this guide will help you understand in detail who the Asset Management module works and relates to other modules.
|
|
- Zoe Cook
- 8 years ago
- Views:
Transcription
1 Asset Management Introduction this guide will help you understand in detail who the Asset Management module works and relates to other modules. this module is critical for most of you looking forward the creation of a security program and in particular something on the grounds of ISO or NIST this module will help you with: identify assets with the end purpose of risk analysis define your own asset classification create data flows (what happens when data at each stage: creation, modification, deletion, etc) asset labelling (define labels for data assets) WARNING: this is not an inventory module. asset management in the scope of security is understood as the initial analysis to identify risks. Asset Identification Introduction identifying and analysing (and as part of that analysis, classifying them) assets in the scope of a security program is a basic exercise and if done properly, extremely useful. eramba will help you systematically identify assets for each of the previously defined business units. the benefit of doing it this way is that you ensure that all assets in use by each business unit in scope are addressed. the proper identification of assets will be crucial to see real business benefits during Risk Management of Data Flow Analysis.
2 As you see in the image above, the asset in red has been identified (and all it s attributes underneath) and mapped with two business units. risks associated with this assets will be linked in the future (shown in the image on the left) Back to the top Using the module this is an important part of the system as it will enable you to perform many other interesting things such as risk analysis and data flow analysis. unless you work with a massively huge organisation such as toyota or shell, you should not have more than a hundred assets. remember, this is not an inventory exercise. the whole objective of identifying assets is to feed the Risk Process (and the incident module). the way we prefer working on this is leveraging from previous conversations (talks, not questionnaires, etc) with business units where they tell me what they do, how and with what elements (assets!). the what is what we need in this section. for each business unit, stakeholders need to
3 walk you trough every main process they run and you need to get the assets they use. For example: you might find that Human Resources and Finance, both have laptops. they might have different characteristics (brand, etc) but you should not care for that. they are laptops and that is an asset. one asset, not two. for each asset make sure you map their related business unit, in the previous example the asset laptop would have mapped the BUs Finance and Human Resources, their liabilities (as this will make the trick when risk analysing) and their asset type (as this will let you run data asset analysis). the other fields (owner, guardian, user, classification, labels, etc) are mostly for those under ISO reviews when creating an asset, you will be asked to provide a Review date. this date will be used to keep a log of the scheduled reviews for this asset. usually this is every 12 months or so and the whole point is to ensure the asset information (classification, owner, etc) is still accurate. every time the value Review is modified a new entry on the review menu will be created. so when looking at the reviews under the manage option you will presented with a popup that lists them all.
4 you typically edit a review and complete the description, reviewer and completed fields (if the review has been completed or not). you may also attach evidence that the review has been conducted (such an to the owner of the asset). you may also create a review before the scheduled date (for example if something changed on the organisation and all assets were reviewed). reviews will be stored and included as part of the PDF export of an asset. when a review has not been Completed on time, the asset will be displayed with a status alarm Asset with missing reviews. notifications notifications can be defined in the asset module, on top of the typical default notifications you have specific notifications for reviews where you will be ed 10 days ahead of a review deadline. Asset Classification
5 Introduction ISO and other standards put a lot of stress into classifying assets according to some organisational criteria, for example something around their integrity, confidentiality or availability. Once you define your classification you will be able to apply it to every asset you later identify. the following is an example of asset classification used in a ISO program Using the module asset classification is in my opinion not really useful unless you are working with risk management in the eyes of ISO ISO requires you to build a classification and apply it on the assets. for that purpose you can build here your own classification criteria. my suggestion is to do what ISO auditors are used to see that is a classification based on the asset confidentiality, integrity and availability. the one i personally choose is for each of them: high: anything related to the integrity,confidentiality or availability that could bring legal issues medium: anything related to the integrity,confidentiality or availability that could bring reputation issues low: anything related to the integrity,confidentiality or availability that could bring minor issues dont forget, you should state in your security policy what your asset classification is!
