Downloads all known user accounts for the associated account along with any previously saved MCP Username alias data.

Size: px
Start display at page:

Download "Downloads all known user accounts for the associated account along with any previously saved MCP Username alias data."

Transcription

1 McAfee Client Proxy Setup Guide Revision A User Identification Utility Introduction The McAfee Client Proxy User Identification Utility ( mcpuseridentification.exe ) allows you to automatically map existing SaaS Web Protection Service users with the user name aliases used for the McAfee Client Proxy (MCP). The utility connects to the SaaS Web Control Console using credentials for a Customer Administrator. It downloads existing account addresses for existing users and matches them to Windows users in the local Active Directory system. The resulting file is uploaded into the SaaS Web Control Console to create the link between account and username for MCP authentication purposes. McAfee Client Proxy User Identification Utility automatically completes the following functions. Connects to the Control Console URL using the supplied Customer Administrator credentials. Downloads all known user accounts for the associated account along with any previously saved MCP Username alias data. Performs Active Directory look ups for all empty MCP Username Aliases (or all MCP Aliases if full refresh was enabled). Uploads the updated data back to the same Control Console. System Requirements Microsoft.NET 4.0 or greater must be installed on Windows. The Windows computer must have access to the local Active Directory server. Run the utility To use the utility, run an executable file on a computer and connect to the Web Protection Control Console. Task 1 From the Control Console, open Web Protection Policies McAfee Client Proxy Policies. 2 Click the MCP User Idnetification Utility link. This launches the.zip file to MCP executable. 3 Open the.zip file and copy the mcpuseridentification.exe file to the computer. 4 On the computer, double click mcpuseridentification.exe. 1

2 5 Enter the Customer Administrator logon credentials. 6 Optionally supply a Default Domain NetBIOS Name. 7 Optionally decide whether to perform a full refresh. 8 Click Connect. Optional form settings These additional options are provided on the form that is displayed to the user when they run this utility, but they need not be changed in most cases. They are made available for exceptional situations. Default Domain NetBIOS Name The Domain NetBIOS Name (Windows domain) is automatically queried along with every domain look up attempt. For all users who have matching SaaS and Active Directory accounts, this is ideal. However, when an Active Directory account does not exist for a specific SaaS user, an MCP Username Alias can be dynamically constructed for the missing user by affixing this Default Domain NetBIOS Name along with a back slash and the local part portion of their SaaS account name. This feature is optional and can be disabled. For Example: Presume a user sets the Default Domain NetBIOS Name to SAMPLE. Then, if the utility searches a (fictional) SaaS user, saasadmin@sample.domain.tld, who does not have an Active Directory account, the dynamic MCP Username Alias that is constructed becomes SAMPLE\saasadmin. 1 The Default Domain NetBIOS Name is automatically set to the NetBIOS name of the domain to which the current user has authenticated when this utility is loaded. 2 Delete the Default Domain NetBIOS Name value to prevent Best Guess matching. When this value is empty, SaaS accounts that have no match in Active Directory will not be given dynamically generated MCP Username Aliases. Optional configuration file An optional XML configuration file is supported by this utility. When not present, the utility functions correctly using built in settings. When present, this configuration file enables users to configure the utility with preset values for the Customer Administrator logon name and password as well as any number of Control Console URLs which the utility attempts to access whenever it downloads the user's MCP account data. This configuration file must be named mcpuseridentification.exe.config and it must exist in the same directory as the mcpuseridentification.exe. Configuration File Sample The following is the default content of the optional XML configuration file: <?xml version="1.0" encoding="utf 8"?> <configuration> <configsections> <sectiongroup name="usersettings" type="system.configuration.usersettingsgroup, System, Version= , Culture=neutral, PublicKeyToken=b77a5c561934e089" > <section name="mcpuseridentification.properties.settings" type="system.configuration.clientsettingssection, System, Version= , Culture=neutral, 2

