Cloud Portal Guest Invitations 4.0
|
|
|
- Eileen Griffin
- 10 years ago
- Views:
Transcription
1 Release Notes Cloud Portal Guest Invitations 4.0 January 2014 Cloud Portal Guest Invitations 4.0 Release Notes Copyright sentence ( 2014, CTERA Networks. All rights reserved)
2 1 Release Contents Copyright CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission from CTERA Network Ltd. Information in this document is subject to change without notice and does not represent a commitment on part of CTERA Networks Ltd. CTERA, C200, C400, C800, P1200, CloudPlug, NEXT3, Cloud Attached Storage, and Virtual Cloud Drive are trademarks, service marks, or registered trademarks of CTERA Networks Ltd. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. patents, foreign patents, or pending applications. 2 Cloud Portal Guest Invitations 4.0 Release Notes
3 1 Release Contents About This Release Guest invitations are special time-limited URLs containing a secret code that grants the recipient the ability to view a specific file or folder on a Cloud Drive, and to optionally collaborate on those items. In CTERA Portal 4.0, guest invitations include the following highlights: Two-factor authentication Public link Invitation Access and Authentication Logging Two-Factor Authentication In previous versions, CTERA Portal administrators could require invitation recipients to authenticate to the CTERA Portal using their username and password, before they could access shared file/folders. This provided a single layer of protection against unintended recipients accessing the guest invitation URL. CTERA Portal 4.0 supports two-factor authentication for guest invitations. In addition to requiring recipients to authenticate to the CTERA Portal, it is possible to send them a random, 6-digit numeric passcode via , which they must enter in order to access the shared file/folder. To enable two-factor authentication, a CTERA Portal administrator visits the Settings > Invitations page, clicks Settings, and selects Verify with and/or Verify with Text Message. Cloud Portal Guest Invitations 4.0 Release Notes 3
4 1 Release Contents When a portal user wants to share file/folder using two-factor authentication, they access their Cloud Drive, browse to the desired file/folder, and click Invite Guest. 4 Cloud Portal Guest Invitations 4.0 Release Notes
5 Release Contents 1 In the Protection Level field, the user selects Verify by , fills in the rest of the fields, and clicks Invite. The recipient will receive an invitation with a link to the shared file/folder As well as an with a passcode. Cloud Portal Guest Invitations 4.0 Release Notes 5
6 1 Release Contents When the recipient clicks on the link in the invitation, a popup window will prompt them for the passcode. The recipient can only view the shared file/folder after entering the passcode. Protection against Brute Force and DoS Attacks Two-factor authentication is protected against brute force attacks: The user is given five tries to enter the code, after which the code is disabled. In addition, rate limits are employed to restrict the number of authentication requests, so as to protect against denial of service attacks. Bypass of Two-Factor Authentication On private computers, after successfully authenticating using two-factor authentication, the user is given the option of setting their computer as "Trusted". When this option is selected, a 256-bit, unique random key is stored on the user's computer, allowing the user to bypass twofactor authentication challenges and avoid answering challenges from the same device for the next 30 days. 6 Cloud Portal Guest Invitations 4.0 Release Notes
7 Release Contents 1 Public Link In addition to two-factor authentication, it is possible to include a public link in guest invitations. To enable public links, a CTERA Portal administrator visits the Settings > Invitations page, clicks Settings, and then selects Public Link. When a portal user wants to share file/folder, they access their Cloud Drive, browse to the desired file/folder, and click Invite Guest. Then in the Protection Level field, they select Public Link. The recipient will receive an invitation with a public link to the shared file/folder. CTERA administrators can easily copy the link when viewing the invitation in the CTERA Portal's Settings > Invitations page. Cloud Portal Guest Invitations 4.0 Release Notes 7
8 1 Release Contents Invitation Access and Authentication Logging All accesses to invitations, as well as successful or failed two-factor authentication attempts, are logged in the CTERA Portal Access Log. 8 Cloud Portal Guest Invitations 4.0 Release Notes
Release Notes. CTERA Portal 4.1. July 2014. CTERA Portal 4.1 Release Notes 1
