic management Allow tag definition Allow folder setup Allow folder check-out management Allow production folder management Allow custodian management Allow participant management View exceptions Manage exceptions Allow OCR processing Other case management functions (e.g. jobs, batches, etc.) Access to all other case management functions not otherwise specified. This includes: batches, jobs, logs, and schedules. System Administrative Settings Case User Search, tagging, and print dashboard rights to one or more cases General Rights Allow analysis tags dashboard access Allow access to management charts Collection Rights Legal Holds Rights Document Access Rights Allow viewing Allow tagging Allow move or removing from folders Allow bulk tagging Allow viewing of prediction ranks Allow predictive coding actions Allow access to tag event comments Allow access to item notes Allow redacting Prompt for reason code Allow tag history viewing Allow tag history searching Allow printing Allow native download Allow caching for review Allow searching and filtering by processing flags Page 13

16 Case Administration Rights No case admin rights System Administrative Settings Collection Admin Administrator-level collection set management General Rights Allow integrated analytics access Allow reports access Allow mobile access Collection Rights Allow collections access Data map management Collections management Collection sets management Legal Holds Rights Document Access Rights Case Administration Rights No case admin rights System Administrative Settings Allow Case Home and All Cases Dashboard Access ediscovery Admin Administrator-level access to one or more cases as well as well as collection set management and integrated analytics General Rights Allow integrated analytics access Allow analysis tags dashboard access Allow access to management charts Allow reports access Allow mobile access Collection Rights Allow collections access Data map management Collections management Collection sets management Legal Holds Rights Allow Legal Hold access Legal Hold management Document Access Rights Allow viewing Allow tagging Allow move or removing from folders Allow bulk tagging Page 14

17 Allow smart tagging Allow viewing of prediction ranks Allow predictive coding actions Allow access to tag event comments Allow access to item notes Allow redacting Prompt for reason code Allow tag history viewing Allow tag history searching Allow exporting Allow printing Allow native download Allow caching for review Allow searching and filtering by processing flags Case Administration Rights All case admin rights Legal Hold Admin System Manager Administrator-level legal hold management Unrestricted rights to manage entire Symantec ediscovery Platform system, including administrator-level access to all cases System Administrative Settings Allow Case Home and All Cases Dashboard Access General Rights Allow integrated analytics access Allow mobile access Collection Rights Legal Holds Rights Allow Legal Hold access Legal Hold management Document Access Rights Case Administration Rights No case admin rights System Administrative Settings Allow Case Home and All Cases Dashboard Access General Rights Allow integrated analytics access Allow analysis tags dashboard access Allow access to management charts Allow reports access Allow mobile access Collection Rights Allow collections access Data map management Collections management Collection sets management Legal Holds Rights Page 15

18 Allow Legal Hold access Legal Hold management Document Access Rights Allow viewing Allow tagging Allow move or removing from folders Allow bulk tagging Allow smart tagging Allow viewing of prediction ranks Allow predictive coding actions Allow access to tag event comments Allow access to item notes Allow redacting Prompt for reason code Allow tag history viewing Allow tag history searching Allow exporting Allow printing Allow native download Allow caching for review Allow searching and filtering by processing flags Case Administration Rights All case admin rights System Administrative Settings Allow Case Home and All Cases Dashboard Access Allow system management Allow support access Allow new case creation, case backup, restore, deletion, template creation Allow collections and data map backup, restore Allow user management Allow admin user and role management Table 3 Page 16

19 About Symantec: Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at For specific country offices and contact numbers, please visit our Web site: Symantec Corporation World Headquarters 350 Ellis Street Mountain View, CA USA +1 (650) (800) Copyright 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Enterprise Vault Whitepaper Move Archive Feature Overview

Enterprise Vault Whitepaper Move Archive Feature Overview Enterprise Vault Whitepaper Move Archive Feature Overview This document provides an overview of the Enterprise Vault Move Archive feature This document applies to the following version(s) of :

