ScriptLogic Enterprise Security Reporter. VERSION 3 Reporting Guide

Size: px
Start display at page:

Download "ScriptLogic Enterprise Security Reporter. VERSION 3 Reporting Guide"

Transcription

1 I ScriptLogic Enterprise Security Reporter VERSION 3 Reporting Guide

2 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE I Copyright 2011 by ScriptLogic Corporation All rights reserved. This publication is protected by copyright and all rights are reserved by ScriptLogic Corporation. It may not, in whole or part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or computer readable form without prior consent, in writing, from ScriptLogic Corporation. This publication supports Enterprise Security Reporter 3.x. It is possible that it may contain technical or typographical errors. ScriptLogic Corporation provides this publication as is, without warranty of any kind, either expressed or implied. ScriptLogic Corporation 6000 Broken Sound Parkway NW Boca Raton, Florida Trademark Acknowledgements: Enterprise Security Reporter is a registered trademark of ScriptLogic Corporation in the United States and/or other countries. Microsoft Windows, Windows NT, and Microsoft SQL Server are registered trademarks of Microsoft Corporation.

3 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE II DOCUMENTATION CONVENTIONS Typeface Conventions Bold Indicates a button, menu selection, tab, dialog box title, text to type, selections from drop-down lists, or prompts on a dialog box. CONTACTING SCRIPTLOGIC ScriptLogic may be contacted about any questions, problems or concerns you might have at: ScriptLogic Corporation 6000 Broken Sound Parkway NW Boca Raton, Florida Sales and General Inquiries Technical Support Fax SCRIPTLOGIC ON THE WEB ScriptLogic can be found on the web at Our web site offers customers a variety of information: Download product updates, patches and/or evaluation products. Locate product information and technical details. Find out about Product Pricing. Search the Knowledge Base for Technical Notes containing an extensive collection of technical articles, troubleshooting tips and white papers. Search Frequently Asked Questions, for the answers to the most common nontechnical issues. Participate in Discussion Forums to discuss problems or ideas with other users and ScriptLogic representatives.

4 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE III Contents INTRODUCTION...1 REPORTING CONSOLE...2 STARTING THE REPORTING CONSOLE...2 EXAMINING THE REPORTING CONSOLE...3 File Menu...4 View Menu...4 Options Menu...4 Help Menu...5 Toolbar...5 Status Bar...5 CONFIGURING THE REPORTING CONSOLE...6 Configuring Database Settings...6 Configuring Group Membership Subreports...7 Adding a Watermark...9 OPTIONAL REGISTRY SETTINGS...10 REPORTS...11 RUNNING A REPORT...11 EXPORTING REPORTS...16 EXPORTING REPORT RESULTS ING REPORTS...19 DEFINING CATEGORIES...20 CREATING A NEW REPORT...21 MANAGING REPORTS...31 Exporting Report Definitions...31 Importing Report Definitions...32 Editing a Report...35 VIEWING DISCOVERY LOGS...35 SCHEDULING A REPORT...37 USING THE COMMAND LINE UTILITY: ESRREPORT.EXE...41 AD-HOC QUERY BUILDER...42 BUILDING A QUERY...42 VIEWING RESULTS...48 Grouping Results...49 Exporting Results...49 Printing Results...50 CREATING REPORTS...50 SAVING A QUERY...50 SCHEDULING A QUERY...50 REPORT DESIGNER...51 EXAMINING THE REPORT DESIGNER...52 File Menu...52 Edit Menu...53 Report Menu...53 Edit Toolbar...54 Layout Toolbar...54 Format Toolbar...56 Report Tools...57

5 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE IV Fields Toolbox...57 Report Contents Toolbox...58 Properties Toolbox...58 Appearance Behavior Data 61 Design Layout Misc Summary ADDING REPORT SECTIONS...64 Deleting Report Sections...65 Reordering Groups...65 ADDING CONTROLS...66 Moving Controls...66 Layering Controls...66 Formatting a Border...67 LOADING A REPORT LAYOUT...68 SETTING REPORT PRINT OPTIONS...68 Page Setup...69 Printer Settings...70 Styles...71 Global Settings...72 EXPORTING THE REPORT LAYOUT...73 GLOBAL REPORTS LIST...74 ALL DOMAIN ACCOUNT REPORTS...75 Domain Account SID Report Sorted by Account Name Domain Account SID Report Sorted by Account SID COMPLIANCE...75 HIPAA Compliance Reporting Administrative Safeguards (a)(1) Security Management (A) Risk Analysis Common Vulnerabilities Open Shares Everyone Full Control Trust Relationships By Domain Resource Identification All Computers in Domain Discovered Computer List Domain Controller Report Extended Domain User Information Full Group Membership Report by Domain Member Servers Printer by Computer Public Shares by Computer Show Members of All Local Groups (B) Risk Management Event Log Changes Event Log Configuration Report Password Older than N Days Sorted by Account Services with Domain Logon Accounts (a)(3) Workforce Security (A) Authorization and/or Supervision Authorization... 78

