Application for Splunk Enterprise

Size: px
Start display at page:

Download "Application for Splunk Enterprise"

Transcription

1 Application for Splunk Enterprise User Guide Document Version October EN Rev. A

2 2015 ThreatConnect, Inc. ThreatConnect is a registered trademark of ThreatConnect, Inc. UNIX is a registered trademark of The Open Group. JavaScript is a registered trademark of the Oracle Corporation. Splunk is a registered trademark of Splunk, Inc. Application for Splunk Enterprise 2

3 TABLE OF CONTENTS OVERVIEW... 5 Key Features... 5 GETTING STARTED... 5 Prerequisites... 5 Installation... 6 ThreatConnect API User Creation... 6 THE THREATCONNECT APP FOR SPLUNK... 8 App Setup and Configuration... 8 Owner Configuration... 9 Setting Up Alerts Option Option 2 (Legacy) Basic Alert Scenario The ThreatConnect Dashboard The Indicator Dashboard The Diamond Dashboard The Threat Lookup Screen The Reports Screen The DB Data Menu The Search Screen Workflow: Event Actions Application for Splunk Enterprise 3

4 Workflow: Field Actions The ThreatConnect App Logs Indicator Logs Group Logs Tag Logs Application for Splunk Enterprise 4

5 OVERVIEW The ThreatConnect Application (App) for Splunk Enterprise gives Splunk users the ability to leverage customizable threat intelligence integrated into Splunk from their ThreatConnect accounts. ThreatConnect provides the ability to aggregate threat intelligence from multiple sources (i.e., open source, commercial, communities, and internally created), analyze and track identified adversary infrastructure and capabilities, and put that refined knowledge to work in Splunk, identifying threats targeting organizations. Key Features Multi-source threat intelligence collection (open source, commercial, communities, internal research) Transparent threat intelligence aggregated, confidence weighted, and applied to triggered Splunk alerts Automatic threat intelligence indicator updates Prioritized events based on criticality and confidence scores, relationships to known threat types and groups, past incidents, and tags Insights on a threat s capability, infrastructure, and past incidents affecting users or members of trusted communities represented using the Diamond Model for Intrusion Analysis History of how a Threat has affected users networks using the Diamond Dashboard GETTING STARTED Prerequisites Users will need an active ThreatConnect Application Programming Interface (API) account to leverage the ThreatConnect App for Splunk Enterprise. Users without a current subscription to ThreatConnect, who wish to start a trial of the ThreatConnect App for Splunk with a live connection to the latest customizable threat intelligence data, please inquire at: Once an Organization has been licensed for API access, its users will need to create an API User within the Organization prior to Splunk interfacing with the ThreatConnect API. For detailed steps on creating an API User, please see the API User Creation section in the ThreatConnect Application Programming Interface User Guide. Application for Splunk Enterprise 5

6 Installation Users can download the ThreatConnect App for Splunk Enterprise from or they can directly install the App from the Find more apps online link in Apps Manage Apps. For more information on installing Splunk Apps, reference the Splunk documentation located at: ThreatConnect API User Creation A ThreatConnect API User is created from within the ThreatConnect Web application for the instance being used. For the ThreatConnect Cloud edition this is: To Create an API User: 1. Log in with an Organization Administrator account. 2. On the top navigation bar, click on the Account drop-down menu and select Org Settings (Figure 1). The Organization Settings screen will appear with the MEMBERSHIP tab highlighted (Figure 2). Figure 1 Figure 2 Application for Splunk Enterprise 6

7 3. Click on the + Create API User button, and the API User Administration pop-up screen will appear (Figure 3). Figure 3 4. Fill in the information requested, as shown in Table 1, and copy the Access ID and Secret Key to a safe location. Note: It is critical to save the Secret Key, as this will not be available again. If it is lost, the existing API User will need to be deleted, and a new API User will need to be created. Do not share the Access ID or Secret Key as these are your credentials and will be used to track API usage limits. Table 1 Parameter Description First Name Last Name Pseudonym The First Name of the user that will appear in posts, data modifications, and data creation within ThreatConnect The Last Name of the user that will appear in posts, data modifications, and data creation within ThreatConnect The Pseudonym of the user that will appear in posts, data modifications, and data creation within ThreatConnect Application for Splunk Enterprise 7

8 THE THREATCONNECT APP FOR SPLUNK App Setup and Configuration URL: After installing the ThreatConnect App for Splunk Enterprise, the application setup must be completed before accessing the App. To properly configure the App, fill in each of the form text boxes with the appropriate data from the API User Creation section, as shown in Figure 4. Figure 4 Application for Splunk Enterprise 8

9 Default Organization: This is the user s Organization as defined during account creation within the ThreatConnect application. API Base URL: The ThreatConnect Public Cloud API can be accessed at Users with a Private Cloud or On-Premises edition of ThreatConnect were provided with their instance URL during their initial setup and installation. API Access ID: The API Access ID corresponds with a user s ThreatConnect API account s Access ID. API Secret Key: The API Secret Key corresponds with a user s ThreatConnect API account key, accessible during account creation within the user s ThreatConnect organization. Activity Log: The Activity Log checkbox enables activity logging in the ThreatConnect Platform for any API write actions. Result Limits: These are the maximum value of results that can be returned in one query without pagination. The maximum value currently supported with the ThreatConnect API for returned results without pagination is 500. Unless there is a special requirement on a user s network, it is recommended this value be left at 500. Enable Proxy: This checkbox enables proxy-server support. Enable Debug: This checkbox enables debug logging for the ThreatConnect App for Splunk Enterprise. After the setup is complete, the ThreatConnect App for Splunk Enterprise will be accessible. When accessing the App, the default dashboard will not show any populated results, which is expected, until matched data is available. The ThreatConnect App for Splunk Enterprise will begin matching against a set of defined Common Information Model (CIM) data models upon setup. For custom matching, Alerts must be created to specify which log and event data within Splunk to match against. It is recommended that users create specific Alerts for their environments. Owner Configuration URL: After setting up the app, users may want to specify filters for the intelligence and indicators imported from ThreatConnect. The Owner Configuration page allows users to selectively choose what is imported into Splunk for alerting and context and how often it is updated. To create filters, provide criteria in each of the fields depicted on the Owner Configuration screen (Figure 5). Application for Splunk Enterprise 9