6 Asset Labels Introduction once again, labelling assets is a common requirement in most standards related to security, including ISO labels are one way of profiling data, typical examples are Private, Confidential, Public Domain, etc. labels defined in this section will later be associated with every identified asset. the following is a simple labelling example: Using the module although i do see a little bit of value in terms of security, once again, this is a requirements from ISO. you should define this in a security policy and simply map what you have there in eramba. an example is: restricted: The asset must be of considerable sensibility or confidentiality or integrity. This decision is up to the asset owner and assistance when required of the Legal department internal: The asset must be of considerable sensibility or confidentiality or integrity as the Restricted tag but the audience, instead of being restricted to certain teams or individuals is restricted to the corporation as a whole. public: Anyone is a valid, potential recipient Asset Types
7 Introduction on top of the list of default asset types, the user is allowed to create more to match their needs. simply create a new type and it will become available to use in the system. Data Asset Analysis Introduction most security people is concerned that confidential data (credit-card numbers, credential, secrets, trade marks, etc) remains undisclosed but few really spend the time to understand what happens when data is created, modified, deleted, discarded, etc and were the risks really exists. data flows will let users to perform the analysis of what happens with data and map for each state which security controls are available to protect it. on the image above states are defined as columns (created, transit, etc) and controls in green.
8 if done properly, this analysis goes to the point (risk analysis applied to asset) and avoids getting into other complicated practices such as risk management. this exercise is highly recommended for those who are tempted to spend zillion dollars in data loss prevention solutions (DLP, Network DLP, Etc). Back to the top Using the module if you dont need to run a risk management program (say because you are not under ISO, etc) we would definitely recommend you focusing on this section as it s easier to maintain and goes into the point of understanding what is your critical data and what it takes to look after it. Warning: to use this sub-module you will need to have compiled your list of controls (Security Controls / Security Services). the objective is for every asset previously identified as Data Asset describe for every state (created, transmitted, modified, etc) who uses the data, with whom (third parties) and what controls (or not) are there to safeguard data. this is a simple approach to risk management but one that hits the bell as in the end, your security program is there in part, to protect critical data. you need to conduct interviews with the stakeholders of each business unit that originally notified you about the data asset and ask what happens for each of the following stages: created (when the data is created, for example when invoices paper arrive to the company) stored (when the invoices are stored in lockers or scanned and stored in a share drive) deleted (when the papers are deleted) modified (paper invoices cant be modified, you could review if integrity could be questioned) transit (when the invoices are shared with someone else) unnecessary (when invoices become not useful) for each of the stages, you need to validate:
9 which business unit is in contact with the data asset which external third party is involved (to further analyse third parties) what controls exist to protect the data from risk what projects can be implemented in case there are no controls where they should once the analysis is done, the status field will keep you aware trough out the changes of states of controls and projects if the analysis remains relevant or not (controls expired, failed audits, etc) you can export the data to a CSV if you want to have a deeper look or share your analysis with your colleagues.
