Intellipool Network Monitor 2.0

Size: px
Start display at page:

Download "Intellipool Network Monitor 2.0"

Transcription

1 User's Guide Intellipool Network Monitor 2.0 Intellipool AB Printed on 18 October, 2003

2

3 i Contents Intellipool Network Monitor Documentation 1 Copyright Notice...2 End user license agreement...3 Getting help...7 Contact information...8 Introduction 9 Planning...11 Software and hardware requirements...11 Service logon account...12 Net send...13 SNMP monitoring...14 ODBC logging...14 Firewalls and routers...14 Anti virus programs and software firewalls...14 Monitoring Windows NT/2000/XP machines...14 Monitoring Unix machines...14 DHCP Agent considerations...15 Internal web server...15 Web server security...15 Backup of configuration repository...16 File security...16 User logon verifications...16 Agent username and password...16 SMS notification...16 Paging...19 CPU usage and threading...20 Memory usage...21 Installation check list...22 Getting started...23 Program settings...24 Creating new operator accounts...24 Creating a new operator group...25 Creating new action lists...26 Scanning for objects and agents...27 Assigning the restart list with global changes...28 Summary...28

4 ii Contents How to obtain updates...29 Intellipool Network Monitor Concepts 31 Action lists...31 Auto scan...32 Data extraction...32 Dependency tree...32 Frequently used terms...32 Internal servers...34 Logging...34 Networks,Objects And agents...36 Operators and operator groups...36 Reports...37 Schedules...38 Test procedure...38 The configuration repository...39 How to use Intellipool Network Monitor 41 Action lists...43 Creating a action list...44 Deleting an action...45 Dependency trees...46 Frequently used user interface terms...49 Global changes...50 Index page and menus...52 My settings...53 NOC view...55 Networks, objects and agents...57 Creating a agent...57 Delete a agent...59 Agent information page...59 Agent list page...61 Agents with alarms page...61 Agents by type page...62 Agent mini list page...62 Creating a network...63 Delete a network...64 Network info page...65 Network list page...67 Network by agent type page...68 Creating a object...69 Delete a object...70 Object information page...70 Creating dependency...72 Importing objects...72 Object list page...73 Operators and operator groups...75 Create an operator group...75 Delete an operator group...76 Change the default operator group...76 Create an operator...77 Delete an operator...79 Program settings...81 Generic settings...83 Log settings...88 Pagegate integration...89

5 Contents iii Reports...91 Creating a report template...91 Creating a report...94 Viewing a report...96 Schedule a report...97 Copy a report...98 Delete a report a report...99 Schedules Creating a operator schedule Creating a maintenance schedule Creating an event schedule...108

6 iv Contents System administration Agent documentation 113 Bandwidth agent CPU load agent DHCP agent Disk size agent DNS agent Event log agent File check agent FTP agent HTTP agent ICA agent IMAP4 agent INM agent LDAP agent Memory size agent Network interface load agent NNTP agent ODBC agent Ping agent POP3 agent Process agent RDP agent Service agent SMTP agent SNMP agent SNMP Trap agent SSH2 agent SSH2 script agent Swap size agent Syslog agent TCP port scan agent Telnet agent TempTrax agent Text file scan agent TFTP agent Winperf agent Action documentation 157 Clear Windows Event log Execute command via SSH Execute windows command List reset Net Send Paging via PageGate SNMP Set Send SMS Send mail Wake-on-LAN Windows service control Data extraction 169 agent_graph agent_statusstring...171

7 Contents v agent_uptimestring dir operator_status version Frequently Asked Questions 177 Agent questions File and directory related questions Misc questions Notification questions Username, password and logon questions Guides 189 Action list example Formatting alarm and restart messages Monitoring Windows user logon failures Remote reboot of Windows machine SSH2 script agent, average load for Unix Index 201

8

9 1 C HAPTER 1 Intellipool Network Monitor Documentation This document is written for the experienced system administrator who is familiar with Windows, Unix, networking and monitoring technologies. In This Chapter Copyright Notice...2 End user license agreement...3 Getting help...7 Contact information...8