6 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE V Account Right Report Sorted by Computer, Right, Account All Permissions Under File or Folder All Permissions Under Share Folders & Files with Any Effective Permissions Full Group Membership Report by Domain Show Groups for Selected Members Show Members of All Local Groups Show Members of Local Administrator Groups Specific folders that do not inherit permissions, showing +, -, *, = difference (C) Termination Procedures Account Expiration Report By Expiration Date Full Group Membership Report by Domain Logon in Last N Days No Logon in Last N Days Password Changed in Last N Days Sorted By Account (a)(4) Information Access Management (B) Access Authorization Account Right Report Sorted by Account, Right, Computer Account Right Report Sorted by Computer, Right, Account All Permissions Under File or Folder All Permissions Under Share Domain Users with Administrative Rights Full Group Membership Report by Domain Show Groups for Selected Members Show Members for All Local Groups Specific Folders that do not inherit permission, showing +, -, *, = differences (a)(5) Security Awareness Training (D) Password Management Expired Passwords Passwords Changed in Last N Days Sorted by Date Passwords Older than N Days Sorted by Date Technical Safeguards (a)(1) Access Control (i) Unique User Identification Extended Domain User Information Full Group Membership Report By Domain PCI Compliance Reporting...85 Build and Maintain a Secure Network Requirement 2 Do not use vendor-supplied defaults for system passwords and other security parameters Change vendor-supplied defaults Password Changed in Last N Days Sorted by Account Password Changed in Last N Days Sorted by Date Develop configuration standards for all system components Implement only one primary function per server Selected Services by Computer Services by Computer Disable all unnecessary and insecure services and protocols Selected Services by Computer Service Permissions by Computer Services by Computer Services with Domain Logon Accounts Configure system security parameters to prevent misuse... 87

7 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE VI Computer Policy Report Implementing Strong Access Control Measures Requirement 7 Restrict access to cardholder data by business need to know Limit access to computing resources and cardholder information only to those individuals whose job requires such access Restriction of access rights to privileged user IDs to least privileges necessary to perform job responsibilities Folders & Files with Any Effective Permissions Folders & Files with Any Effective Permissions, under Selected File or Folder SharePoint Effective Permissions Report SQL - Effective Database Object Permissions Report All Folder Permissions Report All Permissions Report All Permissions Under File or Folder All Permissions Under Share SharePoint All List and Folder Permissions On Site SharePoint All Permissions On Site SQL Database Object Permissions Report SQL Permissions for Selected Database Objects Limit access to computing resources and cardholder information only to those individuals whose job requires such access Assignment of privileges is based on individual personnel s job classification and function From a user perspective, these reports will show all groups that contain the user as a member Show Groups for All Members By Domain Show Groups for Selected Members SQL Effective Database Role Membership Report SQL Effective Server Role Membership Report These reports highlight where a user is granted direct access, not through group membership All Folder Permissions for Account All Permissions for Account SharePoint All List and Folder Permissions for Account SharePoint All Permissions for Account SQL Effective Database Object Permissions Report Requirement 8 Assign a unique ID to each person with computer access Ensure proper user authentication and password management for non-consumer users and administrators, on all system components Control addition, deletion, and modification of user IDs, credentials, and other identifier objects 92 Folders & Files with Any Effective Permissions Folders & Files with Any Effective Permissions, under Selected File or Folder SharePoint Effective Permissions Report SQL Effective Database Object Permissions Report Require a minimum password length of at least seven characters Computer Policy Report Use passwords containing both numeric and alphabetic characters Computer Policy Report Do not allow individuals to submit a new password that is the same as any of the last four passwords they have used Computer Policy Report Limit repeated access attempts by locking out the user ID after not more than six attempts Computer Policy Report Set first-time passwords to a unique value for each user and change immediately after the first use 94

8 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE VII Password Change Not Allowed Immediately revoke access to any terminated users Disabled Domain User Accounts Folders & Files with Any Effective Permissions Folders & Files with Any Effective Permissions under Selected File or Folder No Logon in Last N Days No Logon Since Specific Date SharePoint Effective Permissions Report SQL Effective Database Object Permissions Report Remove inactive user accounts at least every 90 days No Logon in Last N Days No Logon Since Specific Date Enable accounts used by vendors for remote maintenance only during the time period needed. 97 Extended Domain User Information Do not use group, shared, or generic accounts and passwords Disabled Domain User Accounts Non-Disabled Guest Accounts Non-renamed Administrator Accounts Non-renamed Guest Accounts Change user passwords at least every 90 days Password Never Expires Password Older than N Days Sorted by Account Password Older than N Days Sorted by Date Regularly Monitor and Test Networks Requirement 10 Track and monitor all access to network resources and cardholder data Secure Audit trails so they cannot be altered Limit viewing of audit trials to those with a job-related need All Permissions Under File or Folder SQL Database Object Permissions Report Protect audit trails from unauthorized modifications All Permissions Under File or Folder SQL Database Object Permissions Report SOX Compliance Reporting Corporate Responsibility for Financial Reporting (a)(5)(a) and (B) Deficiencies in Internal Controls Common Vulnerabilities Open Shares - Everyone Full Control Group Membership Full Group Membership Report By Domain Show Groups for Selected Members Show Members for Selected Groups Show Members of All Local Groups Management Assessment of Internal Controls Administrative Access Controls Domain Users with Administrative Rights Common Security Settings Event Log Changes Event Log Configuration Report Password Older than N Days Sorted by Date Computer Assessment Services by Computer Services with Domain Logon Accounts

