Dell Security Explorer 9.6

Size: px
Start display at page:

Download "Dell Security Explorer 9.6"

Transcription

1 Dell June 2015 These release notes provide information about Dell. About New features Resolved issues Known issues System requirements Product licensing Getting started with Security Explorer Globalization Third-party contributions About Dell About Security Explorer provides a single console for managing access controls, permissions, and security across Microsoft platforms that span multiple servers. The product provides a broad array of security enhancements including the ability to identify who has rights to resources across the entire organization. It also provides the ability to grant, revoke, clone, modify, and overwrite permissions quickly and from a central location. Unlike native tools, Security Explorer provides the ability to back up and restore permissions only, ensuring the integrity of data. To help meet auditing requirements, Security Explorer provides convenient reports that can be generated at your convenience. Lastly, the product s cleanup capabilities address common post-migration security issues. is a minor release, with enhanced features and functionality. See New features. New features New features in : Additional supported platforms for NTFS Security, Share Security, and Group & User Management: Dell Fluid File System (FluidFS) NetApp 8.3 EMC Isilon EMC Celerra EMC VNX 1

2 New licensing For, you must have a Dell license file (.dlv) or a Site Administrator QLL license file (*asc). Your previous licenses will not be recognized by version 9.6. The license utility that updated old licenses has been removed from the Autorun. Add alternate credentials for NAS devices Security Explorer Tools Options now has a NAS devices tab where you can set alternate credentials for network-attached storage (NAS) devices. Use alternate credentials to specify additional accounts that have administrative privileges to various NAS devices on your network. Each account in the list is tried in the order listed until an account is found with sufficient privileges. If no account is found with administrative privileges, Access Denied is displayed. Search Active Directory for users and groups The Active Directory tree is now part of the Search Scope in the Group and User Management module. You can select organizational units and containers to search the computers for local groups and users, or you can select individual computers. To search for domain users and groups, use the Network node. Use multiple wildcards when restoring In the NTFS Security module, you can use multiple wildcards when restricting the permissions to restore. Use commas to separate multiple wildcards. Use the * wildcard to match any number of characters. Use the? wildcard to match a single character. Set new advanced restore options The Advanced Restore Settings option is redesigned. To help you find and select parts of the backup file to restore, you can filter the path and the accounts. If the backup file is exceptionally large, you can filter the backup file to load only a portion of the file. You also can choose to apply the path filters to root paths only, which is useful if you have a large number of root paths in your backup file. Alternatively, you can apply the path filters to all paths except the root paths, which is useful if you have a large backup in a more complicated tree-like structure. Filtered out permissions do not display and are not restored. With the new restore mode, you can overwrite all permissions, restore permissions only for accounts from the backup file, or add permissions from the backup file to the existing permissions. In any case, the restore process skips paths for which no permissions are loaded from the backup, so those permissions remain unchanged. With the new scope mode, you can restore permissions for only the paths and subpaths that are visible and selected in the tree, or for all subpaths of the paths selected in the tree, including those that are filtered out or not selected. Search by SID When defining search criteria in the NTFS Security module, you can now include the SID. Type a full or partial SID on the Group and user search criteria tab. You can use the * wildcard to match any number of characters and the? wildcard to match a single character. The comparison is not case sensitive. Searching by SID is helpful for locating deleted accounts by pair the SID search with Search for unknown accounts. You also can pair the SID search with Include group results, Include user results, Search for permissions (DACL), and Search for owner to help you find accounts. Revoke permissions using SID history When searching for permissions to revoke, you can choose to include the SID history search. Since there may be more than one SID associated with the selected account, selecting to include the SID history search adds all existing SIDs to the List of users and groups to revoke list so that all existing permissions are revoked. Filter the display of modules You can choose to filter the list of modules that display. Select View Filters, and point to Filters to view the filter selections. You can choose All, None, or select specific modules to display. Skip subfolders and files when processing This Folder Only permissions By default, child items under the parent folder are processed when granting or deleting the This Folder Only permission. On the Tools Options Advanced tab, you can now choose to skip processing child items when granting or deleting the This Folder Only permission, which may speed up the process. Note that if you do choose to skip subfolder processing, any existing inheritance issues are not corrected automatically as part of the processing. Manage SMTP addresses for mailbox users Security Explorer provided management of SMTP addresses for contacts, mail users, and distribution groups. With version 9.6, mailbox users are also included. You can add many addresses, but only one address is designated as the primary address. Restore to different path in SharePoint Security module In, you now can restore permissions to a different path even if the site structures are different. Permissions are restored only for site items that are identical. Site items that do not match are ignored. Remove Remote Registry service You no longer need to start the Remote Registry service on remote servers running SQL Server to manage permissions. 2