10 2 Intellipool Network Monitor 2.0 User's Guide Copyright Notice Intellipool Network Monitor Copyright Intellipool AB. SSH2 support powered by sshlib, Copyright (C) by Bitvise Ltd, portions Copyright (C) by Wei Dai. All rights reserved The software contains proprietary information of Intellipool AB; it is provided under a license agreement containing restrictions on use and disclosure and is also protected by copyright law. Reverse engineering of the software is prohibited. Due to continued product development this information may change without notice. The information and intellectual property contained herein is confidential between Intellipool AB. and the client and remains the exclusive property of Intellipool AB. If you find any problems in the documentation, please report them to us in writing. Intellipool AB does not warrant that this document is error-free. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission of Intellipool AB. Intellipool AB Franzengatan 14 SE Härnösand Sweden +46 (0) Internet support@intellipool.com Website:

11 Intellipool Network Monitor Documentation 3 End user license agreement Intellipool Network Monitor Version 2.0 This license agreement is a binding contract between you (natural person or legal entity) and Intellipool AB, and applies to the software product from Intellipool AB specified above. By installing, producing copies or otherwise using this software, you are accepting the terms of this license agreement, and thereby consenting to be bound by it. If you do not accept the terms of this license, you are not entitled to install or use this software. 1. Licensed Product The Licensed Product consists of the software program in a machinereadable form, including specifications and other electronic documentation, as indicated above. 2. Grant of license This License Agreement gives the licensee a non-exclusive right to use the Licensed Product pursuant to the terms and conditions of this Agreement. 3. License fee The rights granted under this License are conditioned on the licensee having paid the license fee for the Licensed Product, pursuant to the terms and conditions applied by the licensor at the time in question. 4. Free versions of the software The terms and conditions of this license agreement shall also apply to users who are given access to the free version of the software product supplied by the Licensor. 5. Scope of the License The Licensee shall be entitled to install one copy of the Licensed Product on a single computer, which is used to provide users within the organisation of the Licensee with access to the functions of Licensed Products. A few copies of the Licensed Product may be made for security- and archive-related purposes. Copies of the Licensed Product produced in this manner shall be subject to the terms and conditions of this Agreement.

12 4 Intellipool Network Monitor 2.0 User's Guide The Licensee may not, by itself or through another, use, copy or otherwise transfer or use the Licensed Product, in whole or in part, other than as set forth in this License Agreement. The Licensee may not, by itself, nor through another, discover, decompile or otherwise use the code to the Licensed Product to any extent not expressively allowed pursuant to law. The Licensee may not, directly or indirectly, with or without consideration, sublicense, lease, lend or otherwise allow anyone but the Licensee to control or use the Licensed Product. Production of copies of the Licensed Product for private use is thus not allowed. The assignment of any and all rights pursuant to this License Agreement may only be done with the written consent of the Licensor. 6. Licensor s right to the Licensed Product The rights granted by this license shall not be construed to mean that the Licensor s rights, including copyright and patent rights, where applicable, to the Licensed Product are being transferred to the Licensee. Nor do the rights granted by this license mean a transfer to the Licensee of title to the Licensed Product or to the medium on which the Licensed Product are made accessible to the Licensee. 7. The Licensee s duty to inspect and right to rescind The Licensee, upon receiving the Licensed Product, has an obligation to check its functions and quality. If the Licensee finds that the Licensed Product do not fulfil the functions specified by the Licensor in the documentation included with the Licensed Product pursuant to section one, the Licensee shall be entitled to rescind the License Agreement. This right to rescission is conditioned upon the Licensor receiving a written notice within thirty (30) days of the date of delivery. In the case of a rescission, the Licensor shall immediately refund the license fee. The Licensee shall not have the right to interest on this amount. In the event the Licensed Product has been sold through a distributor, the distributor shall be responsible to effect a refund of the license fee. 8. Right to cure defects, etc. The Licensor shall cure deviations from the software specification of the Licensed Product, provided that the deviations affect the use of the Licensed Product to a significant degree. The Licensor may, in conjunction with this, choose to upgrade the Licensee s version of the software. 9. Limitation of liability

