Instrumentation and Obfuscation Quick Start Guide
|
|
|
- John Phelps
- 10 years ago
- Views:
Transcription
1 Instrumentation and Obfuscation Quick Start Guide Contents Instrumentation... 2 Quick Start... 2 Best Practices for Specific Platforms... 4 Instrumentation Customization... 4 Debugging... 6 Obfuscation... 7 Renaming... 7 Library Mode Control Flow String Encryption Removal Watermarking (PreMark) Linking XAML Considerations Smart Obfuscation Rules & Warnings Property and Event Metadata Map Files & Stack Trace Decoding Exclusions/Inclusions in Code Troubleshooting Build Errors Troubleshooting Runtime Errors /19/ PreEmptive Solutions, LLC Page 1 of 17
2 Instrumentation Quick Start Required Attributes - BusinessAttribute o Ensures that your data is correctly partitioned such that only users from your company can view your data. PreEmptive will supply you with a CompanyKey o Must be added to a root-level assembly. - ApplicationAttribute o Enables your data to be reported on per application. There is a GUID generator button to create new applications. o Must be added to a root-level assembly. - SetupAttribute o Sets up to send messages to the correct endpoint. Use the Commercial endpoint for the Runtime Intelligence Service, and a Custom endpoint for PA for TFS. o Must be added to a method; usually added to all the entry points of an application. o Sends Application.Start & Session.Start messages. These are not surfaced inside PreEmptive Analytics for TFS Community Edition BUT Dotfuscator Community Edition can instrument these and send them to a Custom endpoint. - TeardownAttribute o Sends Session.Stop & Application.Stop messages. o Must be added to a method; usually added to all the exit points of an application. o Cleans up reporting state and turns off ability to send messages. Exception Reporting Attributes - ExceptionTrackAttribute o Three types: Unhandled Caught (NOT supported in PA for TFS Community Edition) Thrown (NOT supported in PA for TFS Community Edition) o Can be added at the assembly level or method level. 10/19/ PreEmptive Solutions, LLC Page 2 of 17
3 o o Supported by all editions of PA for TFS: Assembly-level Unhandled: Hooks into the AppDomain s UnhandledException event. Method-level Unhandled: Wraps the method in a try/catch (with rethrow). ONLY supported in PA for TFS Professional: Assembly-level Caught: Equivalent to putting a Method-level Caught on every method. Method-level Caught: At the beginning of each existing catch block in the method, report the exception that was caught. Assembly-level Thrown: Equivalent to putting a Method-level Thrown on every method. Method-level Thrown: At every instance of the throw instruction, report the exception object that is about to be thrown. Feature Reporting Attributes - FeatureAttribute o Placed on methods that should be considered the entry point to a particular application feature. These are not surfaced inside PreEmptive Analytics for TFS Community Edition BUT Dotfuscator Community Edition can instrument these and send them to a custom endpoint. o There are two types: Tick Just a simple counter that indicates this feature has been used. Duration Requires two feature attributes with the same name. Specify a FeatureEventType of Start on one and Stop on the other. The report will include the amount of time spent in that feature. They can be added to the same method, and the Start will be injected at the top of the method, the Stop at the bottom. - PerformanceProbeAttribute o Collects and sends the amount of memory currently used by the application. - SystemProfileAttribute o Collects and sends the DeviceName, DeviceManufacturer, and DeviceTotalMemory. - ExceptionTrackAttribute o See the section devoted to this above. 10/19/ PreEmptive Solutions, LLC Page 3 of 17
4 Best Practices for Specific Platforms Windows Phone platform It is not possible to send messages on teardown on the phone platform. During application shutdown on the phone, the mechanism used for checking whether a network connection reports that there exists a network connection, but it cannot actually be used for message sending at that point. To get around this, all TeardownAttribute messages are automatically persisted to Isolated Storage rather than sent immediately. Unfortunately, no other attributes are currently capable of this behavior, so if a FeatureAttribute is hit during application shutdown (say, on the same method where the TeardownAttribute lives), then that data will be lost. Silverlight Two possible approaches: - Approach 1: Count every app entrance (regardless of whether it s a fresh app run, rehydration, etc.) as a new run, gathering data for each portion independently. o Put setup on both Application_Launching() and Application_Activated() o Put teardown on both Application_Closing() and Application_Deactivated() o Pros More correct count of incomplete sessions since every entrance/exit is accounted for. o Cons Depending on your definition, incorrect application runs count, since a run that gets temporarily interrupted and resumed will count as two runs. This will also impact statistics on features per run, etc. - Approach 2: Only count every fresh app run. o Only put setup on Application_Launching(), and only put teardown on Application_Closing() o Pros Depending on your definition, correct count of application runs, features used per run, etc. o Cons More incorrect count of incomplete sessions. XNA We have found that this works best if the SetupAttribute is placed on the Initialize() method (the one that overrides void Microsoft.XNA.Framework.Game.Initialize()), and the TeardownAttribute placed on any method tied to the Game.Exiting event. Instrumentation Customization User Opt-In The SetupAttribute provides the ability to specify an OptInSource, which is a boolean (that can be read at runtime from a method s return value, property, field, etc.) that tells PreEmptive Analytics (PA) whether or not it should send analytics messages for the current session. If the OptInSource is not specified, it defaults to sending messages. 10/19/ PreEmptive Solutions, LLC Page 4 of 17