10 Figure 5 Select Owner: Select the Owner (Source, Community, or a user s ThreatConnect Organization s data) in which the download setting needs to be updated. Group Types: Select the ThreatConnect Group types to download for use in the Diamond Dashboard. Available options are Adversary, Incident, and Threat. Indicator Types: Select the Indicator types to download for use by the ThreatConnect App for Splunk Enterprise. Available options are: Address, , File, Host, and URL. Tag Filters: Add any Tags to filter indicators that are available to the ThreatConnect App for Splunk Enterprise. If Tags are provided, only indicators that have those Tags present will be downloaded into the App. Rating Filter: Select an indicator threat-rating threshold. In ThreatConnect, Threat ratings have a value of 0-5 points. Only indicators that meet the filter s threshold will be downloaded into the App. Confidence Filter: Select an indicator confidence threshold. In ThreatConnect, Confidence ratings have a value of 0-100%. Only indicators that meet the filter s threshold will be downloaded into the App. Cron Schedule: The schedule for the Indicator download is defined here. The recommended download period is once every 24 hours. More information on Cron settings can be found at: Application for Splunk Enterprise 10

11 Setting Up Alerts Any search that returns a set of indicators can be saved as an alert that automatically searches for matching indicators from ThreatConnect. The search can return any single indicator type or multiple indicator types that are supported by the ThreatConnect API. There are two options to implement these automated ThreatConnect queries once the search has been created: Option 1 Once the search command is returning valid indicator results, the results need to be sent to the ThreatConnect script; provide the indicator field names in comma-separated format in the ioc_map option (e.g., sourcetype=cisco:asa action=drop stats count by src_ip where count > 500 rename src_ip as indicator tcalert ioc_map= src_ip victim_field= dest_ip ). The victim field argument is optional but highly recommended when possible. Option 2 (Legacy) 1. Use the Splunk built-in rename command to rename the indicator field to indicator (e.g., sourcetype=cisco:asa action=drop stats count by src_ip where count > 500 rename src_ip as indicator). 2. Once the search command is returning valid indicator results with a field name of indicator, the results need to be sent to the ThreatConnect script (e.g., sourcetype=cisco:asa action=drop stats count by src_ip where count > 500 rename src_ip as indicator tcalert). It is recommended that the search be run over the past hour of logs, and that the alert be set to run every hour. If any matches are found, a log entry will be created in the ThreatConnect App log, which can be viewed from the App s ThreatConnect Dashboard or by executing a search on the ThreatConnect sourcetype (e.g., sourcetype=threatconnect match=true). All non-matching calls to the ThreatConnect script will also create a log entry, which can be viewed by searching the ThreatConnect sourcetype (e.g., sourcetype=threatconnect match=false). The non-matching events are not displayed on the dashboard. Basic Alert Scenario In this example, a company has a requirement to monitor Internet traffic sourced from China that is coming into its network. The search could be as simple as: sourcetype=cisco:asa iplocation src_ip search Country=China rename src_ip as indicator. However, this could create a lot of results and trigger too many lookups. We can filter these results down to all traffic sourced from China that is not blocked by the firewall by adding an additional filter. The new search would be: sourcetype=cisco:asa action=permit iplocation src_ip search Country=China. This Application for Splunk Enterprise 11

12 search will now return less results. The search can be filtered further to exclude duplicate IP addresses by using the stats command to get the count of events by src_ip. To limit the results even further, a threshold can be added to the search using the where command. The new search would then be: sourcetype=cisco:asa action=permit iplocation src_ip search Country=China stats count by src_ip where count > 50.Now that the search results have been filtered to a comfortable level, they can be passed to the ThreatConnect script. 1. Ensure that the ' tcalert ioc_map= src_ip victim="dest_ip"' has been appended to the search (Figure 6). Figure 6 2. Click on the Save As button, select Alert from the drop-down menu, and the Save As Alert screen will appear (Figure 7). Note: The alert title can be any value; however, it is recommended to add a meaningful name for ease of recognition. Adding a description will also help others understand the purpose of the search. Figure 7 3. Ensure that the search time period is equal to the frequency of the Alert so that results are not missed. 4. Once the parameters on this screen have been entered, click the Next button to continue configuring the Alert (Figure 8). Application for Splunk Enterprise 12

13 Figure 8 5. Finalize the Alert configuration and click the Save button. This is a basic sample of creating a search to run as an Alert. There are unlimited combinations of searches that can be created to return indicators that are meaningful to threat analysis. These searches can then be configured as an Alert to automatically match indicators from ThreatConnect. All that users require is knowledge of their security logs and an understanding of what type of events can return useful data for threat analysis. The ThreatConnect Dashboard URL: The ThreatConnect Dashboard provides an overview of matches between events in Splunk and indicator data in ThreatConnect. The first row of Single Valued Results provides a count of matched indicators with trending for the past 30 days. These indicators are separated by Indicator Type (Figure 9). Figure 9 Application for Splunk Enterprise 13