3 Support automatic and manual triggered starts The Service Security module now supports automatic and manual triggered starts. Remove Security Explorer settings When uninstalling Security Explorer, you now have the option of removing the folders that contain saved settings, such as search criteria, alternate credentials, favorites, and enterprise scopes. Use context-sensitive help When you access Security Explorer help, you now see a help page that is pertinent to the dialog box you are inquiring about. See also: Resolved issues Resolved issues The following is a list of issues addressed in this release. Table 1. General resolved issues Path and Applies to columns are parsed incorrectly for saving search results When printing with the option Use column widths from main window display checked, you receive Error: Index out of range Cannot grant Replace permissions from Windows context menu Table 2. NTFS Security resolved issues The Progress window goes through all subfolders and files when permissions are granted and the This folder only checkbox is selected Permissions are not restored for NAS devices if local account permissions exist Table 3. Group & User Management resolved issues User description disappears after pre-windows 2000 name was edited Impossible to display user memberships after pre-windows 2000 name was edited Table 4. SQL Security resolved issues It is necessary to restart the Remote Registry service, if it was not used for more than several minutes, to see SQL Server instances installed on Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R Table 5. Exchange Security resolved issues 3

4 The Revoke Disabled and Revoke Unknown tasks do not work for Public Folders Table 6. SharePoint Security resolved issues Restore to different path does not work for lists Cannot change Active Directory permissions under alternate credentials Restoring permissions to a different path can work only if the source and target sites are identical. If one site item is different, permissions cannot be restored to all site items. Table 7. Task Management resolved issues Cannot set Active Directory group accounts to task user accounts Cannot copy tasks configured to run with group accounts Table 8. Dell Fluid FS support resolved issues Security Explorer cannot get the local groups list in all modules Cannot see Group Contents for local groups Group and User Management: Cannot create new local users and groups Group and User Management: Cannot delete local users Group and User Management: Cannot see the local groups list in the Select account dialog box. Group and User Management: Domain Group appears in Group Properties dialog box Group and User Management: Error occurs in the Clear Local Admin task Group and User Management: Memberships list is empty NTFS Security: Cannot see Group Contents for local groups NTFS Security: Cannot see Memberships for local users after selecting a container NTFS Security: Cannot rename local accounts NTFS Security: Cannot search for permissions on the root NTFS Security: In the Search function, an error occurs after selecting a local user and enabling the Include all group memberships checkbox NTFS Security: An error occurs after attempting to create a share NTFS Security and Share Security: It is impossible to add any user (domain or local) into a local group NTFS Security: Cannot back up security when the Include SACL checkbox is selected NTFS Security and Share Security: Cannot search for disabled accounts Table 9. NetApp support resolved issues 4

5 Command line utilities cannot work with NetApp users PowerShell commandlets cannot work with NetApp shares in Clustered mode PowerShell commandlets cannot work with NetApp users Known issues The following is a list of issues, including those attributed to third-party products, known to exist at the time of release. Table 10. Known issues Known issue NTFS Security: The Revoke Disabled/Unknown task doesn't work for files Cannot create a mailbox for a new user if Exchange 2013 is in the mode: Active Directory split permission security model to the Exchange organization SharePoint Security: Permission levels cannot be renamed SharePoint Security: Permission level is not created when restoring permissions using subpath (list, folder, item) as source and target. SharePoint Security: Domain users and groups cannot be set as owner for SharePoint groups. NTFS Security: For Isilon and Dell Fluid File System (FluidFS), there is an error in Search after enabling the Include nested group memberships check box. NTFS Security: SACL is not restored to different path or when using the Add restore mode. NTFS Security: Search by logon name without domain name cannot return permissions for accounts in child domain of trusted forest. NTFS Security: In the Advanced Restore options, the scope mode works incorrectly for files. Group and User Management: Cannot simultaneously grant/revoke/add to group two users if the logon name of one matches the full name of the other. PoweShell Cmdlets and CmdUtils: Impossible to Grant/Revoke/Clone permissions for account names without the domain name for accounts in trusted domain. NTFS Security: For NetApp 8.3, cannot search permissions with the device as search scope System requirements Before installing, ensure that your system meets the following minimum hardware and software requirements. Hardware requirements Software requirements Supported platforms for Security Explorer User privilege requirements 5