5 Offline Caching (not available with Dotfuscator Community Edition) Instrumented applications have the ability to store usage data in situations when network access is unavailable and then transmit the data when connectivity is restored. Usage data is stored in Isolated Storage. This behavior is enabled by default and default connectivity detection code is injected into instrumented applications. Developers can override the default behavior by changing the OfflineStateSourceElement. If the OfflineStateSourceElement value is changed to None then usage data will not be stored when the application is unable to connect to the network and that usage data will be dropped. Custom Data (not available with Dotfuscator Community Edition) Most message types allow user defined data (in the form of key-value pairs) to be gathered and sent along with the message. To send extended key information, specify an ExtendedKeySource on the attribute corresponding to the message you wish to send. Dotfuscator uses the ExtendedKeySource to generate code that gathers the key-value pairs at runtime. The ExtendedKeySource is an IDictionary or IDictionary<string,string> valued property, method, field, or method argument; it is the developer's responsibility to ensure that a correct value is available in the ExtendedKeySource at the time the attributed method is executed. Custom Instance ID The SetupAttribute provides the ability to specify an InstanceIdSource, which is a string (that can be read at runtime a variety of ways) that is used to uniquely identify the current user of the application. This is typically populated with some sort of serial number value. There are specific reports on the portal that show usage trends per InstanceId. If the InstanceId is not specified, it defaults to a GUID we store in isolated storage. Also: - The username defaults to the user s anonymous ID (aka ANID ) if we can get it; if we can t get it, the username also falls back to the GUID we store in isolated storage. - The MachineName defaults to the DeviceUniqueId if we can get it. Choice of Endpoint - Custom Endpoint o Use this for PA for TFS. o Users can also set up their own endpoint to catch, aggregate, and report data. - PreEmptive s Commercial Runtime Intelligence Service o Requires contract with PreEmptive. o Better data retention period, storage allocation, etc. 10/19/ PreEmptive Solutions, LLC Page 5 of 17
6 Debugging - Was the application properly instrumented? o The Dotfuscator build output should call out every attribute that it is injecting individually. If no such list appears, then it was not properly configured. - Is any data leaving the app? o Check with Fiddler, WireShark, or similar tools (be sure to turn off SSL first) o The method with the SetupAttribute must be called before any FeatureAttributes (or others). o Are the messages being persisted to Isolated Storage (due to lack of network or app teardown considerations)? 10/19/ PreEmptive Solutions, LLC Page 6 of 17
7 Obfuscation Dotfuscator Community Edition only includes renaming and does not include a command line interface. Renaming Overview Dotfuscator is capable of renaming all classes, methods, fields, properties and events to short (spacesaving) names. In addition to making decompiled output much more difficult to understand, it also makes the resulting executable smaller in size. Example: Before & After on the sample included in the install at PreEmptive Solutions\Dotfuscator Windows Phone Edition 4.9\samples\cs\WinPhone7SilverlightDemo Limitations Problems can occur with Renaming when any type of reflection is used (including XAML), configuration files that specify entry points, libraries that are called by other applications, etc. It is important to fully test applications after Renaming to ensure no such problems exist. Specific Exclusions Presuming library mode is turned off (explained later), Dotfuscator will try to rename everything it possibly can. Certain uses of reflection can cause Dotfuscator to not update all references to a particular 10/19/ PreEmptive Solutions, LLC Page 7 of 17
8 entity upon renaming. For instance, using the included sample Silverlight application, we ve made 4 specific exclusions: Those four properties are referenced from XAML in a way that Dotfuscator does not currently statically analyze, so if these properties are renamed, then the references from XAML will no longer work. Hence, we exclude them from renaming via the checkboxes. Custom Exclusion Rules There may be times when you may need to make many specific exclusions for a particular coding convention. And even then, when a developer adds more code that follows that convention, they would have to remember to make yet another specific exclusion for their new code. The solution to this is the custom exclusion rules. Using the previous example, let s say we figured out that all properties with Name or name in its name will need to be excluded from renaming for some reason. Rather than creating a bunch of specific exclusions, we can make one custom rule: 10/19/ PreEmptive Solutions, LLC Page 8 of 17
