USER GUIDE: MaaS360 Financial IT Reg Enforcement Service

Size: px
Start display at page:

Download "USER GUIDE: MaaS360 Financial IT Reg Enforcement Service"

Transcription

1 USER GUIDE: MaaS360 Financial IT Reg Enforcement Service

2 Copyright 2011 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of those agreements. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Fiberlink Corporation. All brands and their products are trademarks or registered trademarks of their respective holders and should be noted as such. Fiberlink Corporation 1787 Sentry Parkway West Blue Bell, PA

3 Table of Contents Introduction... 7 Major Features... 8 Navigation... 8 The Tabs... 8 My Reg Watch List... 9 Watch List s Managing Policies and Portal Administrators Policy Management and Configuration Portal Administrator Management Add User Edit User Delete User Search for Deleted Administrators Reset User Password Reactivate Locked Administrator Accounts MaaS360 Device Management View Overview Accessing the Device Views View All Devices Screen Smart Search Device Views Headings Summary View Hardware Inventory View Network Information View Software Installed View Operating System View Missing OS Patches View Missing Application Updates View Endpoint Security View Data Protection View Compliance Incidents View Internet Connections View VPN Connections View MaaS360 Services View Change History View Remote Control Software Distribution Manage Packages Distribute Package Manage Distributions Software Distributions from the Device Management Screen Reports Overview Types of Reports Graphs and Charts Tabs

4 Filters Saving a Filter Using a Saved Filter Summary-to-Detail Drill-Down Views Printing and Downloading Report Information Navigating to Different Pages Agent Reports Agent Details Agent Details Tab Agent Policy Details Tab Any Connection Reporting Connection Details Tab Any Connection Details Report Wi-Fi Connection Details Tab Wi-Fi Connection Details Report VPN Usage Reports VPN Overview Tab Devices by Last VPN Connection Report Total VPN Connections (Top 10) Report VPN Connected Networks Report Total Connections and Average VPN Duration (Minutes) Report VPN Summary Tab VPN Connections Summary Report VPN Details Tab VPN Connections Details Report Policy Enforcement Reports Policy Enforcement Summary Tab Out-of-Compliance Events by Application Report Out-of-Compliance Events by Cause Report Out-of Compliance Enforcement Actions Report Out-of-Compliance Events (Last 7 Days) Report Devices Out-of-Compliance (Top 10) Report Devices by Out-of-Compliance Events Report Out-of-Compliance Events Tab Out-of-Compliance Events Report Enforcement Actions Tab Out-of Compliance Enforcement Actions Report Compliance Details Tab Out-of-Compliance Events and Enforcement Actions Report Hardware Inventory Reports Device Summary Tab Device Summary by Manufacturer (Top 10) Free Space on System Drive Physical Memory Installed Operating System Summary Hardware Identity Tab Hardware Identity Report Hardware Capacity Tab Hardware Capacity Report Operating System Tab

5 Operating System Details Report Network Information Tab Network Information Details Report Software Inventory Reports Installed Software Tab Installed Software Report Software Details Tab Software Details Report Endpoint Security Reports Endpoint Security Summary Tab Installed Endpoint Security Applications Report Devices by Anti-Virus Definition Age Report Devices by Anti-Virus Version (Top 10) Report Devices by Personal Firewall Version (Top 10) Devices by Personal Firewall Status Summary by Device Tab Endpoint Security Details Report Anti-Virus Tab Anti-Virus Details Report Personal Firewall Tab Personal Firewall Details Report Patch Management Reports Patch Management Overview Tab Devices Missing Critical Microsoft Patches Report Total Missing Microsoft Patches by Severity Report Patch Summary by Device Tab Devices Missing Critical Microsoft Patches Report Summary by Patch Tab Missing Microsoft Patches Summary by Patch Report Patch Details Tab Missing Microsoft Patch Details Report Microsoft Patch Deployments Tab Microsoft Patch Deployments Report Data Protection Reports Data Protection Summary Tab Installed Data Protection Applications Report Devices by Encryption Status Report Devices by Encryption Application (Top 10) Report Summary by Device Tab Summary by Device Report Encryption Tab Encryption Details Report End User Instructions Starting the Application Minimizing the Application Window Using Online Help Viewing Version and Copyright Information Getting Status Details Main View Status for Individual Applications

6 Overall Status System Tray Icons Compliance Icon Background Update Icon Message History Activity Log Activity Log Codes Uploading the Activity Log Adjusting Preferences Changing the Language for the Service Updates Getting Policy and Software Updates Troubleshooting Troubleshooting Compliance Events

7 Introduction MaaS360 s Financial IT Reg Enforcement Service allows Fiberlink customers to see detailed information about their end users computers. It also allows you to define the steps it should take if a device is out of compliance. You can see information about the hardware and software on your end users computers, and the status of the security applications protecting them. After you load the software, it reports in to the MaaS360 Management Center where you can see graphs, charts and reports showing how well these computers are protected. It can show you how many of your users have no anti-virus protection, and how many have the software but the definitions are out of date. It can show you which computers are missing critical operating system patches and which drives on each computer are encrypted. You can then take action to enforce compliance to corporate security policies, as necessary. MaaS360 s Financial IT Reg Enforcement Service reports provide information about the following: 1. Hardware Inventory 2. Network Information 3. Software Installed 4. Operating System 5. Missing OS Patches 6. Missing Application Updates 7. Endpoint Security 8. Data Protection 9. Compliance Incidents 10. Internet Connections 11. VPN Connections 7

8 Major Features Navigation The user interface provides easy-to-use navigation with links, menus and tabs, allowing quicker access to the available applications. Links on the My Reg Watch List window take you directly to reports showing potential problems you may want to address immediately. Links on the Financial IT Reg Enforcement Suite window take you directly to reports you can use to proactively manage your organizations devices. Tabs correspond to a related set of available applications or tasks. The menus show the individual workflows, reports, etc. for the portal user. To access the menus, move your mouse over the tab and the menu will appear. Then click once to access the item. The Tabs A breadcrumb trail allows you to move backwards through different screens. Links on the right side of the page provide quick access to additional information about the MaaS360 Financial IT Reg Enforcement Service, how to get help, etc. The MaaS360 Platform includes the following tabs: 1. Home - takes you to the Home screen. 8