6 Required software for Microsoft Exchange 2013 for Security Explorer Setting up Microsoft Exchange for Security Explorer Upgrade and compatibility Hardware requirements Table 11. Hardware requirements Requirement Details Processor Pentium 600MHz or faster Memory 1 GB for Windows Vista and later Hard Disk space 150 MB Monitor 1024 x 768 screen resolution Operating System Windows Vista Windows 7 Windows 8 Windows 8.1 Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 Software requirements Table 12. Software requirements Requirement.Net Framework v.4.0 or later Details Install either the Full or Standalone version. Do not install just the Client Profile. 6

7 Supported platforms for Security Explorer Table 13. Supported platforms for Security Explorer Security Explorer Module NTFS Security Share Security Registry Security Printer Security Service Security Task Management Group & User Management NTFS Security Share Security Group & User Management Supported Platform Windows NT 4.0 Windows 2000 Professional or Server Windows XP Windows Vista Windows 7 Windows 8 Windows 8.1 Windows 2000 Server Windows Server 2003 Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 Dell Fluid File System (FluidFS) EMC Isilon EMC Celerra EMC VNX NetApp 8.2 (7-Mode and Clustered Mode) NetApp 8.3 SQL Security SQL Server 2014 SQL Server 2012 SQL Server 2008 R2 SQL Server 2008 SQL Server 2005 SharePoint Security SharePoint 2013 SharePoint 2010 SharePoint Foundation SharePoint 2007 SharePoint Services 3.0 Exchange Security Exchange 2013 Exchange 2010 Exchange 2007 Exchange 2003 NOTE: Security Explorer supports CIFS volumes. Mixed CIFS/UNIX volumes are supported if the volume root owner is a Windows account. NOTE: For NetApp Clustered mode, to see changes after a permission action, such as Grant, Revoke, or Modify, on folders and shares, you must refresh the tree in the Navigation pane. 7

8 User privilege requirements To start Security Explorer, a user must be a member of the local Administrators, otherwise error messages display. Each module in Security Explorer has additional requirements to enable permission management. Table 14. Requirements to enable permission management Module NTFS Security Share Security Registry Security Printer Security Service Security Task Management Group and User Management SharePoint Security SQL Server Security Exchange Security Requirement To manage permissions on folders and files on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer. To manage permissions on shares on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer. To manage permissions on registry keys on remote computers: The Remote Registry service must be running on the target computer. The file and print sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer. To manage permissions on printers on remote computers: The Printer Spooler service must be running on the target computer. The file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed. To manage permissions on services on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer. To manage tasks on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer. To manage groups and users on remote computers, the file and printer sharing option must be enabled on the firewall on the computer with Security Explorer installed and on the remote computer. To manage permissions on SharePoint servers, the SharePoint site must be on the same network as the computer on which Security Explorer is installed. To manage SharePoint sites exposed over SSL ( add the SharePoint server s certificate to the Trusted Root Certification Authorities store on the computer with Security Explorer installed. To manage permissions on SQL Servers: Current user must be a member of the Administrators local group on the SQL server. Windows Firewall on the SQL server must be configured to allow SQL and WMI. For more information please refer to: Configure the Windows Firewall to Allow SQL Server Access at To manage permissions on the Exchange organization, the Exchange organization must be on the same Active Directory forest as the computer on which Security Explorer is installed. 8

