Designing and implementing effective PAC file solutions
|
|
- Fay Tate
- 7 years ago
- Views:
Transcription
1 Designing and implementing effective PAC file solutions Copyright 2006 ScanSafe. All Rights Reserved. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without prior consent in writing from ScanSafe. Every effort has been made to ensure the accuracy of this manual. However, ScanSafe makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. ScanSafe shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this document is subject to change without notice.
2 1 What is a PAC file? A PAC file or Proxy Auto-Configuration file defines how web browsers can automatically select an appropriate proxy for accessing a given URL. The file is based on rules defined using Javascript, providing a scalable solution which can be powerful enough to meet the demands of almost every situation it may face. 2 Is it difficult to implement? This is entirely dependant on the specification required for the PAC file and the chosen distribution method. PAC files can be extremely simple, a one line piece of code used to direct all traffic through a proxy, or they can be notoriously powerful, providing allowances for load balancing, multiple proxies and failovers etc. The market leading browsers - Opera, Firefox and Internet Explorer, all allow several levels of automation regarding the implementation of proxies: Manual proxy selection: simply specifying a hostname/ip address and a port number to be used for all URLs. It s possible to enter exceptions that will bypass the proxy. Proxy Auto-Configuration (PAC): Specify a location of a PAC file with Javascript defined rules that determines the appropriate proxy for each URL accessed. Web Proxy Auto-discovery Protocol (WDAP): A method of implementing the PAC file, this allows the browser to predict the location of the PAC file and retrieve the file without user intervention. In this guide we shall cover the first two methods in-depth. 3 Which method should I use? In this section we shall evaluate each method and their respective advantages and disadvantages. 3.1 Manual Proxy Selection This method allows the use of a single defined proxy in the browser connection settings, it s the simplest method and perhaps because of this, the more reliable choice. Advantages: - Simple to configure, all that is required is the location of the proxy and the relevant port. - Easy to exception sites that you might not wish to put through the proxy. - In most situations, the more secure method. Designing and implementing effective PAC file solutions. Copyright 2006 ScanSafe. All Rights Reserved. 1
3 Disadvantages: - Only one proxy can be specified, therefore the option of implementing failover proxies is unavailable. Put simply, a lack of flexibility. - The proxy setting must be applied to each machine, with Internet Explorer this can be pushed out via Group Policies, however with browsers such as Opera and Firefox this would have to be amended manually for each browser. 3.2 Proxy Auto-Configuration Likely to be the preferred method, the location of the PAC file must still be set in each browser (Manually or group policy), however the PAC file allows greater control and+ flexibility only limited by creators ability to code the file in Javascript, as well as the infrastructure available. Advantages: - Ability to implement failover proxies, load balancing, fault tolerance etc. - Scalable, can be as complex as the requirements that need to be met. Disadvantages: - Potentially a basic understanding of programming may be necessary to create or amend PAC file scripts to meet requirements. 3.3 Web Proxy Auto-discovery Protocol Advantages: - It has the same advantages as a lone PAC file configuration. - Requires the least amount of user/administrator intervention to setup each user. Disadvantages: - Requires explicit requirements be met before it can function correctly. - The system serving the PAC file must have a high uptime level. - It has inherent security issues. - Older browsers might not support WPAD (Pre-Internet Explorer 5). Hopefully this has provided an overall insight into which method may best suit your requirements. 4 Examples Each of the below examples include 3 return entries, two proxies and an instruction to go direct. The client browser will attempt the first proxy first, if unavailable it will try the next entry, the second proxy, again if unavailable it will then instruct the browser to go direct. Designing and implementing effective PAC file solutions. Copyright 2006 ScanSafe. All Rights Reserved. 2
4 Example 1 { return "PROXY proxy.example1.com:8080; PROXY proxy.example2.com:8080; DIRECT"; } Behaviour: simply directs all traffic through the example 1 proxy unless the proxy is unreachable, in which case it will attempt the second proxy, if both are unavailable, it will go direct. Example 2 { if (url.substring(0, 6) == " return "DIRECT"; else return "PROXY proxy.example1.com:8080; PROXY proxy.example2.com; DIRECT"; } Behaviour: All https traffic goes direct, bypassing the proxy but still allowing http traffic to go via the proxy. Example 3 { if (host =="mydomain.com") return "DIRECT"; else return "PROXY proxy.example1.com:8080; PROXY proxy.example2.com:8080; DIRECT"; } Behaviour: If traffic is destined for mycompany.com it will go direct, otherwise all traffic will go through the proxy. Example 4 { if (isinnet(myipaddress(), " ", " ")) return "PROXY proxy.example1.com:8080; PROXY proxy.example2.com:8080; DIRECT"; else return "DIRECT"; } Behaviour: If the client computer is on the specified internal network, go through the proxy, otherwise go direct. Please note that each of these examples includes two proxy entries, and a failover value of going direct if the proxies are unavailable. Please amend as necessary if you do wish users to go direct if the proxies are unavailable. Unfortunately we can t cover basic PAC file scripting in this guide, however the level of scripting in use should be accessible to anyone who has even a basic understanding of programming. A complete list of Javascript functions available for use can be found in a 1996 set of release notes for Netscape: 5 Implementation / Deployment 5.1 Local Hosted PAC File In comparison to deployment via WPAD, this is relatively simple with very few requirements. - Hosted on the local file system of the machine, e.g. c:\windows\proxy.pac. However this would require that the file be copied onto each separate machine. We encourage that the PAC file is permission protected to ensure that end-users cannot alter the PAC file. Designing and implementing effective PAC file solutions. Copyright 2006 ScanSafe. All Rights Reserved. 3
5 The most popular browsers all implement this feature in a very similar way. Firefox: Tools > Options > General Tab > Connection Settings > Select Automatic Configuration URL > enter the location of the PAC file, in Firefox it would be: file:///c:/proxy.pac Opera: Tools > Preferences > Advanced tab > Select Network on the left-hand bar > Proxy Servers> Ensure that only Use Automatic proxy configuration is checked > Enter the location of the PAC file. E.g. file://c:/proxy.pac Internet Explorer: Tools > Internet Options > Connections tab > LAN Settings > Ensure everything under Proxy server is unchecked > Select Use automatic configuration script > Enter the location of the PAC file. If the file is hosted on the local system the location of the PAC file would be as such: file://c:/proxy.pac 5.2 Network Hosted PAC File This solution should be used when you would like to host the file on a network share and use a VBScript to copy the PAC file from the share to the local machine. The reason you have to copy the PAC file to the local machines is because it won t work if you host the file on a network share. So we suggest using a VBScript to initiate this process, as they work well with windows logon scripting. - Create a Proxy.pac file. Copy this example into notepad and amend the relative details, once complete save it as a *.pac file, See example below: { // Web sites you wish to go to direct and not through ScanSafe // This list would include internally hosted websites, // intranets etc if ( shexpmatch ( url, "*.somecompany.co.uk*") shexpmatch (url, "*.example.com*") shexpmatch (url, "*.anotherexample.com*")) { return "DIRECT"; } // Internal IP address ranges that you need to be able to go // directly to else if (isinnet ( host, "XXX.XXX.XXX.XXX", " " ) isinnet ( host, "XXX.XXX.XXX.XXX", " ") isinnet ( host, "XXX.XXX.XXX.XXX", " ")) { return "DIRECT"; } // Send all other HTTP HTTPS and FTP traffic to ScanSafe else { return " PROXYXX.scansafe.net:8080"; } } Designing and implementing effective PAC file solutions. Copyright 2006 ScanSafe. All Rights Reserved. 4
6 - Set a share directory on a file server that everyone has access to, and store the Proxy.pac file there. - Create a Script.vbs to copy the Proxy.pac file from the Share on the Server down to the local machine. Use this example, copy the text into Notepad and amend the relative details and save it as a VBScript file, create it on the domain controller as that is where you will need to use it, See Example below: Const OverwriteExisting = True Set objfso = CreateObject("Scripting.FileSystemObject") Set objname= CreateObject("wscript.network") objfso.copyfile "\\server_name\share_name\proxy.pac", "C:\proxy.pac", OverwriteExisting Something to remember: As Login Scripts run with the same permissions as the logged in user, they don t always have the permissions to write to the root of C:\, so make sure that the VBScript is copying the PAC file to a location the user has read\write permissions on the local machine. - Open Active Directory and select the Properties of the OU or the Domain you want to apply the Group Policy too, Select the GP tab and click edit. Designing and implementing effective PAC file solutions. Copyright 2006 ScanSafe. All Rights Reserved. 5
7 - Under User Setting expand Windows Settings and select Scripts - From the Logon Scripts window, click Add, in the Script Name dialog box, click Browse and paste the VBScript into that window. Click Ok. - That completes the setup of the VBScript process. Designing and implementing effective PAC file solutions. Copyright 2006 ScanSafe. All Rights Reserved. 6
8 The next step is to create the Group Policy Object that will enforce the browser configuration using the PAC file. You should add this rule into the same policy that enforces the Login Script. - Open the Active Directory Users and Computers Administrative Tools Console. - Right click on the Domain Name and click Properties. - Click the Group Policy Tab. - Select the Policy and click Edit. - Expand User Configuration and browse to Internet Explorer Maintenance under the Windows Settings folder. - Select Connections and open Automatic Browser Configuration - Uncheck Automatically detect configuration settings. - Check Enable Automatic Configuration. - Choose a time value of your choice for Automatically configure every X minutes. - Under Auto-Proxy URL put in the location of your PAC file. See example below: We encourage that the PAC file is permission protected to ensure that end-users cannot alter the PAC file. Designing and implementing effective PAC file solutions. Copyright 2006 ScanSafe. All Rights Reserved. 7