9 The root node on the right is a Type node with the name.* with regex= true to indicate that the.* should be treated as a regular expression. This will match all types, but we have excludetype= false, which means it is not our goal here to be excluding the type, just whatever comes beneath it (that we have not specified yet). The child node is a Property node with the name.*(n n)ame.*, and again we ve indicated that this should be treated as a regular expression. Once this is properly configured, you can click the Preview button and Dotfuscator will highlight the entries that match your custom rule in the treeview on the left. Here you see we have matched BackgroundName and ChairName, which will both be excluded from renaming without needing to click their individual checkboxes. The resulting configuration of this custom rule is stored as XML in the configuration file. This example would produce the following config xml: <type name=".*" regex="true" excludetype="false"> <propertymember name=".*(n n)ame.*" regex="true" /> </type> Built-in Rules Built-in rules are custom exclude rules that are fairly universally useful, so we include them by default so users do not have to re-implement them. 10/19/ PreEmptive Solutions, LLC Page 9 of 17
10 The exact definitions of each of these can be found at %ProgramData%\PreEmptive Solutions\Common\dotfuscatorReferenceRule_v1.3.xml For example, Fields of Silverlight and WPF UserControls translates to the custom rule <type name=".*" regex="true" excludetype="false"> <field name=".*" regex="true" /> <supertype name="system.windows.controls.usercontrol" /> </type> Options There are many renaming options available on the Rename Options tab, including what renaming scheme should be used, whether to introduce explicit overrides, and many others. They are well documented in the user manual. Note: Overload Induction is typically not performed on assemblies containing any XAML code because of the way the runtime determines how XAML & Code are linked up. As a result, the Use Enhanced Overload Induction option will not change anything for such assemblies. Library Mode Library Mode is a per-assembly option that tells Dotfuscator not to rename or remove anything that could be accessed from outside that assembly. - This includes things like public methods within private types. Since the type is private, the public could not be accessed from outside that assembly. Library mode is enabled by default for all input assemblies. As a result, applications are likely to work after renaming. However, users may be concerned that so little of their application has been renamed. Turning Library Mode off will allow Dotfuscator to rename much more. 10/19/ PreEmptive Solutions, LLC Page 10 of 17
11 An exact specification of Library Mode rules can be found in the user guide. Control Flow Overview Dotfuscator works by destroying the code patterns that decompilers use to recreate source code. The end result is code that is semantically equivalent to the original but contains no clues as to how the code was originally written. The goal of this feature is to prevent automatic decompilation of MSIL within methods back to high-level source. End users can still view the MSIL itself, but it is harder to fully comprehend and make large changes in functionality. Example: Before & After on the sample included in the install at PreEmptive Solutions\Dotfuscator Windows Phone Edition 4.9\samples\cs\WinPhone7XNADemo 10/19/ PreEmptive Solutions, LLC Page 11 of 17
12 Limitations Problems with correctness very rarely occur with Control Flow. It is important to test application performance after Control Flow obfuscation, particularly any code that is executed many times (such as a game loop, or computationally/algorithmically intensive method). Control Flow obfuscation is only able to effectively defeat decompilers when the method contains sufficiently many basic blocks, among other requirements. It is also not fully deterministic based on input IL, so two input methods with the same IL contents may result in different (but functionally equivalent (ignoring performance)) IL listings after obfuscation. As a result, if there was little code in those matching methods, one of them may result in IL that is decompilable, while the other may result in the //This item is obfuscated and can not be translated. message you see above. Exclusions Control Flow obfuscation excludes work in the same way as Renaming Exclusions, with both specific exclusions and custom rules, but for Control Flow they are only applicable to methods. If users see performance degradation during testing, then these should be used to exclude any methods or classes where computationally intensive work is done (basically any situation in which the CPU is the limiting factor on performance). Options High is the only level designed to defeat automatic decompilers. Medium or Low may be used if High causes performance degradation that cannot be resolved using exclusions or for debugging purposes if Control Flow is believed to be the cause of a runtime error. String Encryption Overview A common attacker method is to locate critical code sections by looking for string references inside the binary. For example, if your application is time locked, it may display a message when the timeout expires. Attackers search for this message inside the disassembled or decompiled output and chances are when they find it they will be very close to your sensitive time lock algorithm. Example: Before & After on the sample included in the install at PreEmptive Solutions\Dotfuscator Windows Phone Edition 4.9\samples\cs\WinPhone7SilverlightDemo 10/19/ PreEmptive Solutions, LLC Page 12 of 17
