How to set up Pulse Secure Host Checker SSL VPN with OPSWAT Gears Client
|
|
|
- Jeremy Stanley
- 9 years ago
- Views:
Transcription
1 How to set up Pulse Secure Host Checker SSL VPN with OPSWAT Gears Client About This Guide... 2 Method #1: Antivirus Policy... 3 Method #2: Custom Process and Registry Check... 8 Method #3: Third Party Policy: Distribute Gears for Guest Devices OPSWAT, Inc. All rights reserved. OPSWAT, Gears and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names and images mentioned and/or used herein belong to their respective owners. 1
2 About This Guide Gears is a platform for network security management for IT and security professionals that provides visibility over all types of endpoint applications from antivirus to hard disk encryption and public file sharing, as well as the ability to enforce compliance and detect threats. More information on Gears may be found at Gears can be leveraged by Pulse Secure s Endpoint Security Host Checker policies to provide enhanced compliance checking capabilities for the Junos Pulse application. There are three standard methods for configuring the Pulse Secure Host Checker policy to leverage Gears to control network access. Each method has its pros and cons, and each can be used in combination with the others on the same or multiple realms. The three methods covered by this guide: 1. Create an Antivirus Rule in Pulse Secure Host Checker to leverage Gears o Summary: Checks if Gears is running and the endpoint is in a compliant state Pro: Easy setup Con: Only verifies compliance state, but not to which account/policy it complies 2. Create a Custom Process and Registry Check in Pulse Secure Host Checker to leverage Gears o Summary: Checks if Gears is running, endpoint belongs to a certain account, and is in a compliant state Pro: Works with all client types; Checks state and require a specific account/policy Con: Setup is marginally more complicated than #1 3. Create a Third Party Policy in Pulse Secure Host Checker to leverage Gears o Summary: Similar to #2 but first automatically distributes Gears portable to the endpoint Pro: No need to separately deploy Gears to the endpoints Con: Only supported for Windows endpoints; limited auto-remediation options* * Auto-remediation for guest devices is being added in Q4/2014-Q1/2015 More information on the benefits of integrating Gears with Pulse Secure Host Checker can be found at This guide specifically illustrates how to establish Gears policy checks for Windows and Mac OS devices through Pulse Secure Host Checker. Please note that in order to leverage these checks additional configurations must be made to the Realms, Roles, and Profiles. These standard Pulse Secure device configurations options are outside the scope of this guide. 2
3 Method #1: Antivirus Policy The first method of configuring Pulse Secure Host Checker to utilize Gears for compliance checks uses an Antivirus rule in the Endpoint Security/Host Checker portion of Junos Pulse. Once completed, if the Gears client is installed and running on an endpoint, it will be detected as an antivirus. When a check for real-time-protection is performed, the Gears client will return Enabled only if Gears client is currently running and the endpoint device is meeting all policy* requirements established within Gears. *Note: This method cannot check to which account/policy an endpoint is compliant, only that it is or isn t compliant. Step 1: Under Endpoint Security, select the Host Checker tab. 3
4 Step 2: Under Policies, you can create a New policy or Edit an existing one. When creating a new policy, users will be prompted to provide a policy name. 4
5 Step 3: This step allows you to add a rule for the Antivirus. Please note that by default Windows will be selected. For a Mac OS rule please select Mac and enter the same information outlined below. Select Predefined: Antivirus from the drop down and click Add. Ensure under Require that All of the above rules is selected and under Remediation you have selected Send Reason Strings (the default configuration). 5
6 Step 4: Establish a name for the rule and set the criteria along with any optional checks. A User may require any supported product or go with a specific set of vendors and or products. For Gears specifically, users will select the following: Vendor OPSWAT, Inc. Product Gears Client Step 5: You can setup any other compliance requirements relevant to your organization at this time. Under Save Changes, click Save Changes. Host Checker is now setup for the Antivirus Compliance policy and will check for the presence of Gears Client as well as the status of real time protection. An endpoint will only pass this antivirus compliance policy if Gears client is installed, running and reporting that the endpoint is compliant with the policy set in Gears Cloud. The next step will be to apply this policy to the Administrative and or User Realms as necessary. 6