9 2. Manage allows you to manage your portal administrators, and provides access to the Device Summary Report. Depending on the services you are using, you may also be able to manage your policy from this tab. 3. Reports provides access to the MaaS360 Platform reports. 4. Support displays the Get Help page, which has a variety of resources to help you. My Reg Watch List The My Reg Watch List block appears at the top of the Home page. It shows you critical information about your endpoints and allows you to access the details you need to remediate problems. For example, the MaaS360 Platform will tell you if any of your devices do not have Anti-Virus or Personal Firewall software installed. You can click on the Watch List to see a list of those devices. The MaaS360 Platform displays how many devices are in a potentially problematic situation, allowing you to rectify the situation promptly. Watch List items include the following: Devices that do not have Anti-Virus or Personal Firewall software Devices that are missing at least one critical patch Devices with disabled Anti-Virus software Devices with disabled Personal Firewall software Anti-Virus definitions that are older than seven days Devices that do not have Encryption software You can click on each Watch List item to see a MaaS360 report that shows you detailed information about that item. In many cases report with filters set up to show the devices that meet the Watch List criteria. For example, if you click on the Watch List item for devices with disabled personal firewall software, MaaS360 automatically displays the Personal Firewall Details Report with the Status filter set to Stopped. 9

10 Watch List s An will be sent each week to the address on file for the account. It shows the Watch List items that could prove to be a problem for your organization. The Watch List items are links if you click on them you will be taken to a MaaS360 report that has the details about that item (after you log in). You can choose to opt out of these s, if you wish, by performing the following steps: 1. Log into MaaS360 as usual. 2. Click the My Profile button at the top of any screen. 10

11 3. Click the Edit button at the bottom of the screen. 4. Change the Subscribe to My Watch List Alert from Yes to No, and click Save. 11

12 Managing Policies and Portal Administrators To make your MaaS360 Services run smoothly, there are a few basic maintenance tasks that a portal administrator will need to do. All of these workflows are accessible from the Manage tab. Policy Management and Configuration MaaS360 uses policies to govern everything from what should happen if a device has no anti-virus software to the Help Desk message that is displayed to the user. You can have multiple policies in your organization, but a device can only have one policy at a time. When a device is enrolled, it receives the default policy automatically. You can customize that policy or create different policies as necessary. Start by reviewing the default policy: 1. Click Step 3 on the Getting Started Checklist on the Home page. 2. Review the settings in the policy, reviewing the items on each of the tabs. Click Edit to make changes. 3. Make your changes. If you are finished and want to revise the policy later, click Save. If you want to distribute the new policy to users immediately, click Save and Publish. 12

13 4. Click Back to Results to see the policy. 5. The status of the policy has changed. It will be Needs Publish or Published, depending on whether you have published it or not. A policy must be published before it can be given to anyone. Every 15 minutes, the last saved policy (if there is one) is made available to your users, and the version number at the top of this page is incremented. Your end users will receive the updated policy automatically the next time they access the Internet. Portal Administrator Management Portal administrators can create portal administrators and give them the appropriate access. These users do not necessarily have the MaaS360 service software on their own machines. 13

14 Add User Administrators can create new portal administrators and assign them one or more roles. To add a new portal administrator: 1. Mouse over the Manage tab. 2. Select Add User under the Create Portal Administrators heading. 3. Enter the user name in the User Name field. Make sure it has a minimum of six characters. 4. Enter a valid address in the Address field. The password for this person will be automatically generated and sent to this address. 5. Click to select one or more roles to assign to the new user. When you click to select a role, the role description appears in the Role Description field. 6. Click the arrow buttons to move selected options or all options between the fields. 7. Click Add to finalize the changes. 8. A message confirms successful addition of the user and roles. Edit User Administrators can view, edit, or delete a portal administrator s role assignments. To edit portal administrator role assignments: 1. Hover over the Manage tab. 2. Select Manage Portal Administrators to view the Search Portal User screen. 14

15 3. Enter or select desired search criteria in the User Name box, the Address box and the Role drop-down list, if required. 4. Click Search to view results matching the entered search criteria. 5. Click the Edit icon associated with the user to view the Edit Portal User screen. 6. Click the arrow buttons to move selected roles or all roles between the fields, as necessary. 7. Click Save to save your changes and view the confirmation message. Delete User To delete a portal administrator: 1. Hover over the Manage tab. 2. Select Manage Portal Administrators to view the Search User screen. 15

16 3. Enter or select desired search criteria in the User Name box, the Address box and the Role drop-down list, if required 4. Click Search to view results matching the entered search criteria. 5. Click the Delete icon to delete the selected portal administrator accounts. A deletion confirmation message displays. Search for Deleted Administrators As part of the User Management Audit feature, the new Search for Deleted Administrators menu item allows you to search and view a list of all deleted portal administrator accounts and the associated audit details. To view deleted administrator accounts: 1. Mouse over the Manage tab, and select Search for Deleted Administrators. 2. Enter or select desired search criteria in the User Name field, the Address box and the Deletion Date boxes, if required. 3. Click Search. Results matching the search criteria display. 16

17 4. Click the Audit History icon to view the View Change History screen. 5. If required, click the View Change link to view the View Changes screen. Note: Items are highlighted in yellow to indicate a changed value, green text indicates a new value, and text with a red strike-through indicates that the value was deleted. Reset User Password You can also reset a user password. You may choose to reset a password when a user has forgotten his password or if a new portal user has requested you to reset and resend his password. To reset a portal administrator password: 1. Mouse over the Manage tab and click Manage Portal Administrators menu to view the Search Portal User screen. 17