3 PublicKeyToken=b77a5c561934e089" allowexedefinition="machinetolocaluser" requirepermission="false" /> </sectiongroup> <sectiongroup name="applicationsettings" type="system.configuration.applicationsettingsgroup, System, Version= , Culture=neutral, PublicKeyToken=b77a5c561934e089" > <section name="mcpuseridentification.properties.settings" type="system.configuration.clientsettingssection, System, Version= , Culture=neutral, PublicKeyToken=b77a5c561934e089" requirepermission="false" /> </sectiongroup> </configsections> <usersettings> <mcpuseridentification.properties.settings> <setting name="logon " serializeas="string"> <value /> </setting> <setting name="logonpassword" serializeas="string"> <value /> </setting> </mcpuseridentification.properties.settings> </usersettings> <applicationsettings> <mcpuseridentification.properties.settings> <setting name="consoleaddresses" serializeas="xml"> <value> <ArrayOfString xmlns:xsi=" instance" xmlns:xsd=" <string> <string> </ArrayOfString> </value> </setting> </mcpuseridentification.properties.settings> </applicationsettings> </configuration> Matching algorithm The matching algorithm supports a variety of options that support various Active Directory configurations. Active Directory supports advanced concepts like domain aliasing (called UPNSuffixes in Active Directory terminology). As a result, the following overarching algorithm is used in sequence to find MCP Username Alias data for each SaaS Account (each of these methods are defined below): 1 Direct Match 2 Domain Permutation Match 3 Domain Alias Match 4 Best Guess In all except Best Guess, the following Active Directory fields are searched no matter which version of Active Directory is used: 1 userprincipalname (the Windows 2000 style Domain login name for the user) 2 mail (the optional e mail field that Windows Administrators can provide for each user) 3 proxyaddresses (the set of Microsoft Exchange e mail addresses and e mail aliases that exist for each user) 3

4 Upon finding a match (excluding the Best Guess method), the MCP Username Alias is constructed using the configured NetBIOS Name for the Active Directory domain that contains the matching record. A Windows NT style logon name (in DomainNetBIOSname\UserName form) is then generated. This step is faster in Windows Server 2008 environments because this Windows NT style logon name is returned by the search request. All Active Directory searches are initially performed at the Global Catalog level and may be automatically delegated to any specific Forest or Tree level by the Global Catalog controller. These delegations are honored by this utility during its search, so the very best possible match is always sought. For all Active Directory search methods against Forests with more than one domain, there is always the possibility of finding the wrong Active Directory user account when the same local part exists in more than one domain. This utility tries to find the best possible match first, then each other somewhat less reliable method progressively. In most cases, this results in total success. In rare, edge cases, this can result in a small number of mismatches in scenarios where john.doe@domain1.tld and john.doe@domain2.tld exist in the same Forest, are actually two different people, and the customer is using a single fake domain with the SaaS account. To avoid this mismatch for the like named users, you should add unique e mail addresses (using their fake SaaS domain name) for the affected users to their respective Active Directory records (in the mail field) and use those unique e mail addresses as their SaaS account names. Direct match A direct match occurs when your SaaS account uses the same SaaS domain name as the local Active Directory domain name and the SaaS user account names match their local Active Directory account names. In this scenario, every SaaS user maps directly to the userprincipalname value of local Active Directory user accounts without any guesswork. For Example : Suppose you have a fictional customer that has a SaaS account with domain real.domain.tld and has a SaaS user with name real.user. Suppose also that the local Active Directory domain name is named, real.domain.tld and you diligently create SaaS users that exactly match their real local users. When you run this utility, the Active Directory user, real.user@real.domain.tld will be found, resulting in a direct match. Domain permutation match When the direct match method fails to find a local Windows account, this utility takes the local part of the SaaS account name and substitutes the domain name with every Active Directory domain name that is accessible in the nearest Global Catalog. Active Directory is then searched with each substitution until a match is found. This is likely to succeed in cases where the customer has registered a fake SaaS domain but all of their SaaS user accounts share the same local part as their intended Active Directory user accounts. For Example : Suppose you have a complex Active Directory Forest with several domains (with several Trees). Presume that two of these domain names are private.domain.1.tld and private.domain.2.tld. Let real.user.1 be a real user in private.domain.1.tld and real.user.2 be a real user in private.domain.2.tld. Suppose further that you did not register these private domains with our SaaS service. Instead of private.domain.1.tld and private.domain.2.tld, you simply have one SaaS domain, named fake.domain.tld. Yet all of your users have been granted SaaS accounts using their real user names ( real.user.1 and real.user.2 ), resulting in SaaS user names of, real.user.1@fake.domain.tld and real.user.2@fake.domain.tld. When you run the MCP User Identification utility, all of these real users on the fake domain are matched to real Active Directory accounts. This is possible because the domain portion of their SaaS accounts, fake.domain.tld, is dropped (when the direct match method fails) and substituted with 4