7 7
8 Method #2: Custom Process and Registry Check Pulse Secure Host Checker can also be configured to utilize Gears for compliance checks using a combination of custom process and registry checks in the Endpoint Security/Host Checker portion of Junos Pulse. This requires more configuration than method #1, but has the benefit of also checking to which account/policy an endpoint is compliant. Together, these checks will ensure that endpoint devices are meeting all compliance requirements established by the organization through the Gears admin console. The process check first ensures that the Gears Client is actively running on the device; second, the registry check determines whether the device is compliant with the defined Gears policy. Step 1: Under Endpoint Security, select the Host Checker tab. 8
9 Step 2: Under Policies, either create a New policy or Edit an existing one. When creating a new policy, users will be prompted to provide a policy name. Step 3: This step allows you to add a Custom Process. Please note that by default Windows will be selected. For the Mac configuration, select the Mac tab. Select Customer: Process from the drop down and click Add. Please note that for Mac devices within Host Checker Policy, you are currently only able to monitor the running Gears process, not the service. 9
10 Step 4: In Host Checker Policy we are creating a new custom rule. Here we will create the new rule name and add a requirement for the Gears process to be running. Windows For the persistent, installed Gears client, check for the process GEARSAgentService.exe For the on demand, portable Gears client, check for the process opswatgears-od.exe Mac For the persistent, installed Gears client, check for the process GearsAgent For the on demand, portable Gears client, check for the process opswat-gears-od 10
11 Step 5: Once setup is complete click on Save Changes, then return to the Host Checker policy page. 11
12 Step 6: Under Policies, either create a new policy or edit an existing one. When creating a new policy, users will be prompted to provide a policy name. Step 7: This step allows you to create a Custom Registry Setting. Select Custom: Registry Setting from the drop down and click Add. By default Windows will be selected. 12
13 The following steps will outline the how to establish the registry check for both 32-bit and 64-bit Windows devices. Step 8: Establish the registry setting for the 64-bit system by first creating the rule name for the check. This name should be unique to designate the difference between the two checks. Now add requirements for the following Registry details. Confirm the Registration Key on the Client matches the Account. 1. For the persistent, installed Gears client: Registry root key HKEY_LOCAL_MACHINE Registry subkey \SOFTWARE\Wow6432Node\OPSWAT\GEARS Client\Config Name RegistrationKey Type REG_SZ Value should match the account Registration Key 2. For the on demand, portable Gears client: Registry root key HKEY_CURRENT_USER Registry subkey \SOFTWARE\OPSWAT\GEARS OnDemand\Config Name RegistrationKey Type REG_SZ Value should match the account Registration Key Check the Compliance state on the endpoint. 1. For the persistent, installed Gears client: Root key HKEY Local Machine Subkey \SOFTWARE\Wow6432Node\OPSWAT\GEARS Client\Status Name Policy Type DWORD Value 0x (1) 2. For the on demand, portable Gears client: Root key HKEY Current User Subkey \SOFTWARE\OPSWAT\GEARS OnDemand\Config Name Policy Type DWORD Value 0x (1) Policy Key Values: a. 0 = NOT in compliance with policy, check Gars Cloud for details on the device b. 1 = in compliance with policy, check Gears Cloud to view the defined policy 13
14 Save changes to enable the check for a 64-bit registry. The combination of the two values, both Policy and Registration Key, ensure that the client installed is assigned to the Account that manages the defined Polices. Step 9: To create the 32-bit check, create a Custom Registry Setting. Select Custom: Registry Setting from the drop down and click Add. 14