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

Enterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage

Enterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage Enterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage This document provides background and guidance on how configure Symantec Enterprise Vault with generic Network Attached

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Direct virtual machine creation from backup with BMR

Direct virtual machine creation from backup with BMR NETBACKUP 7.6 FEATURE BRIEFING DIRECT VIRTUAL MACHINE CREATION FROM BACKUP WITH BMR NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,

More information

Enterprise Vault 11 Feature Briefing

Enterprise Vault 11 Feature Briefing Enterprise Vault 11 Feature Briefing Enterprise Vault SCOM Enhancements This document is about the new Enterprise Vault SCOM enhancements introduced in Enterprise Vault 11. If you have any feedback or

More information

Enterprise Vault 10 Feature Briefing

Enterprise Vault 10 Feature Briefing Enterprise Vault 10 Feature Briefing Nirvanix Cloud Storage This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the

More information

Enterprise Vault Whitepaper

Enterprise Vault Whitepaper Enterprise Vault Whitepaper Enterprise Vault and Microsoft Office 365 This document outlines the integration of the offsite Office 365 email service with an on-premises Enterprise Vault solution. If you

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who

More information

FreeFlow Core, Version 4.0 August 2014 702P02837. Xerox FreeFlow Core Security Guide

FreeFlow Core, Version 4.0 August 2014 702P02837. Xerox FreeFlow Core Security Guide FreeFlow Core, Version 4.0 August 2014 702P02837 2014 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and FreeFlow are trademarks of Xerox Corporation in the United States and/or other

More information

EV 10.0.3 Feature Briefing

EV 10.0.3 Feature Briefing EV 10.0.3 Feature Briefing Exchange Server 2013 OWA Support This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

This course includes practical hands-on exercises that enable you to test your new skills and begin to use those skills in a working environment.

This course includes practical hands-on exercises that enable you to test your new skills and begin to use those skills in a working environment. Symantec Clearwell ediscovery Platform 7.x: Administration Day(s): 5 Course Code: HA0429 Overview The Symantec Clearwell ediscovery Platform 7.x: Administration course is designed for the network, IT security,

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

Filr 2.0 Administration Guide. April 2016

Filr 2.0 Administration Guide. April 2016 Filr 2.0 Administration Guide April 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy,

More information

Getting Started With Halo for Windows

Getting Started With Halo for Windows Getting Started With Halo for Windows For CloudPassage Halo Protecting your Windows servers in a public or private cloud is much easier and more secure with CloudPassage Halo for Windows. Halo for Windows

More information

Symantec Clearwell ediscovery Platform. Upgrade Overview

Symantec Clearwell ediscovery Platform. Upgrade Overview Symantec Clearwell ediscovery Platform Upgrade Overview Upgrade Overview PAGE: 2 Clearwell ediscovery Platform : Upgrade Overview The software described in this book is furnished under a license agreement

More information

Symantec Mail Security for Domino

Symantec Mail Security for Domino Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database

More information

Upgrade to Webtrends Analytics 8.7: Best Practices

Upgrade to Webtrends Analytics 8.7: Best Practices Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.

More information

Symantec Enterprise Vault for Microsoft Exchange Server

Symantec Enterprise Vault for Microsoft Exchange Server Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Symantec Mail Security for Microsoft Exchange Getting Started Guide

Symantec Mail Security for Microsoft Exchange Getting Started Guide Symantec Mail Security for Microsoft Exchange Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Barracuda Message Archiver

Barracuda Message Archiver Barracuda Networks Technical Documentation Barracuda Message Archiver Administrator s Guide Version 3.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2012, Barracuda Networks, Inc. www.barracuda.com

More information

RazorSafe Mail Archiving Appliances

RazorSafe Mail Archiving Appliances RazorSafe Mail Archiving Appliances Product Overview Oct 2012 INTRODUCING RAZORSAFE Copyright (C) 2012 2 RAZORSAFE Overview Our fastest, most scalable and HIGHEST CAPACITY mail archiving appliances ever!