Release Notes CTERA Portal 4.1 July 2014 CTERA Portal 4.1 Release Notes 1 1 Release Contents Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any
Cloud Attached Storage
Performing a Bare-Metal Restore Cloud Attached Storage January 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by
Cloud Attached Storage
Backing Up and Restoring SQL Server Databases Cloud Attached Storage February 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in
CTERA Agent Sync Edition for Windows
Quick Walkthrough CTERA Agent Sync Edition for Windows November 2012 Version 3.2 2012, CTERA Networks. All rights reserved. 1 Install CTERA Agent for Windows Tip For more detailed information, refer to
Backing Up and Restoring Microsoft Hyper-V Server Virtual Machines. Cloud Attached Storage. February 2014 Version 4.0
Backing Up and Restoring Microsoft Hyper-V Server Virtual Machines Cloud Attached Storage February 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document
Release Notes. CTERA Portal 4.0. November 2013. CTERA Portal 4.0 Release Notes 1
Release Notes CTERA Portal 4.0 November 2013 CTERA Portal 4.0 Release Notes 1 1 Release Contents Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced
Cloud Attached Storage 5.0
Release Notes Cloud Attached Storage 5.0 March 2015 2015 Cloud Attached Storage 5.0 Release Notes 1 1 Release Contents Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document
How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu 7.5.2 (Windows 7) On Pc Or Ipad
Deploying CTERA Agent via Microsoft Active Directory and Single Sign On Cloud Attached Storage September 2015 Version 5.0 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document
Cloud Attached Storage
Using CTERA Agent in VDI mode Cloud Attached Storage November 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by
Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1
Migrating Your Windows File Server to a CTERA Cloud Gateway Cloud Attached Storage February 2015 Version 4.1 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be
Release Notes. Cloud Attached Storage 2.5.32
Release Notes Cloud Attached Storage 2.5.32 January 2011 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
Backing Up the CTERA Portal Using Veeam Backup & Replication. CTERA Portal Datacenter Edition. May 2014 Version 4.0
Backing Up the CTERA Portal Using Veeam Backup & Replication CTERA Portal Datacenter Edition May 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may
CTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
Cloud Attached Storage 3.1 EA
Release Notes Cloud Attached Storage 3.1 EA March 2012 Cloud Attached Storage 3.1 EA Release Notes 1 1 Release Contents Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document
Release Notes. CTERA Portal 3.2.43. May 2013. CTERA Portal 3.2.43 Release Notes 1
Release Notes CTERA Portal 3.2.43 May 2013 CTERA Portal 3.2.43 Release Notes 1 1 Release Contents Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced
CTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
CTERA Agent File Sync and Share for Mac
Quick Walkthrough for Mac August 2014 Version 4.1 2014, CTERA Networks. All rights reserved. For more detailed information, refer to the for Mac User Guide, available at http://www.ctera.com/support. 1
CTERA Agent for Linux
User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
User Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
CTERA Agent for Windows
User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
CTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
Adding Signer Authentication to an Envelope
DocuSign Quick Start Guide Adding Signer Authentication to an Envelope Overview An important DocuSign feature is the ability to verify the identity of a recipient before they can access documents in an
Remote Storage Area (RSA) Basics
Remote Storage Area (RSA) Basics Table of Contents Remote Storage Area Overview... 3 What is Remote Storage Area?... 3 Who has access to RSA?... 3 How much space is available?... 3 Basic RSA Use... 4 How
Two-Factor Authentication
Two-Factor Authentication The two-factor authentication system provides an additional level of security when signing in to Ryerson web applications via Ryerson s Central Authentication Service. When you
Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox
Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents
CTERA End-to-End Security. Whitepaper by CTERA Networks
CTERA End-to-End Security Whitepaper by CTERA Networks Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
WatchDox for Mac User Guide
WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized
Setting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
Patient Portal. Accessing the Patient Portal. How to Begin: Enter first and last name, date of birth and create a user name and password.
