Symantec On-Demand 2.6/ Juniper IVE SSL VPN 5.2 Integration Guide Addendum
|
|
|
- Samuel Hubbard
- 9 years ago
- Views:
Transcription
1 Symantec On-Demand 2.6/ Juniper IVE SSL VPN 5.2 Integration Guide Addendum Uploading the Jedi Package: Preventing Virtual Desktop Bypass during User Access to Juniper SSL VPN Appliance
2 Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide Addendum Copyright Information: Symantec Corporation Copyright by Symantec Corporation. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic, mechanical, or otherwise, without prior written permission of Symantec Corporation. Information in this document is subject to change without notice and does not constitute any commitment on the part of Symantec Corporation. Symantec Corporation may own patents or pending patent applications, trademarks, copyrights, and other intellectual property rights covering the subject matter of this document. Furnishing of this documentation does not in any way grant you a license to any patents, trademarks, copyrights, or other intellectual property of Symantec Corporation. Symantec, Symantec Secure Enterprise, and the Symantec S Logo are registered trademarks or trademarks of Symantec Corporation. Microsoft and Windows are registered trademarks of Microsoft Corporation. All other companies and product names referenced herein may be trademarks or registered trademarks of their respective holders. ii
3 Copyright Information: Juniper Networks, Inc. Copyright (c) Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, NetScreen, NetScreen Technologies, GigaScreen, and the NetScreen logo are registered trademarks of Juniper Networks, Inc. NetScreen-5GT, NetScreen-5GT ADSL, NetScreen-5XP, NetScreen-5XT, NetScreen-25, NetScreen-50, NetScreen-100, NetScreen-204, NetScreen-208, NetScreen-500, NetScreen- 5200, NetScreen-5400, NetScreen-Global PRO, NetScreen-Global PRO Express, NetScreen-Remote Security Client, NetScreen-Remote VPN Client, NetScreen-IDP 10, NetScreen-IDP 100, NetScreen-IDP 500, GigaScreen ASIC, GigaScreen-II ASIC, and NetScreen ScreenOS are trademarks of Juniper Networks, Inc. All other trademarks and registered trademarks are the property of their respective companies. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without receiving written permission from: Juniper Networks, Inc N. Mathilda Ave., Sunnyvale, CA ATTN: General Counsel iii
4 Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide Addendum Table of Contents Symantec Jedi Package and Virtual Desktop Bypass Prevention... 1 Prerequisites...1 Symantec...1 Juniper...2 Symantec Support...2 Third-Party Product Support...2 Virtual Desktop Bypass Description...3 Installing the Jedi Package...3 Step 1: Setting Up Symantec On-Demand Manager...3 Symantec On-Demand Setup Procedures...3 Configure URLs...4 Set Up Policies for Export...4 Step 2: Upload the jedi.zip File to the Juniper SSL VPN Appliance...5 Point to the jedi.zip file and Enable the New Jedi Policies...6 iv
5 Symantec Jedi Package and Virtual Desktop Bypass Prevention When clients are using the Virtual Desktop but then switch back to their normal desktop, there may be instances of misuse of the Success URL link within the Virtual Desktop. In this case, if the Success URL link within the Virtual Desktop for Juniper login is copied, and the user switches to the normal desktop and opens a browser and uses that Success URL link, then that user could potentially login to the Juniper appliance without the Virtual Desktop. The Jedi Package prevents this level of bypass of the Virtual Desktop. When the jedi.zip file is uploaded to the Juniper appliance, it is transparently unzipped and two new rules are created. These new rules assure usage of the Virtual Desktop during user login to the Juniper SSL VPN appliance. This integration guide addendum provides the tasks required to upload the Symantec jedi.zip package in order to prevent the bypassing of the Virtual Desktop during user login and access to the Juniper SSL VPN appliance. Note: There are two basic methods you can use to integrate the Symantec On- Demand functionality with the Juniper appliance. One uses a built-in Host Check Client Interface to manage the integration, and the other uses a customized user interface based on templates to accomplish the same goal. The tasks required to prevent the bypass of the Virtual Desktop involve use of the customizable user interface integration method. Refer to the Symantec On- Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide for information about the customizable user interface integration process. Prerequisites Symantec The instructions that follow assume that the Symantec On-Demand Manager is installed on your machine, and that your copy of the Symantec On-Demand Manager is licensed appropriately with the Virtual Desktop module enabled. For information about licensing issues, or about how to install or configure the Symantec On-Demand Manager, see the Symantec On-Demand Administration Guide. 1