13 Intellipool Network Monitor Documentation 5 Beyond what is stipulated in the above provisions, the Licensor shall have no liability for the functioning or quality of the Licensed Product, since any defects are fully regulated through this Agreement. Thus, the Licensor shall not be obligated, under any circumstances, to pay damages on account of a defect in the Licensed Product. In addition, the Licensor shall have no liability for damage or injury, whether direct or indirect, which may have been sustained by the Licensee, regardless whether such damage or injury consists of lost revenues or additional expenses, such as lost or damaged data or the liability to reimburse a third party. 10. Confidentiality The Licensed Product contains business and trade secrets belonging to the Licensor. These have been made accessible to third parties only through this License Agreement. The Licensee is therefore under an obligation not to make the Licensed Product accessible to others without the written consent of the Licensor, and to take all reasonable actions to prevent third parties from accessing the business and trade secrets that the Licensed Product contain. The licensee is responsible for ensuring that the relevant staff receive instruction in this matter, and are obligated to abide by the rules for using the Licensed Product. The Licensee s obligation to maintain confidentiality shall continue to apply after the right to use the Licensed Product pursuant to this Agreement ceases due to cases of rescission or termination, or through assignment. The obligation to maintain confidentiality continues for a period of five years. In the case of copies maintained on file, pursuant to law, the obligation to maintain confidentiality shall continue as long as the Licensee shall keep the copy on file. The Licensee shall be obligated to store Licensed Product in a secure manner during the period of the license, so as to prevent dissemination of the Licensed Product. 11. Damages, etc. In the event the Licensee shall violate any term of this Agreement that is of material importance to the Licensor, the Licensee shall indemnify the Licensor for its damage, regardless of whether or not the Licensor shall choose to rescind this Agreement. If, as a result of the breach of contract, an unauthorized person shall gain access to information regarding all or part of the Licensed Product, and this shall adversely affect the opportunities of the Licensor to market and grant licenses for the Licensed Product, the damage in each individual case shall be deemed to be equal to five Basic Amounts for National Insurance, unless damage in excess of that amount is proved.

14 6 Intellipool Network Monitor 2.0 User's Guide If the Licensee s breach of contract consisted of producing unauthorized copies, or parts thereof, the Licensee shall not only be obligated to pay the license fees for the unauthorized copies produced, but shall also be obligated to compensate the Licensor for any additional damage or injury. 12. Term of the License, termination Upon payment of the license fee, the rights granted under this license shall continue indefinitely. At any time during the term of this license, the Licensee shall be entitled to terminate this Agreement. This termination shall not entitle the Licensee to a refund of any part of the license fee paid. The Licensor shall be entitled to terminate this License Agreement upon immediate notice in the event the Licensee shall violate any of the terms of the Agreement. The rights granted under this license shall automatically terminate when the Licensed Product is no longer in the possession of the Licensee. Upon the termination of this Agreement, the Licensee shall be obligated to immediately destroy the Licensed Product, including both the software itself and copies thereof and the specifications and other documentation. 13. Disputes Disputes regarding the interpretation and/or application of this Agreement shall, in all cases, be determined by a Swedish court according to Swedish law.

15 Intellipool Network Monitor Documentation 7 Getting help Intellipool is committed to give you good and fast support. Your copy of Intellipool Network Monitor comes with 30 days support and one year of free upgrades. Frequently Asked Question This is a compiled list of common answers and questions, you may want to look through this document, perhaps your question is already answered here. support Send the mail to support@intellipool.com Please be as thorough as possible when you describe your problem.

16 8 Intellipool Network Monitor 2.0 User's Guide Contact information Mail: Intellipool AB Franzengatan Härnösand Sweden Phone: +46-(0) Web

17 9 C HAPTER 2 Introduction Intellipool Network Monitor is an easy to use network monitor that can monitor many different protocols and services. When a service or protocol enters an alarm state or exits an alarm state INM can execute predefined actions lists. Intellipool Network Monitor operates by testing standard protocols and functions in your network, by doing so you never need to install any software on the monitored host. In this documentation we will refer to Intellipool Network Monitor as the abbreviation INM In This Chapter Planning...11 Getting started...23 How to obtain updates...29

18

19 11 Planning This section describes the prerequisite that has to be met before INM can be utilized to its fullest. By reading this section many common installation and setup problems can be avoided. This section also provide a check list that can be used to make a final check out before installing INM. Software and hardware requirements Recommended software and hardware requirements Operating system: Windows 2000 SP 3 or Windows XP SP 1 Hardware Intel Pentium III 800 MHz or AMD Athlon/Duron 800 MHz 128 Mb memory 20 Mb free disk space Network interface card Browser supported Microsoft Internet Explorer 5.0 or greater Opera 6.0 or greater The following features must be enabled in your browser settings. Accept third party cookies Java script enabled Cookies are needed to keep track of the user session. Java scripts are used by the web interface and must be enabled.