Patient Portal How to Begin: If you provided an email address when you registered as a patient, you can expect an email after your discharge that will be sent directly from CPSI, our Electronic Health
SafeNet Authentication Manager 8.2 and Windows Azure. Quick Start Guide
SafeNet Authentication Manager 8.2 and Windows Azure Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate. SafeNet,
Cloud Attached Storage 3.2.47
Release Notes Cloud Attached Storage 3.2.47 May 2013 Cloud Attached Storage 3.2.47 Release Notes 1 1 Release Contents Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document
How to Configure Guest Management on the DWC-1000
Configuration Guide How to Configure Guest Management on the DWC-1000 Overview This guide describes how to configure and customize a billing profile and generate temporary user account on the D-Link DWC-1000
Access to Webmail services via a Non Trust Computer
Access to Webmail services via a Non Trust Computer Aintree Outlook Web Access has been provided via the AppGate SSL Portal, this service can be accessed from any computer on the Internet. Two factor SMS
NTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
Installation Guide. SafeNet Authentication Service
SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Omniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
Integration Guide. Duo Security Authentication
Integration Guide Duo Security Authentication Revised: 21 January 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration
Microsoft IAS and NPS Agent Configuration Guide
Microsoft IAS and NPS Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Agent IAS and NPS (Microsoft) Configuration
Endpoint Security VPN for Windows 32-bit/64-bit
Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users
StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011.
Email Archiving User Guide Outlook Plugin. Manual version 3.1
Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad
Implementing SSL Offload with JAGUAR Ver.1.0
JAG C TB SSL Offload v1.0 E Implementing SSL Offload with JAGUAR Ver.1.0 T e c h n i c a l B r i e f What is SSL Offload with JAGUAR 5000 Reverse Proxy? JAGUAR 5000 can change HTTP Web Server s service
Juniper SSL VPN Authentication QUICKStart Guide
Juniper SSL VPN Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights
Cloud Authentication. Getting Started Guide. Version 2.1.0.06
Cloud Authentication Getting Started Guide Version 2.1.0.06 ii Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
This document shows new Citrix users how to set up and log in to their Citrix account.
Citrix Set up Set up and Log in to Citrix Objective: This document shows new Citrix users how to set up and log in to their Citrix account. Procedure This document shows you how to set up and log in to
Welcome to Your FCSL Student Web Portal. Course Schedule Students can view and search course schedules and view class details.
Welcome to Your FCSL Student Web Portal Course Schedule Students can view and search course schedules and view class details. Online Registration Online registration allows students to register for courses
Two Factor Authentication - USER GUIDE
Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.
Technology Services Group Procedures. IH Anywhere guide. 0 P a g e
VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple
Receiving Secure Emails
Receiving Secure Emails This document explains how you can access emails that have been sent to you through CyberArk s Secure Email system in several simple steps. When you receive a secure email, you
Initial DUO 2 Factor Setup, Install, Login and Verification
Please read this entire document it contains important instructions that will help you with the setup and maintenance of your DUO account. PLEASE NOTE: Use of a smartphone is the fastest and simplest way
WatchDox for Windows. User Guide. Version 3.9.5
WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to
SafeNet Cisco AnyConnect Client. Configuration Guide
SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0
Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:
Using the Payment Processing Feature
DocuSign Quick Start Guide Using the Payment Processing Feature Overview There might be times when you want to send an envelope where you can send an offer, close the deal and collect the cash all in one
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
NTP Software File Reporter Analysis Server
NTP Software File Reporter Analysis Server Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for installing NTP Software File Reporter Analysis Server from an administrator
WatchDox SharePoint Beta Guide. Application Version 1.0.0
Application Version 1.0.0 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
ClickView Digital Signage User Manual
ClickView Digital Signage User Manual Table of Contents 1. What is ClickView Digital Signage?... 3 2. Where do I find ClickView Digital Signage?... 3 2.1. To find ClickView Digital Signage... 3 3. How
Why Use Blackboard Content System to Store Documents One Time
Set Up Blackboard Drive to Store and Access Assessment Plans and Related Documents This document will walk you through installing the Blackboard Drive application and then configuring it to access the
Strong Authentication for Juniper Networks SSL VPN
Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
CA VPN Client. User Guide for Windows 1.0.2.2
CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
USER GUIDE 2014 AGILE NETWORK, LLC ALL RIGHTS RESERVED
Customer Portal USER GUIDE 2014 AGILE NETWORK, LLC ALL RIGHTS RESERVED Customer Portal TABLE OF CONTENTS Customer Support Process 3 Logging-in to Your Account... 4 Navigating the Portal. 5 Maintaining
FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide
FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide February 5, 2015 Revision 1 Copyright 2015 Fortinet, Inc. All rights reserved.