18 2. Enter or select desired search criteria in the User Name field, the Address field or the Role drop-down list, as necessary. 3. Click Search. Results matching the search criteria display. 4. Click the Reset icon to reset the password. 5. The Reset Password Confirmation message displays. 6. Click Confirm to reset the selected portal administrator s password. A confirmation message displays. The new password will be sent to the portal administrator s address. Reactivate Locked Administrator Accounts Due to the enhanced security features in the MaaS360 Services, if a user belonging to the MAS authentication domain enters an incorrect password five times consecutively, then the user account will be locked. If a user account is locked, it can be reactivated through the Manage Portal Administrators workflow. 18

19 To reactivate a locked administrator account: 1. Mouse over the Manage tab and click Manage Portal Administrators to view the Search Portal User screen. 2. Enter the desired search criteria. 3. Click Search to view the results matching the entered criteria. 4. Click the Reactivate icon to reactivate the locked user account. The Reset Password Confirmation screen displays. 5. Click Confirm to reactivate the locked user account. The Password Reset screen displays a confirmation message. The user account is reactivated and a new system-generated password is sent to the user s address. 19

20 MaaS360 Device Management View Overview Device views provide detailed information about individual devices. This information can be useful for managing licenses, migrations and troubleshooting. The information in these views is collected and displayed in real- or near real-time, instead of daily as with the reports you find in the Reports tab. A unique identifier other than computer name is also used. As a result: Due to timing differences, you may find that data appears in your device views a few hours before it appears in your reports. Device views can show data about inactive devices but reports include only active ones. Device views can show multiple security applications, if they are installed on the device. The views will indicate which applications, if any, are running. Device view data is updated 15 minutes after a device heartbeats in to the server. Accessing the Device Views Many reports in MaaS360 list the Computer Name as a link. If you click the link, you will display the Device View for that endpoint. After viewing the information about the device, click Back To Results to return to the View All Devices screen. 20

21 You can also access the Device View for an endpoint from the View All Devices screen, and by performing a Smart Search. View All Devices Screen Access the screen by performing the following steps: 1. Mouse over the Manage tab. 2. Select View All Devices. The View All Devices screen appears. You can customize the columns displayed on the field by clicking the arrow to the right of each column, then selecting Columns. 21

22 Check the items you want to see on the screen. You can save your choice by selecting the Save Column Preference button. You can update the data on the screen by selecting the Refresh Data button. 22

23 You can search for a particular device using the filter at the top of the screen. Select a column, enter the search criteria and click Search. When you find the device you want, click the Computer Name. Smart Search You can also find a device by performing a Smart Search. 1. Mouse over the Manage tab and select Smart Search. 23

24 2. Specify if you want to search for Active Devices, Inactive Devices, or All Devices, and then specify when the devices should have reported in to the Fiberlink servers. 3. Enter the specific items you want to search for. You can use Boolean operators to search for more than one criterion at a time. Three conditions are available by default, but you can add more by clicking the green plus icon. 24

25 Category Attribute Operator Criteria The Device View where you would find the information about the attribute. Specific data item you are searching for. Operator for the search. Depending on the attribute, it could be Contains, Doesn t Contain, Begins With, Ends With, Equal To, Not Equal To, Between, and more. Value to be included in the search. Depending on the attribute, it could be text, a number, or a date. 4. Click Search to see the results. Device Views 5. Click on the Computer Name to see the Device View for that endpoint. The different Device View screens show specific details about the endpoint. The Summary View is the default. Select a different option from the pull-down menu to see the different device views for the selected device. Note: Depending on the MaaS360 services your organization has implemented, some of the options listed on the menu may not be visible. Contact your account representative for more information. 25

26 Headings The following four fields appear at the top of each view: OS Username Last Reported (GMT) Custom Asset Number License Status Username used to log into the computer. Last date that the computer contacted the Fiberlink servers. Unique identifier for the device as defined by your organization. Specifies if the device s license is Active or Inactive. All the views include following: The Actions button, which allows you to make the device inactive. It will not appear on views or in searches (unless you search for inactive devices) until the devices reports in to the Fiberlink servers. The Refresh button, which updates the information on the screen. The Device Online Status icon, which indicated if the device is online ( ) or offline ( ). The Back to Results button, which takes you back to the list of devices. Summary View The first screen you see when you access the device view is the Summary screen. It shows general information about the device and can help with basic troubleshooting. 26

27 The view contains the following fields: MaaS360 Services Service Package Name of the MaaS360 service package running on the computer. Installed Date Date the MaaS360 service was installed on the device. Hardware Manufacturer Company that made the computer. Model Model of the computer. Physical Memory Amount of physical memory the computer has. Installed Free Space on Percentage of the space on the system drive that is free. System Drive Operating Device s operating system. System Office/Location Custom attribute used to define the primary location of the device. Security Anti-Virus Status Specifies if anti-virus software has been installed on the device, and if it is Running or Stopped. Anti-Virus Definition Date Anti-Spyware Status Personal Firewall Status Encryption Status Last Backup Microsoft Auto- Update Status Number of Missing Critical OS Patches Date that the last anti-virus definitions were downloaded and installed on the device. Specifies if anti-spyware software has been installed on the device, and if it is Running or Stopped. Specifies if personal firewall software has been installed on the device, and if it is Running or Stopped. Shows where the device is in the encryption process. Date of the last backup. Displays how Microsoft automatic updates are being handled. Shows how many critical security operating system patches are missing from the device. Hardware Inventory View This report shows detailed information about the device s hardware. 27