20 12 Intellipool Network Monitor 2.0 User's Guide Service logon account INM executes as a Windows service on the host machine and must be granted a Windows account with permission to access other Windows machines. Default INM is installed using the local machine account. We recommend that a special user account is created for the INM service, the account must have permission to access the following items on a remote machine. The following rights must be granted the new account Act as part of operating system Allow log on locally Log on as a service Profile system performance Profile single process The account password should be set to Password never expires The following agents can be affected by an account that is not allowed to access the above mentioned items. Process agent Disk size agent Swap size agent CPU load agent Memory size agent Service agent Event log agent File check agent Generic Windows Performance agent To verify that the account can access the resources need for INM to operate follow these steps. 1. Login on the INM host machine with the account created for INM 2. Start Perfmon.exe 3. Try to add a counter from a remote machine you wish to monitor with INM 4. If step 3 works continue with next step, otherwise check the account settings an begin from step 1 5. Open a file explorer window and try to access a default share of the machine you wish to monitor by typing the UNC path (ex. \\remotemachine\c$) 6. If you are asked to enter a user name and password to gain access you need to check the account settings and begin from step 5.

21 Chapter 2 Introduction 13 When the account have passed the test above configure the INM service to use that account instead of the local account. Net send The service "Messenger" must be running on both the INM host machine and the machine that the alert is sent to.

22 14 Intellipool Network Monitor 2.0 User's Guide SNMP monitoring ODBC logging Firewalls and routers To use the SNMP Agent the Windows SNMP service must be installed and started on the INM host machine. Consult the Windows documentation on installing the SNMP service. The data source used for ODBC logging must be a system data source. It cannot be a user data source because the INM service cannot access user data sources. INM uses many different ports and protocols to preformed agent tests. Its very important that firewalls and routers between the INM host machine and the monitored hosts are configured so traffic from and to the INM host machine can pass through. To get a complete list of assigned port numbers follow this link Anti virus programs and software firewalls Anti virus programs and software firewalls can cause INM not to work properly. Therefore we recommend not to run any software firewalls or anti virus program on the INM host machine. Monitoring Windows NT/2000/XP machines Monitoring Unix machines INM supports monitoring of all performance objects and counters on the following Windows versions. Windows NT 4.0 workstation and server with service pack 6 Windows 2000 Professional and server with service pack 3 Windows 2003 Standard and enterprise edition Windows XP professional Some agents uses the built in SSH2 client to access a Unix hosts in a secure fashion. These agents require a username and password to execute a command on the Unix machine and return the result. The agents that is using SSH2 and requires a username and password are: Disk size agent

23 Chapter 2 Introduction 15 DHCP Agent considerations Internal web server Web server security Swap size agent Process agent File check agent SSH2 agent (username/password optional) (1) SSH2 script agent (2) The account used for these agents must have the permission to execute the following commands: df k ps e -f free k ls -l --full-time (1) If no username/password is specified the agent does a simple connection test that works with SSH1 servers as well. (2) The agent executes a user specified command and the account must have permission to execute that command. The DHCP agent uses the MAC address of the first network interface card that is installed in the INM host machine to request an IP address from a DHCP server. It is important that the network interface card not is configured to use DHCP, the DHCP agent will try to request an IP address with the MAC address and then immediately release the address rendering the interface card with an invalid address. INM features a built in web server that delivers the interface to a browser. The web server is (default) using port 8080 (TCP), if another service is using port 8080 (TCP) INM will fail to open that port and will shutdown. The port used by the web server can be changed in the init.cfg file, INM needs to be restarted before the changes take affect. The built in web server can not write files to disk and reads the html template library only at startup. The template library is also protected with a strong encryption algorithm. The web server can be configured to only accept connection from a range of IP numbers. Information how to configure the IP numbers accepted by the web server can be found in the program settings page. By default the web server accepts all incoming connections.

