What s New in Centrify Server Suite 2014
|
|
- Cecil McDaniel
- 8 years ago
- Views:
Transcription
1 CENTRIFY SERVER SUITE 2014 WHAT S NEW What s New in Centrify Server Suite 2014 The new Centrify Server Suite 2014 introduces major new features that simplify risk management and make regulatory compliance repeatable and sustainable across heterogeneous servers and applications in the data center and the cloud. Enhancements to Centrify Server Suite include streamlined creation and management of administrative entitlements. This release makes it easier to implement least-privilege access by delivering new pre-configured rights for Windows server management consoles that can be used out of the box. New wizards automate the creation of new, complex rights for administrative users and reduce the process to the simple click of a button. Wizards can be used in conjunction with our powerful new match criteria that improves flexibility in building a least-privilege access model by enabling privileges to be determined based on properties such as a digital signature (for example, signed by Adobe, Inc.). Centrify Server Suite 2014 also uniquely provides full privileged activity audit trails and video capture that ties all activity back to an individual. With this release Centrify enhances our powerful search capabilities and compliance reporting that combines access controls and the associated activity fully integrated across Windows, Linux, and UNIX platforms. Centrify Server Suite Standard Edition New match criteria to identify applications on Windows Many organizations run different versions of applications that need elevated privileges. From the admin s perspective, it s hard to keep track of all the different combinations. For example, if you have two rights to run SQL Server Management Console because your organization uses SQL Server 2008 and SQL Server 2012, which application right belongs to which version? The new match criteria feature makes it simple to define a single application right that will launch multiple versions of the same application with privilege; or, multiple different applications that share common criteria. For example, a user can be provisioned with the right to run any application digitally signed by Microsoft Corporation with the string Microsoft SQL Server in the product name, enabling the user to run any of the SQL Server management tools with elevated privilege in a single application right. Or, a user can be granted the right to install any of a broad range of printer drivers through a single application right that elevates privilege on exe files whose file name contains the string pcl6 and is digitally signed by Hewlett-Packard Company. There are over a dozen match criteria, including: Any of 11 executable file types, including EXE, COM, MSC, MSI, VBS and PS1 files Digital signature Product name and version File version and description File digest (SHA-1 hash) File path and command-line arguments 2014 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. DS PAGE 1
2 New application rights builder Application rights enable Windows admins to do their jobs without having to use highly-privileged accounts like local administrator or domain admins. Creating and assigning rights to run applications with elevated privilege is critical to the success of a privilege management project. And, you want to make sure that the right you re creating is definitively tied to the actual application and program file you want the user to run. The new Application Rights Builder makes it easy to create application rights for your Windows admins. You simply select a program file! The Builder retrieves all match criteria including file paths and command arguments, eliminating mistakes and wasted time. Rights for complex application and argument list combinations such as MMC snap-in consoles are easy to create. Since match criteria values can be edited at any time, you can also use the Builder to make any application right a template for the creation of additional rights. You can also select from a list of running processes on the target computer instead of selecting a program file. And, since the Application Rights Builder supports pulling match criteria via remote connections to other computers on the network, you can easily assure that you are granting rights to precisely the correct program regardless of where the program file or process may reside. Figure 1 Match criteria in the Application Rights Builder Pre-defined rights for Windows Server management consoles The standard management consoles built in to Microsoft Windows Server get a lot of use from administrators. Each console is designed to manage a major Windows component such as Services or Print Management, and can connect remotely to other computers on the network when necessary CENTRIFY CORPORATION. ALL RIGHTS RESERVED. PAGE 2