14 The drilldown action for these results directs the user to the Splunk search that generated the count. Note that the count deduplicates the indicator by each API lookup, so that the number of events might be different depending on the number of communities to which the indicator belongs. See The Search Screen section for more information on viewing the generated logs from matched indicators. The second row provides a timeline view of Matched Indicator by Type (Figure 10), which offers an oversight of indicator activity in Splunk. Figure 10 The view at the bottom displays the latest matched indicators in a paginated table (Figure 11). This table has a built-in form that allows dynamic filtering on indicator data. Figure 11 Note: A matching event may display several times if the matched indicator has several owners in ThreatConnect. In cases such as these, a row will be displayed for each owner of the indicator. Each column is described below: _time: This column is stored internally in UTC format. It is translated to human-readable UNIX time format when Splunk Enterprise renders the search results (the very last step of search-time event processing). Indicator: This column lists the indicator that matched between local logs and ThreatConnect. This value is a hyperlink that will open a page to the indicator s Details screen on the ThreatConnect website. Application for Splunk Enterprise 14

15 Victim: This column represents the bottom of the Diamond Model. This value is determined by the user while setting up alerts or automatically when searching the Data Models. Trigger: The trigger field is classified into three types: alert, auto, or manual. The alert trigger indicates that the matched event was found using a Splunk search configured as an alert. The auto trigger indicates that the matched event was found using the automatic Data Model search. The manual trigger indicates that the event was either matched using a workflow action, or that the indicator was searched using the manual search option. Rating: This column lists the criticality rating assigned by the indicator s owner within ThreatConnect. This value is on a scale of 0-5 points, with 5 being the most critical. The ratings are color highlighted by their value ( no highlight; 3-4 amber; and > 4 red). Confidence: This column lists the confidence rating assigned by the indicator s owner within ThreatConnect. This value is on a scale of 0-100%. Owner: This column displays the owner of the indicator within ThreatConnect, which is, typically, a particular source, community, or the organization s own private data. Tags: This column displays any tags associated with the matched indicator by the owner. If multiple owners exist for a matched indicator, only tags created by the owner listed in the same row will be displayed in this column. Groups: This column display any groups associated with the matched indicator by the owner, as well as the group type (e.g., Incidents, s, Threats, s, Adversaries, Documents, or Signatures). If multiple owners exist for a matched indicator, only groups created by the owner listed in the same row will be displayed in the Groups (Types) column. Application for Splunk Enterprise 15

16 The Indicator Dashboard URL: The Indicator Dashboard provides an additional view of the matched indicator data. This dashboard focuses on the groupings of the matched indicators themselves and provides some statistics on the most-recent indicators available from ThreatConnect. The first row of this timeline view (Figure 12) displays Matched Indicators by Owners (i.e., Source, Community, and Organization). Figure 12 The second row displays additional paginated tables for matched indicators (Figure 13). From left to right, these are the top matched indicators (with a count of times observed for each indicator), the top matched group names, and the top matched tags. Figure 13 Application for Splunk Enterprise 16

17 The Diamond Dashboard URL: This page allows users to lookup an Adversary, Incident, or Threat group from a specified owner in ThreatConnect. A Diamond Model profile of the group is given to include all known capabilities, infrastructure, and related incidents. Indicators associated to the group are matched using specified CIM Data Models. The first section of the dashboard allows the user to query a group with specified data models (Figure 14). Figure 14 The query parameters are specified by the following fields: Data Models: Specified CIM Data Models to match events against the group s indicators. Available data models include: Alerts, , Intrusion Detection, Malware, Network Resolutions, Network Sessions, Network Traffic, and Web. Owner: Select the Owner (i.e., Source, Community, or Organization) in which the group exists. Type: Select the Group Type (i.e., Adversary, Incident, or Threat). Name: Select the specific Group by name. Application for Splunk Enterprise 17

18 The second section of the dashboard shows a Diamond breakout of the queried group (Figure 15). The Adversary/Threat table shows Adversary and Threat associations to the queried group. The Associations table shows all associated Documents, s, Incidents, and Signatures to the queried group. The Capability table shows all known associated Common Vulnerabilities and Exposures (CVE) and malware files by MD5 hash. The Infrastructure table shows all Address, , Host, and URL indicators associated to the queried group. Figure 15 The third section of the dashboard shows a timeline and table of CIM events matched to the queried group (Figure 16). Figure 16 Application for Splunk Enterprise 18

19 The Threat Lookup Screen URL: This screen allows manual lookup of indicators against the ThreatConnect API (Figure 17). The indicator type will be automatically detected. This manual lookup will be logged to the App logs and will be displayed on the App Dashboard. The Reports Screen Figure 17 URL: A few canned reports are created for monitoring ThreatConnect alert queries and for tracking how many of those queries hit the ThreatConnect API (Figure 18). User-defined custom reports can be added for more detailed views into the ThreatConnect data. Figure 18 Application for Splunk Enterprise 19