5 each of the real local domains, private.domain.1.tld and private.domain.2.tld. This results in searching Active Directory for and and finding matches. Domain alias match When both the direct match and domain permutation match methods fail to find Active Directory accounts, all registered Active Directory domain suffixes are then used to search for matches. This method is identical to the domain permutation match method except that UPNSuffix entries are used instead of domain names. This enables customers to match SaaS domains with local Active Directory domains that do not otherwise match, yet tie them together in a predictable way. For Example : Suppose you have a single local Active Directory domain, ad.domain.tld. but you use a different, fake SaaS domain, like fake.saas.domain.tld. You can assign the UPNSuffix, fake.saas.domain.tld to your domain controller for ad.domain.tld. Upon doing so, you are then able to get successful Active Directory searches with the MCP User Identification utility (as long as the local part portion of their SaaS accounts match the local part portion of their Active Directory accounts). Best-Guess When all else fails, a fictional MCP Username Alias is created for the SaaS account (unless Default Domain NetBIOS Name is empty). This fictional account is dynamically created by prefixing the Default Domain NetBIOS Name with a back slash to the local part portion of the unmatched SaaS account name. See the example in the Default Domain NetBIOS Name section above for more information. Note that when the Default NetBIOS Domain Name is empty, this step is skipped and dynamic MCP Aliases are not generated. Avoiding duplicate resolution Whenever more than one SaaS account resolves to the same Active Directory account, only the first encountered SaaS account gets an MCP Username Alias. All others are set to empty strings (no MCP Username Alias). SaaS accounts are processed in alphabetical order, so it should be easy to predict the outcome. To avoid duplication, you can try any of the following: Disable Best Guess matching by deleting the Default Domain NetBIOS Name. Reduce the likelihood of duplication by manually creating fictitious e mail address records in all but one of the affected users' Active Directory records and use those fictitious addresses as their SaaS account names (as discussed above in the Note under Matching Algorithm). Change the affected users' Active Directory account names so that the resulting names are sufficiently unique (such that no two accounts have the same local part in their User Principal Names). Ensure that the Active Directory SAM Account Name for every user in the Forest is unique. Delete any inactive, duplicate users from Active Directory and/or the SaaS service. 5

6 Copyright 2013 McAfee, Inc. Do not copy without permission. McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. 6 A00

About Email Archiving for Microsoft Exchange Server

About Email Archiving for Microsoft Exchange Server Setup Guide Revision A McAfee SaaS Email Archiving Service Configuring Microsoft Exchange Server 2013 About Email Archiving for Microsoft Exchange Server The McAfee SaaS Email Archiving service stores

More information

AVG Business Secure Sign On Active Directory Quick Start Guide

AVG Business Secure Sign On Active Directory Quick Start Guide AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual TIBCO Spotfire Automation Services 6.5 Installation and Deployment Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

How To - Implement Single Sign On Authentication with Active Directory

How To - Implement Single Sign On Authentication with Active Directory How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory

More information

Security Assertion Markup Language (SAML) Site Manager Setup

Security Assertion Markup Language (SAML) Site Manager Setup Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and