15 Step 10: Establish the registry setting for the 32-bit system by first creating the rule name for the check. This name should be unique to designate the difference between the two checks. Then add requirements for the following Registry details. Confirm the Registration Key on the Client matches the Account. 1. For the persistent, installed Gears client: Registry root key HKEY_LOCAL_MACHINE Registry subkey - HKEY_LOCAL_MACHINE\SOFTWARE\OPSWAT\GEARS Client\Config Name RegistrationKey Type REG_SZ Value should match the account Registration Key 2. For the on demand, portable Gears client: Registry root key HKEY_CURRENT_USER Registry subkey \SOFTWARE\OPSWAT\GEARS OnDemand\Config Name RegistrationKey Type REG_SZ Value should match the account Registration Key Check the Compliance state on the endpoint. 1. For the persistent, installed Gears client: Root key HKEY Local Machine Subkey \SOFTWARE \OPSWAT\GEARS Client\Status Name Policy Type DWORD Value 0x (1) 2. For the on demand, portable Gears client: Root key HKEY Current User Subkey \SOFTWARE\OPSWAT\GEARS OnDemand\Config Name Policy Type DWORD Value 0x (1) Policy Key Values: a. 0 = NOT in compliance with policy, check Gears Cloud for details on the device b. 1 = in compliance with policy, check Gears Cloud to view the defined policy The combination of the two values, both Policy and Registration Key, ensure that the client installed is assigned to the Account that manages the defined Polices. 15
16 Step 11: For Mac devices, the client provides a file with the Registration Key and Policy value. To configure for the Mac: 1. Select the Mac tab within Host Check Policy. 2. Under Rule Settings, Select Custom: Process, the select Add. 3. Create a New Process 4. Add file: a. For the persistent, installed Gears client: Applications/OPSWAT GEARS Client/Policies. b. For the on demand, portable Gears client: /Users/username/Documents/OPSWAT/GEARS OnDemand 5. Look for file named: a. For the persistent, installed Gears client: GEARS_<gears license key>_<policy value>.txt, where the gears license key will be where you add your Account Registration Key, and Policy Value would be 1 if the device passes the policy defined in the Gears dashboard. b. For the on demand, portable Gears client: GEARS_<gears license key>_<policy value>, where the gears license key will be where you add your Account Registration Key, and Policy Value would be 1 if the device passes the policy defined in the Gears dashboard. This file includes a combination of two values, Policy and LicenseKey, to ensure that the client installed is assigned to the Account that manages the defined Polices. The Policy value will be defined as the following: Step 12: a. 0 = NOT in compliance with policy, check Gears Cloud for details on the device b. 1 = in compliance with policy, check Gears Cloud to view the defined policy To finalize the configuration of the Host Checker Policy, confirm the following: Ensure that Require is checked with Any of the Above Rules Enable Custom instructions - The Custom Instructions should include a brief note on why a user may be running into issues passing this compliance check and next steps they may take. Disable Send Reason Strings - This will ensure that registry key information is not sent to the user and avoids further confusion. 16
17 Step 13: Complete setup of any other requirements and save the changes. Once completed, this check will determine if Gears policies are being met by the endpoint device. Host Checker is now setup for the Custom Process and Registry Compliance policies. The next step will be to apply these policies to the Administrative and or User Realms as necessary. 17
18 Method #3: Third Party Policy: Distribute Gears for Guest Devices Gears for Guest Devices can be integrated with Pulse Secure Host Checker as a third party policy. With this option, Host Checker will cause Windows endpoints to download a ~3MB portable Gears client and perform an on-demand compliance and malware scan. When the VPN session is ended, the Gears client will automatically be deleted from the endpoint. The portable Gears client must be manually uploaded (one-time) by the network admin to the Pulse Secure device. The format of the upload is a ZIP file with an INI for configurations, and a DLL for executing the process. Automatic updates are not supported. To update the client version, the network admin must download the latest Gears for Guest Devices client, put it in the ZIP package, and upload to the Pulse Secure device. Method #3 only works with Windows endpoints. The screenshots included here are from a Pulse Secure SA2500 running 8.0R5. Step 1: Download the third party policy Contact OPSWAT to get a copy of the DLL Step 2: Retrieve Gears portable EXE and license key Log in to your Gears account at Go to the dashboard and click + DEVICES in the header bar Click Enable Gears client on this device in the dialog box On the resulting page, copy down the license key displayed on the bottom left Download the Windows Client from Run without installing (admin or non-admin version) Rename the downloaded file opswat-gears.exe 18