9 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE VIII Data Access Control All Permissions Under File or Folder All Permissions Under Share Open Shares Everyone Full Control Specific folders that do not inherit permissions, showing +, -, *, = differences Domain Trusts Trust Relationships By Domain User Account Assessment Account Right Report Sorted by Computer, Right, Account No Logon in Last N Days COMPUTER REPORTS Computer Accounts Computer Password Change Report Discovered Computer List Domain Controller Report Hidden computers (from domain discovery) Hidden computers (from local computer discovery) Member Servers Computer IP Addresses Computers with specific IP addresses Sorted by Computer Name Computers with specific IP addresses Sorted by IP Address Computer Polices Account Right Report Sorted by Account, Right, Computer Account Right Report Sorted by Computer, Right, Account Computer Policy Report Event Logs Event Log Configuration Report Files Duplicate Files Report Files Created in Date Range Sorted By Date Created Files Created in Date Range Sorted By Path Files Created in Last N Days Sorted By Date Created Files Created in Last N Days Sorted By Path Files Larger than a Specific Size Files Last Accessed In Date Range Sorted By Date Last Accessed Files Last Accessed in Date Range Sorted by Path Files Last Accessed in Last N Days Sorted by Date Last Accessed Files Last Accessed in Last N Days Sorted by Path Files Modified in Date Range Sorted by Date Modified Files Modified in Date Range Sorted by Path Files Modified in Last N Days Sorted by Date Modified Files Modified in Last N Days Sorted by Path Files with Specific Extensions Folders Folder Size Report Sorted by Path Folder Size Report Sorted by Size Folders Created in Date Range Sorted By Date Created Folders Created in Date Range Sorted By Path Folders Created in Last N Days Sorted By Date Created Folders Created in Last N Days Sorted By Path Folders Modified in Date Range Sorted By Date Created Folders Modified in Date Range Sorted By Path

10 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE IX Folders Modified in Last N Days Sorted By Date Created Folders Modified in Last N Days Sorted By Path Local Accounts Local Account SID Report Sorted by Account Name Local Account SID Report Sorted by Account SID Ownership All Files and Folders by Owner All Files and Folders Under Folder by Owner Files and Folders by Owner Files and Folders Under Folder by Owner Permissions Everyone Group Permissions Report Permissions on Computer Report Protected Security Descriptor Report Unique User Permissions Under Folder All Permissions Explicit and Inherited All Folder Permissions for Account All Folder Permissions Report All Permissions for Account All Permissions for all Domain User Accounts All Permissions Report All Permissions Under File or Folder All Permissions Under Share Denied Permissions Denied Permissions Report Sorted by Account Denied Permissions Report Sorted by Path Differences between Parent and Child Folders Folders on computer that do not inherit permissions, showing +, -, *, and = differences Folders on computer that do not inherit permissions, showing +, - and * differences Folder under specific shares that do not inherit permissions, showing +, - and * differences Folders under specific shares that do not inherit permissions, showing +. -, *, and = differences Specific Folders that do not inherit permissions, showing +, - and * differences Specific Folders that do not inherit permissions, showing +, -, *, and = differences Explicit Permissions Explicit Folder Permissions for Account Explicit Folder Permissions Report Explicit Permissions for Account Explicit Permissions for all Domain User Accounts Explicit Permissions Report Explicit Permissions Under File or Folder Explicit Permissions Under Share Files & Folders with Permissions for Selected Accounts Account, or group it is a member of, has explicit or inherited permissions Folders & Files with Any Effective Permissions Folders & Files with Any Effective Permissions, under Selected File or Folder Folders with Any Effective Permissions Account, or group it is a member of, has explicit permissions Folders & Files with Explicit Effective Permissions Folders & Files with Explicit Effective Permissions under a Selected Folder or File Folders with Explicit Effective Permissions No Effective Permissions Groups with No Effective NTFS Access Report

11 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE X Groups with No Effective NTFS Access Report (By Computer) Printers Printer By Computer Printer Permission By Computer Services Selected Services by Computer Service Permissions by Computer Services by Computer Services with Domain Logon Accounts Shares Administrative Shares by Computer Computers with No Public Shares Effective Share Permission Report Hidden Shares By Computer Open Shares Everyone Any Access Open Shares Everyone Full Control Public Shares by Computer Share Permissions by Computer Volumes Volumes by Computer DELTAS SNAPSHOT COMPARISON REPORTS Account Changes Consolidated Change Report Event Log Changes Folder & File Changes Group Membership Changes NTFS Permission Changes Service Changes Share Changes Share Permissions Changes SQL Change Report DISCOVERY REPORTS Discovery Errors for Computer or Domain Discovery Errors Report Discovery Group Configuration Discovery Job Log Report DOMAIN REPORTS All Computers in Domain Domain Controller Report Hidden Computers (from domain discovery) Trust Relationships By Domain GROUP MEMBERSHIP REPORTS Domain Groups Domain Groups that are members of local Administrators groups Domain Groups with Unknown Members Empty Domain Groups Full Group Membership Report by Domain Show Groups for All Members By Domain Show Groups for Selected Members Show Members for Selected Groups Local Groups Empty Local Groups