More information

Using LDAP for User Authentication

Using LDAP for User Authentication Using LDAP for User Authentication Product version: 4.60 Document version: 1.0 Document creation date: 31-03-2006 Purpose This technical note describes how to configure and set up EPiServer to use an LDAP

More information

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

SPHOL300 Synchronizing Profile Pictures from On-Premises AD to SharePoint Online

SPHOL300 Synchronizing Profile Pictures from On-Premises AD to SharePoint Online SPHOL300 Synchronizing Profile Pictures from On-Premises AD to SharePoint Online Contents Overview... 3 Introduction... 3 The Contoso Ltd. Scenario... 4 Exercise 1: Member Server Sign up for Office 365

More information

Microsoft Dynamics CRM Adapter for Microsoft Dynamics GP

Microsoft Dynamics CRM Adapter for Microsoft Dynamics GP Microsoft Dynamics Microsoft Dynamics CRM Adapter for Microsoft Dynamics GP May 2010 Find updates to this documentation at the following location. http://go.microsoft.com/fwlink/?linkid=162558&clcid=0x409

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks

More information

Quality Center LDAP Guide

Quality Center LDAP Guide Information Services Quality Assurance Quality Center LDAP Guide Version 1.0 Lightweight Directory Access Protocol( LDAP) authentication facilitates single sign on by synchronizing Quality Center (QC)

More information

Polar Help Desk Installation Guide

Polar Help Desk Installation Guide Polar Help Desk Installation Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Integrating Webalo with LDAP or Active Directory

Integrating Webalo with LDAP or Active Directory Integrating Webalo with LDAP or Active Directory Webalo can be integrated with an external directory to identify valid Webalo users and then authenticate them to the Webalo appliance. Integration with

More information

AVG Business SSO Connecting to Active Directory

AVG Business SSO Connecting to Active Directory AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud

More information

How to Install the Active Directory Domain Services (AD DS) Role in Windows Server 2008 R2 and Promote a Server to a Domain Controller

How to Install the Active Directory Domain Services (AD DS) Role in Windows Server 2008 R2 and Promote a Server to a Domain Controller How to Install the Active Directory Domain Services (AD DS) Role in Windows Server 2008 R2 and Promote a Server to a Domain Controller I am not responsible for your actions or their outcomes, in any way,

More information

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc. Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

WatchDox for Windows User Guide. Version 3.9.0

WatchDox for Windows User Guide. Version 3.9.0 Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or

More information

IIS SECURE ACCESS FILTER 1.3

IIS SECURE ACCESS FILTER 1.3 OTP SERVER INTEGRATION MODULE IIS SECURE ACCESS FILTER 1.3 Copyright, NordicEdge, 2006 www.nordicedge.se Copyright, 2006, Nordic Edge AB Page 1 of 14 1 Introduction 1.1 Overview Nordic Edge One Time Password

More information

Hosted Exchange 2010

Hosted Exchange 2010 Hosted Exchange 2010 Introduction The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender provides enterprise grade Exchange 2010

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Quick Start Guide. IT Management On-Demand

Quick Start Guide. IT Management On-Demand 1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2003

Setup Guide. Email Archiving for Microsoft Exchange Server 2003 Setup Guide Email Archiving for Microsoft Exchange Server 2003 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

Email Protection for your account

Email Protection for your account User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding

More information

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Setting up Hyper-V for 2X VirtualDesktopServer Manual Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Creating a Content Group and assigning the Encrypt action to the Group.