3 Server Suite 2014 adds pre-defined application rights for 18 consoles, for a total of 28 pre-defined rights for managing Windows Server. These pre-defined rights make it easy to get started with privilege management for your Windows servers; for example, you can quickly grant your admins the right to manage Windows services without having to give them local administrator accounts. New pre-defined console rights include: DHCP File Server Print Management Security Configuration Share and Storage Management Windows Services Figure 2 - Out-of-the-box Application Rights PowerShell cmdlets for management and integration Microsoft s PowerShell is a powerful and ubiquitous tool for managing Windows Server. It s the go-forward command-line and script environment for Windows admins. Server Suite 2014 enables you to fully manage all aspects of its DirectManage components through PowerShell. For example, you can automate the creation of Centrify Zones and roles, add UNIX profiles for Active Directory users and groups to Centrify-managed computers and Zones, or assign UNIX and Windows users and groups to roles, computers and computer Zones, all through PowerShell commands and scripts CENTRIFY CORPORATION. ALL RIGHTS RESERVED. PAGE 3
4 A new Centrify DirectManage Module for PowerShell provides cmdlets for scripting commands and integrating with other solutions. The PowerShell module is a standard component of Centrify Server Suite 2014 Standard Edition; no additional licensing is required. The module includes cmdlets that enable PowerShell scripting of virtually all the operations available within the DirectManage management console by accessing Centrify objects in Active Directory. Computer Profile Computer Role Group Profile Right Role Role Assignment User Profile Zone Additional Windows features Offline enforcement on Windows platforms enables the use of roles and rights even when the computer is disconnected from the network or cannot reach a domain controller. The Centrify Windows Agent retains roles and rights from the last poll of the domain controller for all users who previously logged in. Support of the Centrify DirectAuthorize Agent on Windows 8 and Windows Server 2012 has been added. The Desktop rights feature is not supported on these platforms at this time. Zone Provisioning Agent Two new tools have been added to mirror group membership and hierarchy across trusted domains and forests. ADEDIT The ADEdit-based report set is enhanced to provide better reporting and customization abilities using a SQL database with user-accessible views. A new generation of report tool, adreport2.tcl, has been created for this purpose. ADEdit is enhanced to support provisioning of DirectAuthorize objects for Classic Zones. Centrify PuTTY This release of Centrify PuTTY incorporates the open source PuTTY version PuTTY 0.63 contains the following security fixes: PuTTY now wards off nefarious SSH server or network attackers from crashing PuTTY. PuTTY no longer retains the private half of users' keys in memory by mistake. Centrify OpenSSH Audit trail events for Centrify OpenSSH are now integrated with DirectAudit. Support for the SELinux environment has been improved CENTRIFY CORPORATION. ALL RIGHTS RESERVED. PAGE 4
5 Additional configuration options for UNIX A new substitution variable can be used as a placeholder for the home directory of a user Zone profile in DirectManage Access Manager. New configuration parameters have been added for UNIX agents. Please refer to the Centrify Server Suite 2014 Configuration and Tuning Reference Guide for details. Centrify Server Suite Enterprise Edition Audit Trail Integration with DirectAudit Auditing has been enhanced to include a number of different UNIX audit events. These audit events are enforced with role-based access control. The Centrify Audit Analyzer now allows querying of both Windows and UNIX audit events. The standard audit reports now query and report data for both Windows and UNIX computers. A new Group Policy has been added to allow global control of whether audit trail events from the Centrify UNIX Agent for Access should be generated and whether they should be sent to syslog and/or DirectAudit. A new command-line utility can be used in dzcheck to send audit events with extra customer-defined information such as trouble tickets. Centrify OpenSSH audit trail events have been integrated with DirectAudit, starting from Centrify DirectControl version Figure 3 - Centrify Audit Analyzer 2014 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. PAGE 5