6 Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide Addendum Juniper You must have an Advanced license for your Juniper SSL VPN appliance. The instructions in this addendum assume that the NetScreen Secure Access appliance and the Juniper IVE have been installed and configured according to the instructions in the appliance s installation guide and the NetScreen Instant Virtual Extranet Platform Administration Guide. The instructions also assume that roles (JSAM and NC) have already been created on the NetScreen Secure Access appliance. Please see the NetScreen Instant Virtual Extranet Platform Administration Guide for instructions on how to create these roles. Symantec Support Symantec Corporation provides a wide variety of service and Support programs. Contact Symantec at: Third-Party Product Support If you obtained this product from a hardware or software company other than Symantec Corporation directly, your software license as well as all service and support should be obtained through that vendor. Check the Addendum provided with the package for service and support information. 2
7 Virtual Desktop Bypass Description In practice, when a client connects to a Juniper SSL VPN appliance, the Virtual Desktop is loaded and within the Virtual Desktop the client is provided a login interface to the Juniper appliance interface. However, the Success URL link provided for the Virtual Desktop is sometimes applied to the normal desktop instead, thereby bypassing the Virtual Desktop. Symantec On-Demand 2.6 includes a new Jedi Package that prevents bypass of the Virtual Desktop. The Jedi Package is a zip file uploaded to the Juniper appliance. It enables two new rules that manage proper usage of the Virtual Desktop. Use the following steps to prevent a user from accessing the Juniper SSL VPN appliance interface without the Virtual Desktop. Installing the Jedi Package Step 1: Setting Up Symantec On-Demand Manager This section describes how to set up the Symantec On-Demand Manager to prepare for uploading of the jedi.zip file to the NetScreen Secure Access appliance. Symantec On-Demand Setup Procedures You need to perform two basic tasks in the On-Demand Manager to prepare files for integration with the Juniper appliance: Configure the On-Demand module(s) to access the IP address or DNS-resolvable name of the appliance. Each module can point to a different sign-in page if desired. Set and apply policies for each module. These tasks are described below. 3
8 Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide Addendum Configure URLs 1. Launch the Symantec On-Demand Manager and click the + sign next to Location (Office in this example) to expand it. 2. Click the module you want to export (Virtual Desktop in this example). 3. Click the URL tab. 4. In the Success area of the URL tab, enter the IP address or DNS-resolvable name of the NetScreen Secure Access appliance s login page. (Don t forget to enter the s in https, and make sure that Set Cookie is not checked.). In this example the URL is composed of the appliance s IP address and the /vd/ extension. You will use this URL later when you create the Secure sign-in policy on the NetScreen Secure Access appliance. See Create Secure Sign-in Policy for more information. 5. Using the Virtual Desktop and Web Browser tabs, set up the On-Demand policies and rules that you want to export to the Juniper appliance. Remember to click Apply to save your settings. 6. Repeat steps 2 through 5 for each module for which you want to specify a URL. Please note that you cannot use the same URL extension (/vd/ in this example) for the other modules. Each module you configure must have a different extension. For further information about setting up URLs for locations, see the Setting the Success and Failure URLs section of the Symantec On-Demand Manager Administration Guide. Set Up Policies for Export When you use the Custom UI integration method, you can specify policies for all of the Symantec On-Demand modules and prepare them for upload to the NetScreen Secure Access appliance. You can specify different policies for each of your locations. Please see 4