A Step-By-Step Guide
ONLINE SUPPORT SYSTEM A Step-By-Step Guide Contents About This Guide...3 Who Should Read This Guide...3 Overview...4 Login...5 Report a Problem...7 View Existing Tickets...9 Request a Modification...10
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications
Fax User Guide 07/31/2014 USER GUIDE
Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section
Remote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
Two-Factor Authentication
Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com
Getting Started with Pipeliner 05 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner Learn How to Get Started with Pipeliner Sales CRM Application. CONTENT. Setting up Pipeliner
Quick Start User Guide
The global standard for esignature Quick Start User Guide Using Templates Overview This guide provides an overview of how to use a template when creating and sending an envelope. Templates help streamline
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Welcome to ncrypted Cloud!
Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the
Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note
KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies
Citrix Receiver. Configuration and User Guide. For Windows Users
Citrix Receiver Configuration and User Guide For Windows Users rev: 26.01.2016 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP
WatchDox for Windows User Guide. Version 3.9.0
Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or
Secure File Transfer Guest User Guide Updated: 5/8/14
Secure File Transfer Guest User Guide Updated: 5/8/14 TABLE OF CONTENTS INTRODUCTION... 3 ACCESS SECURE FILE TRANSFER TOOL... 3 REGISTRATION... 4 SELF REGISTERING... 4 REGISTER VIA AN INVITATION SENT BY
Two-Factor Authentication
Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012
StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which
Cisco ASA Authentication QUICKStart Guide
Cisco ASA Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved.
Dell Mobile Management. Apple Device Enrollment Program
Dell Mobile Management Contents Dell Mobile Management 3 Setting up the 3 DMM Device Deployment Program Prerequisites 4 Configure Apple VPP Token in DMM 5 Download Apple VPP Token 5 Assign VPP App Licenses
ELM Server Exchange Edition Virtual Archive Mailbox version 5.5
ELM Server Exchange Edition Virtual Archive Mailbox version 5.5 Copyright 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc., registered in the U.S. and/or other countries.
RedBlack CyBake Online Customer Service Desk
RedBlack CyBake Online Customer Service Desk Publication Date: June 2014 Copyright Copyright 2014 RedBlack Software Ltd. All rights reserved. Complying with all applicable copyright laws is the responsibility
Manual POLICY PATROL SECURE FILE TRANSFER
Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
Using Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
Mac OS X User Manual Version 2.0
Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
ProxySG TechBrief Downloading & Configuring Web Filter
ProxySG TechBrief Downloading & Configuring Web Filter What is Content Filtering? URL filtering is the process of limiting a user s Web site access through a policy that is associated with a specific URL
Using YSU Password Self-Service
Using YSU Password Self-Service Using YSU Password Self-Service Password Self-Service Web Interface Required Items: YSU (MyYSU) Directory account, Web browser This guide will assist you with using the
SFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org
SFTP Server User Login Instructions Open Internet explorer and enter the following url: https://sftp.sae.org You will be prompted for a user id and password as such. Please enter your account id and password.
How to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
Citrix Receiver. Configuration and User Guide. For Macintosh Users
Citrix Receiver Configuration and User Guide For Macintosh Users rev: 25.03.2015 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP
Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step
Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Guide Microsoft Corporation Published: July 2009 Updated: September 2009 Abstract Remote Desktop Web Access (RD Web
RSA SecurID Software Token 1.0 for Android Administrator s Guide
RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
NovaBACKUP Remote Workforce Version 12.5 Cloud Restore
NovaBACKUP Remote Workforce Version 12.5 Cloud Restore NovaStor / November 2011 Rev 20111114 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and
http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