12 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE XI Local Groups with Unknown Members Show Groups for Selected Members Show Members for Selected Groups Show Members of All Local Groups Show Members of Local Administrator Groups SHAREPOINT Documents and Libraries SharePoint - All Documents By Author SharePoint - Documents Created in Date Range Sorted by Date Created SharePoint - Documents Created in Data Range Sorted by Path SharePoint - Documents Created in Last N Days Sorted by Date Created SharePoint - Documents Created in Last N Days Sorted by Path SharePoint - Documents Modified in Date Range Sorted by Date Modified SharePoint - Documents Modified in Date Range Sorted by Path SharePoint - Documents Modified in Last N Days Sorted by Date Modified SharePoint - Documents Modified in Last N Days Sorted by Path SharePoint - Site Document Report Groups and Users SharePoint - Group Membership Report Permissions SharePoint - Permission Level Report All Permissions SharePoint - All List and Folder Permissions for Account SharePoint - All List and Folder Permissions On Site SharePoint - All Permissions for Account SharePoint - All Permissions for All Domain User Accounts SharePoint - All Permissions on Site SharePoint - All Permissions on Site Except Builtin Groups Effective Permissions SharePoint - Effective Permissions Report Explicit Permissions SharePoint - Explicit List and Folder Permissions for Account SharePoint - Explicit List and Folder Permissions On Site SharePoint - Explicit Permissions For Account SharePoint - Explicit Permissions for All Domain User Accounts SharePoint - Explicit Permissions On Site SharePoint - Explicit Permissions On Site Except Builtin Groups Sites and Webs SharePoint - Site Report SQL SERVER REPORTS Database Reports SQL - Database Listing Report SQL - Database Object Report Permission Report SQL - Database Object Permissions Report SQL - Database Schema Permissions Report SQL - Effective Database Object Permissions Report SQL - Permissions for Selected Database Objects Role and User Reports SQL - Database Role Membership Report SQL - Database User Report SQL - Effective Database Role Membership Report

13 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE XII SQL - Effective Server Role Membership Report SQL - Server Login Report SQL - Server Role Membership Report USER REPORTS Domain Users Account Creation Date Account Expiration Report By Account Account Expiration Report By Expiration Date Disabled Domain User Accounts Domain Users with Administrative Rights Extended Domain User Information Local Admin Access Report Locked Domain User Accounts Logon in Last N Days Logon Since Specific Date No Logon in Last N Days No Logon Since Specific Date Password Reports Expired Passwords Password Change Allowed Password Change Not Allowed Password Changed in Last N Days Sorted By Account Password Changed in Last N Days Sorted By Date Password Expiration Report (Sorted By Account) Password Expiration Report (Sorted by Expiration Date) Password Never Expires Password Older than N Days Sorted by Account Password Older than N Days Sorted by Date Local Users Disabled Guest Accounts Non-Disabled Guest Accounts Non-Renamed Administrator Accounts Non-Renamed Guest Accounts Renamed Administrator Accounts Renamed Guest Accounts REPORT TYPES AND TABLES Domain Reports Domain Account Reports Domain Computer Reports Domain Controller Reports Domain OU Reports Domain Site Reports Domain Trust Reports Computer Reports Computer Account Reports File Reports Files Under Folder Reports Folder Reports Folder Under Folder Reports Effective Folder Permission Reports Folder & File Permission Reports Permissions Under Folder Reports Effective Permissions Under Folder Reports...159

14 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE XIII Permissions Under Share Reports Delta Permissions Under Share Reports Folder & File Delta Permissions Reports Folder & File Delta Permissions Under Folder Reports Folder & File Ownership Reports Folder & File Ownership Under Folder Reports Share Reports Share Permission Reports SharePoint Permission Level Reports SharePoint Site Reports SharePoint Node Reports SharePoint Node Permission Reports SharePoint Group Membership Reports Effective SharePoint Permission Reports SQL Server Reports SQL Server Login Reports SQL Server Role Reports SQL Server Role Member Reports SQL Database Reports SQL Database Object Reports SQL Database Object Permission Reports SQL Database Role Reports SQL Database Role Member Reports SQL Database Schema Reports SQL Database Schema Permission Reports SQL Database User Reports Volume Reports Service Reports Service Permission Reports Printer Reports Printer Permission Reports Registry Key Reports Registry Value Reports Event Log Reports Local Account Right Reports Local Computer Policy Reports Computer Address Reports Domain User Reports Local User Reports All User Reports Domain Group Member Reports Local Group Member Reports All Group Member Reports Discovery Delta Reports Discovery Configuration Reports Discovery Job Reports Discovery Job Error Reports Discovery Job Log Reports TROUBLESHOOTING INDEX...175

15 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 1 Introduction Enterprise Security Reporter is an agent less, fast, comprehensive discovery and reporting solution for analyzing file security, group memberships and other security settings on Windows file servers, Active Directory servers, SharePoint servers, and SQL Servers. Enterprise Security Reporter provides the administrator with tools to compare, analyze, query and report on the security and configuration of the network. Enterprise Security Reporter includes numerous ready made and customizable reports, with output in eight popular file formats.