19 Step 2: Prepare the policy package Unzip the file Move the downloaded gears-opswat.exe file into the directory Open GEARSConfig.ini in a text editor Change the configuration options o server: Which Gears environment you are using (regular or beta) o key: Your account license key o deepscan: 0 Malware scan only listed running processes; 1 Also scan linked libraries. Enabling this (1) increases scan time from < 60 seconds to ~2-3 minutes o showremediation: 0 Only display summary remediation message in Pulse Secure webpage; 1 Also show detailed and user-friendly self-remediation instructions in a new webpage o debuglog: 0 Disable debug log on local machine 1 Enable debug log on local machine (log is deleted when session ends) 19
20 Step 3: Rezip the package Rezip the package, without further changing any files names or folder structure. The zip file itself can be given any name. Expected package contents: META-INF/MANIFEST.HCIF GEARSConfig.ini omcjuniperhcif.dll opswat-gears.exe Step 4: Log in to Pulse Secure console, Navigate to Endpoint Security > Host Checker 20
21 Step 5: Create a New 3 rd Party Policy 21
22 Step 6: Name the policy and upload the ZIP package Step 7: Click Save Changes Leave Remediation options at default settings 22
23 Step 8: Assign the Host Checker Policy to a User Realm (Using a User Realm that you have already created) Assign the new Host Checker Policy to the target User Realm. The policy to use will be called <Name Given in Step 6>.isMachineClean For more information, or if you have any questions about the steps above, please log into the OPSWAT Portal at and submit a ticket to request assistance from our support team. 23
Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide
Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide ii Preface Copyright Information: Symantec Corporation Copyright
Accessing TP SSL VPN
Accessing TP SSL VPN This guide describes the steps to install, connect and disconnect the SSL VPN for remote access to TP intranet systems using personal notebooks. A. Installing the SSL VPN client Junos
System Center 2012 R2 SP1 Configuration Manager & Microsoft Intune
2015 System Center 2012 R2 SP1 Configuration Manager & Microsoft Intune DEPLOYING MICROSOFT OFFICE 365 PROFESSIONAL PLUS RONNI PEDERSEN & HANS CHRISTIAN ANDERSEN RONNIPEDERSEN.COM Microsoft MVP: Enterprise
Capture Pro Software FTP Server System Output
Capture Pro Software FTP Server System Output Overview The Capture Pro Software FTP server will transfer batches and index data (that have been scanned and output to the local PC) to an FTP location accessible
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
How to integrate with OPSWAT GEARS cookie API
How to integrate with OPSWAT GEARS cookie API About This Guide...2 Change Log... 3 Background... 4 Cookie Format...5 Cookie: Policy_State... 6 Cookie: License_Key... 6 Cookie: Device_ID... 6 Future enhancements...
VMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Network Connect & Junos Pulse Performance Logs on Windows
Network Connect & Junos Pulse Performance Logs on Windows How-to Juniper Networks, Inc. 1 Table of Contents Introduction Part 1: Client Prerequisites... 3 Step 1.1: Packet Sniffer... 3 Step 1.2: Output
K7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
Setting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
McAfee DAT Reputation Implementation Guide. Version 1.0 for Enterprise
McAfee DAT Reputation Implementation Guide Version 1.0 for Enterprise McAfee DAT Reputation... 2 What is McAfee DAT Reputation?... 2 Rollout phases: Elective Download, AutoUpdate & AutoEnable... 3 DAT
Netwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using
ez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal 1.1.3 On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (
Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration This document provides configuration steps for Avaya one X Portal s 1.1.3 communication
Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
MIS Export via the FEM transfer software
Content 1 Introduction How does the FEM transfer actually work and how do I transfer files to Fronter for a nightly import? How does the FEM transfer tool work? What does the XML/CSV files do and can I
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO
DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download
How To Gather Log Files On A Pulse Secure Server On A Pc Or Ipad (For A Free Download) On A Network Or Ipa (For Free) On An Ipa Or Ipv (For An Ubuntu) On Your Pc
Network Connect & Pulse Performance Logs on Windows How-to Published Date July 2015 Contents Introduction 4 Part 1: Client Prerequisites 4 Step 1.1: Packet Sniffer 4 Step 1.2: Output of IPs, Routes, Ping,
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
Managed Antivirus Quick Start Guide
Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices
NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices End-of-Life Notice Please note that GO!Enterprise MDM server version 3.6.3 is the last to officially
Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.