9 Installing the Jedi Package the Symantec On-Demand Manager Administration Guide for detailed information about how to create policies. 1. Launch the Symantec On-Demand Manager and click the + next to the desired location (Office in this example) to expand it. 2. Click Host Integrity, Virtual Desktop, or Cache Cleaner (Virtual Desktop in this example) and specify the policies you want to enforce on endpoint machines in this location. 3. Click Apply to save your settings. 4. Continue specifying policies for the other modules as desired. Remember to click Apply to save your settings before exiting each tab. Step 2: Upload the jedi.zip File to the Juniper SSL VPN Appliance This section describes how to upload the jedi.zip file located in the Symantec directory to the Juniper appliance. Note: The Jedi Package is used only for custom UI integration method. Refer to the Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide for information about creating, editing, and uploading custom UIs. 5
10 Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide Addendum Point to the jedi.zip file and Enable the New Jedi Policies 1. Log on to the Juniper SSL VPN appliance as an administrator. 2. Click System Endpoint Security, then click the Host Checker tab. 3. Now click New 3 rd Party Policy. Name the new policy (in the example, we named the policy No_Normal_Window_login. 4. Browse to the jedi.zip file located at C:\Program Files\Symantec\Symantec On-Demand. 6
11 Installing the Jedi Package 5. Click Save Changes. 6. Next, click Users User Authentication Realms SecureVD and click the Authentication Policy tab. Note: In the custom UI integration method, there is typically one secure and one insecure realm configured for integration with Symantec On-Demand. In the next step, you enable the new policies defined by jedi.zip in the secure realm. For information about configuring a secure realm, see page 41 of the Symantec On-Demand 2.6/Juniper IVE SSL VPN 5.2 Integration Guide. 7
12 Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide Addendum 7. In the Authentication Policy window, click Host Checker in the submenu (located under the Tabs). Note: When jedi.zip was uploaded, it created two new policy entries under the Host Checker. You will now enable the new policies. 8. Enable the new jedi.zip policies by clicking the two bottom-most checkboxes for the newly available policies in both the Evaluate Policies column as well as the Require and Enforce column. 9. Click Save Changes. The new jedi.zip policies are now enabled and users will now be prevented from bypassing the Virtual Desktop when accessing the Juniper SSL VPN appliance interface. 8
Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide
Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide ii Preface Copyright Information: Symantec Corporation Copyright
ADMINISTRATOR S GUIDE
ADMINISTRATOR S GUIDE NetScreen-Statistical Report Server Version FP2 P/N 093-1386-000 Rev.A Copyright Notice Copyright 2004 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks
Integrating Juniper Netscreen (ScreenOS)
Integrating Juniper Netscreen (ScreenOS) EventTracker Enterprise Publication Date: Jan. 5, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide helps you
NetScreen-5GT Announcement Frequently Asked Questions (FAQ)
Announcement Frequently Asked Questions (FAQ) Q: What is the? A: The is a high performance network security appliance targeted to small or remote offices in distributed enterprises, including telecommuters,
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0
Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described
Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources
APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................
Secure Virtual Workspace. Release 5.3R3. Juniper Networks Secure Access. Juniper Networks, Inc. www.juniper.net
Juniper Networks Secure Access Secure Virtual Workspace Release 5.3R3 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part Number: 53B050606 This
Hyper-V Server 2008 Setup and Configuration Tool Guide
Hyper-V Server 2008 Setup and Configuration Tool Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide will help you set up and configure Microsoft Hyper-V
Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET
DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,
Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: 2013-10-18. Copyright 2013, Juniper Networks, Inc.