16 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 2 Reporting Console Enterprise Security Reporter comes with a wide array of built in reports and queries to help you understand the security on your network. These reports and queries were developed in conjunction with many of our customers, and are designed to meet real world needs. In addition to these standard reports, you can create custom reports, which help to form the backbone of security analysis in a Microsoft Windows Network environment. STARTING THE REPORTING CONSOLE The Reporting Console is provided as a separate module to make it easier to distribute to end users who need only the reporting capabilities. Click Start, point to Programs ScriptLogic Corporation Enterprise Security Reporter 3, and then select Reporting Console. From the Discovery Console, click Tools menu., or choose Open reporting console from the

17 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 3 EXAMINING THE REPORTING CONSOLE After starting the Reporting Console, you see the main application window where you can run reports and create custom reports. The Enterprise Security Reporter Reporting Console main window opens to the list of Recent Reports, which on initial installation will be empty. As you run reports, this list will grow. Enterprise Security Reporter comes with several reports that are located in the Global Reports category. If you select a report, a description and the report parameters display in the lower pane. For a complete list of reports, see Global Reports List.

18 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 4 File Menu Option Import Report Export Report Open Scheduled Report File Exit Description Load an ESR Report Definitions (*.xrd) file into the Reporting Console. See Defining Categories. Save report definitions to an ESR Report Definitions (*.xrd) file. See Exporting Report Definitions. Load a command configuration (*.xrc) file for editing or scheduling. See Scheduling a Report. Close Reporting Console. View Menu Option Recent Reports Global Reports Local Reports Description Display recent reports in the top right pane. Display list of reports available to an organization. Display list of reports stored locally on a specific computer available only to the user of that computer. Options Menu Option Synchronize Reports Settings Description Overwrites Global Reports with the current version of each report located in the Program Files\ScriptLogic Corporation\ESR3\ Discovery Console\Database\Reports folder. Customize the Reporting Console. See Configuring the Reporting Console.

19 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 5 Help Menu Option Contents About ESR3: Reporting Console Description Displays online help. View information about the version of Enterprise Security Explorer Reporting Console installed on your computer, to apply a license file, or to visit the ScriptLogic website. Toolbar The buttons in the Report Explorer group are used to organize reports. The buttons in the Report Manager group are used to create new reports and manage the Reporting Console. You can open and close the list by clicking and respectively. You also can customize the toolbar. See Error! Reference source not found.. Button Description View and run reports that you ran most recently. View and run global reports that are available within your organization. These reports are stored in the Program Files\ScriptLogic Corporation\ESR3\Discovery Console\ Database\Reports folder. View and run reports that you have created or modified locally based on your specific needs. Build an ad-hoc query to select specific data items for a custom report. See Building a Query. Create a new report. See Creating a New Report. Manage the categories used to organize reports. See Importing Report Definitions. Browse Discovery Logs to find detailed information about discoveries that have been run. See Viewing Discovery Logs. Configure the Reporting Console. See Configuring the Reporting Console. Status Bar The status bar displays the discovery and report database connection.

20 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 6 CONFIGURING THE REPORTING CONSOLE Since the reporting console often is used by people who are not involved in the discovery process, we have made it very easy to distribute the reporting console to end users and have it pull the configuration data from a master server. All you need to do is configure one server with the reporting console, and then configure each user s reporting console to pull its configuration data from that master server. From the Reporting Console main window, click User Settings. Alternatively, select Settings from the Options menu. The Report Console Settings box opens to Database Settings. Configuring Database Settings On each computer where the Reporting Console resides, you must set the discovery server, and the discovery and reporting database. You also can adjust the amount of time before the computer times out trying to access the databases.

21 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 7 Configuring Group Membership Subreports Some computer permission reports have the option to include a Group Membership Subreport. For these Group Membership Reports, you can select fields to include in every report, exclude specific group members from the report, and edit a report template. Selecting Fields On the Select Fields tab, select fields that you want to include on every Group Membership Subreport.

22 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 8 Excluding Group Members To exclude groups from the report, open the Exclude Group Members tab, select a group, and then click. Editing Subreport Layouts To edit a subreport layout, select the type of report to edit, click Browse to select a subreport layout, and then click Designer. See the Report Designer chapter.

23 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 9 Adding a Watermark You can add a watermark to appear on each report. When you load an image from any location, a copy will be stored in the ScriptLogic Corporation\ESR3\Reporting Console\Watermarks folder.

24 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 10 OPTIONAL REGISTRY SETTINGS There are a few settings you can add to the registry on a user s computer to configure the Report Console. HKEY_CURRENT_USER\SOFTWARE\ScriptLogic Corporation\Enterprise Security Reporter\v3\ReportExecutingSettings RenderWarningPageCount When a report reaches 10,000 pages, report generation pauses and a message displays asking the user to continue or not. You can suppress this message by setting this value to 1. CacheRowLimit (default value is 50,000) Determines the number of rows that a data set must contain in order to cause the report to be cached to disk. Disk caching is slower, and therefore should not be used unless the report is very large. RenderMaxVirtualMemorySize (default value is 1,536,000,000) (or 1.5GB) Sets the amount of memory that may be consumed by the report before rendering is automatically stopped. Some reports can get beyond a size that can fit in memory, even when using disk caching. If the computer runs out of virtual memory, it will cause unpredictable behavior, therefore, by default, rendering stops once 1.5GB of memory is consumed. If the report will not render in 1.5GB of memory, then you can increase this value or modify the report design to remove graphical elements, such as the ScriptLogic icon in the page footers. MaxGridMemorySize (default value is ) (or 500MB) Sets the maximum amount of virtual memory that the results grid is allowed to consume. Although the data grid may not be allowed to display all rows (because it does not support a disk caching mechanism), the full dataset is still available via the export option on that grid. The full dataset can be exported to a CSV or XML file. MaxGridRowCount (default value is 1000 rows) Sets the number of rows that the grid can display. If this number is very large, the MaxGridMemorySize value limits the amount of data displayed. TempFolder (default value is C:\Documents and Settings\userID\Local Settings\Temp\) Designate the folder for generation of.xml report file. Type the full path to the folder.