9 Setting up Microsoft Exchange for Security Explorer Client access server configuration 1 Check that all Exchange Windows services with Automatic startup are started. 2 Check that IIS Admin Service and World Wide Web Publishing Service IIS Services are started. 3 Check that the Exchange Web Application is configured correctly in IIS: Authentication: Windows Authentication is Enabled SSL Settings: Require SSL is switched on 4 Exchange Server 2010 and 2013 only: Enable PowerShell Remoting on the Exchange Server by running the PowerShell command: Enable-PSRemoting force. Client Configuration 1 Open port 443 on the firewall. 2 Install an Exchange Server SSL certificate. Upgrade and compatibility Security Explorer 9 does not require that you uninstall version 5, version 6, version 7, or version 8. You can install side-by-side with all of these previous versions. Product licensing For, you must have a Dell license file (.dlv) or a Site Administrator QLL license file (*asc). Your previous licenses will not be recognized by version 9.6. To activate a trial or purchased commercial license 1 Start Security Explorer. When you start Security Explorer, a license check is performed. If you are installing Security Explorer for the first time, you are asked to update the license. 2 Click Update License, and locate the license file. The license file is approximately 1 KB in size and has a.dlv or.asc file extension. To update a license 1 Start Security Explorer. 2 Select Help About Security Explorer. To view the applied licenses, click Licenses. To update a selected license, click Update License. 9

10 Getting started with Installation instructions Additional resources Installation instructions IMPORTANT: If you are running Active Administrator on the same computer as Security Explorer, exit Active Administrator and stop all Active Administrator services before upgrading to Security Explorer. Use the autorun to install Security Explorer. To install Security Explorer 1 Launch the autorun. 2 On the Welcome screen of the Install Wizard, click Next. 3 Click View License Agreement. 4 Scroll to the end of the license agreement. 5 Click I accept these terms, and click OK. 6 Click Next. 7 Enter customer information, and click Next. 8 To change the location of the program files, click Change, or click Next to accept the default installation directory. 9 Click Install. 10 Click Finish. Additional resources Additional information is available from the following: Online product documentation ( What s New Guide Installation Guide Upgrade Guide User Guide 10

11 Globalization This section contains information about installing and operating this product in non-english configurations, such as those needed by customers outside of North America. This section does not replace the materials about supported platforms and configurations found elsewhere in the product documentation. This release is Unicode-enabled and supports any character set. In this release, all product components should be configured to use the same or compatible character encodings and should be installed to use the same locale and regional options. This release is targeted to support operations in the following regions: North America, Western Europe and Latin America, Central and Eastern Europe, Far-East Asia, Japan. Third-party contributions This product contains the third-party components listed below. For third-party license information, go to Source code for components marked with an asterisk (*) is available at Table 15. List of third-party contributions Component Renci SSH.NET Library Beta License or Acknowledgement Copyright (c) 2010, RENCI All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of RENCI nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 11

12 About Dell Dell listens to customers and delivers worldwide innovative technology, business solutions and services they trust and value. For more information, visit Contacting Dell Technical support: Online support Product questions and sales: (800) Technical support resources Technical support is available to customers who have purchased Dell software with a valid maintenance contract and to customers who have trial versions. To access the Support Portal, go to The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. In addition, the portal provides direct access to product support engineers through an online Service Request system. The site enables you to: Create, update, and manage Service Requests (cases) View Knowledge Base articles Obtain product notifications Download software. For trial software, go to Trial Downloads. View how-to videos Engage in community discussions Chat with a support engineer 12

13 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Dell Inc. The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Dell does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Dell Inc. Attn: LEGAL Dept 5 Polaris Way Aliso Viejo, CA Refer to our web site (software.dell.com) for regional and international office information. Trademarks Dell, and the Dell logo are trademarks of Dell Inc. Microsoft, Windows, Windows Server, Windows Vista, SharePoint, SQL Server, Windows PowerShell, and Active Directory are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Pentium is a trademark of Intel Corporation in the U.S. and/or other countries. NetApp and the NetApp logo are trademarks or registered trademarks of NetApp, Inc. in the United States and/or other countries. EMC, Isilon, Celerra, and VNX are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest in the marks and names of others. Legend CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death. IMPORTANT NOTE, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information. 13

Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014

Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014 June 2014 These release notes provide information about Dell. About New features s Known issues System requirements Product licensing Getting started with Security Explorer Globalization About Dell About