24 16 Intellipool Network Monitor 2.0 User's Guide Backup of configuration repository File security User logon verifications Agent username and password SMS notification INM saves the configuration into a file called settings.nxd, after the configuration is successfully saved a copy is made. The file, named "settings.bak", is used by INM if the current file is invalid or missing. To make backup copies of the configuration repository, use the backup function in program settings page. Its not recommended that external programs take backups of the settings.nxd file while INM is running. More information about the backup function in the program settings page. All data files accessed by INM are encrypted with a strong encryption algorithm that protects the data from tampering and unauthorized use. INM uses only basic HTML for its interface to be compliant with almost any browser. Both the username and password identifying a user is sent back to INM unencrypted. Therefore the login page should NOT be treated as a secure login, only a basic user validation. If needed, encryption should be applied on lower OSI level to ensure that the connection not can be eavesdropped. When creating an agent both username and password is sent back to INM unencrypted. This is a weakness that could be exploited by a person with knowledge of IP networks. When viewing a created agent INM only sends the username to the browser, the password is masked with a random count of * signs. INM can send SMS messages directly if a GSM phone is connected to the INM host. INM uses the following commands to send a SMS. ATZ AT+CMGF AT+CMGS The GSM phone must comply with the GSM 7.05 standard. Check list for SMS phone installation: 1 Connect the phone cable to one of the INM host computers serial ports

25 Chapter 2 Introduction 17 2 Install the modem driver for your phone (if needed) 3 With a terminal program connect to the phone. 4 Try to send a SMS by typing the following ATZ AT+CMGF=1 AT+CMGS= PHONENUMBER INM SMS TEST Press CTRL-z 5 The SMS should now be sent, remember to replace PHONENUMBER with the number of the receiving phone and keep the quote signs (ex ). On the last line you should press the CTRL-z key combination. 6 The phone should answer with CMGS followed by a number indicating the ID of the sent SMS. 7 Select the serial port the phone is connected to in the "program settings" page. CMS Error codes Error Code 8 Operator determined barring 10 Call barred 21 Short message transfer rejected 27 Destination out of service 28 Unidentified subscriber 29 Facility rejected 30 Unknown subscriber 38 Network out of order 41 Temporary failure 42 Congestion 47 Resources unavailable, unspecified 50 Requested facility not subscribed 69 Requested facility not implemented 81 Invalid short message transfer reference value 95 Invalid message, unspecified 96 Invalid mandatory information 97 Message type non-existent or not implemented 98 Message not compatible with short message protocol state 99 Information element non-existent or not implemented 111 Protocol error, unspecified

26 18 Intellipool Network Monitor 2.0 User's Guide 127 Interworking, unspecified 128 Telematic interworking not supported 129 Short message Type 0 not supported 130 Cannot replace short message 143 Unspecified TP-PID error 144 Data coding scheme (alphabet) not supported 145 Message class not supported 159 Unspecified TP-DCS error 160 Command cannot be actioned 161 Command unsupported 175 Unspecified TP-Command error 176 TPDU not supported 192 SC busy 193 No SC subscription 194 SC system failure 195 Invalid SME address 196 Destination SME barred 197 SM Rejected-Duplicate SM 198 TP-VPF not supported 199 TP-VP not supported 208 D0 SIM SMS storage full 209 No SMS storage capability in SIM 210 Error in MS 211 Memory Capacity Exceeded 212 SIM Application Toolkit Busy 213 SIM data download error 255 Unspecified error cause 300 ME failure 301 SMS service of ME reserved 302 Operation not allowed 303 Operation not supported 304 Invalid PDU mode parameter 305 Invalid text mode parameter 310 SIM not inserted 311 SIM PIN required 312 PH-SIM PIN required 313 SIM failure

27 Chapter 2 Introduction SIM busy 315 SIM wrong 316 SIM PUK required 317 SIM PIN2 required 318 SIM PUK2 required 320 Memory failure 321 Invalid memory index 322 Memory full 330 SMSC address unknown 331 No network service 332 Network timeout 340 NO +CNMA ACK EXPECTED 500 Unknown error 512 User abort Paging INM can be integrated with Pagegate, paging server software from Notepage Inc. Pagegate can page user via numeric pagers, alpha numeric pagers and wireless phone standards not directly supported by INM. INM uses the GetAscii interface to communicate with Pagegate, before the GetAscii method can be used a directory must be created that both INM and the Pagegate server can access. The Pagegate settings can be found in the "program settings page. Refer to the Pagegate documentation how to setup Pagegate to poll from the GetAscii directory and how you create Pagegate users. Note that both the Pagegate users and INM operator Pagegate ID must be the same.