25 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 11 Reports RUNNING A REPORT 1. From the Reporting Console, select a report to run from the Recent Reports, Global Reports, or Local Reports groups. Point the cursor at a report name to view a brief description. When you select a report, the bottom pane displays a description of the report and the report parameters. This report has three required parameters and three hidden parameters.

26 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE Double click the name of the report; or right click the report name, and then select Run Report. If the report has parameters to enter, the first box lists the parameters in the left pane. The name of the parameter displays at the top of the box. Next to the name, either (Required) or (Optional) displays to indicate whether entry is required or optional. There are several different types of parameter entry options depending on the report. Note: If you use the * wildcard for a parameter, % displays instead. Example 1 In this example, you first select how you want to enter the data. Computer Name is selected, so you would either type a computer name or select one from the dropdown list. To add the entry, click. To remove a selected entry from the list, click.

27 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 13 Example 2 In this example, you select a discovery item from the drop down list. Note: You can configure the Group Membership Subreports. See Configuring Group Membership Subreports. 3. Select the parameter. If there are more parameters, Next stays available. Click Next to enter the next parameter. 4. Click Finish. The report runs. Note: If you need to stop the report generation, click. After the report finishes executing, the Print Preview window appears where you can print the report, view a table of contents, search for an item in the report, export the report, and view the query used to produce the report. Note: If your report does not return any data, there could be several possibilities: a discovery was not done on the selected domain or computer, the reporting data is not included in the current discovery, one or more selected parameters was incorrect, or there is no data to be found. Open the Discovery Console and check the current discovery. Try running the report again.

28 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 14 Toolbar Item Description Stops report generation. Opens the Export Wizard. See Exporting Reports. Send the report as a PDF attachment to selected recipients. See ing Reports. Opens a Contents pane to the left of the report. If the report groups data, such as by computer or account, you can quickly jump to a particular item by clicking the name in the Contents pane. Opens the Print dialog box. You can change printer properties and output settings before printing the report. Not applicable Opens the Find dialog box. In the Find What box, type the text to find, and then click Find Next. Displays one page at a time. Displays multiple pages at a time. Display continuous pages. Zooms in or out. You also can select a zoom percentage from the list. Switches pages in the report. You also can type a page number in the box, and then press Enter. To view the results in table format, open the Results tab. Note: Only the first 1,000 results display. If you export the report, all results are included in the file.

29 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 15 To view the results in XML format, open the XML Results tab. To view the query behind the report, open the Query tab.

30 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 16 EXPORTING REPORTS You can export a report to another format, such as a PDF file for attaching to an or a TIFF file for including in a slide presentation. 1. From the Print Preview window, click. 2. If prompted, enter any report parameters. The Export Wizard opens. 3. From the Export Format list, select a format. The available options are HTML, PDF, RTF, Delimited Text, TIFF, and Microsoft Excel. 4. In the Export File box, type a path and name for the exported file, or click to locate a path for the file. 5. Click Next. Depending on the format you chose, the next box displays the default settings for that format. HTML (*.htm, *.html)

31 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 17 Portable Document Format (*.pdf) Rich Text Format (*.rtf) No options. Delimited Text (*.txt, *.cvs) Tagged Image File Format (*.tif)

32 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 18 Microsoft Excel (*.xls) 6. After selecting options for the export file, click Finish. EXPORTING REPORT RESULTS You can export report results to a text file for use in another application. 1. Open the Results tab, and then click. The Export Results box opens. 2. Click to choose a location and name the file. The full path displays in the Export File box. 3. From the File Delimiter list, choose a format. 4. Click Finish.

33 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 19 ING REPORTS You can a report to recipients. The report is sent as a PDF file attachment. 1. From the Print Preview window, click. The Report box opens with the report title displayed in the Subject box. 2. Complete the appropriate boxes, and then click Send.

34 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 20 DEFINING CATEGORIES Categories are provided with Enterprise Security Reporter to organize the standard reports that are included with the product. You might want to keep these standard reports separate from the custom reports that you create. Simply create a new category for your custom reports. You could also create a category for your favorite standard reports, and then copy and paste selected reports into that category for easy access. Under the Report Manager group, click Define Categories. The ESR3: Category Editor list displays the current categories. To manage the list, right click either the window or a category to display the shortcut menu. Menu Option Cut Copy Paste New Category Delete Category Description Cut the selected category to the Clipboard. Copy the selected category to the Clipboard. Paste a cut or copied category to the specified location. Create a new category beneath the selected category. To create a top level category, right-click a blank area in the window. Delete the selected category.