20 The DB Data Menu The DB Data drop-down menu provides additional screens for each ThreatConnect indicator type, independent of matches to events or logs within Splunk, allowing users to view statistics for each. The screens are formatted identically, and one screen exists for each indicator type: Address Indicators DB Data Page URL: Addresses DB Data Page URL: File Indicators DB Data Page URL: Host Indicators DB Data Page URL: URL Indicators DB Data Page URL: The first row displays graphical representations for the total number of indicators from ThreatConnect of the specified type (Figure 19). There are two charts: one for Indicator type by owner and another by rating. Figure 19 Application for Splunk Enterprise 20

21 The second row contains two tables that display the last 10 created and updated indicators (Figure 20). Figure 20 The final row displays a paginated table of all the indicators of that type pulled from ThreatConnect (Figure 21). The Search Screen Figure 21 URL: Workflow: Event Actions Using the Search screen while in the ThreatConnect App provides additional features for threat analysis. The built-in Splunk Event Actions feature will display a link for any indicator field that follows the Common Information Model (CIM) standard naming convention. By selecting this link, the indicator displayed will be queried using the ThreatConnect API, and any matching results will be displayed in a results table (Figure 22). Application for Splunk Enterprise 21

22 Figure 22 Application for Splunk Enterprise 22

23 Workflow: Field Actions If the results fields do not follow the CIM naming convention, an indicator can still be queried in the ThreatConnect API by using the Field Actions menu. By selecting this link, the indicator displayed will be queried using the ThreatConnect API, and any matching result will be displayed in a results table (Figure 23). Figure 23 Application for Splunk Enterprise 23

24 The ThreatConnect App Logs The ThreatConnect App logs can be searched just like any other log in Splunk. The App logs are formatted in JavaScript Object Notation (JSON) and are easily readable by humans and machines. Indicator Logs All indicators that are passed to the ThreatConnect script are logged. Figure 24 displays a matching result in its native, collapsed form. Figure 24 Clicking on the plus sign (+) symbol in the Event column will expand the event to display additional data. Figure 25 displays a fully expanded matching-indicator result in the ThreatConnect App log. All the indicator data is nested in the indicator section of the event. All the search information, including the search string that created this log entry, is nested in the search section of the event. A key field in this data is search.method, which indicates if the search was performed manually by using the ThreatConnect Manual Lookup, by Workflow Action, or by an alert. Each field from the log below is described as follows: app: This field notates the ThreatConnect App as the source of the log. Indicator: This field is nested with data on the matched indicator from ThreatConnect s API. indicator.confidence: This field displays the owner-specific confidence value on the indicator provided from ThreatConnect s API. indicator.dateadded: This field displays the date the indicator was added to the owner within ThreatConnect. indicator.description: This field includes the owner-specific default-description attribute of the indicator from ThreatConnect. indicator.id: This field displays the indicator s id value from ThreatConnect. indicator.indicator: This field specifies the actual indicator value from ThreatConnect. Application for Splunk Enterprise 24

25 indicator.lastmodified: This field notates the time the indicator was last modified within ThreatConnect. indicator.owner: This field is nested with data on the indicator s owner from ThreatConnect. indicator.owner.id: This field displays the owner s id value from ThreatConnect. indicator.owner.name: This field includes the name of the indicator s owner within ThreatConnect. indicator.owner.type: This field specifies the type of owner. indicator.rating: This field notates the owner-specific criticality rating of the indicator. indicator.source: This field displays the owner-specific default-source attribute value for the indicator from ThreatConnect. indicator. This field is present if the matched indicator is an address. Its value will be the address indicator. indicator.hostname: This field is present if the matched indicator is a host name. Its value will be the host indicator. indicator.ip: This field is present if the matched indicator is an IP address. Its value will be the IP address indicator. indicator.md5: This field is present if the matched indicator is an MD5. Its value will be the MD5 hash indicator. indicator.sha1: This field is present if the matched indicator is a SHA1. Its value will be the SHA1 hash indicator. indicator.sha256: This field is present if the matched indicator is a SHA256. Its value will be the SHA256 hash indicator. indicator.text: This field is present if the matched indicator is a URL. Its value will be the URL indicator. indicator.type: This field specifies the type of indicator that was automatically determined by the ThreatConnect script. indicator.weblink: This field displays a unique URL link to the indicator s Details screen within the ThreatConnect platform. match: A value of True in this field signifies that the searched indicator matched a known indicator in ThreatConnect. A value of False in this field signifies that the searched indicator did not match a known indicator in ThreatConnect. search: This field is nested with data relevant to the search made within the ThreatConnect App. search.indicator: This field will be identical to the indicator.indicator on an event where match=true. Events that have match=false will not have an indicator section. Application for Splunk Enterprise 25

26 search.method: A value of alert in this field indicates that the log event was triggered by an alert. A value of manual in this field indicates that the log event was generated from a ThreatConnect Manual Lookup or a Workflow Action. search.owners: This field notates the ThreatConnect owners that were searched for the value in search.indicator. search.string: This field includes the search string that created this event. search.type: This field specifies the type of search performed in the ThreatConnect App. The values can be indicators, groups, or tags. timestamp: This field displays the timestamp for this logged event. uuid: This field displays the universally unique id value for this logged event. The uuid field can be used to join indicator events with matching tag and group events for the same search. Figure 25 Application for Splunk Enterprise 26