13 Limitations Typically the only problems with String Encryption are properly configuring the feature. See the includes section below. Const strings are not encrypted, but all the places that use them are updated with encrypted versions of the string. To get around this, Enable Removal, and set Removal Options Removal Kind to Remove only literals (const definitions). If some computationally intensive (highly repeated code) is generating strings (maybe for logging purposes), then there may be performance degradation as extra method calls must be performed to decrypt those strings. Includes Unlike Renaming and Control Flow which transform as much code as they can unless you specifically exclude items, String Encryption by default encrypts no strings whatsoever. To enable encryption of all strings in an assembly, simply go to the String Encryption Include tab, and click the checkbox on the assembly node (which will recursively check all subitems). 10/19/ PreEmptive Solutions, LLC Page 13 of 17
14 Removal Overview Dotfuscator Professional Edition has the ability to statically analyze your application and determine which pieces are not actually being used. This includes searching for unused types, methods, and fields. This is of great benefit if application size is a concern, particularly if you are building your application from reusable components. Limitations The problems that can occur with Removal are very similar to those that may occur with Renaming. If Dotfuscator is unable to tell that certain methods are being called (due to reflection / XAML / etc.), then it may try to remove things that are required at runtime. Includes There are two types of inclusions possible, and both can be controlled by specific inclusions & custom rules. Consider an application in which method A() calls method B(): - Include Triggers: If you select a method as an Include Trigger, Dotfuscator will make sure to keep that method, as well as any descendants of that method in the call graph Dotfuscator sees (again skipping things like reflection). If an Include Trigger is set on method A(), then both A() and B() will be kept. - Conditional Includes: Any method set as a Conditional Include is kept, but its call tree is not traversed for additional methods to keep. If a Conditional Include is set on method A(), then A() will be kept, but B() will be removed (as long as it is also not called by any other methods that Dotfuscator knows about). Options There are two options for Removal Kind - Remove unused metadata and code This is used when you want Dotfuscator to actively search out unused types/methods and remove them. - Remove only literals (const definitions) This is used to strengthen the power of String Encryption, so that unencrypted string consts get removed. If String Encryption is enabled, users almost always want Removal turned on with this option selected. Watermarking (PreMark) Dotfuscator Professional Edition supports watermarking.net assemblies. Watermarking can be used to unobtrusively embed data such as copyright information or unique identification numbers into your.net application without impacting its runtime behavior. This is one method that can be used to track unauthorized copies of your software back to the source. Typically the only problems with PreMark are properly configuring the feature and using the commandline tool for extracting watermarks. 10/19/ PreEmptive Solutions, LLC Page 14 of 17
15 Linking Dotfuscator supports linking multiple input assemblies into one or more output assemblies. Assembly linking can be used to make your application even smaller, especially when used with renaming and pruning, and to simplify deployment scenarios. Limitations We do not update the assembly name in Pack URIs in XAML. As such, linking of applications with any XAML is generally advised against. XAML Considerations XAML Rewriting Dotfuscator parses & updates: - Binding Markup Extensions, if the base property in the expression belongs to a class in the xml hierarchy above that node. o Ex: <Textbox Text= {Binding Path= Dealership.SalesTeam } > - Element names if we determine it is backed by a class we can find in the input (based on the namespace). o If we can find a match, then we also rewrite attributes/children nodes appropriately XAML Rewriting Limitations Dotfuscator does not handle: - Actual XML namespaces - We try to update things in templates/styles, but we may do so incorrectly. It is typically better to just exclude properties & types referenced from templates/styles. - Attached properties/events o We do not update the backing field, methods, and registered name for the XAML references Best Practices Manually exclude: - all attached properties & events. - all backing fields & registered methods of attached properties & events. o Look for fields of type System.Windows.DependencyProperty o Look for methods that have any parameter of type System.Windows.DependencyObject Unfortunately, a custom rule cannot be made to support this in the current version, so all instances must be found manually. - all properties referenced from templates/styles (and potentially all other properties in the input with the same literal name). 10/19/ PreEmptive Solutions, LLC Page 15 of 17