28 The view contains the following fields: Basic Information Manufacturer Company that made the computer. Model Model of the computer. Computer Model Model ID of the computer. ID Motherboard Serial Number BIOS Serial Number BIOS Date Date of the BIOS software. Processor Computer s processor. Physical Memory Amount of physical memory the computer has. Installed WMI Status Serial number of the computer s motherboard (Windows) or the Apple serial number (Mac). Serial number of the basic input/output system boot firmware (Windows) or the boot ROM version (Mac). Specifies if the Windows Management Interface (WMI) is Running or Stopped. Test Device Indicates if the device is defined as a test machine. OS Username Last username that was used to log into the computer. User Access Specifies the access level of the last logged in user. Level CD/DVD Name Name of the CD/DVD drive. Local Timezone Configured local time for the device. Number of Drives Number of drives on the device. Drive Information Note: These fields will be repeated for each of the device s drives. Drive Size Amount of space on the drive. Free Space Amount of free space on the drive. Drive Label Drive identifier. File System Type Drive s file system type. System Drive Indicates if this is the system drive. Custom Attributes Custom Asset Custom inventory number for the device. Number Device Owner Name of the device s owner. Vendor Vendor from whom the device was purchased. 28

29 Purchase Order Number Purchase Type Purchase Date Purchase Price Warranty Number Warranty Type Warranty Expiration Date Office/Location Department Business Unit Comments Purchase order number for the device. Type of purchase, as defined by your organization. Date the device was purchased. Cost of the device. Identification number of the warranty. Type of warranty. Date the warranty expires. Primary physical location of the device. Department to which the device or device owner belongs. Field where you can enter any additional information or comments about the device. Network Information View This view shows detailed information about the networks the device uses. The fields will be repeated if the device uses more than one network. The view contains the following fields: Domain/Workgroup Adapter Adapter Type Adapter ID IP Address Subnet Mask DHCP Enabled MAC Address DNS Servers Gateway Device Driver Name Device Driver Version Device Driver Date Domain or workgroup to which the device belongs. Basic information about the adaptor. Type of network adaptor. Adaptor ID. IP address for the device. Bit mask covering the number of bits used in the prefix of the IP address. Indicates if Dynamic Host Configuration Protocol is enabled for the network adaptor. Unique identifier assigned by the adaptor s manufacturer. Domain Name System identification of the adaptor s servers. Identifier of the network node. Name of the program that allows other applications to interface with the device. Version of the device driver. Date of the device driver version. 29

30 Software Installed View The Software Installed view lists all the applications installed on the device. The view contains the following fields: Application Vendor Application Name Version Installed Date Company that provides the application. Name of the software application. Version number of the application. Date the application was installed. Operating System View This view shows detailed information about the device s operating system, and the operating system patches that have been installed. The view contains the following fields: Operating System OS Edition Operating system on the computer. Edition of the operating system. 30

31 Service Pack OS Architecture Version Default OS Language Microsoft Auto- Update Status Installed OS Patches Patch Name Patch Category Vendor Product Severity KB ID Bulletin ID Latest service pack installed on the computer. Specific architecture of the operating system. Operating system s version. Default operating system language. Specifies how automatic updates from Microsoft will be handled. Name of the patch. Click to see a description of the patch from the vendor s web site. Type of patch. Company that provided the patch. Software that needed the patch. How critical the patch is. Knowledgebase identification number of the patch. Bulletin that discusses the patch. Missing OS Patches View The Missing OS Patches view shows all the patches that are available for the device, but have not been installed. Patch Name Patch Category Vendor Product Severity KB ID Bulletin ID Name of the patch. Click to see a description of the patch from the vendor s web site. Type of patch. Company that provided the patch. Software that needed the patch. How critical the patch is. Knowledgebase identification number of the patch. Bulletin that discusses the patch. Missing Application Updates View This view shows missing application updates from vendors like Adobe and Apple. 31

32 The view contains the following fields: Application Update Name Application Update Category Vendor File Size (MB) Release Date Missing Application Update Detected Date Name of the update that is missing. Type of update that is missing. Company that provided the update. Download size of the update. Date the update became available. Date that MaaS360 determined that the update was missing. *This view is updated daily. Endpoint Security View The Endpoint Security view displays information about your security applications. It will show all the applications installed on the device, even if they are not currently enabled. The view has the following fields: Anti-Virus 32

33 Anti-Virus Detected Number of Vendors Vendor Indicates if an anti-virus application has been installed on the device. Specifies how many anti-virus applications have been installed on the device, whether they are running or not. Company that supplied the anti-virus application. Note: The following fields will be repeated for each unique vendor. Application Name Version Installed Date Status Anti-Virus Definition Date Anti-Virus Definition Last Scan Date Personal Firewall Personal Firewall Detected Number of Vendors Vendor Name of the anti-virus application. Version of the software. Date the application was installed. Specifies if the anti-virus application is Running or Stopped. Date of the most recent definition update. Definition s identifier. Date of the most recent anti-virus scan. Indicates if a personal firewall application has been installed on the device. Specifies how many personal firewall applications have been installed on the device, whether they are running or not. Company that supplied the personal firewall application. Note: The following fields will be repeated for each unique vendor. Application Name of the personal firewall application. Name Version Version of the application. Installed Date Date the application was installed. Status Specifies if the application is Running or Stopped. Anti-Spyware Anti-Spyware Indicates if an anti-spyware application has been installed on the device. Detected Number of Vendors Vendor Specifies how many applications have been installed on the device, whether they are running or not. Company that supplied the anti-spyware application. Note: The following fields will be repeated for each unique vendor. Application Name of the anti-spyware application. Name Version Version of the software. Installed Date Date that the application was installed. Status Indicates if the application is Running or Stopped. Anti-Spyware Date of the most recent definition update. Definition Date Anti-Spyware Definition s identifier. Definition Last Scan Date Date of the most recent anti-spyware scan. Data Protection View The Data Protection view shows the data protection applications resident on the device. Data protection applications include: 33

34 Data encryption Peripheral protection Backup and recovery Data leak prevention The view includes the following fields: Data Encryption Data Encryption Indicates if a data encryption application has been installed on the device. Detected Number of Specifies how many data encryption applications have been installed on Vendors the device, whether they are running or not. Vendor Note: The following fields will be repeated for each unique vendor. Application Name of the data encryption application. Name Version Version of the software. Installed Date Date the software was installed. Encryption Current state of encryption application. Status Encrypted Drives Names of the encrypted drives. Peripheral Protection Peripheral Protection Detected Number of Vendors Application Name Application Vendor Version Installed Date Status Backup & Recovery Indicates if a peripheral protection application has been installed on the device. Specifies how many peripheral protection applications have been installed on the device, whether they are running or not. Name of the peripheral protection application. Company that provided the software. Version of the software. Date the software was installed. Specifies if the application is Running or Stopped. 34