Information Security Policy. Chapter 12. Asset Management
Information Security Policy Chapter 12 Asset Management Author: Policy & Strategy Team Version: 0.5 Date: April 2008 Version 0.5 Page 1 of 7 Document Control Information Document ID Document title Sefton
More informationEnd User Manual. SharePoint. Please send feedback or suggestions for updates to the following email address IT.Training@lse.ac.uk
SharePoint End User Manual Please send feedback or suggestions for updates to the following email address IT.Training@lse.ac.uk London School of Economics & Political Science 1 02/12/2014/lse.ac.uk/IMT/training
More informationSite Administrator User Guide. show, tell, share
Site Administrator User Guide show, tell, share Contents About your Team site 1 What is a Team site? 1 What can you do on a Team or Business site that you can t do on www.present.me? 1 Getting Started
More informationMC Talent Management System. Goals Module Guidebook
MC Talent Management System Goals Module Guidebook A. Signing On and Off of the System B. Employee Center Home Page - Left Pane - Center Pane - Right Pane C. Accessing and Creating the Goal Plan D. Navigating
More informationEmail Message Classification user guide
Email Message Classification user guide Introduction Email message classification tags each email used within the authority with one of three classifications chosen by a user dependant on the content of
More informationQuick Start help guide: Use your Software Assurance and Services Benefits
Quick Start help guide: Use your Software Assurance and Services Customer Guide The Microsoft Business Center lets you view, learn about and use your Software Assurance benefits, as well as benefits you
More informationEmail Basics. For more information on the Library and programs, visit www.bcpls.org BCPLS 08/10/2010 PEMA
Email Basics Email, short for Electronic Mail, consists of messages which are sent and received using the Internet. There are many different email services available that allow you to create an email account
More informatione-invoicing Online Billing
e-invoicing Online Billing For any assistance please contact Email: Tel: Contents Welcome to Online Billing 3 Registering for Online Billing 4 einvoicing and epayment 10 Logging in 11 Accessing your new
More informationSocial Return on Investment
Social Return on Investment Valuing what you do Guidance on understanding and completing the Social Return on Investment toolkit for your organisation 60838 SROI v2.indd 1 07/03/2013 16:50 60838 SROI v2.indd
More informationThe United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0.
The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0. Copyright 1994-2007 by Northrop Grumman. All rights reserved. Northrop Grumman, the
More informationGetting the most from Contracts Finder
Getting the most from Contracts Finder A guide for businesses and the public May 2012 What s in this guide What s this guide for?...2 What s on Contracts Finder...2 Searching for notices the basics...2
More informationAtlantic Automation. Document Storage and Retrieval System. Administrator s Guide
Atlantic Automation Document Storage and Retrieval System Administrator s Guide Copyright Notice This document is copyright material. It may not be reproduced in any form whatsoever, including physical,
More informatione-administration your guide to using with TNT
e-administration your guide to using with TNT For any administrative assistance please email group.admin.stubbins@tnt.com For any technical advice please contact 01827 711 611 Contents welcome to e-administration
More informationBuilding Qualtrics Surveys for EFS & ALC Course Evaluations: Step by Step Instructions
Building Qualtrics Surveys for EFS & ALC Course Evaluations: Step by Step Instructions Jennifer DeSantis August 28, 2013 A relatively quick guide with detailed explanations of each step. It s recommended
More informationGetting Started With MySaleManager.NET
Getting Started With MySaleManager.NET Welcome to MySaleManager.NET! We are glad you chose us to be the provider for automation services at your Consignment Event. This guide is designed to help you gets
More informationAbout DropSend. Sending Files with DropSend
About DropSend DropSend is a service that allows businesses and individuals to send large files, store files online and collaborate in a quick and easy way. DropSend Business Plan will help your company
More informationCERVIS Technologies Volunteer Management User Manual
CERVIS Technologies Volunteer Management User Manual Created By: Andrew Bauer, Erin Bracken, Anna Schozer and Chris Xavier Worcester Polytechnic Institute Interactive Qualifying Project D Term 2016 Contents
More informationUSER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3]
Pro-curo Software Ltd USER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3] CONTENTS Everyday use... 3 Logging on... 4 Main Screen... 5 Adding locations... 6 Working with locations... 7 Duplicate...
More informationClient Manager User Guide. Version 1.2 Last update: 30 April 2015
Version 1.2 Last update: 30 April 2015 TABLE OF CONTENTS 1. Connecting to Client Manager 2 1.1. Logging into the system 2 2. Client Level Features 3 2.1. Group Availability 3 2.2. Client Selection 4 2.3.