6 Expanded support of troubleshooting privileges In previous versions of DirectAudit, only the root user was always allowed to log in or run an audited command when the system has environment setup issues. A new parameter has been added to the DirectAudit configuration file to allow specifying one or more local users who may log in or run an audited command in addition to root in such a circumstance. New Group Policy support A number of Group Policies for DirectAudit on UNIX are added. These policies include DirectAudit shell, DirectAudit Daemon, and other settings for the UNIX Agent. New custom command prompt detection You can now specify a regular expression on a computer hosting the Centrify DirectAudit Collector to detect a custom command prompt within an audited event. Skip binary data recording For file transfer commands like rsync, sftp and scp when an SSH connection is being used, you can now skip auditing and the recording of the binary data being sent to and from the server for specified SSH commands. Expanded search criteria for audited events Multiple users and/or computers can be specified as search criteria when searching for Audit Events. FindSession enhancements FindSession now supports query of multiple users and computers. New command-line options have been added to export roles and tickets in UNIX commands, input, and output data. FindSession now displays the URL link when exporting a session list. The URL can be passed directly to the DirectAudit Session Player to replay the audited session. Performance and tuning (UNIX) The default interval for monitoring and repairing the NSS/LAM configuration files is now increased from 60 seconds to one hour to reduce system load. A new configuration parameter controls whether the dad process caches name service query results about users and groups. Enhancement of DAINFO report The DAINFO command has been enhanced to include: The offline store size of the audit trail The de-spool rate of the audit trail The online status of the audit trail channel Applied Group Policy settings (option) Additional Windows features Failed privilege elevation attempts by Run As Role and desktop creation are now recorded as an audit event in the DirectAudit database CENTRIFY CORPORATION. ALL RIGHTS RESERVED. PAGE 6
7 Support of the Centrify DirectAudit Agent has been added for the following Windows platforms: Windows 8 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Management component platform support Support for the management components of Server Suite on the following Windows platforms has been added: Windows 8 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Server Suite Standard Edition Management components supported on these new platforms include: Centrify DirectManage Access Manager Centrify XML and ADM templates for extensions to Active Directory Group Policy Objects Centrify Group Policy Management Editor extension Centrify ADUC (Active Directory Users and Computers) property page extensions Centrify DirectManage Deployment Manager Server Suite Enterprise Edition Management components supported on these new platforms include (in addition to the Standard Edition management components): Centrify DirectManage Audit Manager Centrify Audit Analyzer Centrify for User Suite Mac Edition Centrify for Mac Centrify now supports the generation of UIDs, GIDs and primary GIDs in Auto Zone or in hierarchical Zones using the Apple scheme. This makes it easy for customers to change their Mac workstations from the Apple Active Directory plugin to the Centrify DirectControl Agent. A new helper script is included, and enhancements have been made in many Server Suite components to support this feature, including Access Manager, the DirectManage Module for PowerShell, the Centrify Windows SDK, ADEdit, Zone Provisioning Agent, Group Policies, and various configuration parameters. Group Policy Objects have been added to control new Agent functionality, including: Allow offline user login even if the Active Directory user account is locked. Enable the import of raw plist settings where individual settings can be applied to an existing plist file. Auto-enrolled and renewal of User Certificates specifically to support user authentication to Wi-Fi networks. Certificates can also be stored in a non-exportable keychain entry for increased security 2014 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. PAGE 7
8 Enable/disable SecurityAgent restart at ADClient startup Improvements have been made to printer management. Printer models can be specified via Group Policy to enable configuration of a particular driver. The list of printer models in Group Policy is checked locally against available printer drivers. Configuration defaults to Generic PostScript if no appropriate driver for model is found. Supported platforms Support has been added for the following operating systems: Debian Linux 7.2, 7.3 (32-bit and 64-bit) CentOS 5.10, 6.5 (32-bit and 64-bit) Fedora 20 (32-bit and 64-bit) Linux Mint 16 (32-bit and 64-bit) Mac OS/X 10.9 Oracle Linux 6.5 (32-bit and 64-bit) Red Hat Enterprise Linux Server 5.10, 6.5 (32-bit and 64-bit) Red Hat Enterprise Linux Desktop 5.10, 6.5 (32-bit and 64-bit) Red Hat Enterprise Linux Server 5.10, PPC (64-bit) Red Hat Enterprise Linux Server 5.10 Itanium (64-bit) Scientific Linux 5.10 (32-bit and 64-bit) Ubuntu Desktop (32-bit and 64-bit) Ubuntu Server (32-bit and 64-bit) The complete list of supported platforms is on the Centrify website at: CENTRIFY CORPORATION. ALL RIGHTS RESERVED. PAGE 8