16 XAML Build Warnings In most situations when Dotfuscator analyzes a piece of XAML and cannot match it up with a CLR object, it will issue a warning to notify users they will need to make a manual change. It is important that warnings be checked when trying to determine the cause of runtime failures. Smart Obfuscation Rules & Warnings Smart Obfuscation is an ongoing effort to identify and apply obfuscation rules automatically for known API usage patterns and application types. Smart obfuscation rules are a lot like Built-In renaming exclusion rules, but for situations that cannot be described by simple regular expressions. The simplest example of this is the exclusion of Enum members when Dotfuscator sees ToString() being called on one of them. If the user is requiring the Enum member to be ToString() d, then they probably want it to have the original name. There is no possible way to describe this situation using the Custom Rule Exclusion mechanism. Smart obfuscation produces two reports: - A listing of the items excluded from renaming/removal due to Smart Obfuscation. - A listing of items that Dotfuscator found but could not resolve itself that may indicate the need for manual exclusions. o There are many, many possible warnings. Here is just one example of such a warning: FrameworkElementRule flagged something in Method Namespace.ContextMenu::void OnApplyTemplate() for the following reasons: Examine possible name arguments to System.Windows.FrameworkElement::FindName and manually exclude the referenced elements. The user should simply follow the instructions Find the ContextMenu class and look at the OnApplyTemplate() method. Find all places in that method that call FindName(string), and figure out if that string represents a Property from the input that needs to be manually excluded. Property and Event Metadata Properties (and events) consist of metadata defining them, as well as their actual backing methods. Dotfuscator is able to remove property metadata, backing methods, or both. The Output tab will display what was done after each build. If the property node itself is grayed out, then the metadata was removed. If the method nodes underneath are grayed out then those backing methods were removed. Map Files & Stack Trace Decoding Dotfuscator provides the ability to decode obfuscated stack traces that result from errors in renamed applications. This process is explained in detail in the manual. Exclusions/Inclusions in Code The System.Reflection.ObfuscationAttribute class (Or the PreEmptive.ObfuscationAttributes.dll) allows users to set exclusions in code rather than by using the GUI. 10/19/ PreEmptive Solutions, LLC Page 16 of 17
17 Troubleshooting Build Errors - Are all 3 rd party assemblies marked as artifacts? - Are they using the latest version? Using the WP7 SKU? - Can t find a reference assembly? o Run from command line with /v /e /bindlog=true for additional info about where Dotfuscator is looking. Add appropriate paths to the User Defined Assembly Load Path. - In case of Dotfuscator errors, get a Dotfuscator stack trace by run from command line with options: /v /e Troubleshooting Runtime Errors - Are all 3 rd party assemblies marked as artifacts? - Are they using the latest version? Using the WP7 SKU? - Is the application signed / resigned properly? - Can you determine which transform is causing the problem? o Does it work when all obfuscation transforms are turned off? o Does it work with Library Mode enabled on all input assemblies? o Does it work with Transform XAML turned off on all input assemblies? o Runtime errors are almost always related to Renaming Dependency Properties is the property and all backing methods excluded from renaming? Does it work with the Property Exclusion Catch-All custom rule? <type name=".*" regex="true"> <propertymember name=".*" regex="true" /> </type> - Are all of the warnings on the Warnings tab accounted for? - Catch runtime exceptions and display them in a messagebox to see what is actually going wrong. 10/19/ PreEmptive Solutions, LLC Page 17 of 17
How To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
MS Enterprise Library 5.0 (Logging Application Block)
International Journal of Scientific and Research Publications, Volume 4, Issue 8, August 2014 1 MS Enterprise Library 5.0 (Logging Application Block) Anubhav Tiwari * R&D Dept., Syscom Corporation Ltd.
Cache Configuration Reference
Sitecore CMS 6.2 Cache Configuration Reference Rev: 2009-11-20 Sitecore CMS 6.2 Cache Configuration Reference Tips and Techniques for Administrators and Developers Table of Contents Chapter 1 Introduction...
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
PriveonLabs Research. Cisco Security Agent Protection Series:
Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 5.2.0.245 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com
System Monitoring and Diagnostics Guide for Siebel Business Applications. Version 7.8 April 2005
System Monitoring and Diagnostics Guide for Siebel Business Applications April 2005 Siebel Systems, Inc., 2207 Bridgepointe Parkway, San Mateo, CA 94404 Copyright 2005 Siebel Systems, Inc. All rights reserved.
Chapter 3 Application Monitors
Chapter 3 Application Monitors AppMetrics utilizes application monitors to organize data collection and analysis per application server. An application monitor is defined on the AppMetrics manager computer
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
1 Which of the following questions can be answered using the goal flow report?
1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
Troubleshooting PHP Issues with Zend Server Code Tracing
White Paper: Troubleshooting PHP Issues with Zend Server Code Tracing Technical January 2010 Table of Contents Introduction... 3 What is Code Tracing?... 3 Supported Workflows... 4 Manual Workflow... 4
Online Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
Xcode Project Management Guide. (Legacy)
Xcode Project Management Guide (Legacy) Contents Introduction 10 Organization of This Document 10 See Also 11 Part I: Project Organization 12 Overview of an Xcode Project 13 Components of an Xcode Project
DocAve 4.1 Backup User Guide
September 2007 DocAve 4.1 Backup User Guide Additional user guides available at http://www.avepoint.com/support AvePoint DocAve TM 4.1 Enterprise Backup User Guide 1 Copyright 2001-2007 AvePoint, Inc.
HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App
HP AppPulse Mobile Adding HP AppPulse Mobile to Your Android App Document Release Date: April 2015 How to Add HP AppPulse Mobile to Your Android App How to Add HP AppPulse Mobile to Your Android App For
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Release Notes LS Retail Data Director 3.01.04 August 2011
Release Notes LS Retail Data Director 3.01.04 August 2011 Copyright 2010-2011, LS Retail. All rights reserved. All trademarks belong to their respective holders. Contents 1 Introduction... 1 1.1 What s
Windows Scheduled Task and PowerShell Scheduled Job Management Pack Guide for Operations Manager 2012
Windows Scheduled Task and PowerShell Scheduled Job Management Pack Guide for Operations Manager 2012 Published: July 2014 Version 1.2.0.500 Copyright 2007 2014 Raphael Burri, All rights reserved Terms
Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.3
Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.3 Software Release Notes Revised September 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation
WebSphere Business Monitor
WebSphere Business Monitor Monitor models 2010 IBM Corporation This presentation should provide an overview of monitor models in WebSphere Business Monitor. WBPM_Monitor_MonitorModels.ppt Page 1 of 25
Online Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
Kofax Export Connector 8.3.0 for Microsoft SharePoint
Kofax Export Connector 8.3.0 for Microsoft SharePoint Administrator's Guide 2013-02-27 2013 Kofax, Inc., 15211 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved. Use is subject to
Installation Documentation Smartsite ixperion 1.3
Installation Documentation Smartsite ixperion 1.3 Upgrade from ixperion 1.0/1.1 or install from scratch to get started with Smartsite ixperion 1.3. Upgrade from Smartsite ixperion 1.0/1.1: Described in
Foglight. Dashboard Support Guide
Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
Tivoli Endpoint Manager BigFix Dashboard
Tivoli Endpoint Manager BigFix Dashboard Helping you monitor and control your Deployment. By Daniel Heth Moran Version 1.1.0 http://bigfix.me/dashboard 1 Copyright Stuff This edition first published in
Online Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
Online Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
IBM BPM V8.5 Standard Consistent Document Managment
IBM Software An IBM Proof of Technology IBM BPM V8.5 Standard Consistent Document Managment Lab Exercises Version 1.0 Author: Sebastian Carbajales An IBM Proof of Technology Catalog Number Copyright IBM
Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1
Auditing a Web Application Brad Ruppert SANS Technology Institute GWAS Presentation 1 Objectives Define why application vulnerabilities exist Address Auditing Approach Discuss Information Interfaces Walk
Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.
1348 CHAPTER 33 Logging and Debugging Monitoring Performance The Performance tab enables you to view the CPU and physical memory usage in graphical form. This information is especially useful when you
Tips and Tricks SAGE ACCPAC INTELLIGENCE
Tips and Tricks SAGE ACCPAC INTELLIGENCE 1 Table of Contents Auto e-mailing reports... 4 Automatically Running Macros... 7 Creating new Macros from Excel... 8 Compact Metadata Functionality... 9 Copying,
Team Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day [email protected] v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
App Distribution Guide
App Distribution Guide Contents About App Distribution 10 At a Glance 11 Enroll in an Apple Developer Program to Distribute Your App 11 Generate Certificates and Register Your Devices 11 Add Store Capabilities
Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide
Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Admin Reference Guide. PinPoint Document Management System
Admin Reference Guide PinPoint Document Management System 1 Contents Introduction... 2 Managing Departments... 3 Managing Languages... 4 Managing Users... 5 Managing User Groups... 7 Managing Tags... 9
Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0
Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0 Software Release Notes May 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation 1 New features
Using NCache for ASP.NET Sessions in Web Farms
Using NCache for ASP.NET Sessions in Web Farms April 22, 2015 Contents 1 Getting Started... 1 1.1 Step 1: Install NCache... 1 1.2 Step 2: Configure for Multiple Network Cards... 1 1.3 Step 3: Configure