More informationINTRODUCTION TO EMAIL: & BASICS
University of North Carolina at Chapel Hill Libraries Chapel Hill Public Library Carrboro Branch Library Carrboro Cybrary Durham Public Library INTRODUCTION TO EMAIL: & BASICS Getting Started Page 02 Prerequisites
More informationSimplyCast emarketing Email User Guide
SimplyCast emarketing Email User Guide Email User Guide Page 1 Contents 1. Email Overview... 3 2. Features Overview... 3 3. Email Editor Features... 8 4. How to Create an Email Campaign?... 5 5. Additional
More informationCvent Attendee Management
Cvent Attendee Management 1765 Greensboro Station Place McLean, VA 22102 www.cvent.com customercare@cvent.com U.S. and Canada (toll-free) 866.318.4357 UK (toll-free) 0808.234.4543 Australia (toll-free)
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationAppointment Schedule and Online Messaging Help Guide
Appointment Schedule and Online Messaging Help Guide 1. Accessing your appointment schedule 2. Understanding the icons 3. Exclusions 4. Requesting meetings 5. Cancelling pending meeting requests 6. Accepting
More informationMovida provides a complete solution for managing catch-up and Video On-Demand services. It enables you to manage the editorial side of your Video
Movida provides a complete solution for managing catch-up and Video On-Demand services. It enables you to manage the editorial side of your Video On-Demand business across multiple platforms, devices,
More informationCity of De Pere. Halogen How To Guide
City of De Pere Halogen How To Guide Page1 (revised 12/14/2015) Halogen Performance Management website address: https://global.hgncloud.com/cityofdepere/welcome.jsp The following steps take place to complete
More information03_Events Trainingv3 1
03_Events Trainingv3 1 Publish Event You can publish some information about your content before you have set up all the details. In this way, people can learn about the event on your website prior to registrations
More informationMobility Tool Guide for Beneficiaries
EUROPEAN COMMISSION Directorate-General for Education and Culture Lifelong Learning: policies and programme Coordination of the "Lifelong learning" programme Mobility Tool Guide for Beneficiaries Version:
More informationCitrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide
Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6
More informationU.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)
U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) Security Risk Assessment (SRA) Tool User Guide Version Date: March 2014
More informationBIG LOTS VENDOR COMPLIANCE WEB PORTAL USER GUIDE - VENDOR 300 PHILLIPI RD. COLUMBUS, OH 43228
BIG LOTS VENDOR COMPLIANCE WEB PORTAL USER GUIDE - VENDOR 300 PHILLIPI RD. COLUMBUS, OH 43228 Contents Getting Started...4 Tips for Using Actionable Intelligence... 4 Logging into Actionable Intelligence...
More informationInformation Security Policy. Appendix B. Secure Transfer of Information
Information Security Policy Appendix B Secure Transfer of Information Author: Data Protection and Information Security Officer. Version: 0.7 Date: March 2008 Document Control Information Document ID Document
More informationVendor Portal User Guide
State of Illinois Illinois Department of Transportation Vendor Portal User Guide Version 2.1 November 2015 0137-16, 11/15, web Item Document Title File Name Disposition Author Document Description Description
More informationBarracuda Spam Firewall
Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive
More informationClinic Event Management System v5.1 Instruction Manual. 2014 Nursing Module
Clinic Event Management System v5.1 Instruction Manual 2014 Nursing Module The Regional Municipality of Niagara, 2014 Table of Contents LOGIN... 1 MAIN MENU... 1 CLIENT QUEUE... 6 CLIENT QUESTIONNAIRE...
More informationHiSoftware Policy Sheriff. SP HiSoftware Security Sheriff SP. Content-aware. Compliance and Security Solutions for. Microsoft SharePoint
HiSoftware Policy Sheriff SP HiSoftware Security Sheriff SP Content-aware Compliance and Security Solutions for Microsoft SharePoint SharePoint and the ECM Challenge The numbers tell the story. According
More informationGETTING STARTED WITH THE PCI COMPLIANCE SERVICE VERSION 2.3. May 1, 2008
GETTING STARTED WITH THE PCI COMPLIANCE SERVICE VERSION 2.3 May 1, 2008 Copyright 2006-2008 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys,
More informationCanIt-PRO End-User s Guide Roaring Penguin Software Inc. 9 September 2005
CanIt-PRO End-User s Guide Roaring Penguin Software Inc. 9 September 2005 2 Contents 1 Introduction 5 2 Accessing The CanIt-PRO User Interface 7 3 CanIt-PRO Simplified Interface 9 4 CanIt-PRO Expert Interface
More informationThe United States Office Of Personnel Management eopf System Administrator Training Manual for eopf Version 4.0.