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

New Features and Enhancements

New Features and Enhancements Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Dell One Identity Quick Connect for Cloud Services 3.6.1

Dell One Identity Quick Connect for Cloud Services 3.6.1 Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

Dell One Identity Quick Connect for Cloud Services 3.6.0

Dell One Identity Quick Connect for Cloud Services 3.6.0 Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

Enterprise Reporter Report Library

Enterprise Reporter Report Library Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell Recovery Manager for Active Directory 8.6.0

Dell Recovery Manager for Active Directory 8.6.0 Dell Recovery Manager for Active Directory 8.6.0 April, 2014 These release notes provide information about the Recovery Manager for Active Directory release. About Recovery Manager for Active Directory

More information

Dell Client Profile Updating Utility 5.5.6

Dell Client Profile Updating Utility 5.5.6 Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Recovery Manager for Active Directory 8.6.3

Dell Recovery Manager for Active Directory 8.6.3 Dell Recovery Manager for Active Directory 8.6.3 May 15, 2015 These release notes provide information about the Dell Recovery Manager for Active Directory release. Resolved Issues Known Issues System Requirements

More information

Dell NetVault Backup Plug-in for SQL Server 6.1

Dell NetVault Backup Plug-in for SQL Server 6.1 Dell NetVault Backup Plug-in for SQL Server 6.1 April 2014 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Enhancements Resolved issues Known

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Dell NetVault Backup Plug-in for SQL Server 10.0.1

Dell NetVault Backup Plug-in for SQL Server 10.0.1 Dell NetVault Backup Plug-in for SQL Server 10.0.1, Revision 1 February 2015 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Dell NetVault Backup

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

Dell InTrust 11.0 Best Practices Report Pack

Dell InTrust 11.0 Best Practices Report Pack Complete Product Name with Trademarks Version Dell InTrust 11.0 Best Practices Report Pack November 2014 Contents About this Document Auditing Domain Controllers Auditing Exchange Servers Auditing File

More information

Dell Spotlight on Active Directory 6.8.4. Deployment Guide

Dell Spotlight on Active Directory 6.8.4. Deployment Guide Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell One Identity Manager 7.0. Help Desk Module Administration Guide

Dell One Identity Manager 7.0. Help Desk Module Administration Guide Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated MMES - What Can and Cannot Be Migrated First Release - April 2015 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

8.7. Target Exchange 2010 Environment Preparation

8.7. Target Exchange 2010 Environment Preparation 8.7 Target Exchange 2010 Environment Preparation 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document

More information

Toad for Apache Hadoop 1.1.0

Toad for Apache Hadoop 1.1.0 Toad for Apache Hadoop 1.1.0 January 23, 2015 These release notes provide information about the Toad for Apache Hadoop release. About New features Enhancements Known issues System requirements Product

More information

Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide

Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Dell Active Administrator 7.5. Install Guide

Dell Active Administrator 7.5. Install Guide Dell Active Administrator 7.5 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

About Dell Statistica 12.6... 2

About Dell Statistica 12.6... 2 Complete Product Name with Trademarks Version Dell TM Statistica TM 12.6 Contents Dell TM Statistica TM... 1 About Dell Statistica 12.6... 2 New Features... 2 Workspace Enhancements: Statistica Enterprise

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

Object Level Authentication

Object Level Authentication Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Dell Migration Manager for Exchange 8.11. Product Overview

Dell Migration Manager for Exchange 8.11. Product Overview Dell Migration Manager for Exchange 8.11 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell InTrust 11.0. Real-Time Monitoring Guide

Dell InTrust 11.0. Real-Time Monitoring Guide Dell InTrust 11.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

7.5 7.5. Spotlight on Messaging. Evaluator s Guide

7.5 7.5. Spotlight on Messaging. Evaluator s Guide 7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

Dell Recovery Manager for Active Directory 8.6. Deployment Guide

Dell Recovery Manager for Active Directory 8.6. Deployment Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Toad for Apache Hadoop 1.2.0

Toad for Apache Hadoop 1.2.0 Toad for Apache Hadoop 1.2.0 September 16, 2015 These release notes provide information about the Toad for Apache Hadoop release. About New features Enhancements Known issues System requirements Product