More information

Barracuda Message Archiver Vx Deployment. Whitepaper

Barracuda Message Archiver Vx Deployment. Whitepaper Barracuda Message Archiver Vx Deployment Whitepaper Document Scope This document provides guidance on designing and deploying Barracuda Message Archiver Vx on VMware vsphere Document Scope, and Microsoft

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

visionapp Remote Desktop 2010 (vrd 2010)

visionapp Remote Desktop 2010 (vrd 2010) visionapp Remote Desktop 2010 (vrd 2010) Convenient System Management P roduct Information www.vrd2010.com Inhalt 1 Introduction... 1 2 Overview of Administration Tools... 1 2.1 RDP Administration Tools...

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should

More information

EMC Documentum Connector for Microsoft SharePoint

EMC Documentum Connector for Microsoft SharePoint EMC Documentum Connector for Microsoft SharePoint Version 7.1 Installation Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 2013-2014

More information

IceWarp to IceWarp Server Migration

IceWarp to IceWarp Server Migration IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone

More information

Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker

Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker White Paper Publication Date: June 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Overview EventTracker

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

Symantec ediscovery Platform, powered by Clearwell

Symantec ediscovery Platform, powered by Clearwell Symantec ediscovery Platform, powered by Clearwell Data Sheet: Archiving and ediscovery The brings transparency and control to the electronic discovery process. From collection to production, our workflow

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Application Server Installation

Application Server Installation Application Server Installation Guide ARGUS Enterprise 11.0 11/25/2015 ARGUS Software An Altus Group Company Application Server Installation ARGUS Enterprise Version 11.0 11/25/2015 Published by: ARGUS

More information

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc

Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc Configuring Symantec AntiVirus for Hitachi High-performance NAS Platform, powered by BlueArc The software described

More information

Virtual Web Appliance Setup Guide

Virtual Web Appliance Setup Guide Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing

More information

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2 DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP

Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP Configuring Symantec Protection Engine for Network Attached Storage 7.5 for NetApp Data ONTAP. The software

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Burst Technology bt-loganalyzer SE

Burst Technology bt-loganalyzer SE Burst Technology bt-loganalyzer SE Burst Technology Inc. 9240 Bonita Beach Rd, Bonita Springs, FL 34135 CONTENTS WELCOME... 3 1 SOFTWARE AND HARDWARE REQUIREMENTS... 3 2 SQL DESIGN... 3 3 INSTALLING BT-LOGANALYZER...

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

RealPresence Platform Director

RealPresence Platform Director RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director

More information

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2 JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014

www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010

Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install

More information

An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance

An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance An Oracle Technical White Paper May 2015 How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing Kaspersky

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Barracuda Message Archiver Administrator s Guide

Barracuda Message Archiver Administrator s Guide Barracuda Message Archiver Administrator s Guide Version 1.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2008, Barracuda

More information

How To Manage Storage With Novell Storage Manager 3.X For Active Directory

How To Manage Storage With Novell Storage Manager 3.X For Active Directory www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect

More information

NTP Software VFM Administration Web Site for EMC Atmos

NTP Software VFM Administration Web Site for EMC Atmos NTP Software VFM Administration Web Site for EMC Atmos User Manual Revision 1.1 - July 2015 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective.

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

JAMF Software Server Installation Guide for Linux. Version 8.6

JAMF Software Server Installation Guide for Linux. Version 8.6 JAMF Software Server Installation Guide for Linux Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

An Oracle Technical White Paper January 2014. How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance

An Oracle Technical White Paper January 2014. How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance An Oracle Technical White Paper January 2014 How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Attix5 Pro Plug-ins. V6.2 User Manual. Cover. for Microsoft Windows. Your guide to installing and using Attix5 Pro plug-ins. Last updated: 2011/10