The United States Office Of Personnel Management eopf System Administrator Training Manual for eopf Version 4.0. Copyright 1994-2007 by Northrop Grumman. All rights reserved. Northrop Grumman, the Northrop
More informationGetting Started Manual: Authors
PaperPlaza and PaperCept Conference Manuscript Management and Registration Systems Getting Started Manual: Authors PaperCept, Inc. (Revised October 5, 2011) Getting Started Manual: Authors Contents 1.
More informationHands-on Guide. FileMaker Pro. Using FileMaker Pro with Microsoft Office
Hands-on Guide FileMaker Pro Using FileMaker Pro with Microsoft Office Table of Contents Introduction... 3 Before You Get Started... 4 Sharing Data between FileMaker Pro and Microsoft Excel... 5 Drag and
More informationMINAP Web-portal Guide
MINAP Web-portal Guide Version 1.0 June 2014 Contents 1. Scope... 1 2. Getting started... 2 i. 2.1 Introduction... 2 2.2 Access requirements... 2 2.3 Requesting access... 3 3. How to create a record...
More informationMyCSI Global User Guide. MyCSI Global User Guide
MyCSI Global User Guide 1 Table of Contents 1. MyCSI Fundamentals... 3 2. Search... 5 3. myschedules... 7 4. myassets... 9 5. myinvoices (US/Canada only)... 12 6. mytransactions... 13 7. myadministration...
More informationMac OS X User Manual Version 2.0
Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
More informationAutomated Vendor Form for Disbursement Voucher Vendors Instruction Manual
Automated Vendor Form for Disbursement Voucher Vendors Instruction Manual Table of Contents Eligible Vendor Types for Use with the Automated Vendor Form... 2 Search KFS for Vendors Before Using the Automated
More informationHIPAA Compliance Evaluation Report
Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations
More informationOutlook XP Email Only
Outlook XP Email Only Table of Contents OUTLOOK XP EMAIL 5 HOW EMAIL WORKS: 5 POP AND SMTP: 5 TO SET UP THE POP AND SMTP ADDRESSES: 6 TO SET THE DELIVERY PROPERTY: 8 STARTING OUTLOOK: 10 THE OUTLOOK BAR:
More informationLetMC.com Training Support Part 2 Issue 5.1 18/05/09 Accounting Irish Edition
LetMC.com Training Support Part 2 Issue 5.1 18/05/09 Accounting Irish Edition (Tantum eruditi sunt liberi) Page 2 INTRODUCTION... 8 Payments and Deposits... 10 Taking Payments... 10 Make a Bank Deposit...
More informationUSERGUIDE FOR INSTRUCTORS
USERGUIDE FOR INSTRUCTORS INTRODUCTION Dear instructor, Thank you for downloading this Ephorus User Guide. If you have any questions, please contact the Ephorus key user within your educational institute.
More informationSo, why should you have a website for your church? Isn't it just another thing to add to the to-do list? Or will it really be useful?