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
More informationPAC File Best Practices with Web Security Gateway and Web Security Gateway Anywhere
PAC File Best Practices with Web Security Gateway and Web Security Gateway Anywhere PAC File Best Practices Web Security Gateway (Anywhere) Version 7.x This article examines Proxy Auto-Configuration (PAC)
More informationQuickstart guide to Configuring WebTitan
Quickstart guide to Configuring WebTitan 1. Install the License Once you have received the evaluation license by e-mail, you log on to WebTitan as follows using a browser as admin/hiadmin. Then navigate
More informationM86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
More informationWeb Proxy Auto Discovery (WPAD) Configuration Guide. Revision 1.0.1. Warning and Disclaimer
Web Proxy Auto Discovery (WPAD) Configuration Guide Revision 1.0.1 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet Professional
More informationBlue Coat Security First Steps Solution for Deploying an Explicit Proxy
Blue Coat Security First Steps Solution for Deploying an Explicit Proxy SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW,
More informationJanuary 23, 2010 McAfee SaaS Email Continuity User Guide
January 23, 2010 McAfee SaaS Email Continuity User Guide COPYRIGHT Copyright 2001 2010 McAfee, Inc. All Rights Reserved. This document contains proprietary information of McAfee Inc. and is subject to
More informationSmart Connect. Deployment Guide
Smart Connect Deployment Guide Smart Connect Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationStrong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationUniversal Management Service 2015
Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,
More informationIntegrated Citrix Servers
Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights
More informationVP-ASP Shopping Cart Quick Start (Free Version) Guide Version 6.50 March 21 2007
VP-ASP Shopping Cart Quick Start (Free Version) Guide Version 6.50 March 21 2007 Rocksalt International Pty Ltd support@vpasp.com www.vpasp.com Table of Contents 1 INTRODUCTION... 3 2 FEATURES... 4 3 WHAT
More informationContents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
More informationACT! by Sage. Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility
ACT! by Sage Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility ACT! by Sage Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility Copyright
More informationBy the Citrix Publications Department. Citrix Systems, Inc.
Licensing: Setting Up the License Server on a Microsoft Cluster By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice.
More informationInstallation Guide Supplement
Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,
More informationUsing Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
More informationCyclope Internet Filtering Proxy. - Installation Guide -
Cyclope Internet Filtering Proxy - Installation Guide - 1. Overview 3 2. Installation 4 2.1 System requirements 4 2.2 Cyclope Internet Filtering Proxy Installation 4 2.3 Client Browser Configuration 6
More informationCyclope Internet Filtering Proxy
Cyclope Internet Filtering Proxy - Installation Guide - Cyclope-Series - 2010 - Table of contents 1. Overview - 3-2. Installation - 4-2.1. System requirements - 4-2.2. Cyclope Internet Filtering Proxy
More informationJetAdvice Manager Data Collector v. 2.1. Date: 2014-06-30
JetAdvice Manager Data Collector v. 2.1 Date: 2014-06-30 NOTE The information contained in this document is subject to change without notice. EuroForm makes no warranty of any kind with regard to this
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July
More informationWeb Security Firewall Setup. Administrator Guide
Web Security Firewall Setup Administrator Guide Web Security Firewall Setup Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
More informationStrong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationWeb Remote Access. User Guide
Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior
More informationConfiguring IBM Cognos Controller 8 to use Single Sign- On
Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright
More informationNTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
More informationTechnical Brief for Windows Home Server Remote Access
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
More informationTrouble Shooting SiteManager to GateManager access via a corporate Intranet
Trouble Shooting SiteManager to GateManager access via a corporate Intranet If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection
More informationSolarWinds Technical Reference
SolarWinds Technical Reference Using Active Directory for Orion Authentication Orion AD Integration... 1 Adding AD Orion Authentication for AD Users... 3 Adding a New User Account... 3 Configuring User
More informationSubversion Server for Windows
Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.