27 Figure 26 displays a fully expanded indicator event that did not match during the ThreatConnect script execution. The key field to note is match: False. This information is useful in tuning the alert to filter out additional indicators. It also provides a view into what is defined as a relevant indicator to trigger an alert. Figure 26 Group Logs Each time a matching indicator is found, the ThreatConnect script performs a query to find any matching groups that are related to the matching indicator. If matching groups are found, the group data will be written to the App log file. Figure 27 displays a fully expanded log entry for a group. This group can be associated with the matching indicator log entry using the uuid field. Each field unique to the group log is described as follows: group: This field is nested with data relevant to a group associated to a matched indicator. group.dateadded: This field displays the date on which an owner-specific group was added to ThreatConnect. group.id: This field displays the unique id of the group within ThreatConnect. group.name: This field specifies the name of the group within ThreatConnect. group.ownername: This field displays the name of the owner of the group within ThreatConnect. group.type: This field specifies the type of group. group.weblink: This group displays a URL link to the group s Details screen within ThreatConnect. Application for Splunk Enterprise 27

28 Figure 27 Tag Logs Each time a matching indicator is found, the ThreatConnect App performs a query to find any matching tags that are related to the matching indicator. If matching tags are found, the tag data will be written to the App log file. Figure 28 displays a fully expanded log entry for a tag. This tag can be associated with the matching indicator log entry using the uuid field. Each field unique to the group log is described as follows: tag: This field is nested with data relevant to a tag associated to a matched indicator. tag.name: This field displays the name of the tag within ThreatConnect. tag.weblink: This field displays a URL link to the tag s Details screen within ThreatConnect. Application for Splunk Enterprise 28

29 Figure 28 Application for Splunk Enterprise 29

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal This Application Note provides instructions for configuring Apps settings on the Cisco OnPlus Portal and Autotask application settings

More information

Set Up and Maintain Customer Support Tools

Set Up and Maintain Customer Support Tools Set Up and Maintain Customer Support Tools Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Table of Contents. Copyright 2010-2015 Symphonic Source, Inc. All rights reserved. Salesforce is a registered trademark of salesforce.

Table of Contents. Copyright 2010-2015 Symphonic Source, Inc. All rights reserved. Salesforce is a registered trademark of salesforce. DupeCatcher is a real-time deduplication app designed specifically for Salesforce. It is a 100% APEX developed and deployed managed package, and is installed via the Salesforce AppExchange, eliminating

More information

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal This Application Note explains how to configure ConnectWise PSA (Professional Service Automation) application settings and Cisco

More information

User Management Tool 1.6

User Management Tool 1.6 User Management Tool 1.6 2014-12-08 23:32:48 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.6... 3 ShareFile User Management

More information

Salesforce Customer Portal Implementation Guide

Salesforce Customer Portal Implementation Guide Salesforce Customer Portal Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

Oracle Siebel Marketing and Oracle B2B Cross- Channel Marketing Integration Guide ORACLE WHITE PAPER AUGUST 2014

Oracle Siebel Marketing and Oracle B2B Cross- Channel Marketing Integration Guide ORACLE WHITE PAPER AUGUST 2014 Oracle Siebel Marketing and Oracle B2B Cross- Channel Marketing Integration Guide ORACLE WHITE PAPER AUGUST 2014 Disclaimer The following is intended to outline our general product direction. It is intended

More information

DocuSign Connect for Salesforce Guide

DocuSign Connect for Salesforce Guide Information Guide 1 DocuSign Connect for Salesforce Guide 1 Copyright 2003-2013 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

Adeptia Suite 6.2. Application Services Guide. Release Date October 16, 2014

Adeptia Suite 6.2. Application Services Guide. Release Date October 16, 2014 Adeptia Suite 6.2 Application Services Guide Release Date October 16, 2014 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 Document Information DOCUMENT INFORMATION

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

VMware vcenter Log Insight User's Guide

VMware vcenter Log Insight User's Guide VMware vcenter Log Insight User's Guide vcenter Log Insight 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Administration Guide for the System Center Cloud Services Process Pack

Administration Guide for the System Center Cloud Services Process Pack Administration Guide for the System Center Cloud Services Process Pack Microsoft Corporation Published: May 7, 2012 Author Kathy Vinatieri Applies To System Center Cloud Services Process Pack This document

More information

Email Security 8.0 User Guide

Email Security 8.0 User Guide Email Security 8.0 User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage to

More information

Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0

Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0 Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...

More information

LiveText for Salesforce Quick Start Guide

LiveText for Salesforce Quick Start Guide LiveText for Salesforce Quick Start Guide (C) 2014 HEYWIRE BUSINESS ALL RIGHTS RESERVED LiveText for Salesforce Quick Start Guide Table of Contents Who should be looking at this document... 3 Software

More information

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015 QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

Monitoring System Status

Monitoring System Status CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,

More information

Sage CRM. Sage CRM 7.3 Mobile Guide

Sage CRM. Sage CRM 7.3 Mobile Guide Sage CRM Sage CRM 7.3 Mobile Guide Copyright 2014 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated,

More information

Sisense. Product Highlights. www.sisense.com

Sisense. Product Highlights. www.sisense.com Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze

More information

GETTING STARTED WITH COVALENT BROWSER

GETTING STARTED WITH COVALENT BROWSER GETTING STARTED WITH COVALENT BROWSER Contents Getting Started with Covalent Browser... 1 What is the Browser Version?... 4 Logging in... 5 The URL address... 5 Home page... 5 Menu bar... 5 Go To button...

More information

Tenable for Google Cloud Platform

Tenable for Google Cloud Platform HOW-TO GUIDE Tenable for Google Cloud Platform Introduction This document describes how to deploy Tenable SecurityCenter Continuous View (Security Center CV ) for integration with Google Cloud Platform.

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

NetFlow Analytics for Splunk

NetFlow Analytics for Splunk NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...