EPiServer Operator's Guide
EPiServer Operator's Guide Abstract This document is mainly intended for administrators and developers that operate EPiServer or want to learn more about EPiServer's operating environment. The document
PTC System Monitor Solution Training
PTC System Monitor Solution Training Patrick Kulenkamp June 2012 Agenda What is PTC System Monitor (PSM)? How does it work? Terminology PSM Configuration The PTC Integrity Implementation Drilling Down
Symantec Endpoint Protection Shared Insight Cache User Guide
Symantec Endpoint Protection Shared Insight Cache User Guide Symantec Endpoint Protection Shared Insight Cache User Guide The software described in this book is furnished under a license agreement and
GP REPORTS VIEWER USER GUIDE
GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated
Tutorial: Load Testing with CLIF
Tutorial: Load Testing with CLIF Bruno Dillenseger, Orange Labs Learning the basic concepts and manipulation of the CLIF load testing platform. Focus on the Eclipse-based GUI. Menu Introduction about Load
SnapLogic Salesforce Snap Reference
SnapLogic Salesforce Snap Reference Document Release: October 2012 SnapLogic, Inc. 71 East Third Avenue San Mateo, California 94401 U.S.A. www.snaplogic.com Copyright Information 2012 SnapLogic, Inc. All
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Hypercosm. Studio. www.hypercosm.com
Hypercosm Studio www.hypercosm.com Hypercosm Studio Guide 3 Revision: November 2005 Copyright 2005 Hypercosm LLC All rights reserved. Hypercosm, OMAR, Hypercosm 3D Player, and Hypercosm Studio are trademarks
Getting Started with Telerik Data Access. Contents
Contents Overview... 3 Product Installation... 3 Building a Domain Model... 5 Database-First (Reverse) Mapping... 5 Creating the Project... 6 Creating Entities From the Database Schema... 7 Model-First
CRM Setup Factory Installer V 3.0 Developers Guide
CRM Setup Factory Installer V 3.0 Developers Guide Who Should Read This Guide This guide is for ACCPAC CRM solution providers and developers. We assume that you have experience using: Microsoft Visual
APS Package Certification Guide
APS Package Certification Guide Revision 1.0.15 Copyright 1999-2012 by Parallels Holdings Ltd. and its affiliates. rights reserved. All Contents Feedback If you have found a mistake in this guide, or if
Cisco TelePresence Management Suite Extension for Microsoft Exchange
Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide Version 3.0 D14890 04 September 2012 Contents Introduction 5 Requirements 6 System requirements for Cisco TMSXE 6
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
Version 7.7 PREEMPTIVE SOLUTIONS DASHO. User Guide
Version 7.7 PREEMPTIVE SOLUTIONS DASHO User Guide 1998-2015 by PreEmptive Solutions, LLC All rights reserved. Manual Version 7.7 www.preemptive.com TRADEMARKS DashO, Overload-Induction, the PreEmptive
MATLAB Distributed Computing Server with HPC Cluster in Microsoft Azure
MATLAB Distributed Computing Server with HPC Cluster in Microsoft Azure Introduction This article shows you how to deploy the MATLAB Distributed Computing Server (hereinafter referred to as MDCS) with
PORTAL ADMINISTRATION
1 Portal Administration User s Guide PORTAL ADMINISTRATION GUIDE Page 1 2 Portal Administration User s Guide Table of Contents Introduction...5 Core Portal Framework Concepts...5 Key Items...5 Layouts...5
Installation and Administration Guide
Installation and Administration Guide BlackBerry Enterprise Transporter for BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-06 SWD-20141106165936643 Contents What is BES12?... 6 Key features
Samsung Xchange for Mac User Guide. Winter 2013 v2.3
Samsung Xchange for Mac User Guide Winter 2013 v2.3 Contents Welcome to Samsung Xchange IOS Desktop Client... 3 How to Install Samsung Xchange... 3 Where is it?... 4 The Dock menu... 4 The menu bar...
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI)
Sonatype CLM Enforcement Points - Continuous Integration (CI) i Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI) ii Contents 1
Safewhere*PasswordReset
Safewhere*PasswordReset User Guideline 1.0 Page 1 Safewhere*PasswordReset Contents Safewhere*PasswordReset... 2 1. System Requirements... 3 2. Introduction... 3 3. Glossary... 3 4. PasswordReset installer...
Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide
Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Table of Contents TABLE OF CONTENTS... 3 1.0 INTRODUCTION... 1 1.1 HOW TO USE THIS GUIDE... 1 1.2 TOPIC SUMMARY...