28 20 Intellipool Network Monitor 2.0 User's Guide CPU usage and threading INM is a highly threaded application that can take advantage of machines with more than one CPU. For each agent test INM spawns a new thread that executes the test. The action lists are executed in a separate thread and the INM core is running as a separate thread. The web server is running in a thread and each session is handled in a separate thread. This is why INM, unlike many other programs, can be scaled from monitoring just a few objects to several thousands objects without any modifications. This is an example of how threads are distributed in two different scenarios. When executing on a single CPU machine the same CPU executes all the threads. When a machine contains more than one CPU, the threads will be divided between the different CPU s making it possible to monitor more objects.

29 Chapter 2 Introduction 21 Memory usage To calculate the average agent/object memory usage the following numbers can be used. Type Size (bytes) Agent 1000 Agent statistical data Object 300 The INM executable consumes 11.5 mb. Example This example assumes 2 active data inputs per agent. To estimate the memory need of a 1000 agent, 100 object INM installation. Agent size 1000 x ( (16000 * 2)) = 31.4 mb Object size = 100 * 300 = = 29.9 kb INM executable = 11.5 mb Total memory consumption 31.4 mb mb kb = 42.9 mb This is the minimum memory consumption after 12 hours execution time, this value does not include error logs and other parameters. A good rule of thumb is to double the amount of memory indicated by this calculation.

30 22 Intellipool Network Monitor 2.0 User's Guide Installation check list Make a estimation of the number of objects and agents INM will monitor and using the numbers provided in the "Memory usage" section, calculate the estimated memory usage of INM. Check that the host machine has enough free memory to run INM. Make an port usage assessment and make necessary changes in firewalls and routers to make it possible for INM to test external devices Check that the host machine meets the software and hardware requirements Make sure that a Windows account that have the right privileges has been created and tested If Net send is going to be used, check that the "messenger" service is started. If SNMP will be used, install and start the Windows SNMP service on the INM host machine If ODBC logging will be used, create a ODBC system data source on the INM host machine. Make sure that no antivirus program is interfering with INM disk I/O operations and network communication. If a software firewall is installed on the INM host machine make sure it does not interfere with incoming or outgoing network communication Check that no other service is using port 8080, if so, change the port number in the init.cfg file after installation and restart INM. If a GSM phone will be used, install it and verify that it is responding correctly with a terminal program If a TempTrax Model F thermometer will be used, install it and verify that it is responding correctly with a terminal program Install Intellipool Network Monitor Assign the Windows account to INM in the service property page and restart the service

Intellipool Network Monitor 3.0 2006 Intellipool AB

Intellipool Network Monitor 3.0 2006 Intellipool AB Intellipool Network Monitor 3.0 Intellipool Network Monitor All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying,

More information

Kaseya 2. User Guide. for Network Monitor 4.1

Kaseya 2. User Guide. for Network Monitor 4.1 Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 Syslog Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

Error and Confirmation Codes

Error and Confirmation Codes Error and Confirmation s The following two tables list the error and confirmation codes that can be returned within SMS replies or notifications. Table 14: Error s 8 008 10 00A 21 015 27 01B 28 01C 29

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

Studio 5.0 User s Guide

Studio 5.0 User s Guide Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

User and Installation Manual

User and Installation Manual PowerNETGuard User and Installation Manual 0MNSWK007ENUE SUPPORT AND LIABILITY STATEMENT The manufacturer does not accept liability for loss of data, productivity, equipment or any other associated damage

More information

DME-N Network Driver Installation Guide for LS9

DME-N Network Driver Installation Guide for LS9 DME-N Network Driver Installation Guide for LS9 ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED

More information

Features Overview Guide About new features in WhatsUp Gold v12

Features Overview Guide About new features in WhatsUp Gold v12 Features Overview Guide About new features in WhatsUp Gold v12 Contents CHAPTER 1 Learning about new features in Ipswitch WhatsUp Gold v12 Welcome to WhatsUp Gold... 1 What's new in WhatsUp Gold v12...