More informationConnection and Printer Setup Guide
Connection and Printer Setup Guide For connection issues, see the following sections of this document: "Connection Requirements" on page 1 "Log on" on page 2 "Troubleshooting Your Connection" on page 4
More informationez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
More informationDIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationVirtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
More informationTransparent Identification of Users
Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
More informationProject management integrated into Outlook
y Project management integrated into Outlook InLoox 6.x deployment via Group Policy An InLoox Whitepaper Published: February 2011 You can find up-to-date information at http://www.inloox.com The information
More informationSetup Guide Revision C. McAfee SaaS Web Protection Service
Setup Guide Revision C McAfee SaaS Web Protection Service COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
More informationAgent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationUser Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory
Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property
More informationios Deployment Simplified FileMaker How To Guide
ios Deployment Simplified FileMaker How To Guide Table of Contents FileMaker How To Guide Introduction... 3 Deployment Options... 3 Option 1 Transfer to the ios device... 3 Option 2 - Host with FileMaker
More informationUsing Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
More informationADS Integration Guide
ADS Integration Guide Document version 9402-1.0-18/10/2006 Cyberoam ADS Integration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of
More informationATT8367-Novell GroupWise 2014 and the Directory Labs
ATT8367-Novell GroupWise 2014 and the Directory Labs ATT8367 Novell Training Services AUTHORIZED COURSEWARE www.novell.com Legal Notices Novell, Inc., makes no representations or warranties with respect
More informationLAE 5.1. Windows Server Installation Guide. Version 1.0
LAE 5.1 Windows Server Installation Guide Copyright THE CONTENTS OF THIS DOCUMENT ARE THE COPYRIGHT OF LIMITED. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS THEREOF MAY NOT BE REPRODUCED IN ANY FORM WITHOUT
More informationXcalibur Global Version 1.2 Installation Guide Document Version 3.0
Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.
More informationDAP Proxy Server Configuration. Technical Note
DAP Proxy Server Configuration Technical Note The software described in this manual is furnished under license and may only be used or copied in accordance with the terms of the license. Manual release
More informationDisaster Recovery. Websense Web Security Web Security Gateway. v7.6
Disaster Recovery Websense Web Security Web Security Gateway v7.6 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2011 The products and/or methods
More informationCitrix Systems, Inc.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
More informationFile and Printer Sharing with Microsoft Windows
Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of
More informationSecureW2 Client for Windows User Guide. Version 3.1
SecureW2 Client for Windows User Guide Version 3.1 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright
More informationtechnical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
More informationTrouble Shooting SiteManager to GateManager access
Trouble Shooting SiteManager to GateManager access If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection issues, this document
More informationProduct Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with
More informationConfiguration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationHP OpenView Storage Mirroring application notes. Guidelines for testing a disaster recovery/high availability scenario
HP OpenView Storage Mirroring application notes Guidelines for testing a disaster recovery/high availability scenario Part number: T2558 88082 Third edition: June 2006 Legal and notice information Copyright
More informationMicrosoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
More informationWeb Protection Services Setup Guide Product Version: Web Protection
Web Protection Services Setup Guide Product Version: Web Protection Release Date: November, 2010 Document Version: 0.3 RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION. Copyright
More informationNCD ThinPATH Load Balancing Startup Guide
NCD ThinPATH Load Balancing Startup Guide Copyright Copyright 1999 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network Computing
More informationPatching the Windows 2000 Server Operating System on S8100 Media Servers, IP600 Communications Servers, & DEFNITY ONE Communications Systems
Patching the Windows 2000 Server Operating System on S8100 Media Servers, IP600 Communications Servers, & DEFNITY ONE Communications Systems Abstract This document provides guidance on how to apply Microsoft
More informationAutomating client deployment
Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark
More informationDameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
More informationSvn.spamsvn110. QuickStart Guide to Authentication. WebTitan Version 5
Svn.spamsvn110 QuickStart Guide to Authentication WebTitan Version 5 Copyright 2014 Copperfasten Technologies. All rights reserved. The product described in this document is furnished under a license agreement
More informationv6.1 Websense Enterprise Reporting Administrator s Guide
v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,
More informationSetup and Configuration Guide for Pathways Mobile Estimating
Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of
More informationPaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu
PaperStream Connect Setup Guide Version 1.0.0.0 Copyright Fujitsu 2014 Contents Introduction to PaperStream Connect... 2 Setting up PaperStream Capture to Release to Cloud Services... 3 Selecting a Cloud
More informationTroubleshooting File and Printer Sharing in Microsoft Windows XP
Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows
More informationSymantec Enterprise Vault Technical Note. Administering the Monitoring database. Windows
Symantec Enterprise Vault Technical Note Administering the Monitoring database Windows December 2006 Symantec Enterprise Vault Administering the Monitoring database Copyright 2006 Symantec Corporation.