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1
Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1 Software Release Notes May 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation 2 New features
Visual Basic. murach's TRAINING & REFERENCE
TRAINING & REFERENCE murach's Visual Basic 2008 Anne Boehm lbm Mike Murach & Associates, Inc. H 1-800-221-5528 (559) 440-9071 Fax: (559) 440-0963 [email protected] www.murach.com Contents Introduction
VPN Configuration Guide. Dell SonicWALL
VPN Configuration Guide Dell SonicWALL 2013 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in part, without the written consent of
Getting Started with Sitecore Azure
Sitecore Azure 3.1 Getting Started with Sitecore Azure Rev: 2015-09-09 Sitecore Azure 3.1 Getting Started with Sitecore Azure An Overview for Sitecore Administrators Table of Contents Chapter 1 Getting
UltraLog HSPI User s Guide
UltraLog HSPI User s Guide A HomeSeer HS2 plug-in to store and retrieve HomeSeer and syslog events Copyright 2013 [email protected] Revised 01/27/2013 This document contains proprietary and copyrighted
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
Installation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
Extensibility. vcloud Automation Center 6.0 EN-001328-00
vcloud Automation Center 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Security Provider Integration LDAP Server
Security Provider Integration LDAP Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
Generating Automated Test Scripts for AltioLive using QF Test
Generating Automated Test Scripts for AltioLive using QF Test Author: Maryam Umar Contents 1. Introduction 2 2. Setting up QF Test 2 3. Starting an Altio application 3 4. Recording components 5 5. Performing
Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure
Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded
Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide
Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72 User Guide Contents 1 Introduction... 4 2 Requirements... 5 3 Important Note for Customers Upgrading... 5 4 Installing the Web Reports
Zoom Plug-ins for Adobe
= Zoom Plug-ins for Adobe User Guide Copyright 2010 Evolphin Software. All rights reserved. Table of Contents Table of Contents Chapter 1 Preface... 4 1.1 Document Revision... 4 1.2 Audience... 4 1.3 Pre-requisite...
PHP Integration Kit. Version 2.5.1. User Guide
PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001
Configuring, Customizing, and Troubleshooting Outlook Express
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide
Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08
Zen Internet Online Data Backup Zen Vault Express for Windows Issue: 2.0.08 Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installation... 5 2.1 The Setup WIzard... 5 3 The Backup Service...
Monitoring and Diagnostic Guidance for Windows Azure hosted Applications
Monitoring and Diagnostic Guidance for Windows Azure hosted Applications Published: June 2010 Overview: This monitoring and diagnostics guide provides information on the tools available for applications
Enterprise Manager Performance Tips
Enterprise Manager Performance Tips + The tips below are related to common situations customers experience when their Enterprise Manager(s) are not performing consistent with performance goals. If you
Aneka Dynamic Provisioning
MANJRASOFT PTY LTD Aneka Aneka 2.0 Manjrasoft 10/22/2010 This document describes the dynamic provisioning features implemented in Aneka and how it is possible to leverage dynamic resources for scaling
User's Guide. ControlPoint. Change Manager (Advanced Copy) SharePoint Migration. v. 4.0
User's Guide ControlPoint Change Manager (Advanced Copy) SharePoint Migration v. 4.0 Last Updated 7 August 2013 i Contents Preface 3 What's New in Version 4.0... 3 Components... 3 The ControlPoint Central
Installing Magento Extensions
to Installing Magento Extensions by Welcome This best practice guide contains universal instructions for a smooth, trouble free installation of any Magento extension - whether by Fooman or another developer,
The Social Accelerator Setup Guide
The Social Accelerator Setup Guide Welcome! Welcome to the Social Accelerator setup guide. This guide covers 2 ways to setup SA. Most likely, you will want to use the easy setup wizard. In that case, you
Online Backup Client User Manual
For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.
Manage Traps in a VDI Environment. Traps Administrator s Guide. Version 3.3. Copyright 2007-2015 Palo Alto Networks
Manage Traps in a VDI Environment Traps Administrator s Guide Version 3.3 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
View Controller Programming Guide for ios
View Controller Programming Guide for ios Contents About View Controllers 10 At a Glance 11 A View Controller Manages a Set of Views 11 You Manage Your Content Using Content View Controllers 11 Container
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327 Mod ule_i D Error _Cod e Error Description 1 1 PROCESSOR_NULLREF_ERROR 1 100 ERROR_PARSE_PAIR Failed
How to test and debug an ASP.NET application
Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult
Java 7 Recipes. Freddy Guime. vk» (,\['«** g!p#« Carl Dea. Josh Juneau. John O'Conner
1 vk» Java 7 Recipes (,\['«** - < g!p#«josh Juneau Carl Dea Freddy Guime John O'Conner Contents J Contents at a Glance About the Authors About the Technical Reviewers Acknowledgments Introduction iv xvi
PSA INTEGRATION GUIDE
efolder ConnectWise PSA Integration Guide Page 1 PSA INTEGRATION GUIDE Last Updated July 2014 Integration Overview ConnectWise PSA is business automation software that helps IT service providers efficiently
HOW TO SETUP SITE-TO-SITE REPLICATION
HOW TO SETUP SITE-TO-SITE REPLICATION Last Updated December 2012 Solution Overview In many cases, an end-user or partner wants to store valuable data offsite, but needs to do so such that the data is stored