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

PRINT FLEET MANAGER USER MANUAL

PRINT FLEET MANAGER USER MANUAL PRINT FLEET MANAGER USER MANUAL 1 Disclaimer of warranties and limitation of liabilities ( YES ) reserves all rights in the program as delivered. The program or any portion thereof may not be reproduced

More information

Sage ERP Accpac Online

Sage ERP Accpac Online Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac

More information

Embarcadero Performance Center 2.7 Installation Guide

Embarcadero Performance Center 2.7 Installation Guide Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.

More information

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1 Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....

More information

Oracle Enterprise Manager

Oracle Enterprise Manager Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory Release 12.1.0.1.0 E28548-04 February 2014 Microsoft Active Directory, which is included with Microsoft

More information

Oracle Enterprise Manager

Oracle Enterprise Manager Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Internet Information Services Release 12.1.0.2.0 E28547-05 February 2014 This document provides a brief description

More information

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage. Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Administrator Operations Guide

Administrator Operations Guide Administrator Operations Guide 1 What You Can Do with Remote Communication Gate S 2 Login and Logout 3 Settings 4 Printer Management 5 Log Management 6 Firmware Management 7 Installation Support 8 Maintenance

More information

MFPConnect Monitoring. Monitoring with IPCheck Server Monitor. Integration Manual Version 2.05.00 Edition 1

MFPConnect Monitoring. Monitoring with IPCheck Server Monitor. Integration Manual Version 2.05.00 Edition 1 MFPConnect Monitoring Monitoring with IPCheck Server Monitor Integration Manual Version 2.05.00 Edition 1 TABLE OF CONTENTS 1. INTRODUCTION...3 2. REQUIREMENTS...4 3. RESTRICTIONS...5 4. INSTALLATION...6

More information

Overview of ServerView Windows Agent This chapter explains overview of ServerView Windows Agent, and system requirements.

Overview of ServerView Windows Agent This chapter explains overview of ServerView Windows Agent, and system requirements. ServerView User s Guide (For Windows Agent) Areas Covered - Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview of ServerView

More information

Imaging License Server User Guide

Imaging License Server User Guide IMAGING LICENSE SERVER USER GUIDE Imaging License Server User Guide PerkinElmer Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

NetBrain Discovery Appliance Manual

NetBrain Discovery Appliance Manual NetBrain Discovery Appliance Manual NetBrain Technologies, Inc. 2009-07-20-1 - Table of Contents 1. Overview... 4 2. Installation... 5 2.1 Installation Software... 5 2.1.1 Install ActivePerl... 5 2.1.2

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Intel Device View. User Guide

Intel Device View. User Guide Intel Device View User Guide Year 2000 Capable An Intel product, when used in accordance with its associated documentation, is Year 2000 Capable when, upon installation, it accurately stores, displays,

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Remote Console Installation & Setup Guide. November 2009

Remote Console Installation & Setup Guide. November 2009 Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

Intellipool Network Monitor 3.3 2007 Intellipool AB

Intellipool Network Monitor 3.3 2007 Intellipool AB Intellipool Network Monitor 3.3 2007 Intellipool AB Intellipool Network Monitor 2007 Intellipool AB All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic,

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

CentreWare Internet Services Setup and User Guide. Version 2.0

CentreWare Internet Services Setup and User Guide. Version 2.0 CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS

FileMaker Server 7. Administrator s Guide. For Windows and Mac OS FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark

More information

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3 Wavelink Avalanche Mobility Center Java Console User Guide Version 5.3 Revised 17/04/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,

More information

Installation and Deployment

Installation and Deployment Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats

More information

Pre-Installation Instructions

Pre-Installation Instructions Agile Product Lifecycle Management PLM Mobile Release Notes Release 2.0 E49504-02 October 2014 These Release Notes provide technical information about Oracle Product Lifecycle Management (PLM) Mobile 2.0.