More information

Review Manager Guide

Review Manager Guide Review Manager Guide v8.0 May 10, 2013 For the most recent version of this document, visit kcura's Documentation Site. Table of Contents 1 Review Manager overview 4 1.1 Review Manager life cycle 4 1.2

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Copyright EPiServer AB

Copyright EPiServer AB Table of Contents 3 Table of Contents ABOUT THIS DOCUMENTATION 4 HOW TO ACCESS EPISERVER HELP SYSTEM 4 EXPECTED KNOWLEDGE 4 ONLINE COMMUNITY ON EPISERVER WORLD 4 COPYRIGHT NOTICE 4 EPISERVER ONLINECENTER

More information

Big Data Operations Guide for Cloudera Manager v5.x Hadoop

Big Data Operations Guide for Cloudera Manager v5.x Hadoop Big Data Operations Guide for Cloudera Manager v5.x Hadoop Logging into the Enterprise Cloudera Manager 1. On the server where you have installed 'Cloudera Manager', make sure that the server is running,

More information

DocuSign for Salesforce Administrator Guide v6.1.1 Rev A Published: July 16, 2015

DocuSign for Salesforce Administrator Guide v6.1.1 Rev A Published: July 16, 2015 DocuSign for Salesforce Administrator Guide v6.1.1 Rev A Published: July 16, 2015 Copyright Copyright 2003-2015 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights

More information

Getting Started with Clearlogin A Guide for Administrators V1.01

Getting Started with Clearlogin A Guide for Administrators V1.01 Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality

More information

Redtail Integration. Establishing the Redtail Connection. 1. From the Applications dropdown, choose Setup.

Redtail Integration. Establishing the Redtail Connection. 1. From the Applications dropdown, choose Setup. In this user guide, we will demonstrate how to integrate your Redtail service into the emoney platform. This will allow the Advisor to import and link clients currently in Redtail into emoney. Establishing

More information

SAP Business One mobile app for Android

SAP Business One mobile app for Android User Guide SAP Business One mobile app 1.0.x for Android Document Version: 1.0 2013-11-27 Applicable Releases: SAP Business One 9.0 PL04, SAP Business One 8.82 PL12, SAP Business One 9.0, Version for SAP

More information

Scribe Online Integration Services (IS) Tutorial

Scribe Online Integration Services (IS) Tutorial Scribe Online Integration Services (IS) Tutorial 7/6/2015 Important Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, photocopying,

More information

How To Use Query Console

How To Use Query Console Query Console User Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Query Console User

More information

Asset Track Getting Started Guide. An Introduction to Asset Track

Asset Track Getting Started Guide. An Introduction to Asset Track Asset Track Getting Started Guide An Introduction to Asset Track Contents Introducing Asset Track... 3 Overview... 3 A Quick Start... 6 Quick Start Option 1... 6 Getting to Configuration... 7 Changing

More information

APPLICATION PROGRAMMING INTERFACE

APPLICATION PROGRAMMING INTERFACE DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

Strategic Asset Tracking System User Guide

Strategic Asset Tracking System User Guide Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services

More information

ONCONTACT MARKETING AND CAMPAIGN USER GUIDE V8.1

ONCONTACT MARKETING AND CAMPAIGN USER GUIDE V8.1 ONCONTACT MARKETING AND CAMPAIGN USER GUIDE V8.1 OnContact Marketing Guide v8.1 Contents Marketing Dashboard... 2 Marketing Dashboard Panels... 3 Campaign Record... 3 Field Descriptions... 3 Products Tab...

More information

Secret Server Splunk Integration Guide

Secret Server Splunk Integration Guide Secret Server Splunk Integration Guide Table of Contents Meeting Information Security Compliance Mandates: Secret Server and Splunk SIEM Integration and Configuration... 1 The Secret Server Approach to

More information

Policy Compliance. Getting Started Guide. January 22, 2016

Policy Compliance. Getting Started Guide. January 22, 2016 Policy Compliance Getting Started Guide January 22, 2016 Copyright 2011-2016 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Using Application Insights to Monitor your Applications

Using Application Insights to Monitor your Applications Using Application Insights to Monitor your Applications Overview In this lab, you will learn how to add Application Insights to a web application in order to better detect issues, solve problems, and continuously

More information

TIBCO Spotfire Metrics Modeler User s Guide. Software Release 6.0 November 2013

TIBCO Spotfire Metrics Modeler User s Guide. Software Release 6.0 November 2013 TIBCO Spotfire Metrics Modeler User s Guide Software Release 6.0 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE

More information

Salesforce ExactTarget Marketing Cloud Radian6 Mobile User Guide

Salesforce ExactTarget Marketing Cloud Radian6 Mobile User Guide Salesforce ExactTarget Marketing Cloud Radian6 Mobile User Guide 7/14/2014 Table of Contents Get Started Download the Radian6 Mobile App Log In to Radian6 Mobile Set up a Quick Search Navigate the Quick

More information

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Getting Started with the iscan Online Data Breach Risk Intelligence Platform Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing

More information

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Sage CRM. 7.2 Mobile Guide

Sage CRM. 7.2 Mobile Guide Sage CRM 7.2 Mobile Guide Copyright 2013 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,

More information

Creating and Using Forms in SharePoint

Creating and Using Forms in SharePoint Creating and Using Forms in SharePoint Getting started with custom lists... 1 Creating a custom list... 1 Creating a user-friendly list name... 1 Other options for creating custom lists... 2 Building a

More information

ONCONTACT MARKETING AND CAMPAIGN USER GUIDE V8.1

ONCONTACT MARKETING AND CAMPAIGN USER GUIDE V8.1 ONCONTACT MARKETING AND CAMPAIGN USER GUIDE V8.1 OnContact Marketing Guide v8.1 Contents Marketing Dashboard... 2 Marketing Dashboard Panels... 2 Campaign Record... 3 Field Descriptions... 3 Products Tab...