More informationCA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More informationChecking Browser Settings, and Basic System Requirements for QuestionPoint
Checking Browser Settings, and Basic System Requirements for QuestionPoint This document covers basic IE settings and system requirements necessary for QuestionPoint. These settings and requirements apply
More informationAbout This Guide... 4. Signature Manager Outlook Edition Overview... 5
Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System
More informationRemote Filtering Software
Remote Filtering Software Websense Web Security Solutions v7.7-7.8 1996 2013, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2013 The products and/or
More informationTrustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
More information2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationHELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE
HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationBy the Citrix Publications Department. Citrix Systems, Inc.
Licensing: The License Management Console By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS
More informationLDAP Authentication and Authorization
LDAP Authentication and Authorization What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned to centralized
More informationHP Connection Manager. Administrator's Guide
HP Connection Manager Administrator's Guide Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft, Windows, and Windows
More informationDeploying the Workspace Application for Microsoft SharePoint Online
Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This
More informationWA2256 Responsive Mobile Web Development with HTML5, CSS3, JavaScript, and jquery Mobile. Classroom Setup Guide. Web Age Solutions Inc.
WA2256 Responsive Mobile Web Development with HTML5, CSS3, JavaScript, and jquery Mobile Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum
More informationHow To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
More informationProxySG TechBrief LDAP Authentication with the ProxySG
ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned
More informationSage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
More informationDEPLOYMENT GUIDE Version 1.0. Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1
DEPLOYMENT GUIDE Version 1.0 Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1 Introducing the F5 and Oracle Fusion Middleware SOA Suite configuration Welcome to the F5 and Oracle Fusion Middleware
More informationEnterprise Knowledge Platform
Enterprise Knowledge Platform Single Sign-On Integration with Windows Document Information Document ID: EN136 Document title: EKP Single Sign-On Integration with Windows Version: 1.3 Document date: 19
More informationThis guide consists of the following two chapters and an appendix. Chapter 1 Installing ETERNUSmgr This chapter describes how to install ETERNUSmgr.
Preface This installation guide explains how to install the "ETERNUSmgr for Windows" storage system management software on an ETERNUS DX400 series, ETERNUS DX8000 series, ETERNUS2000, ETERNUS4000, ETERNUS8000,
More informationUTM Quick Installation Guide
www.allo.com Version 2.0 1 Copy Right Copyright 2014 Allo. All rights reserved. No part of this publication may be copied, distributed, transmitted, transcribed, stored in a retrieval system, or translated
More informationDEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
More informationCORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com 7300-1.
CYBEROAM - ADS INTEGRATION GUIDE VERSION: 7 7300-1.0-9/20/2005 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented
More informationDNS and Network Configuration Version 8.0
Version 8.0 Symantec, Incorporated. Page 1 of 37 1 Legal Notices Copyrights Symantec IM Manager and related modules. Copyright 2002-2006 by Symantec, Incorporated. All rights reserved. This manual and
More informationv5.2 Installation Guide for Websense Enterprise v5.2 Embedded on Cisco Content Engine
v5.2 Installation Guide for Websense Enterprise v5.2 Embedded on Cisco Content Engine Websense Enterprise Installation Guide 1996 2004, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San
More informationNTP Software File Auditor for NAS, EMC Edition
NTP Software File Auditor for NAS, EMC Edition Installation Guide June 2012 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for NAS,
More informationSolarWinds Technical Reference
SolarWinds Technical Reference Riverbed and SolarWinds WAN Optimization Introduction...3 Using the WAN Optimization Reports...3 Downloading and Saving Your Reports...3 Specifying Traffic Optimized Interfaces...3
More informationRemote Console Installation & Setup Guide. November 2009
Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission
More informationInstallation Guide. Squid Web Proxy Cache. Websense Enterprise Websense Web Security Suite. v6.3.2. for use with
Installation Guide for use with Squid Web Proxy Cache Websense Enterprise Websense Web Security Suite v6.3.2 1996-2008, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights reserved.
More informationSymantec LiveUpdate Administrator. Getting Started Guide
Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used
More informationSophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
More informationLepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
More information