Znode Multifront - Installation Guide Version 6.2 1 System Requirements To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server
Sophos Mobile Control Administrator guide. Product version: 3.6
Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for
Online Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
Tutorial: Assigning Prelogin Criteria to Policies
CHAPTER 4 This tutorial provides an overview of the CSD configuration sequence. The configuration chapters that follow provide detailed instructions on the attributes. The sections are as follows: Overview
Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2
[1]JD Edwards EnterpriseOne Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2 E61545-01 October 2015 Describes the configuration of the Application
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Host Checker. Configuration Guide
Host Checker Configuration Guide Overview... 2 Client Side requirements for Host Checker:... 2 Qualified platforms:... 2 Compatible platforms:... 2 Windows clients... 3 Installer Package Files and File
Wharf T&T Cloud Backup Service User & Installation Guide
Wharf T&T Cloud Backup Service User & Installation Guide Version 1.6 Feb 2013 Table of contents BEFORE YOU INSTALL 3 Page Section 1. Installation of Client Software 5 Section 2. Account Activation 8 Section
How To Deploy Office 2016 With Office 2016 Deployment Tool
How to deploy Office 2016 using SCCM 2012 R2 In this article we will see how to deploy Office 2016 using SCCM 2012 R2. Along with Office 2016, Microsoft has released office 2016 deployment tool. The Office
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
WatchDox SharePoint Beta Guide. Application Version 1.0.0
Application Version 1.0.0 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Cloud Services for Backup Exec. Planning and Deployment Guide
Cloud Services for Backup Exec Planning and Deployment Guide Chapter 1 Introducing Cloud Services for Backup Exec This chapter includes the following topics: About Cloud Services for Backup Exec Security
ReadyNAS Replicate. User Manual. July 2013 202-10774-03. 350 East Plumeria Drive San Jose, CA 95134 USA
User Manual July 2013 202-10774-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate the serial number on the label
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Quick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
Shavlik Patch for Microsoft System Center
Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
SafeNet KMIP and Google Cloud Storage Integration Guide
SafeNet KMIP and Google Cloud Storage Integration Guide Documentation Version: 20130719 Table of Contents CHAPTER 1 GOOGLE CLOUD STORAGE................................. 2 Introduction...............................................................
Trend Micro KASEYA INTEGRATION GUIDE
Trend Micro KASEYA INTEGRATION GUIDE INTRODUCTION Trend Micro Worry-Free Business Security Services is a server-free security solution that provides protection anytime and anywhere for your business data.
Netwrix Auditor for Windows File Servers
Netwrix Auditor for Windows File Servers Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Network Connect Performance Logs on MAC OS
Network Connect Performance Logs on MAC OS How-to Juniper Networks, Inc. 1 Table of Contents Introduction Part 1: Client Prerequisites... 3 Step 1.1: Packet Sniffer... 3 Step 1.2: Output IPs, Routes, Ping,
MICROSOFT STEP BY STEP INTERACTIVE VERSION 3.0 ADMINISTRATION GUIDE
MICROSOFT STEP BY STEP INTERACTIVE VERSION 3.0 ADMINISTRATION GUIDE Part 1: Network Installation Guide Introduction Part 1 of this document provides instructions for installing Microsoft Interactive Training
ThirtySix Software WRITE ONCE. APPROVE ONCE. USE EVERYWHERE. www.thirtysix.net SMARTDOCS 2014.1 SHAREPOINT CONFIGURATION GUIDE THIRTYSIX SOFTWARE
ThirtySix Software WRITE ONCE. APPROVE ONCE. USE EVERYWHERE. www.thirtysix.net SMARTDOCS 2014.1 SHAREPOINT CONFIGURATION GUIDE THIRTYSIX SOFTWARE UPDATED MAY 2014 Table of Contents Table of Contents...
Appendix E. Captioning Manager system requirements. Installing the Captioning Manager
Appendix E Installing and configuring the Captioning Manager The Mediasite Captioning Manager, a separately sold EX Server add-on, allows users to submit and monitor captioning requests through Automatic
Sophos Mobile Control Administrator guide. Product version: 3
Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Secure Agent Quick Start for Windows
Secure Agent Quick Start for Windows 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
Contents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
Contents Release Notes... ... 3 System Requirements... ... 4 Administering Jive for Office... ... 5
Jive for Office TOC 2 Contents Release Notes...3 System Requirements... 4 Administering Jive for Office... 5 Getting Set Up...5 Installing the Extended API JAR File... 5 Updating Client Binaries...5 Client
FileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Netwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0
ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,
Generating an Apple Enterprise MDM Certificate
Good Mobile Control Server Generating an Apple Enterprise MDM Certificate Updated 09/30/11 Overview... 1 Generating Your Apple Certificate Using a Mac... 1 Generating Your Apple Certificate Using Windows...