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

Remote Management System

Remote Management System RMS Copyright and Distribution Notice November 2009 Copyright 2009 ARTROMICK International, Inc. ALL RIGHTS RESERVED. Published 2009. Printed in the United States of America WARNING: ANY UNAUTHORIZED

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Ipswitch WS_FTP Server

Ipswitch WS_FTP Server Ipswitch WS_FTP Server User s Guide Software Version 5.0 Ipswitch, Inc Ipswitch Inc. Web: http://www.ipswitch.com 10 Maguire Road Phone: 781.676.5700 Lexington, MA Fax: 781.676.5710 02421 Copyrights The

More information

Broadband Router ESG-103. User s Guide

Broadband Router ESG-103. User s Guide Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide 026-1010 Rev 7 06-OCT-2011 Site Manager Installation Guide Retail Solutions 3240 Town Point Drive NW, Suite 100 Kennesaw, GA 30144, USA Phone: 770-425-2724 Fax: 770-425-9319 Table of Contents 1 SERVER

More information

Avalanche Remote Control User Guide. Version 4.1.3

Avalanche Remote Control User Guide. Version 4.1.3 Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.

Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup. Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

Reporting for Contact Center Setup and Operations Guide. BCM Contact Center

Reporting for Contact Center Setup and Operations Guide. BCM Contact Center Reporting for Contact Center Setup and Operations Guide BCM Contact Center Document Number: NN40040-302 Document Status: Standard Document Version: 04.00 Part Code: N0060637 Date: June 2006 Copyright 2005

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

CA Spectrum and CA Service Desk

CA Spectrum and CA Service Desk CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

OfficeServ Link. User Guide. Version 2.1 June 2005

OfficeServ Link. User Guide. Version 2.1 June 2005 OfficeServ Link User Guide Version 2.1 June 2005 OfficeServ Link Version 2.1 User Guide This manual should be read before the installation and operation of the OfficeServ Link Software. COPYRIGHT This

More information

Network Monitoring User Guide

Network Monitoring User Guide Network Monitoring User Guide 2007 Belkin Corporation. All rights reserved. F1DUXXX All trade names are registered trademarks of respective manufacturers listed. Table of Contents Pulse TM Overview 1 Pulse

More information

Crystal Reports Installation Guide

Crystal Reports Installation Guide Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks

More information

PMOD Installation on Windows Systems

PMOD Installation on Windows Systems User's Guide PMOD Installation on Windows Systems Version 3.7 PMOD Technologies Windows Installation The installation for all types of PMOD systems starts with the software extraction from the installation

More information

WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide

WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide WEB CONFIGURATION Configuring and monitoring your VIP-101T from web browser The VIP-101T integrates a web-based graphical user interface that can cover most configurations and machine status monitoring.

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

TOPS Internet Backup Service User Guide

TOPS Internet Backup Service User Guide TOPS Internet Backup Service User Guide By TOPS Software, LLC Clearwater, Florida Document History Version Edition Date Document Software Trademark Copyright First Edition 09 2006 TOPS IBF AA 3.2.1 The

More information

Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix

Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Standard Setup Guide 1 2 3 4 5 Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Read this manual carefully before you use this product and keep it

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D

DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY

More information

Upgrading from Call Center Reporting to Reporting for Call Center

Upgrading from Call Center Reporting to Reporting for Call Center Upgrading from Call Center Reporting to Reporting for Call Center www.nortelnetworks.com 2003 Nortel Networks i Table of Contents Table of Contents Change History...1 How to use this guide...2 Introduction...

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Volume SYSLOG JUNCTION. User s Guide. User s Guide Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Upgrading from Call Center Reporting to Reporting for Contact Center. BCM Contact Center

Upgrading from Call Center Reporting to Reporting for Contact Center. BCM Contact Center Upgrading from Call Center Reporting to Reporting for Contact Center BCM Contact Center Document Number: NN40010-400 Document Status: Standard Document Version: 02.00 Date: June 2006 Copyright Nortel Networks

More information

This document is intended to make you familiar with the ServersCheck Monitoring Appliance

This document is intended to make you familiar with the ServersCheck Monitoring Appliance ServersCheck Monitoring Appliance Quick Overview This document is intended to make you familiar with the ServersCheck Monitoring Appliance Although it is possible, we highly recommend not to install other

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information