Creating a Content Group and assigning the Encrypt action to the Group. Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

EventTracker: Support to Non English Systems

EventTracker: Support to Non English Systems EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to

More information

User Management Tool 1.6

User Management Tool 1.6 User Management Tool 1.6 2014-12-08 23:32:48 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.6... 3 ShareFile User Management

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

Configuring Controller 8.2 to use Active Directory authentication

Configuring Controller 8.2 to use Active Directory authentication Proven Practice Configuring Controller 8.2 to use Active Directory authentication Product(s): Controller 8.2 Area of Interest: Infrastructure Configuring Controller 8.2 to use Active Directory authentication

More information

Connector for Microsoft Dynamics Configuration Guide for Microsoft Dynamics SL

Connector for Microsoft Dynamics Configuration Guide for Microsoft Dynamics SL Microsoft Dynamics Connector for Microsoft Dynamics Configuration Guide for Microsoft Dynamics SL Revised August, 2012 Find updates to this documentation at the following location: http://www.microsoft.com/download/en/details.aspx?id=10381

More information

User Management Tool 1.5

User Management Tool 1.5 User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management

More information

HELP DOCUMENTATION UMRA REFERENCE GUIDE

HELP DOCUMENTATION UMRA REFERENCE GUIDE HELP DOCUMENTATION UMRA REFERENCE GUIDE Copyright 2013, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means without

More information

CRM to Exchange Synchronization

CRM to Exchange Synchronization CRM to Exchange Synchronization Product Registration Instructions VERSION 2.0 DATE PREPARED: 1/1/2013 DEVELOPMENT: BRITE GLOBAL, INC. 2012 Brite Global, Incorporated. All rights reserved. The information

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Management Center. Installation and Upgrade Guide. Version 8 FR4

Management Center. Installation and Upgrade Guide. Version 8 FR4 Management Center Installation and Upgrade Guide Version 8 FR4 APPSENSE MANAGEMENT CENTER INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2012 All rights reserved. part of this document may be produced

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM Abstract This paper explains how to setup Active directory service on windows server 2008.This guide also explains about how to install

More information

Administration Guide. . All right reserved. For more information about Specops Password Sync and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Password Sync and other Specops products, visit www.specopssoft. Administration Guide. All right reserved. For more information about Specops Password Sync and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Sync is a trademark

More information

Weston Public Schools Virtual Desktop Access Instructions

Weston Public Schools Virtual Desktop Access Instructions Instructions for connecting to the Weston Schools Virtual Desktop Environment Notes: You will have to have administrator permission on your computer in order to install a VMWare Client application which

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

FTP, IIS, and Firewall Reference and Troubleshooting

FTP, IIS, and Firewall Reference and Troubleshooting FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the

More information

Important Information

Important Information June 2015 Important Information The following information applies to Proofpoint Essentials US1 data center only. User Interface Access https://usproofpointessentials.com MX Records mx1-usppe-hosted.com

More information

Windows XP Exchange Client Installation Instructions

Windows XP Exchange Client Installation Instructions WINDOWS XP with Outlook 2003 or Outlook 2007 1. Click the Start button and select Control Panel: 2. If your control panel looks like this: Click Switch to Classic View. 3. Double click Mail. 4. Click show

More information

Use Enterprise SSO as the Credential Server for Protected Sites

Use Enterprise SSO as the Credential Server for Protected Sites Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured

More information

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com

How To Manage Your Spam On Graymail On Pc Or Macodeo.Com User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related

More information

IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager

IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager Rational Insight and Rational Asset Manager...4 Prerequisites...5 Configuring the XML data configuration for Rational Asset

More information

TIBCO Spotfire Automation Services Installation and Configuration

TIBCO Spotfire Automation Services Installation and Configuration TIBCO Spotfire Automation Services Installation and Configuration Software Release 7.0 February 2015 Updated March 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt. USC Marshall School of Business Academic Information Services Configuring Outlook 2010 RPC Over HTTP Protocol For Windows 7 Home Computers or Wireless Laptops The steps in this document cover how to configure

More information

Richmond Systems. Self Service Portal

Richmond Systems. Self Service Portal Richmond Systems Self Service Portal Contents Introduction... 4 Product Overview... 4 What s New... 4 Configuring the Self Service Portal... 6 Web Admin... 6 Launching the Web Admin Application... 6 Setup

More information

Virto Active Directory Service for SharePoint. Release 4.1.2. Installation and User Guide

Virto Active Directory Service for SharePoint. Release 4.1.2. Installation and User Guide Virto Active Directory Service for SharePoint Release 4.1.2 Installation and User Guide 2 Table of Contents OVERVIEW... 3 SYSTEM REQUIREMENTS... 4 OPERATING SYSTEM... 4 SERVER... 4 BROWSER... 5 INSTALLATION...