User Manual. User Manual for Version 4.4.0.8
User Manual User Manual for Version 4.4.0.8 I Endpoint Protector Virtual Appliance User Manual Table of Contents 1. Endpoint Protector Virtual Appliance Formats1 1.1. Available Formats of the Virtual Appliance...
Online Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Charter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
Online Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Summary This article contains information about an installation of EdgeSight 5.4 Web Server using SQL 2008 R2 (DB and RS) in a lab environment.
Summary This article contains information about an installation of EdgeSight 5.4 Web Server using SQL 2008 R2 (DB and RS) in a lab environment. This article documents the configuration and settings of
Allworx OfficeSafe Operations Guide Release 6.0
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
efolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
Integration with Active Directory
VMWARE TECHNICAL NOTE VMware ACE Integration with Active Directory This document explains how to set up Active Directory to use with VMware ACE. This document contains the following topics: About Active
http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Online Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
Online Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
Polycom CMA System Upgrade Guide
Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or
FileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
Introduction to FileWave
Introduction to FileWave Modern Systems Management LeRoy Dennison Training & Certification Manager [email protected] Ben Byers Systems Engineer [email protected] What is FileWave? Since 1992, FileWave
Tutorial: Packaging your server build
Tutorial: Packaging your server build This tutorial walks you through the steps to prepare a game server folder or package containing all the files necessary for your game server to run in Amazon GameLift.
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager
Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager Implementing Endpoint Protection in System Center 2012 R2 Configuration Manager This document is for informational purposes
PULSE. Pulse for Windows Phone Quick Start Guide. Release Published Date
PULSE Pulse for Windows Phone Quick Start Guide Release Published Date 1.0 July 2015 Contents PART 1 Pulse for Windows Phone 4 CHAPTER 1 5 Introducing Pulse for Windows Phone 5 Pulse for Windows Phone
User Profile Manager 2.6
User Profile Manager 2.6 User Guide ForensiT Limited, Innovation Centre Medway, Maidstone Road, Chatham, Kent, ME5 9FD England. Tel: US 1-877-224-1721 (Toll Free) Intl. +44 (0) 845 838 7122 Fax: +44 (0)
Virtual CodeMeter Activation Guide
Virtual CodeMeter Activation Guide Introduction A Virtual CodeMeter (VCM) allows the user to run licensed AccessData products without a physical CodeMeter device. A VCM can be created using AccessData
VMware Horizon FLEX User Guide
Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Using Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
Capture Pro Software FTP Server Output Format
Capture Pro Software FTP Server Output Format Overview The Capture Pro Software FTP server will transfer batches and index data (that have been scanned and output to the local PC) to an FTP location accessible
Sophos Mobile Control Startup guide. Product version: 3.5
Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile
VMware Horizon FLEX User Guide
Horizon FLEX 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Online Backup Client User Manual
For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.
WildFire Cloud File Analysis
WildFire 6.1 Administrator s Guide WildFire Cloud File Analysis Palo Alto Networks WildFire Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America
Upgrading Good Mobile Messaging and Good Mobile Control Servers
Good Mobile Messaging Server 8.1.6 Good Mobile Control Server 2.6.4 for IBM Lotus Domino Upgrading Good Mobile Messaging and Good Mobile Control Servers Updated: 09/25/15 1 Introduction 1 2 Pre-Upgrade
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
Inteset Secure Lockdown ver. 2.0
Inteset Secure Lockdown ver. 2.0 for Windows XP, 7, 8, 10 Administrator Guide Table of Contents Administrative Tools and Procedures... 3 Automatic Password Generation... 3 Application Installation Guard
BackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
McAfee Client Proxy 2.0
Product Guide Revision B McAfee Client Proxy 2.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com