Attix5 Pro Plug-ins. V6.2 User Manual. Cover. for Microsoft Windows. Your guide to installing and using Attix5 Pro plug-ins. Last updated: 2011/10 Attix5 Pro Plug-ins V6.2 User Manual Cover for Microsoft Windows Your guide to installing and using Attix5 Pro plug-ins. Last updated: 2011/10 SERVER EDITION V6.0 for MICROSOFT WINDOWS Copyright Notice

More information

QuickStart Guide for Managing Computers. Version 9.2

QuickStart Guide for Managing Computers. Version 9.2 QuickStart Guide for Managing Computers Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software

More information

Virtual Managment Appliance Setup Guide

Virtual Managment Appliance Setup Guide Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy

More information

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes Email Security SonicWALL Email Security 7.3.2 Appliance Release Notes System Compatibility SonicWALL Email Security 7.3.2 is supported on the following SonicWALL Email Security appliances: SonicWALL Email

More information

Cloud Attached Storage 5.0

Cloud Attached Storage 5.0 Release Notes Cloud Attached Storage 5.0 March 2015 2015 Cloud Attached Storage 5.0 Release Notes 1 1 Release Contents Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document

More information

Pre-Installation Guide

Pre-Installation Guide Pre-Installation Guide Version 8.2 December 11, 2015 For the most recent version of this document, visit our documentation website. Table of Contents 1 Pre-installation overview 4 2 Windows updates 4 3

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup. Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page

More information

Benefits of upgrading to Enterprise Vault 11

Benefits of upgrading to Enterprise Vault 11 Benefits of upgrading to Vault 11 This document describes the new s and benefits that are available to existing customers who upgrade to Vault 11. Upgrading to the latest version can provide benefits in

More information

ADS Integration Guide

ADS Integration Guide ADS Integration Guide Document version 9402-1.0-18/10/2006 Cyberoam ADS Integration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of

More information

SOA Software: Troubleshooting Guide for Agents

SOA Software: Troubleshooting Guide for Agents SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,

More information

Secure Messaging Server Console... 2

Secure Messaging Server Console... 2 Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

Trend Micro Worry- Free Business Security 8.0. 1 st time setup Tips & Tricks

Trend Micro Worry- Free Business Security 8.0. 1 st time setup Tips & Tricks Trend Micro Worry- Free Business Security 8.0 WFBS installation best practise, preparations and how to Preparation for 2008 Server IIS: Configuring the required Internet Information Services (IIS) roles

More information

Data Security and Governance with Enterprise Enabler

Data Security and Governance with Enterprise Enabler Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Asset Discovery with Symantec Control Compliance Suite

Asset Discovery with Symantec Control Compliance Suite WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE............. SUITE........................... Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Backup Exec 2010: Archiving Options

Backup Exec 2010: Archiving Options Backup Exec 2010: Archiving Options White Paper: Backup Exec 2010: Archiving Options Backup Exec 2010: Archiving Options Contents Introduction............................................................................................

More information

Upgrade Guide. Upgrading to EventTracker v6.0. Upgrade Guide. 6990 Columbia Gateway Drive, Suite 250 Publication Date: Sep 20, 2007.

Upgrade Guide. Upgrading to EventTracker v6.0. Upgrade Guide. 6990 Columbia Gateway Drive, Suite 250 Publication Date: Sep 20, 2007. Upgrading to EventTracker v6.0 Upgrade Guide 6990 Columbia Gateway Drive, Suite 250 Publication Date: Sep 20, 2007 Columbia MD 21046 877.333.1433 Abstract The purpose of this document is to help users

More information

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2 JAMF Software Server Installation and Configuration Guide for OS X Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

Propalms TSE Quickstart Guide

Propalms TSE Quickstart Guide Propalms TSE Quickstart Guide TSE 7.0 Propalms Ltd. Published February 2013 Overview Note: This guide is based on installation on Windows Server 2012. However, it is also applicable if you are using a

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0. Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Cloud Storage Backup for Storage as a Service with AT&T

Cloud Storage Backup for Storage as a Service with AT&T WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,

More information