35 Backup & Recovery Detected Number of Vendors Vendor Indicates if a backup and recovery application has been installed on the device. Specifies how many backup and recovery applications have been installed on the device, whether they are running or not. Note: The following fields will be repeated for each unique vendor. Application Name of the backup and recovery application. Name Version Version of the software. Installed Date Date the software was installed. Status Indicates if the software is Running or Stopped. Last Backup Date of the most recent backup. Next Backup Date of the next scheduled backup. Backup Limit Maximum amount of data that can be backed up. Data Leak Prevention Data Leak Prevention Detected Number of Vendors Application Name Version Installed Date Status Indicates if a data leak prevention application has been installed on the device. Specifies how many data leak prevention applications have been installed on the device, whether they are running or not. Name of the data leak prevention application. Version of the software. Date the software was installed. Indicates if the software is Running or Stopped. Compliance Incidents View This view displays out-of-compliance events for the specified period. It also shows the actions that the service took as a result, which are defined by your policy. The view has the following fields: Event Date/Time When the event took place. OS Username Username used to log into the computer. 35

36 Event Type Application Type Application Name Description Type of out-of-compliance event. Type of security application that fell out of compliance. Name of the security application. Action taken by the MaaS360 as a result of the event. The action is determined by policy. *This view is updated daily. Internet Connections View This view shows the different Internet connections made by the device, no matter which connection manager it uses. The view contains the following fields: Start Time End Time Connection Duration (Minutes) OS Username Adaptor Name Connection Type IP Address Subnet Mask Connection Speed Bytes In (MB) Bytes Out (MB) *This view is updated daily. Date and time the connection started. Date and time the connection ended. Total duration of the connection. Username used to log into the computer. Manufacturer and model of the network adapter. Type of connection that was made (e.g., VPN, Home) IP address for the device. Bit mask covering the number of bits used in the prefix of the IP address. Speed of the connection. Amount of data downloaded onto the computer during the connection. Amount of data sent by the computer during the connection. VPN Connections View The VPN Connections view shows the different VPN connections made via the device for the specified timeframe. 36

37 The view contains the following fields: Start Time End Time Connection Duration (Minutes) OS Username VPN IP Address Subnet Mask Connected Network Date and time the VPN connection started. Date and time the VPN connection ended. Total duration of the connection. Username used to log into the computer. Type of VPN that was used. IP address for the device. Bit mask covering the number of bits used in the prefix of the IP address. Network that made the connection. *This view is updated daily. MaaS360 Services View The MaaS360 Services view displays the MaaS360 service package that is installed on the device and modules that package contains. This information is particularly useful if you need to contact Fiberlink s Customer Support. The view contains the following fields: Basic Information Service Package MaaS360 Service Package name that is installed on the device. Installed Date Date and time that the core product was installed (GMT) Agent Version Version of the installed core product. 37

38 EEA Status Number of Active Modules Module Specifies if EEA is Running or Stopped. Number of MaaS360 modules currently active on the device. Note: The following fields will be repeated for each module. Version Version of the module. Activation Date Date and time that the module was activated on the device. Other MaaS360 Services Service Name Name of additional Fiberlink services that may be installed on the device. Policy Update Username of the person who last updated the device s policies. Username Policy Set Name of the policy set in use on the device. Policy Groups Details about the four policy groups that comprise the policy set. Last Policy Date and time of the last policy update for the device. Update Date Change History View This view shows how the device s information has been modified over the specified timeframe. The view contains the following fields: Change Date Date and time the change was made. Change Made By Username of the person who changed the account. IP Address IP address of the person who made the change. Attribute Name Attribute that was changed. Old Value Original value of the attribute. New Value Final value of the attribute. 38

39 Remote Control MaaS360 s Remote Control feature works with many of the most popular remote control applications to help you troubleshoot your devices. You can take control of an end user s device without manually entering an IP address or initiating a connection. MaaS360 supports the following remote control applications: Microsoft Remote Desktop RealVNC UltraVNC TightVNC DameWare To use the Remote Control feature, you must have at least one of these applications installed on your device and the endpoints. You must also have permission to access those endpoints. If you do not have any of those applications, you may use one of the web-based applications. You should have Webex, Citrix, or a similar application installed on your device. Before using this feature, you must set it up. 1. Mouse over the Manage tab and select Remote Control Settings. 39

40 2. Select all of the remote control applications you are using. Select the checkbox for each one, and enter the location. 3. When you are finished, save your changes. To take control of a device, perform the following steps: 1. Mouse over the Manage tab and select Remote Control. 40

41 2. MaaS360 displays a list of the devices that have one or more of the supported Remote Control applications. You can use the filters to reduce the number of devices listed. 3. When you find the device you want, click Take Control. 41

42 4. A pop-up box appears with last reported IP addresses used by the device and the remote control applications information from the Remote Control Settings. Review the information, and select an IP address and remote control application. Click Take Control. MaaS360 will automatically launch the remote control application, seed the IP address information, and connect to the device. 42

43 Software Distribution The Software Distribution module allows the Administrator to distribute software applications and non-executable files to end user devices on or off the corporate network. Devices include laptops, desktops, tablets, smartphones, and mobile devices. The Software Distribution module under the Manage tab includes the following menu options: Manage Packages Distribute Packages Manage Distributions If you wish to upload a package, navigate to the Manage > Manage Packages screen, click the Upload Package button and select the type of package that you wish to upload. The Upload Package screen allows you to upload a package that you wish to distribute or install on your end user devices. A package can include an executable file that will be installed on the end user device or a non-executable file that will be downloaded to a desktop or a mobile device. 43