What s New in Centrify Server Suite 2013 Update 2
CENTRIFY SERVER SUITE 2013.2 DATA SHEET What s New in Centrify Server Suite 2013 Update 2 The new Centrify Server Suite 2013 Update 2 (2013.2) builds on the core enhancements Centrify introduced in Server
More informationWhat s New in Centrify Server Suite 2015
C E N T R I F Y S E R V E R S U I T E 2 0 1 5 W H A T S N E W What s New in Centrify Server Suite 2015 Centrify Server Suite Standard Edition Hadoop support Big Data adoption by industry is around 25%
More informationCentrify Identity Service and Mac - Online Training
C E N T R I F Y D A T A S H E E T M A R C H 2015 Centrify Identity Service and Mac - Online Training Overview This course is designed for administrators of the Centrify User Suite and mobile devices. At
More informationCentrify Suite 2012 Express
Centrify Suite 2012 Express Administrator s Guide November 2011 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject to the terms
More informationAutomating Cloud Security with Centrify Express and RightScale
QUICK START GUIDE. MAY 2011 Automating Cloud Security with Centrify Express and RightScale How to secure cloud systems by joining them to your Active Directory infrastructure Abstract This Quick Start
More informationCentrify Server Suite Management Tools
SERVER SUITE TECHNICAL BRIEF Centrify Server Suite Management Tools Centrify Server Suite includes - at no extra charge - a powerful set of management tools in all editions: Centrify Identity Risk Assessor
More informationWindows Least Privilege Management and Beyond
CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has
More informationWindows Security and Directory Services for UNIX using Centrify DirectControl
SOLUTION GUIDE CENTRIFY CORP. SEPTEMBER 2005 Windows Security and Directory Services for UNIX using Centrify DirectControl With Centrify, you can now fully leverage your investment in Active Directory
More informationSecuring VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite
WHITE PAPER CENTRIFY CORP. MARCH 2009 Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite Securing and auditing administrative access to the Virtual Infrastructure
More informationCentrify Identity and Access Management for Cloudera
Centrify Identity and Access Management for Cloudera Integration Guide Abstract Centrify Server Suite is an enterprise-class solution that secures Cloudera Enterprise Data Hub leveraging an organization
More informationWhat s New in Centrify DirectAudit 2.0
CENTRIFY DATASHEET What s New in Centrify DirectAudit 2.0 Introduction Centrify DirectAudit s detailed, real-time auditing of privileged user sessions on Windows, UNIX and Linux systems provides a full
More information1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
More informationCentrify Server Suite 2014
Centrify Server Suite 2014 Administrator s Guide for Linux and UNIX June 2014 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
More informationSECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2
SECURITY TARGET FOR CENTRIFY SUITE VERSION 2013.2 Document No. 1769-000-D0007 Version: v0.89, 12 September 2013 Prepared for: Centrify Corporation 785 N. Mary Avenue, Suite 200 Sunnyvale, California USA,
More informationCentralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
More informationInstallation Overview
Contents Installation Overview... 2 How to Install Ad-Aware Management Server... 3 How to Deploy the Ad-Aware Security Solutions... 5 General Deployment Conditions... 5 Deploying Ad-Aware Management Agent...
More informationAdministration Guide NetIQ Privileged Account Manager 3.0.1
Administration Guide NetIQ Privileged Account Manager 3.0.1 December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use
More informationACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
More informationCentrify Suite Enterprise Edition Online Training
CENTRIFY DATASHEET Centrify Suite Enterprise Edition Online Training Overview The process of installing, configuring, and troubleshooting the Centrify software is easy, once you understand the fundamentals.
More informationManaging UNIX Generic and Service Accounts with Active Directory
APPLICATION NOTE Managing UNIX Generic and Service Accounts with Active Directory Published: June 2007 Abstract Generic accounts are commonly used to enable UNIX administrative staff to log on to a computer
More informationIdentity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
More informationInstalling Samsung SDS CellWe EMM cloud connectors and administrator consoles
Appendix 1 Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles This section explains how you use the Cloud Management Suite installation wizard for the following purposes: To
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationCloud Services ADM. Agent Deployment Guide
Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License
More informationUnderstanding Task Scheduler FIGURE 33.14. Task Scheduler. The error reporting screen.