More information

Security Provider Integration Kerberos Authentication

Security Provider Integration Kerberos Authentication Security Provider Integration Kerberos Authentication 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are

More information

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the

More information

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable

More information

CLEO NED Active Directory Integration. Version 1.2.0

CLEO NED Active Directory Integration. Version 1.2.0 CLEO NED Active Directory Integration Version 1.2.0 CLEO NED Active Directory Integration Manual v1.2.0 Copyright c 2010 Lancaster University Network Services Limited. All rights reserved. Microsoft, Windows,

More information

Propalms TSE Quickstart Guide

Propalms TSE Quickstart Guide Propalms TSE Quickstart Guide TSE 7.0 Propalms Ltd. Published February 2013 Overview Note: This guide is based on installation on Windows Server 2012. However, it is also applicable if you are using a

More information

Installing Microsoft Outlook on a Macintosh. This document explains how to download, install and configure Microsoft Outlook on a Macintosh.

Installing Microsoft Outlook on a Macintosh. This document explains how to download, install and configure Microsoft Outlook on a Macintosh. Reference : USER184 Issue date : December 2002 Revision date : September 2007 Classification : Software Originator : Hugh Burt REVISED DOCUMENT Installing Microsoft Outlook on a Macintosh This document

More information

CA VPN Client. User Guide for Windows 1.0.2.2

CA VPN Client. User Guide for Windows 1.0.2.2 CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

Vyapin Office 365 Management Suite

Vyapin Office 365 Management Suite Vyapin Office 365 Management Suite Last Updated: May 2015 Copyright 2015 Vyapin Software Systems Private Limited. All rights reserved. This document is being furnished by Vyapin Software Systems Private

More information

WatchDox for Windows. User Guide. Version 3.9.5

WatchDox for Windows. User Guide. Version 3.9.5 WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to

More information

CA Spectrum and CA Embedded Entitlements Manager

CA Spectrum and CA Embedded Entitlements Manager CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

Module 4: Implementing User, Group, and Computer Accounts

Module 4: Implementing User, Group, and Computer Accounts Module 4: Implementing User, Group, and Computer Accounts Contents Overview 1 Lesson: Introduction to Accounts 2 Lesson: Creating and Managing Multiple Accounts 8 Lesson: Implementing User Principal Name

More information

SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit

SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit Note: SecureAware version 3.7 and above contains all files and setup configuration needed to use Microsoft IIS as a front end web server. Installing

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS) SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services

More information

Background Deployment 3.1 (1003) Installation and Administration Guide

Background Deployment 3.1 (1003) Installation and Administration Guide Background Deployment 3.1 (1003) Installation and Administration Guide 2010 VoIP Integration March 14, 2011 Table of Contents Product Overview... 3 Personalization... 3 Key Press... 3 Requirements... 4

More information

Managing an Active Directory Infrastructure O BJECTIVES

Managing an Active Directory Infrastructure O BJECTIVES O BJECTIVES This chapter covers the following Microsoft-specified objectives for the Planning and Implementing an Active Directory Infrastructure and Managing and Maintaining an Active Directory Infrastructure

More information

Setup Guide. Email Archiving for Microsoft Exchange Server 2010

Setup Guide. Email Archiving for Microsoft Exchange Server 2010 Setup Guide Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

AD RMS Step-by-Step Guide

AD RMS Step-by-Step Guide AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to

More information

How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication

How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010

Setup Guide Revision B. McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 Setup Guide Revision B McAfee SaaS Email Archiving for Microsoft Exchange Server 2010 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