35 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 21 CREATING A NEW REPORT Although Enterprise Security Reporter ships with a wide variety of reports, we realize that you may need to modify the existing reports or add your own. The Report Composer wizard provides the means to create a new report or edit an existing report. Note: If you are interrupted during the process of creating a new report, click Finish to save the report. When you are ready to continue, right click the report, and then choose Edit Report. The Report Composer Wizard opens and you can continue creating the report. 1. Open the Report Composer Wizard. How you access the Report Composer Wizard determines where the report is stored. To create a new global report, click Global Reports, right click the group under which to store the report, and then choose New Report. Alternatively, select a group, and then press Insert. To create a new local report, click Local Reports, right click the group under which to store the report, and then choose New Report. Alternatively, select a group, and then press Insert. To create a new local report, click Define Reports in the Report Manager area. The Report Composer wizard opens to the Compose a New Report page. 2. From the Report Type list, choose a type of report. The report types are listed in alphabetical order. This table lists the types of reports in groups related by type. The report type defines the set of tables and columns that can be included in the report. Group Group Membership User Information Computer-Related Discovery-Related Report Type All Group Member Domain Group Member Local Group Member All User Domain User Local User Computer Computer Account Computer Address Discovery Configuration Discovery Delta Discovery Group Discovery Job Discovery Job Error Discovery Job Log

36 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 22 Group Domain-Related NTFS Permission-Related Computer Object SharePoint Report Type Domain Domain Account Domain Computer Domain Controller Domain OU Domain Site Domain Trust Effective Folder Permission Effective Permissions Under Folder Effective Printer Permission Effective Service Permission Effective Share Permission Folder & File Permission Folder & File Delta Permissions Folder & File Delta Permissions Under Folder Permissions Under Folder Permissions Under Share Delta Permissions Under Share Event Log File Files Under Folder Folder Folder Under Folder Folder & File Ownership Folder & File Ownership Under Folder Local Account Right Local Computer Policy Printer Printer Permission Registry Key Registry Value Service Service Permission Share Share Permission Volume SharePoint Group Membership SharePoint Node SharePoint Node Permission SharePoint Permission Level SharePoint Site

37 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 23 Group SQL Miscellaneous Report Type SQL Database SQL Database Object SQL Database Object Permission SQL Database Role SQL Database Role Member SQL Database Schema SQL Database Schema Permission SQL User SQL Server SQL Server Login SQL Server Role SQL Server Role Member Custom Note: Select custom only if you want to create the SQL query from scratch. 3. In the Report Name box, type a name for the report. 4. In the Description box, type a description of the report. You also can add an author and date for the report. The description, author, and date display in the lower right pane when the report is selected. 5. Click Next. The Report Categorization box displays the current categories. To keep your custom reports separate, make a new category. To create a new top level category, right click in a blank area of the box, and then select New Category. To create a sublevel category, right click a category, and then select New Category.

38 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 24 In this example, we created a Custom Reports top level category, and then created a subcategory for Accounting Reports. 6. Select the category under which to store the report, and then click Next. The Define Select List box displays the tables and columns available for the type of report you selected on the first page of the wizard. Note: If you do not see the table or column you want, you may need to change the report type. Click Back until you see the Compose a New Report box, and then change the Report Type.

39 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE Select the tables and columns to include in the report, and then click Next. The Report Sort Order list displays the tables and columns available for the report. 8. To add a column on which to sort, double click the name in the left pane. The column is added to the right pane. The report is sorted by the fields in the order they appear on this list. To manage the list, right click a name to display the shortcut menu. Shortcut Menu Option Toggle Sort Direction Move Up Move Down Delete Clear All Description Change the sort direction from Ascending (default) to Descending or vice versa. Move the selected field up the list. Move the selected field down the list. Delete the selected field from the list. Delete all fields from the list. 9. When you are finished creating the sort order for the report, click Next. The Report Parameters box appears.

40 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE Click Add. The Select Parameter list displays the parameters available based on the selections you made. If you select a parameter in the list, a description displays in the right pane. 11. Select the parameter to include in the report, and then click Next. The Parameters Detail box displays the settings specific for the parameter you chose. Note: The Parameters Details box is unique to each parameter. The box you see may not be the same as what is shown here.

41 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE After you configure the first parameter, click Finish. The Report Parameters list displays the settings you chose. Here you can add more parameters and manage the list of parameters for the report. The parameters are presented in the order displayed to the user running the report. Use Current Discovery By default, the current discovery is used to run the report. If you want to be able to select a discovery when running the report, clear the check box. Shortcut Menu Option Add Edit Remove Clear All Move Up Move Down Description Add another parameter to the report. Edit the selected parameter. Remove the selected parameter from the list. Remove all parameters from the list. Move the selected parameter up the list. Move the selected parameter down the list. 13. When the parameter list is set, click Next. The Report Query box displays the dynamic query built by Enterprise Security Reporter based on your selections.