1383 FIGURE.14 The error reporting screen. curring tasks into a central location, administrators gain insight into system functionality and control over their Windows Server 2008 R2 infrastructure through
More informationMicrosoft Corporation. Status: Preliminary documentation
Microsoft Corporation Status: Preliminary documentation Beta content: This guide is currently in beta form. The AppLocker team greatly appreciates you reviewing the document and looks forward to receiving
More informationConfiguring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Details Course Outline Module 1: Introducing Active Directory Domain Services This module provides
More informationKonyOne Server Installer - Linux Release Notes
KonyOne Server Installer - Linux Release Notes Table of Contents 1 Overview... 3 1.1 KonyOne Server installer for Linux... 3 1.2 Silent installation... 4 2 Application servers supported... 4 3 Databases
More informationAdministration Guide. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Gpupdate is a trademark owned by Specops Software.
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationParallels. for your Linux or Windows Server. Small Business Panel. Getting Started Guide. Parallels Small Business Panel // Linux & Windows Server
Getting Started Guide Parallels Small Business Panel for your Linux or Windows Server Getting Started Guide Page 1 Getting Started Guide: Parallels Small Business Panel, Linux & Windows Server Version
More informationActive Directory Installation on Windows Server 2012
Active Directory Installation on Windows Server 2012 What really active directory is..? Active Directory Domain Services (AD DS) is an extensible and scalable directory service you can use to efficiently
More informationMacintosh Printer Management using Centrify DirectControl Group Policies
WHITE PAPER CENTRIFY CORP. MARCH 2010 Macintosh Printer Management using Centrify DirectControl Group Policies ABSTRACT This white paper examines various approaches to managing printer configuration files
More informationCENTRIFY TRAINING CLASS Centrify Suite Standard Edition - Mac OS X Training Course Details. Format: 100% lecture including demonstrations.
Centrify Suite Standard Edition - Mac OS X Training Course Details Synopsis This course introduces the customer to the Centrify Mac OS X specific features of the Centrify Suite Standard Edition. What You
More informationConfiguring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425 Course Outline Module 1: Introducing Active Directory Domain Services This module provides an overview of Active Directory
More informationCentrify DirectAudit Jump Start Service
CENTRIFY DATASHEET Centrify DirectAudit Jump Start Service What is the Centrify DirectAudit Jump Start Service? The Centrify DirectAudit Jump Start Basic Service is designed to give customers a quick start
More informationCentrify Express72 Jump Start Upgrade Service
CENTRIFY DATASHEET JUNE 2015 Centrify Express72 Jump Start Upgrade Service Summary This Jump Start package streamlines the migration from Centrify Express Edition for UNIX and Linux to Centrify Server
More informationMS-6425C - Configuring Windows Server 2008 Active Directory Domain Services
MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials
More informationEnforcing Enterprise-out Security for Cloud Servers
WHITE PAPER Enforcing Enterprise-out Security for Cloud Servers By David McNeely Publication Date: March 2011 Cloud-based computing models offer the promise of a highly scalable compute infrastructure
More informationCentrify Server Suite, Standard Edition
CENTRIFY SERVER SUITE SUPPORTED PLATFORMS Centrify Server Suite, Standard Edition Centrify Server Suite, Standard Edition, centralizes authentication and privileged user access across disparate systems
More informationAVG Business SSO Connecting to Active Directory
AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud
More informationQuick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
More informationCentrify Cloud Management Suite
Centrify Cloud Management Suite Installation and Configuration Guide April 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
More informationThe question becomes, How does the competent Windows IT professional open up their print server to their Mac clients?