More information

Dell NetVault Backup Plug-in for Hyper-V 10.0.1. User s Guide

Dell NetVault Backup Plug-in for Hyper-V 10.0.1. User s Guide Dell NetVault Backup Plug-in for Hyper-V 10.0.1 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Introduction to Version Control in

Introduction to Version Control in Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any

More information

Dell Active Administrator 8.0. About Active Administrator 8.0

Dell Active Administrator 8.0. About Active Administrator 8.0 Dell Active Administrator 8.0 January 2016 These release notes provide information about the Dell Active Administrator release. About Active Administrator 8.0 New features Resolved issues System requirements

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Quick Connect Express for Active Directory

Quick Connect Express for Active Directory Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Quest ChangeAuditor 4.8

Quest ChangeAuditor 4.8 Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,

More information

Quest vworkspace Virtual Desktop Extensions for Linux

Quest vworkspace Virtual Desktop Extensions for Linux Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.

More information

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide Dell NetVault Backup Plug-in for 1.3 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Dell Remote Support Center 2.6.5

Dell Remote Support Center 2.6.5 2.6.5 5/12/2014 These release notes provide information about the Dell Remote Support Center release. About Dell Remote Support Center Resolved issues Known issues System requirements Product licensing

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview

Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview May 2015 Overview Functional highlights Functional details Legal notices Overview Support for Dell SonicWALL malware detection

More information

Foglight. Dashboard Support Guide

Foglight. Dashboard Support Guide Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

6.9. Administrator Guide

6.9. Administrator Guide 6.9 Administrator Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Pulse Redundancy. User Guide

Pulse Redundancy. User Guide Pulse Redundancy User Guide August 2014 Copyright The information in this document is subject to change without prior notice and does not represent a commitment on the part of AFCON Control and Automation

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

6.0. Data Governance Edition. Data Governance Deployment Guide

6.0. Data Governance Edition. Data Governance Deployment Guide 6.0 Data Governance Edition Data Governance Deployment Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Dell Spotlight on Active Directory 6.8.3. User Guide

Dell Spotlight on Active Directory 6.8.3. User Guide Dell Spotlight on Active Directory 6.8.3 User Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Dell Directory Analyzer 4.14. Installation Guide

Dell Directory Analyzer 4.14. Installation Guide Dell Directory Analyzer 4.14 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Top 10 Most Popular Reports in Enterprise Reporter

Top 10 Most Popular Reports in Enterprise Reporter Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software

More information

Symantec Backup Exec TM 10d for Windows Servers

Symantec Backup Exec TM 10d for Windows Servers Symantec Backup Exec TM 10d for Windows Servers Quick Installation Guide N180808 September 2005 Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation

More information

Web Portal Installation Guide 5.0

Web Portal Installation Guide 5.0 Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

6.7. Quick Start Guide

6.7. Quick Start Guide 6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

ChangeAuditor 6.0. Web Client User Guide

ChangeAuditor 6.0. Web Client User Guide ChangeAuditor 6.0 Web Client User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide Foglight 1.0.0.0 Cartridge for Active Directory Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

FOR SHAREPOINT. Quick Start Guide

FOR SHAREPOINT. Quick Start Guide Quick Apps v6.2 FOR SHAREPOINT Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Integrated Citrix Servers

Integrated Citrix Servers Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights

More information

Dell Unified Communications Command Suite - Analytics 8.1. Deployment Guide

Dell Unified Communications Command Suite - Analytics 8.1. Deployment Guide Dell Unified Communications Command Suite - Analytics 8.1 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is

More information

How to Deploy Models using Statistica SVB Nodes

How to Deploy Models using Statistica SVB Nodes How to Deploy Models using Statistica SVB Nodes Abstract Dell Statistica is an analytics software package that offers data preparation, statistics, data mining and predictive analytics, machine learning,

More information

Wise Package Studio 8.0 MR1 Release Notes

Wise Package Studio 8.0 MR1 Release Notes Wise Package Studio 8.0 MR1 Release Notes Wise Package Studio 8.0 MR1 Release Notes The software described in this book is furnished under a license agreement and may be used only in accordance with the

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information