44 The available package types that you can upload include: Application (Windows Computers) Enterprise Application (ios) App Store Application (ios) Document (ios) Application (Windows Computers) allows you to upload packages for Windows Desktops and Laptops. Enterprise Application (ios) allows you to upload enterprise applications for ios devices. 44

45 App Store Application (ios) allows you to upload applications using the Apple itunes and the Apple App Store applications. Document (ios) allows you to upload documents to Apple ios devices On the Upload Package screen, the Total Storage Space and the Available Storage Space sections display the present space limit that is available on the Upload Server. The size of the package that you wish to distribute or install on your end user devices must be less than the Available Storage Space. Manage Packages The Manage > Manage Packages option shows the Manage Packages screen, which allows you to search and view all the available packages. The Manage Packages screen displays the Package Name, Platform, Filename, Package Type, File Size (MB), Status, Upload Date (GMT), and the Uploaded By details. Clicking the associated Distribute Package icon allows you to distribute the package. 45

46 Select the desired filter criteria and click Search to narrow the search results. If required, click the Upload Package button to upload a package or distribute a package from the Manage Packages screen. Clicking the Audit History button at the bottom of the screen displays a list of all actions that were performed on the package. Click Back To Results to return to the Manage Packages screen. If required, select CSV or Excel format option and click Export to export the displayed results. Clicking on a Package Name displays the associated View Package Details screen. Clicking the Package Details menu displays the Package Distributions menu option. Selecting the Package Details > Package Distributions option on the View Package Details screen displays the Distribution Name, Target Devices, Status, Distribution Date (GMT), Distributed By, Relevant Devices, and Successful Devices information for any actions that have been created referencing this package. Clicking the Actions menu displays the Distribute and the Delete actions. The Distribute action displays the Distribute Package screen, which allows you to distribute a package to a specific device, a device group or to all devices. The Distribute Package screen allows you to upload a package that you wish to distribute and install on your end user devices. A package can include an executable, 46

47 which must be installed or a non-executable file that will be downloaded to the device. The Delete action allows you to delete a package. Once a package is deleted, it can no longer be used in distributions. Any active distributions that reference the deleted package will be disabled. If you have also purchased the MaaS360 Mobile Device Management solution, clicking the Actions menu displays the Distribute, Update Provisioning Profile, Upgrade Package, and the Delete actions, as shown below. Every ios application is associated with a provisioning profile. An ios application is verified for its authenticity based on its provisioning profile which is embedded in the ios Package. ios Enterprise Applications requires a provisioning profile that authenticates your devices and allows them to use the application. You can create a provisioning profile by accessing the ios provisioning portal at Ensure that the provisioning profile matches the Bundle ID of the Enterprise application that you wish to distribute. The provisioning profile must also include an application expiry date. The Update Provisioning Profile action allows you to update an existing ios provisioning profile. 47

48 The Upgrade Package action allows you to upgrade an existing ios package. The Delete action allows you to delete a package. Once a package is deleted, it can no longer be used in distributions. Any active distributions that reference the deleted package will also be stopped. Distribute Package The Manage > Distribute Package option displays the Distribute Package screen, which allows you to distribute a package to the end user devices. Click the Search Package icon next to the Package text box to view a list of all the available packages. Alternatively, enter a few characters of a Package Name to view a list of all package names that include the entered string of characters. Click on a Package Name link to select the package. Select the desired Execution Behavior. If you wish to install an executable file, then select the Execute Package option and enter the execution command with the associated command options. If you wish to distribute a non-executable file that will be downloaded or saved to a location, then select the Save Package option. If required, enter the folder location where you wish the package to be automatically downloaded on the end user device. If you do not enter the drive letter in the Save Package text-box, the entered value will be used to create a folder in the Visibility Service s installation path. By default, C:\ Program Files\MaaS360\MaaS360 Visibility Service\ is the folder location where the distributed package will be saved. 48

49 Select the desired Target Devices for distribution of the package. To ensure efficient Internet bandwidth utilization, select the most suitable Distribution Behavior option. The Distribution Name field is automatically populated. Make changes, if required. Enter a relevant package description in the Description field. On the Distribute Package screen, select a desired option and hover your mouse pointer over the associated information icons to view more details, if required. Clicking the Advanced Settings button allows you to configure advance settings in the Advanced Settings pop-up window. Click Save Settings to save the Advanced Settings. Clicking the Distribute button on the Distribute Package screen allows you to review the package distribution details before performing a security check and then distributing the package to the selected devices or device groups. 49

50 Click Continue to complete the distribution. The package distribution confirmation message displays. If required, click the hyperlink text in the confirmation message to view the distribution details. Click Create Another Request if you wish to create another package. Click Manage Distributions if you wish to view and manage the package distributions. When you select a package that will be distributed to ios mobile devices, the following screen displays. Clicking the Distribute button on the Distribute Package screen allows you to review the package distribution details before performing a security check and then distributing the package to the selected devices or device groups. 50

51 Click Continue to complete the distribution. The package distribution confirmation message displays. Manage Distributions Select the Manage > Manage Distributions option to search and list all package distributions that you have performed on your end user devices. The Manage Distributions screen displays the Distribution Name, Package Name, Target Devices, Status, Distribution Date (GMT), Expiration Date (GMT), and the Distributed By information. Clicking on the New Distribution button allows you to create a new package distribution. On the Manage Distributions screen, select the desired filter options and click Search to view results matching the selected search criteria. Clicking on a Distribution Name link displays the associated Package Distribution details screen. On the Package Distribution <package distribution details> screen, clicking the Package Name link under the Basic Information section displays the Package 51

52 Distribution Details screen. On the Package Distribution Details screen, clicking on the Distribution Settings drop-down menu shows the Distribution Details and the Distribution Audit History options. The Distribution Details screen displays the Device Name, OS Username, Last Reported, Status, Description, and the Details information. The Distribution Audit History screen displays the Action Date (GMT), Action, Action By and the IP Address information. Clicking on the Actions tab displays the Create a Copy and the Stop actions. Clicking the Create a Copy action allows you to create a clone or a copy of the selected package distribution. If you wish to create a duplicate distribution, then click the Create a Copy action. The Distribute Package screen displays the details of the selected package distribution. Make changes, if required and click Distribute to create a copy of the selected package distribution. Clicking the Stop action allows you to stop distributing the selected package. 52