INTRODUCTION With the number of Macs growing, especially in the academic and consumer fields the need to support them has become a must have for many existing Windows environments. The question becomes,
More informationGetting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
More informationExecuTrain Course Outline Configuring & Troubleshooting Windows Server 2008 Active Directory Domain Services MOC 6425C 5 Days
ExecuTrain Course Outline Configuring & Troubleshooting Windows Server 2008 Active Directory Domain Services MOC 6425C 5 Days Introduction This five-day instructor-led course provides in-depth training
More information6425C - Windows Server 2008 R2 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Introduction This five-day instructor-led course provides in-depth training on configuring Active Directory Domain Services
More information"Charting the Course...... to Your Success!" MOC 50290 A Understanding and Administering Windows HPC Server 2008. Course Summary
Description Course Summary This course provides students with the knowledge and skills to manage and deploy Microsoft HPC Server 2008 clusters. Objectives At the end of this course, students will be Plan
More informationMoving to Plesk Automation 11.5
Moving to Plesk Automation 11.5 Last updated: 2 June 2015 Contents About This Document 4 Introduction 5 Preparing for the Move 7 1. Install the PA Moving Tool... 8 2. Install Mail Sync Software (Windows
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationLesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
More informationCentralized Mac Home Directories with ExtremeZ-IP
APPLICATION NOTE Centralized Mac Home Directories with ExtremeZ-IP Published: July 2009 Abstract Organizations wanting to integrate Mac OS X systems into their Windows-based enterprise network will most
More informationRES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
More informationYubiKey PIV Deployment Guide
YubiKey PIV Deployment Guide Best Practices and Basic Setup YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n YubiKey PIV Deployment Guide 2016 Yubico. All rights reserved. Page 1 of 27 Copyright 2016
More informationQuick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
More informationConfiguring and Troubleshooting Windows 2008 Active Directory Domain Services
About this Course Configuring and Troubleshooting Windows This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting Active Directory Domain
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER USER GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from NetWrix
More informationConfiguring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Active Directory About this Course This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting (AD DS) in and R2 environments. It covers core
More informationIBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
More informationUsing Centrify s DirectControl with Mac OS X
WHITE PAPER CENTRIFY CORP. OCTOBER 2008 Using Centrify s DirectControl with Mac OS X Centralized, Active Directory-based authentication, access control and policy enforcement for Mac OS X systems in Windows
More informationCourse 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Published: June 02, 2011 Language(s): English Audience(s): IT Professionals Level: 200
More informationThese guidelines can dramatically improve logon and startup performance.
Managing Users with Local Security and Group Policies 573. Disable user or computer settings in GPOs Each GPO consists of a user and a computer section. If there are no settings in either of those sections,
More informationBefore taking this course, Citrix recommends that learners have the following:
Course CXA-206 Citrix XenApp 6.5 Administration Overview Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize and manage applications
More informationP13 -Leveraging Active Directory to Secure and Audit Access to Non-
P13 -Leveraging Active Directory to Secure and Audit Access to Non- Presented by: Windows Systems David McNeely, Sr. Director of Product Management david.mcneely@centrify.com Centrify Corporation Trust
More informationLikewise Security Benefits
Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers
More informationCourse 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
www.etidaho.com (208) 327-0768 Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services 5 Days About this Course This five-day instructor-led course provides in-depth
More informationCloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1
Getting Started Guide Cloud Server powered by Mac OS X Getting Started Guide Page 1 Getting Started Guide: Cloud Server powered by Mac OS X Version 1.0 (02.16.10) Copyright 2010 GoDaddy.com Software, Inc.
More informationSetup Guide for AD FS 3.0 on the Apprenda Platform
Setup Guide for AD FS 3.0 on the Apprenda Platform Last Updated for Apprenda 6.0.3 The Apprenda Platform leverages Active Directory Federation Services (AD FS) to support identity federation. AD FS and
More informationNE-6425C Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Domain Services Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 02 June 2011 200 Windows
More informationAdministrator s Guide
MAPILab Disclaimers for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4
More informationNetIQ Advanced Authentication Framework - Administrative Tools. Installation Guide. Version 5.1.0
NetIQ Advanced Authentication Framework - Administrative Tools Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication
More informationBasic Administration for Citrix XenApp 6.5 Course CXA206; 5 Days, Instructor-led
Basic Administration for Citrix XenApp 6.5 Course CXA206; 5 Days, Instructor-led Course Description Basic Administration for Citrix XenApp 6.5 training course provides the foundation necessary for administrators