More information

Table of Contents. Search Results.21. Equipment Change Request...10 Equipment Removal Request...11 Disposed..12 Not found 12

Table of Contents. Search Results.21. Equipment Change Request...10 Equipment Removal Request...11 Disposed..12 Not found 12 Table of Contents Logging in.. 3 DIIT Online Service Desk Website...3 Asset Inventory Menu for Site.....4 Assets Summary Listing (HTML/Excel)... 4 Assets Summary by Room..6 Search / Edit / Remove Assets...7

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

GETTING STARTED GUIDE. 1.3 September 2015 3725-10306-001D. Polycom RealAccess

GETTING STARTED GUIDE. 1.3 September 2015 3725-10306-001D. Polycom RealAccess GETTING STARTED GUIDE 1.3 September 2015 3725-10306-001D Polycom RealAccess Copyright 2015, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

IBM Information Server

IBM Information Server IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01 IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

WebSphere Business Monitor

WebSphere Business Monitor WebSphere Business Monitor Dashboards 2010 IBM Corporation This presentation should provide an overview of the dashboard widgets for use with WebSphere Business Monitor. WBPM_Monitor_Dashboards.ppt Page

More information

UTILIZING CLOUDCHECKR FOR SECURITY

UTILIZING CLOUDCHECKR FOR SECURITY UTILIZING CLOUDCHECKR FOR SECURITY A guide to security in your AWS Environment Abstract This document outlines steps to properly secure your AWS environment using CloudCheckr. We cover CloudCheckr use

More information

DirectTrack CrossPublication Users Guide

DirectTrack CrossPublication Users Guide DirectTrack CrossPublication Users Guide Table of Contents Introduction...1 Getting Started...2 Do-It-Direct Enabling CrossPublication... 2 CrossPublication Setup... 3 Do-It-Direct CrossPublication Profile

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

Juniper Networks Management Pack Documentation

Juniper Networks Management Pack Documentation Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133

More information

Cloudera Manager Training: Hands-On Exercises

Cloudera Manager Training: Hands-On Exercises 201408 Cloudera Manager Training: Hands-On Exercises General Notes... 2 In- Class Preparation: Accessing Your Cluster... 3 Self- Study Preparation: Creating Your Cluster... 4 Hands- On Exercise: Working

More information

DB Audit Expert 3.1. Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005

DB Audit Expert 3.1. Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005 DB Audit Expert 3.1 Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005 Supported database systems: Microsoft SQL Server 2000 Microsoft SQL Server 2005 Copyright SoftTree Technologies,

More information

Quick Start Guide. www.uptrendsinfra.com

Quick Start Guide. www.uptrendsinfra.com Quick Start Guide Uptrends Infra is a cloud service that monitors your on-premise hardware and software infrastructure. This Quick Start Guide contains the instructions to get you up to speed with your

More information

Qlik REST Connector Installation and User Guide

Qlik REST Connector Installation and User Guide Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All

More information

CCBill Traffic Manager

CCBill Traffic Manager CCBill Traffic Manager User s Guide V.2, AUGUST 2010 CONTENTS Introduction... 3 Overview... 3 Accessing Traffic Manager... 3 Price Points... 3 Regional Pricing... 4 Basic Mode... 5 Advanced Mode... 5 Initial

More information

VMware vcenter Log Insight User's Guide

VMware vcenter Log Insight User's Guide VMware vcenter Log Insight User's Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

WildFire Cloud File Analysis

WildFire Cloud File Analysis WildFire Cloud File Analysis The following topics describe the different methods for sending files to the WildFire Cloud for analysis. Forward Files to the WildFire Cloud Verify Firewall File Forwarding

More information

INTRODUCTION TO ATRIUM... 2 SYSTEM REQUIREMENTS... 2 TECHNICAL DETAILS... 2 LOGGING INTO ATRIUM... 3 SETTINGS... 4 NAVIGATION PANEL...

INTRODUCTION TO ATRIUM... 2 SYSTEM REQUIREMENTS... 2 TECHNICAL DETAILS... 2 LOGGING INTO ATRIUM... 3 SETTINGS... 4 NAVIGATION PANEL... INTRODUCTION TO ATRIUM... 2 SYSTEM REQUIREMENTS... 2 TECHNICAL DETAILS... 2 LOGGING INTO ATRIUM... 3 SETTINGS... 4 CONTROL PANEL... 4 ADDING GROUPS... 6 APPEARANCE... 7 BANNER URL:... 7 NAVIGATION... 8

More information

SAS BI Dashboard 4.3. User's Guide. SAS Documentation

SAS BI Dashboard 4.3. User's Guide. SAS Documentation SAS BI Dashboard 4.3 User's Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2010. SAS BI Dashboard 4.3: User s Guide. Cary, NC: SAS Institute

More information

K7 Business Lite User Manual

K7 Business Lite User Manual K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the

More information

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0 Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity

More information

This guide provides step by step instructions for using the IMF elibrary Data - My Data area. In this guide, you ll learn how to:

This guide provides step by step instructions for using the IMF elibrary Data - My Data area. In this guide, you ll learn how to: This guide provides step by step instructions for using the IMF elibrary Data - area. In this guide, you ll learn how to: Access your favorite and recently used data reports. Make sure you receive email

More information

Cyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10

Cyberoam Virtual Security Appliance - Installation Guide for XenServer. Version 10 Cyberoam Virtual Security Appliance - Installation Guide for XenServer Version 10 Document Version 10.6.1-01/07/2014 Contents Preface... 4 Base Configuration... 4 Installation Procedure... 4 Cyberoam Virtual

More information

Informatica Cloud & Redshift Getting Started User Guide

Informatica Cloud & Redshift Getting Started User Guide Informatica Cloud & Redshift Getting Started User Guide 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording

More information

License Management App 2.1 Administration and User Guide

License Management App 2.1 Administration and User Guide Salesforce.com: Winter '11 License Management App 2.1 Administration and User Guide Last updated: November 30, 2010 Copyright 2000-2010 salesforce.com, inc. All rights reserved. Salesforce.com is a registered

More information

Content Inspection Features

Content Inspection Features Content Inspection Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

User Guide. Making EasyBlog Your Perfect Blogging Tool

User Guide. Making EasyBlog Your Perfect Blogging Tool User Guide Making EasyBlog Your Perfect Blogging Tool Table of Contents CHAPTER 1: INSTALLING EASYBLOG 3 1. INSTALL EASYBLOG FROM JOOMLA. 3 2. INSTALL EASYBLOG FROM DIRECTORY. 4 CHAPTER 2: CREATING MENU

More information

AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard

AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard AlienVault Unified Security Management (USM) 5.1 Running the Getting Started Wizard USM v5.1 Running the Getting Started Wizard, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault

More information

Cloudfinder for Office 365 User Guide. November 2013

Cloudfinder for Office 365 User Guide. November 2013 1 Contents Getting started with Cloudfinder for Office 365 1... 3 Sign up New Cloudfinder user... 3 Sign up Existing Cloudfinder user... 4 Setting the Admin Impersonation... 4 Initial backup... 7 Inside

More information

VMware vrealize Operations for Horizon Administration

VMware vrealize Operations for Horizon Administration VMware vrealize Operations for Horizon Administration vrealize Operations for Horizon 6.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Integrating HP Insight Management WBEM (WMI) Providers for Windows with HP System Insight Manager

Integrating HP Insight Management WBEM (WMI) Providers for Windows with HP System Insight Manager Integrating HP Insight Management WBEM (WMI) Providers for Windows with HP System Insight Manager Integration note, 4 th edition Introduction... 2 Utilizing HP WBEM Providers for Windows... 2 Security...

More information

Maximizer CRM 12 Winter 2012 Feature Guide

Maximizer CRM 12 Winter 2012 Feature Guide Winter Release Maximizer CRM 12 Winter 2012 Feature Guide The Winter release of Maximizer CRM 12 continues our commitment to deliver a simple to use CRM with enhanced performance and usability to help

More information

Taleo Enterprise. Taleo Reporting Getting Started with Business Objects XI3.1 - User Guide

Taleo Enterprise. Taleo Reporting Getting Started with Business Objects XI3.1 - User Guide Taleo Enterprise Taleo Reporting XI3.1 - User Guide Feature Pack 12A January 27, 2012 Confidential Information and Notices Confidential Information The recipient of this document (hereafter referred to

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 SP1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

SharePoint AD Information Sync Installation Instruction

SharePoint AD Information Sync Installation Instruction SharePoint AD Information Sync Installation Instruction System Requirements Microsoft Windows SharePoint Services V3 or Microsoft Office SharePoint Server 2007. License management Click the trial link

More information

PORTAL ADMINISTRATION

PORTAL ADMINISTRATION 1 Portal Administration User s Guide PORTAL ADMINISTRATION GUIDE Page 1 2 Portal Administration User s Guide Table of Contents Introduction...5 Core Portal Framework Concepts...5 Key Items...5 Layouts...5

More information

End User Monitoring. AppDynamics Pro Documentation. Version 4.1.8. Page 1

End User Monitoring. AppDynamics Pro Documentation. Version 4.1.8. Page 1 End User Monitoring AppDynamics Pro Documentation Version 4.1.8 Page 1 End User Monitoring....................................................... 4 Browser Real User Monitoring.............................................

More information

Orientation Course - Lab Manual

Orientation Course - Lab Manual Orientation Course - Lab Manual Using the Virtual Managed Workplace site for the lab exercises Your instructor will provide the following information before the first lab exercise begins: Your numerical

More information

Database Forms and Reports Tutorial

Database Forms and Reports Tutorial Database Forms and Reports Tutorial Contents Introduction... 1 What you will learn in this tutorial... 2 Lesson 1: Create First Form Using Wizard... 3 Lesson 2: Design the Second Form... 9 Add Components

More information

Oracle Primavera. P6 Dashboards Demo Script

Oracle Primavera. P6 Dashboards Demo Script Oracle Primavera P6 Dashboards Demo Script Script Team Information Role Name Email Primary Author L. Camille Frost [email protected] Contributor Reviewer Richard Ring [email protected] Manager

More information

Name Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall.

Name Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall. How to configure quick set up rules You can configure rules/policies using Quick setup to get the Firewall up and running in no time. To do this log in to the Firewall, browse to Firewall > Policies >

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

About the VM-Series Firewall

About the VM-Series Firewall About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9) Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning

More information

Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online

Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online 062212 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any

More information