Why Have A Website? So, why should you have a website for your church? Isn't it just another thing to add to the to-do list? Or will it really be useful? Obviously, 'everyone else does' it not a good enough
More informationDIIMS Records Classifier Guide
DIIMS Records Classifier Guide Featuring Content Server 10 Second Edition, November 2012 Table of Contents Contents 1. DIIMS Overview... 3 1.1 An Overview of DIIMS within the GNWT... 3 1.1.1 Purpose of
More informationTable of Contents. Page 3
Welcome to Exchange Mail Customer Full Name Your e-mail is now being delivered and stored on the new Exchange server. Your new e-mail address is @rit.edu. This is the e-mail address that you should give
More informationintroduction to emarketing
introduction to emarketing emarketing is typically used for promotional campaigns for attendee generation and for attendee communication. It works closely with ereg which also includes email capabilities
More informationCUSTOMER PORTAL USER GUIDE FEBRUARY 2007
CUSTOMER PORTAL USER GUIDE FEBRUARY 2007 CONTENTS INTRODUCTION 1. Access to the system 2. Case Management 2.1 Create a case 2.2 Review & Access existing cases 2.3 Update a Case 2.4 Resolve and Close a
More informationTHE TOP TEN TIPS FOR USING QUALTRICS AT BYU
THE TOP TEN TIPS FOR USING QUALTRICS AT BYU TIP #1: CREATING A SURVEY FROM A COPY AND COLLABORATING ON SURVEYS TIP #2: CREATING AND USING PANELS TIP #3: LIBRARIES AND HOW TO USE THEM TIP #4: BASIC SKIP
More informationHow t o Tr i age O r acle Supp ort Call s
How t o Tr i age O r acle Supp ort Call s M S S W h i t e P a p e r b y M e l a n i e C a m e r o n Does this exchange sound familiar? User: Support: User: Oracle doesn t work. It s up. What s the problem?
More informationCentral and Remote Users Guide
Central and Remote Users Guide Proprietary Rights Notice 1985-2006 IDEXX Laboratories, Inc. All rights reserved. Information in this document is subject to change without notice. Practice names, doctors,
More informationPerformance Management System Reference Guide Administrators
Performance Management System Reference Guide Administrators Administration 8 Manage Company Information... 8 Navigation... 8 Company Data... 8 Company Logo... 8 Password Settings... 8 Review Settings...
More informationRoaring Penguin User Guide
Roaring Penguin User Guide Emails and Spam Training 2-3 The Quarantine Summary 4-5 Logging in to the Roaring Penguin Web Interface 6-8 Roaring Penguin Home Screen 9-10 Opting out of Spam Scanning 11-12
More informationATEA eshop. Basic Administration Guide
Basic Administration Guide Contents Introduction... 3 Audience... 3 Document Location... 3 Special information... 3 1. Login... 4 2. Managing users... 5 3. Increase or decrease licenses... 6 4. Upgrade/Downgrade
More informationSuccessFactors Learning: Scheduling Management
SuccessFactors Learning: Scheduling Management Classroom Guide v 6.4 For SuccessFactors Learning v 6.4 Last Modified 08/30/2011 2011 SuccessFactors, Inc. All rights reserved. Execution is the Difference
More informationIntellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102
Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Interneer, Inc. Updated on 2/22/2012 Created by Erika Keresztyen Fahey 2 Workflow - A102 - Basic HelpDesk Ticketing System
More informationTable of Contents. Manual for Core Staff - Equipment/Scheduling Core Facilities
Table of Contents 1. Overview 2. How do I manage my account? 3. Equipment Scheduling Workflow Overview 4. Equipment Scheduling Walk Through a. How do I access the list of calendars available for scheduling?
More informationPatient Portal Users Guide
e-mds Solution Series Patient Portal Users Guide Version 7.0 How to Use the Patient Portal CHARTING THE FUTURE OF HEALTHCARE e-mds 9900 Spectrum Drive. Austin, TX 78717 Phone 512.257.5200 Fax 512.335.4375
More informationProSoftMod Commission Report Documentation
ProSoftMod Commission Report Documentation The purpose of these modifications is to produce commission reports by salesman. The reports can be done by total sales or gross profit. The can also by produced
More informatione-invoicing your guide to using with TNT
e-invoicing your guide to using with TNT A For any technical assistance please email Atherstone.Helpdesk@tnt.com or call 01827 711 611 Contents welcome to e-invoicing with TNT 03 registering for e-invoicing
More informationisupport 15 Release Notes
isupport 15 Release Notes This document includes new features, changes, and fixes in isupport v15. The Readme.txt file included with the download includes a list of known issues. New Features in isupport
More informationAT&T Online Fax User Guide Version 1.0
AT&T Online Fax User Guide Version 1.0 Welcome to AT&T Website Solutions SM We are focused on providing you the very best web hosting service including all the tools necessary to establish and maintain
More informationWelcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5. Getting Started 1.2... 7 Download ncrypted Cloud...
Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted
More informationAmazon Digital Text Platform
Amazon Digital Text Platform Quick Start Guide Introduction This step-by-step guide will show you how to go from start to finish publishing material with Amazon DTP. If you need additional help, visit
More informationMOST FRAUD CASES INVOLVE SENIOR MANAGEMENT. HOW TO PREVENT THEM FROM MISUSING THEIR POWER?
1 www.e-safecompliance.com MOST FRAUD CASES INVOLVE SENIOR MANAGEMENT. HOW TO PREVENT THEM FROM MISUSING THEIR POWER? Based on Gartner Worldwide spending on information security will reach $71.1 billion
More informationMySpam email filtering service Protection against spam, viruses and phishing attacks
MySpam email filtering service Protection against spam, viruses and phishing attacks 1. Introduction This MySpam guide describes the new service and changes to the University s current spam handling procedures.
More informationSubversion Integration for Visual Studio
Subversion Integration for Visual Studio VisualSVN Team VisualSVN: Subversion Integration for Visual Studio VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft
More informationDeltek Touch Time & Expense for GovCon. User Guide for Triumph
Deltek Touch Time & Expense for GovCon User Guide for Triumph November 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or
More informationFilesAnywhere Feature List
FilesAnywhere Feature List FilesAnywhere Page 1 of 9 3/31/2014 Contents Basic Features... 3 Advanced Features... 7 Enterprise Features... 9 FilesAnywhere Page 2 of 9 3/31/2014 Basic Features No File Size
More informationThe NBT Online Banker PERSONAL FINANCIAL MANAGEMENT TOOL HOW TO GUIDE
The NBT Online Banker HOW TO GUIDE TABLE OF CONTENTS Benefits and Resources... 3 Get Started Accessing and Using the Personal Financial Management Tool... 4 Customize Your Personal Finance Home Page...
More informationSocial Work Portfolio Help Guide. Table of Contents. (click anything from the list below to skip to the correct information)
Social Work Portfolio Help Guide Table of Contents (click anything from the list below to skip to the correct information) Steps to creating your Social Work portfolio Security settings for your portfolio
More informationNYS OCFS CMS Contractor Manual
NYS OCFS CMS Contractor Manual C O N T E N T S CHAPTER 1... 1-1 Chapter 1: Introduction to the Contract Management System... 1-2 CHAPTER 2... 2-1 Accessing the Contract Management System... 2-2 Shortcuts
More informationContents. What's New. Web form example with parsing rules. Newsletter #3
Campground Master Newsletter #3 1 Newsletter #3 Contents What's New Web form example with parsing rules Correction - Java script example New Zip and Postal Code data Feedback Q & A - Reports, printing
More informationProviding Patch Management With N-central. Version 7.1
Providing Patch Management With N-central Version 7.1 Contents Patch Management 3 Introduction 3 Monitoring for Missing Patches 3 Setting up Patch Management in N-central 4 Adding a WSUS Server to N-central
More informationEgress Switch Secure Workspace 2.x. Administration Guide
Egress Switch Secure Workspace 2.x Administration Guide November 2015 Confidentiality Statement This document contains information confidential and proprietary to Egress Software Technologies. It shall
More informationeopf Release E Administrator Training Manual
eopf Release E Administrator Training Manual i The United States Office Of Personnel Management eopf Administrator Training Manual for eopf v5 eopf Version 4.1, July 2007, March 2008, March 2009; eopf
More informationIntroduction to Open Atrium s workflow
Okay welcome everybody! Thanks for attending the webinar today, my name is Mike Potter and we're going to be doing a demonstration today of some really exciting new features in open atrium 2 for handling
More informationAmazon Digital Text Platform
Amazon Digital Text Platform Quick Start Guide Introduction This step-by-step guide will show you how to go from start to finish publishing material with Amazon DTP. If you need additional help, visit
More information2070 Work Life Balance Survey - Employees
2070 Work Life Balance Survey - Employees Record no: Introduction We would be grateful if you could spare the time to take part in our survey it should only take around 15 minutes to complete. The survey