How to set up Outlook Anywhere on your home system

How to set up Outlook Anywhere on your home system How to set up Outlook Anywhere on your home system The Outlook Anywhere feature for Microsoft Exchange Server 2007 allows Microsoft Office Outlook 2007 and Outlook 2003 users to connect to their Outlook

More information

Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles

Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles Appendix 1 Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles This section explains how you use the Cloud Management Suite installation wizard for the following purposes: To

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

SharePoint AD Information Sync Installation Instruction

SharePoint AD Information Sync Installation Instruction SharePoint AD Information Sync Installation Instruction System Requirements Microsoft Windows SharePoint Services V3 or Microsoft Office SharePoint Server 2007. License management Click the trial link

More information

Connecting to Manage Your MS SQL Database

Connecting to Manage Your MS SQL Database Using MS SQL databases HOWTO Copyright 2001 Version 1.0 This HOWTO describes how to connect to a MS SQL database and how to transfer data to an SQL server database. Table of Contents Connecting to Manage

More information

Connect for Dragon Medical 360 Network Edition. Administrator Guide

Connect for Dragon Medical 360 Network Edition. Administrator Guide Connect for Dragon Medical 360 Network Edition Administrator Guide Copyright 2013. Connect for Dragon Medical 360 Network Edition. Nuance Communications, Inc. has patents or pending patent applications

More information

How To Use Directcontrol With Netapp Filers And Directcontrol Together

How To Use Directcontrol With Netapp Filers And Directcontrol Together Application Note Using DirectControl with Network Appliance Filers Published: June 2006 Abstract This Application Note describes the integration between Network Appliance servers and Centrify DirectControl

More information

Active Directory Validation - User Guide

Active Directory Validation - User Guide Composite 2015-12-07 Composite A/S Nygårdsvej 16 DK-2100 Copenhagen Phone +45 3915 7600 www.composite.net Contents 1 INTRODUCTION... 3 1.1 Who Should Read This Guide? 3 1.2 Getting Started 4 2 CREATING

More information

Active Directory Provider User s Guide

Active Directory Provider User s Guide Active Directory Provider User s Guide Mike Horton Version 01.00.03 Last Updated: December 28, 2007 Category: DotNetNuke v4.6.0 and greater Information in this document, including URL and other Internet

More information

Milestone Systems Software Manager 1.5. Administrator's Manual

Milestone Systems Software Manager 1.5. Administrator's Manual Milestone Systems Software Manager 1.5 Contents INTRODUCTION... 4 PREREQUISITES... 5 SUPPORTED OPERATING SYSTEMS... 5 PREREQUISITES FOR ALL REMOTE SERVERS... 5 IMPORTANT INFORMATION... 5 VERSION SPECIFIC

More information

Creating a generic user-password application profile

Creating a generic user-password application profile Chapter 4 Creating a generic user-password application profile Overview If you d like to add applications that aren t in our Samsung KNOX EMM App Catalog, you can create custom application profiles using

More information

XIA Configuration Server

XIA Configuration Server XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration

More information

Virto Password Reset Web Part for SharePoint. Release 3.1.0. Installation and User Guide

Virto Password Reset Web Part for SharePoint. Release 3.1.0. Installation and User Guide Virto Password Reset Web Part for SharePoint Release 3.1.0 Installation and User Guide 2 Table of Contents OVERVIEW... 3 SYSTEM REQUIREMENTS... 3 OPERATING SYSTEM... 3 SERVER... 3 BROWSER... 4 INSTALLATION...

More information

LDAP Directory Integration with Cisco Unity Connection

LDAP Directory Integration with Cisco Unity Connection CHAPTER 6 LDAP Directory Integration with Cisco Unity Connection The Lightweight Directory Access Protocol (LDAP) provides applications like Cisco Unity Connection with a standard method for accessing

More information

TROUBLESHOOTING GUIDE

TROUBLESHOOTING GUIDE Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,

More information

Microsoft Office 365 Using SAML Integration Guide

Microsoft Office 365 Using SAML Integration Guide Microsoft Office 365 Using SAML Integration Guide Revision A Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information