Junos Pulse Windows In-Box Junos Pulse Client Quick Start Guide Published: 2013-10-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
PrivateServer HSM Integration with Microsoft IIS
PrivateServer HSM Integration with Microsoft IIS January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this document
Active Directory Provider User s Guide
Active Directory Provider User s Guide Mike Horton Version 01.00.03 Last Updated: December 28, 2007 Category: DotNetNuke v4.6.0 and greater Information in this document, including URL and other Internet
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
Omniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
Microsoft IIS Integration Guide
Microsoft IIS Integration Guide Preface Preface 2015 SafeNet, Inc. All rights reserved. Part Number: 007-011955-001 (Rev E, 12/2015) All intellectual property is protected by copyright. All trademarks
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
Juniper SSL VPN Authentication QUICKStart Guide
Juniper SSL VPN Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights
Strong Authentication for Juniper Networks SSL VPN
Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
Configuring and Implementing A10
IMPLEMENTATION GUIDE Configuring and Implementing A10 Networks Load Balancing Solution with Juniper s SSL VPN Appliances Although Juniper Networks has attempted to provide accurate information in this
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
MaaS360 Cloud Extender
MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
MaaS360 On-Premises Cloud Extender
MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
Configuring Multiple ACE Management Servers VMware ACE 2.0
Technical Note Configuring Multiple ACE Management Servers VMware ACE 2.0 This technical note describes how to configure multiple VMware ACE Management Servers to work together. VMware recommends this
Email Archiving User Guide Outlook Plugin. Manual version 3.1
Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad
Implementing and Supporting Windows Intune
Implementing and Supporting Windows Intune Lab 5: Using Windows Intune Remote Assistance Lab Manual Information in this document, including URL and other Internet Web site references, is subject to change
VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES
APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table
PRODUCT CATEGORY BROCHURE
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
CRM to Exchange Synchronization
CRM to Exchange Synchronization Installation, Configuration and End-User Instructions VERSION 1.0 DATE PREPARED: 9/1/2012 DEVELOPMENT: BRITE GLOBAL, INC. 2012 Brite Global, Incorporated. All rights reserved.
Juniper Secure Access SSL VPN Log Configuration Guide
Juniper Secure Access SSL VPN Log Configuration Guide Document Release: March 2012 Part Number: LL600049-00ELS01000000 This manual supports LogLogic Juniper Secure Access SSL VPN Release 1.0 and later,
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace
INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
Verizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
with PKI Use Case Guide
Intel Identity Protection Technology (Intel IPT) with PKI Use Case Guide Version 1.0 Document Release Date: February 29, 2012 Intel IPT with PKI Use Case Guide i Legal Notices and Disclaimers INFORMATION
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Deploying the Workspace Application for Microsoft SharePoint Online
Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This
What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4
Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This
Web Security Firewall Setup. Administrator Guide
Web Security Firewall Setup Administrator Guide Web Security Firewall Setup Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
NETWORK AND SECURITY MANAGER
DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching
Technical Certificates Overview
Technical Certificates Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation ( Good
Reverse Proxy Guide. Version 2.0 April 2016
Version 2.0 April 2016 Reverse Proxy Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu
PaperStream Connect Setup Guide Version 1.0.0.0 Copyright Fujitsu 2014 Contents Introduction to PaperStream Connect... 2 Setting up PaperStream Capture to Release to Cloud Services... 3 Selecting a Cloud
Integrate Websense Web Security Gateway (WSG)
Integrate Websense Web Security Gateway (WSG) EventTracker v7.x Publication Date: June 2, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
Integrating Symantec Endpoint Protection
Integrating Symantec Endpoint Protection EventTracker Version 7.x Publication Date: Nov 8, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About this Guide This guide provides
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
JUNOS PULSE APPCONNECT
White Paper JUNOS PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Copyright 2014, Juniper Networks, Inc. 1 Table of
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
Polycom CMA System Upgrade Guide
Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or
SonicWALL SSL VPN 3.5: Virtual Assist
SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following
Thinspace deskcloud. Quick Start Guide
Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the
VMware Virtual Desktop Manager User Authentication Guide
Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
RSA Authentication Manager 8.1 Virtual Appliance Getting Started
RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com
Sales Pipeline Management 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT 1. Configuring
Cloud Authentication. Getting Started Guide. Version 2.1.0.06
Cloud Authentication Getting Started Guide Version 2.1.0.06 ii Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
User Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more Security Review Version 8.1 March 31, 2016 Contacting Leostream Leostream Corporation http://www.leostream.com
Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016
Version 2.0 April 2016 Folder Proxy + OWA + ECP/EAC Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
AvePoint CallAssist 3.2.5 for Microsoft Dynamics CRM. Installation and Configuration Guide
AvePoint CallAssist 3.2.5 for Microsoft Dynamics CRM Installation and Configuration Guide Revision K Issued November 2014 Table of Contents Overview... 4 Prerequisites... 5 Environment Requirements...