More informationCentrify Server Suite, Standard Edition Design Service
Centrify Server Suite, Standard Edition Design Service What is the Centrify Server Suite, Standard Edition Design Service? This package creates a design document consistent with Centrify s best practices
More informationFileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
More informationConfiguring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Course Code: M6425 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Overview This five-day instructor-led course
More informationManaging Windows Environments with Group Policy
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Managing Windows Environments with Group Policy Course: MS50255C
More informationIf you prefer to use your own SSH client, configure NG Admin with the path to the executable:
How to Configure SSH Each Barracuda NG Firewall system is routinely equipped with an SSH daemon listening on TCP port 22 on all administrative IP addresses (the primary box IP address and all other IP
More informationSimple. Control Panel. for your Linux Server. Getting Started Guide. Simple Control Panel // Linux Server
Getting Started Guide Simple Control Panel for your Linux Server Getting Started Guide Page 1 Getting Started Guide: Simple Control Panel, Linux Server Version 2.1 (02.01.10) Copyright 2010. All rights
More informationFileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
More informationTable of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationDeploying WinLIMS Web v7.2 to a Windows 2008 x64 box. Table of Contents. Deploying WinLIMS Web v7.2 to a Windows 2008 x64 box... 1
Deploying WinLIMS Web v7.2 to a Windows 2008 x64 box Table of Contents Deploying WinLIMS Web v7.2 to a Windows 2008 x64 box... 1 Pre-requisites... 2 Deprecated pre-requisites... 2 Scripts... 2 Configuring
More informationBecoming PCI DSS Compliant
WHITE PAPER Becoming PCI DSS Compliant 10 Key Security Requirements WWW.CENTRIFY.COM Becoming PCI DSS Compliant - 10 Key Security Requirements Contents Abstract 3 PCI Requirements Applicability Summary
More informationAuthoring for System Center 2012 Operations Manager
Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack
More informationHow to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1
Managing user roles in SCVMM How to Create a Delegated Administrator User Role... 2 To create a Delegated Administrator user role... 2 Managing User Roles... 3 Backing Up and Restoring the VMM Database...
More informationWindows PowerShell Cookbook
Windows PowerShell Cookbook Lee Holmes O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Foreword Preface xvii xxi Part I. Tour A Guided Tour of Windows PowerShell
More informationCreating and Issuing the Workstation Authentication Certificate Template on the Certification Authority
In this post we will see the steps for deploying the client certificate for windows computers. This post is a part of Deploy PKI Certificates for SCCM 2012 R2 Step by Step Guide. In the previous post we
More informationRequirements & Install. Module 2 Single Engine Installation
Requirements & Install Module 2 Single Engine Installation Requirements Requirement Minimum Optimum Processor Intel Core 2 @ 2GHz Dual Processor Xeon 3.0 GHz Memory 2 GB RAM 8 GB RAM Disk Space 2 GB 5GB
More informationMamut Business Software. Additional Products and Enterprise Extensions. Mamut Client Manager
Mamut Business Software Additional Products and Enterprise Extensions Mamut Client Manager Table of Contents Additional Products and Enterprise Extensions... 3 Access to Additional Products and Enterprise
More informationHost Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
More informationConfiguring and Troubleshooting Windows Server 2008 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425C Course Length: 5 Days Course Overview This five-day course provides in-depth training on implementing,
More informationAutomating client deployment
Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark
More information6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services
6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Details Course Code: Duration: Notes: 6425C 5 days This course syllabus should be used to determine whether
More informationConfiguring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
More informationTECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy
More informationFreshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
More informationCitrix Desktop Virtualization Fast Track
Citrix Desktop Virtualization Fast Track Description: Days: 5 Prerequisites: This fast-paced course provides the foundation necessary for students to effectively centralize and manage desktops and applications
More informationRemote Desktop Reporter Agent Deployment Guide
Remote Desktop Reporter Agent Deployment Guide Table of Contents Overview... 2 Agent Components... 2 Agent Security... 2 Windows Firewall Considerations... 3 Installation Procedure and Configuration Parameters...
More informationParallels Plesk Panel 11 for your Linux server
Getting Started Guide Parallels Plesk Panel 11 for your Linux server Getting Started Guide Page 1 Getting Started Guide: Parallels Plesk Panel 11, Linux Server Version 1.1 (11.1.2012) Copyright 2012. All
More informationModule 7 Management. Section 7.1: WSUS. CIST2414 Microsoft Server Administrator. Summary. Windows Server 2008 Server Administrator
Module 7 Management In Module 7 students will learn how to manage the server by implementing a patch management, optimizing server performance, and configuring event logs. They will also learn about using
More information