53 Software Distributions from the Device Management Screen The Manage > View All Devices option lists all devices on your corporate network. Clicking on a Device Name displays the View Device Details: <device name> screen. Selecting the Software Distributions option from the Summary drop-down list displays the Software Distributions screen, which includes the Distribution Date (GMT), Distribution Name, Package Name, Status, Description, and the Details information for any distribution actions that have been evaluated by the device. 53

54 On the View Device Details screen, if you wish to distribute a package to the device, then select the Distribute Software action on the Actions tab. On the Distribute Package screen, select the desired package that you wish to distribute and click Distribute to distribute the package to the device. Alternatively, on the Manage > Device Groups screen, click the MaaS360 folder icon and select the Distribute Software option to distribute a package to a device group, as shown below. 54

55 Reports Overview The report generation features allow you to use enhanced reporting functions (such as the tabular presentation of reports) to group associated graphs and reports, and it provides easy navigation between the reports. The enhanced reporting solution also includes filters, which help you generate a variety of real-time reports or narrow down report details based on your filter criteria. The graphs and charts provide an enhanced representation of the data in summary and detailed reports. The Print and Download links allow you to print and download the displayed tables to a variety of file formats. Types of Reports The MaaS360 Management Center provides the following types of reports: Note: 1. Device Summary 2. Agent Details 3. Policy Enforcement 4. Endpoint Security Overview a. Anti-Virus b. Personal Firewall 5. Data Protection Overview a. Encryption 6. Hardware Inventory 7. Software Inventory 8. Hardware Inventory for BlackBerry Handhelds 9. Software Inventory for BlackBerry Handhelds 10. Patch Management 11. VPN 12. Any Connection Reporting Not all reports are available for all services. If you have any questions access our Support page. Graphs and Charts Most of the data is presented in charts and graphs, and you can click on one bar or pie section to see details about that piece of data. You can also mouse over a bar or pie section to see the number being represented graphically. 55

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Compliance Rule Sets in MaaS360

Compliance Rule Sets in MaaS360 Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

MaaS360 On-Premises Cloud Extender

MaaS360 On-Premises Cloud Extender MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Using the Apple Configurator and MaaS3360

Using the Apple Configurator and MaaS3360 Using the Apple Configurator and MaaS3360 Overview Apple Configurator Utility (ACU) is a free Apple tool that enables a Mac to configure up to 30 ios devices simultaneously via a USB. There are two modes

More information

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

MaaS360 Secure Productivity Suite (SPS): Secure Container User Guide

MaaS360 Secure Productivity Suite (SPS): Secure Container User Guide MaaS360 Secure Productivity Suite (SPS): Secure Container User Guide Overview MaaS360 keeps your corporate apps, documents, emails, and contacts, etc., separate from your personal content. Corporate content

More information

IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide

IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide Version 2.3.0 Copyright 2015 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change

More information

Resource Online User Guide JUNE 2013

Resource Online User Guide JUNE 2013 Resource Online User Guide JUNE 2013 CHASE PAYMENTECH SOLUTIONS MAKES NO WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Seagate Dashboard User Guide

Seagate Dashboard User Guide Seagate Dashboard User Guide Seagate Dashboard User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Sophos Mobile Control Super administrator guide. Product version: 3

Sophos Mobile Control Super administrator guide. Product version: 3 Sophos Mobile Control Super administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Super administrator accounts...4 3 The super administrator customer...5

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Web Dashboard. User Manual. Build 2.0 2015-09-17

Web Dashboard. User Manual. Build 2.0 2015-09-17 Web Dashboard User Manual Build 2.0 2015-09-17 This is the official user manual on using SAMLite web dashboard to perform reporting and administrative tasks. This manual describes each section of reporting

More information

Software Version 5.1 November, 2014. Xerox Device Agent User Guide

Software Version 5.1 November, 2014. Xerox Device Agent User Guide Software Version 5.1 November, 2014 Xerox Device Agent User Guide 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or

More information

Remark FTP Utility. For Remark Office OMR. User s Guide

Remark FTP Utility. For Remark Office OMR. User s Guide Remark FTP Utility For Remark Office OMR User s Guide Remark Products Group 301 Lindenwood Drive, Suite 100 Malvern, PA 19355-1772 USA www.gravic.com Disclaimer The information contained in this document

More information

Server Installation, Administration and Integration Guide

Server Installation, Administration and Integration Guide Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management

More information

User's Manual. Intego Remote Management Console User's Manual Page 1

User's Manual. Intego Remote Management Console User's Manual Page 1 User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written

More information

OneDrive for Business User Guide

OneDrive for Business User Guide OneDrive for Business User Guide Contents OneDrive for Business and Office 365... 2 Storing University Information in the Cloud... 2 Signing in... 2 The Office 365 Interface... 3 The OneDrive App... 3

More information

MySupport. End User Guide. Document Version: 1.3

MySupport. End User Guide. Document Version: 1.3 MySupport End User Guide Document Table of Contents Table of Contents... 2 Introduction... 3 What is MySupport?...3 System Requirements...3 MySupport Application... 4 Installing MySupport... 4 System Tests...5

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

ReadyNAS Setup Manual

ReadyNAS Setup Manual ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Strategic Asset Tracking System User Guide

Strategic Asset Tracking System User Guide Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data

More information

Verizon Remote Access User Guide

Verizon Remote Access User Guide Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks

More information

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005 Vantage RADIUS 50 Quick Start Guide Version 1.0 3/2005 1 Introducing Vantage RADIUS 50 The Vantage RADIUS (Remote Authentication Dial-In User Service) 50 (referred to in this guide as Vantage RADIUS)

More information

BDR for ShadowProtect Solution Guide and Best Practices

BDR for ShadowProtect Solution Guide and Best Practices BDR for ShadowProtect Solution Guide and Best Practices Updated September 2015 - i - Table of Contents Process Overview... 3 1. Assess backup requirements... 4 2. Provision accounts... 4 3. Install ShadowProtect...