ControlPoint. Advanced Installation Guide. Publication Date: January 12, 2016. Metalogix International GmbH., 2008-2016 All Rights Reserved.
ControlPoint Publication Date: January 12, 2016 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,
INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN
INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data
Integrate Microsoft Windows Hyper V
Integrate Microsoft Windows Hyper V EventTracker v7.x Publication Date: Aug 9, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract Hyper-V in Windows Server 2008 and
What s New in Juniper s SSL VPN Version 6.0
What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper
Secure Access. Client-side Changes Guide. Instant Virtual Extranet Platform
Secure Access Client-side Changes Guide, Instant Virtual Extranet Platform Secure Access Client-side Changes Guide Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000
Juniper Networks SSL VPN Implementation Guide
Juniper Networks SSL VPN Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
StoneGate SSL VPN Technical Note 2076. Setting Up Sygate On-Demand
StoneGate SSL VPN Technical Note 2076 Setting Up Sygate On-Demand Table of Contents Introduction................................... page 3 Overview..................................... page 3 Sygate On-Demand
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Secure IIS Web Server with SSL
Secure IIS Web Server with SSL EventTracker v7.x Publication Date: Sep 30, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is to help
Setting up an icap Server for ISG- 1000/2000 AV Support
Application Note Setting up an icap Server for ISG- 1000/2000 AV Support Version 1.1 Ronald Ng AJTAC Engineer AV/DI/UF Specialist Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA
5.0 Secure Meeting Error Messages
Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Contents 5.0 Secure Meeting Error Messages...1 Contacting Juniper...1 Administrator
Cisco ASA Authentication QUICKStart Guide
Cisco ASA Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved.
NSM Plug-In Users Guide
Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright Notice Copyright 2014 Juniper
Introduction. Document Conventions. Administration. In This Section
MS Project Integration Guide March 2014 Contents Introduction... 5 Document Conventions... 5 Administration... 5 MS Project Template... 6 MS Project Template Usage... 6 Project Metadata... 6 Project WBS/Assignments...
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
By default, STRM provides an untrusted SSL certificate. You can replace the untrusted SSL certificate with a self-signed or trusted certificate.
TECHNICAL NOTE REPLACING THE SSL CERTIFICATE AUGUST 2012 By default, STRM provides an untrusted SSL certificate. You can replace the untrusted SSL certificate with a self-signed or trusted certificate.
Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0
Smart Control Center User Guide 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10685-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted,
Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration
Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012 Revision History Revision Revision History
Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox
Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents
Host Access Management and Security Server
Host Access Management and Security Server Evaluation Guide Host Access Management and Security Server Evaluation Guide 12.2 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved.
ShoreTel 13 Conferencing User Guide. Part Number 850-1234-01
ShoreTel 13 Part Number 850-1234-01 Document and Software Copyrights Copyright 1998-2012 by ShoreTel Inc., Sunnyvale, California, USA. All rights reserved. Printed in the United States of America. Contents
Quick Start Guide FLIR Firmware Update Tool
Quick Start Guide FLIR Firmware Update Tool Copyright 2014 FLIR Systems, Inc. All rights reserved. Doc. No.: 427-0073-99-28, Rev. 110, Oct 2014 FLIR Systems, Inc., 2014. All rights reserved worldwide.