More informationChapter 28: Expanding Web Studio
CHAPTER 25 - SAVING WEB SITES TO THE INTERNET Having successfully completed your Web site you are now ready to save (or post, or upload, or ftp) your Web site to the Internet. Web Studio has three ways
More informationOrganizing image files in Lightroom part 2
Organizing image files in Lightroom part 2 Hopefully, after our last issue, you've spent some time working on your folder structure and now have your images organized to be easy to find. Whether you have
More informationTitles. unexpected. video; learn. messages. When. responses. ugust 2013. Page 1
Microsoft Outlook 2010 learningg assets Simply type the id# in the search mechanism of ACS Skills Online too access the learning assets outlined below. Titles Microsoft Outlook 2010 Backing Up Outlook
More informationUsing the Bulk Export/Import Feature
Using the Bulk Export/Import Feature Through Bulksheet Export and Import, agencies have the ability to download complete campaign structures and statistics across multiple clients and providers, and to
More informationMatch Branch Services to Enterprise Services in Kitomba One
Match Branch Services to Enterprise Services in Kitomba One To manage your services at an enterprise level, you'll need to create a central service list and match all your branch services to this list.
More informationGrantium guidance for applicants How to create and manage your user account and applicant profile. Version 1 January 2016
Grantium guidance for applicants How to create and manage your user account and applicant profile Version 1 January 2016 1 Contents Introduction... 3 What is a user? What is an applicant?... 4 User...
More informationImageNow Report Library Catalog
ImageNow Report Library Catalog Business Insight Version: 6.6.x Written by: Product Documentation, R&D Date: February 2012 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc.
More informationNASP PRO USER GUIDE. Contents
NASP PRO USER GUIDE Updated 10/1/15 Contents NASP PRO USER GUIDE... 1 Overview:... 2 Listing your tournament on the website... 2 Setting up your hardware and software... 3 Managing the Registration process...
More informationFINDING THE RISK IN RISK ASSESSMENTS NYSICA JULY 26, 2012. Presented by: Ken Shulman Internal Audit Director, New York State Insurance Fund
FINDING THE RISK IN RISK ASSESSMENTS NYSICA JULY 26, 2012 Presented by: Ken Shulman Internal Audit Director, New York State Insurance Fund There are different risk assessments prepared: Annual risk assessment
More informationA common sense guide to the Data Protection Act 1998 for volunteers
A common sense guide to the Data Protection Act 1998 for volunteers Why is it necessary? The Data Protection Act 1998 is a law introduced to control the way information held about individuals is handled
More informationVirtual Office Module. View Calendar. Add Personal Event. Add Global Event. View All. View Personal
Virtual Office Module This is for internal use only and does not control a website of any kind. The virtual office allows you enter items such as calendar events, contacts, files, emails, message board,
More informationEgress Switch Email Encryption User Guide
Egress Switch Email Encryption User Guide This guide explains how to use the Egress Switch email encryption software Egress Switch integrates with Microsoft Outlook to provide easy to use email encryption.
More informationE-Learning Courses. Course Category
Course Category Health and Safety E-Learning Courses Course Title Creating a Safe and Healthy Office Fire Safety at Work Health and Safety at Work Health and Safety for Managers Course Description The
More informationTenant Screening Services. User guide
Tenant Screening Services User guide Table of contents Tenant Screening Services overview...1 Security...1 Session time-out...1 User IDs and passwords...1 Password expiration...2 User expiration...2 First-time
More informationUTHSCSA Facilities Management Workflow Guide
UTHSCSA Facilities Management Workflow Guide Powered by: 8/05/08 Table of Contents Preface Page 1 Getting Started Page 2 How does it work? Page 3 How will I know what I need to do and when to do it? Page
More information