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry) Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry) June 2011 Copyright 2011 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without

More information

User Guide. version 1.2

User Guide. version 1.2 Network Discovery User Guide version 1.2 February 15, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

SonicWALL SSL VPN 3.5: Virtual Assist

SonicWALL SSL VPN 3.5: Virtual Assist SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

MaaS360 Mobile Service

MaaS360 Mobile Service Services > Overview MaaS360 Mobile Service Go Mobile! Everything for mobile work - visibility, control, easy mobile connectivity, management tools and security - all in one economical, hosted solution.

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Moxa Device Manager 2.0 User s Guide

Moxa Device Manager 2.0 User s Guide First Edition, March 2009 www.moxa.com/product 2009 Moxa Inc. All rights reserved. Reproduction without permission is prohibited. Moxa Device Manager 2.0 User Guide The software described in this manual

More information

About This Guide SolarEdge Configuration Tool Software Guide. About This Guide

About This Guide SolarEdge Configuration Tool Software Guide. About This Guide About This Guide 3 About This Guide This user guide is intended for Photovoltaic (PV) system owners, installers, technicians, maintainers, administrators and integrators who are authorized to configure

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3 Wavelink Avalanche Mobility Center Java Console User Guide Version 5.3 Revised 17/04/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,

More information

Device LinkUP + Desktop LP Guide RDP

Device LinkUP + Desktop LP Guide RDP Device LinkUP + Desktop LP Guide RDP Version 2.1 January 2016 Copyright 2015 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

LogMeIn Hamachi. Getting Started Guide

LogMeIn Hamachi. Getting Started Guide LogMeIn Hamachi Getting Started Guide Contents What Is LogMeIn Hamachi?...3 Who Should Use LogMeIn Hamachi?...3 The LogMeIn Hamachi Client...4 About the Relationship Between the Client and Your LogMeIn

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Sophos Mobile Control Administrator guide. Product version: 3.6

Sophos Mobile Control Administrator guide. Product version: 3.6 Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for

More information

Learn More Cloud Extender Requirements Cheat Sheet

Learn More Cloud Extender Requirements Cheat Sheet Learn More Cloud Extender Requirements Cheat Sheet Overview This document defines all requirements to ensure a successful installation of the MaaS360 Cloud Extender to enable use of ActiveSync Manager

More information

PowerSchool Parent Portal User Guide. PowerSchool 7.x Student Information System

PowerSchool Parent Portal User Guide. PowerSchool 7.x Student Information System PowerSchool 7.x Student Information System Released December 2011 Document Owner: Documentation Services This edition applies to Release 7.1 of the [product name] software and to all subsequent releases

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

System Area Manager. Remote Management

System Area Manager. Remote Management System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

User Guide Win7Zilla

User Guide Win7Zilla User Guide Win7Zilla Table of contents Section 1: Installation... 3 1.1 System Requirements... 3 1.2 Software Installation... 3 1.3 Uninstalling Win7Zilla software... 3 Section 2: Navigation... 4 2.1 Main

More information

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X Attix5 Pro Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition V6.0 User Manual for Mac OS X Copyright Notice and Proprietary Information All rights reserved. Attix5, 2011 Trademarks

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks

More information

Release 2.0. Cox Business Online Backup Quick Start Guide

Release 2.0. Cox Business Online Backup Quick Start Guide Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.

More information

Enroll a Windows Phone 8 Device

Enroll a Windows Phone 8 Device Enroll a Windows Phone 8 Device Download Process Enrolling your Windows 8 device is a quick and easy process that takes around 2 minutes to complete. Your IT administrator will send you a MaaS360 enrollment

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Guide to the Kofax Customer Portal

Guide to the Kofax Customer Portal Kofax Technical Support April 2015 Contents 1 Introduction... 1 2 Accessing the Portal... 1 2.1 Requesting a Kofax Customer Portal Account... 1 2.2 Requesting a Password Reset... 5 2.3 Requesting your

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE Quick Start Guide for Partners Cloud Security for Endpoints powered by GravityZone Quick Start Guide for Partners Publication date 2013.10.28 Copyright

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

How to configure Mac OS X Server

How to configure Mac OS X Server How to configure Mac OS X Server By Rob Buckley In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X. See photo story here

More information

Imaging License Server User Guide

Imaging License Server User Guide IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Drake Hosted User Guide

Drake Hosted User Guide Drake Hosted User Guide Last Revision Date: 11/23/2015 Support.DrakeSoftware.com (828) 524-8020 Drake Hosted User Guide Copyright The Drake Hosted User Guide, Drake Tax Software, and any other related

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

Admin Guide Virtual Private Server (VPS) MailStreet Hosting Control Panel (CP)

Admin Guide Virtual Private Server (VPS) MailStreet Hosting Control Panel (CP) Admin Guide Virtual Private Server (VPS) MailStreet Hosting Control Panel (CP) DOCUMENT REVISION DATE: September 1, 2009 Virtual Private Server (VPS) Admin Guide / Table of Contents Page 2 of 87 Table

More information

OneDrive for Business User Guide

OneDrive for Business User Guide OneDrive for Business User Guide Contents OneDrive for Business and Office 365... 2 Storing University Information in the Cloud... 2 Signing in... 2 The Office 365 Interface... 3 The OneDrive App... 3

More information

Windows Server 2008 R2 Initial Configuration Tasks

Windows Server 2008 R2 Initial Configuration Tasks Windows Server 2008 R2 Initial Configuration Tasks I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support for the

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

Hyper-V Server 2008 Setup and Configuration Tool Guide

Hyper-V Server 2008 Setup and Configuration Tool Guide Hyper-V Server 2008 Setup and Configuration Tool Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide will help you set up and configure Microsoft Hyper-V

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information