42 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 28 Use Dynamic Report Generation By default, the query generated by Enterprise Security Report is used to create the report. Use Custom Query Select to edit the query. The box becomes available so you can make changes to the query generated by Enterprise Security Reporter. 14. Click Next. The Report Layout box appears. You can load an existing report layout, select a report layout from an existing report, or edit an existing report layout using the Active Report Designer. Load an existing report layout Click Browse. There are templates included with Enterprise Security Reporter. Select one of the existing templates or the new report layout you created with the Report Designer, and then click Open.

43 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 29 A message displays the report layout is loaded. To clear the layout and choose another, click Clear. Select a report layout from an existing report To select a layout from an existing report, click Browse. The Select Report list appears. Select a report, and then click OK. A message displays the report layout is loaded. To clear the layout and choose another, click Clear.

44 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 30 Edit existing report layout Click Designer. The Report Designer opens. Important: If you choose to edit an existing report layout, see the Report Designer chapter for guidance. When you finish editing the report layout, export the layout to an Active Report (*.rpx) file, and then load it as an existing report layout. 15. Click Next. The Report Title Parameter Display Formatting box lists the parameters you added. To add a title to the report, type a title in the Report Title box. Choose the Report Section and Display Control from the lists. To display the parameters, click and drag a parameter to the Report Parameter Display box. Choose the Report Section and Display Control from the lists. 16. Click Finish. The report appears under the group you chose.

45 ENTERPRISE SECURITY REPORTER 3 REPORTING GUIDE 31 MANAGING REPORTS The report definition and layout specifications are stored in an ESR Report Definitions (*.xrd) file. Enterprise Security Reporter provides several standard reports that you can import into your Local Reports area to use as the basis for creating a new report. You also can export a custom report that you created to the Global Reports area for use by others in your organization. Exporting Report Definitions If you created a custom local report, you can export the definition so others can benefit from using the report. The report definition is saved in an ESR Report Definitions (*.xrd) file. 1. Select the report to export, and then choose Export Report from the File menu. Alternatively, right click the report name, and then choose Export Report Definition. The Export list box opens to the Reports folder in the Enterprise Security Reporter installation directory for the Discovery Console. 2. If you want the report definitions file to be available in the Global Reports area, click Save. If you want to save the report definition file in another folder, change the path displayed in the Save In box before clicking Save.

ScriptLogic Enterprise Security Reporter. VERSION 3 Installation Guide

ScriptLogic Enterprise Security Reporter. VERSION 3 Installation Guide ScriptLogic Enterprise Security Reporter VERSION 3 Installation Guide ENTERPRISE SECURITY REPORTER 3 INSTALLATION GUIDE II Copyright 2011 by ScriptLogic Corporation All rights reserved. This publication

More information

ScriptLogic File System Auditor User Guide

ScriptLogic File System Auditor User Guide ScriptLogic File System Auditor User Guide FILE SYSTEM AUDITOR I 2005 by ScriptLogic Corporation All rights reserved. This publication is protected by copyright and all rights are reserved by ScriptLogic

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

ScriptLogic File System Auditor Agent Configuration Getting Started Guide

ScriptLogic File System Auditor Agent Configuration Getting Started Guide ScriptLogic File System Auditor Agent Configuration Getting Started Guide FILE SYSTEM AUDITOR II 2011 by ScriptLogic Corporation All rights reserved. This publication is protected by copyright and all

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Strategic Asset Tracking System User Guide

Strategic Asset Tracking System User Guide Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Results CRM 2012 User Manual

Results CRM 2012 User Manual Results CRM 2012 User Manual A Guide to Using Results CRM Standard, Results CRM Plus, & Results CRM Business Suite Table of Contents Installation Instructions... 1 Single User & Evaluation Installation

More information

Database Servers Tutorial

Database Servers Tutorial Copyright 1995-2010 Esri All rights reserved. Table of Contents A quick tour of the database servers tutorial........................ 3 Exercise 1: Add a database server to the Catalog tree and create

More information

Business Insight Report Authoring Getting Started Guide

Business Insight Report Authoring Getting Started Guide Business Insight Report Authoring Getting Started Guide Version: 6.6 Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software,

More information

ScriptLogic Active Administrator. VERSION 6 Installation Guide

ScriptLogic Active Administrator. VERSION 6 Installation Guide ScriptLogic Active Administrator VERSION 6 Installation Guide ACTIVE ADMINISTRATOR 6.0 INSTALLATION GUIDE II Copyright 2011 ScriptLogic Corporation. All Rights Reserved. This publication is protected by

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Contacting ScriptLogic Contacting ScriptLogic ScriptLogic may be contacted about any questions, problems or concerns you might have at: ScriptLogic Corporation 6000 Broken Sound Parkway

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Timeless Time and Expense Version 3.0. Copyright 1997-2009 MAG Softwrx, Inc.

Timeless Time and Expense Version 3.0. Copyright 1997-2009 MAG Softwrx, Inc. Timeless Time and Expense Version 3.0 Timeless Time and Expense All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

MODULE 2: SMARTLIST, REPORTS AND INQUIRIES

MODULE 2: SMARTLIST, REPORTS AND INQUIRIES MODULE 2: SMARTLIST, REPORTS AND INQUIRIES Module Overview SmartLists are used to access accounting data. Information, such as customer and vendor records can be accessed from key tables. The SmartList

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

Business Portal for Microsoft Dynamics GP 2010. User s Guide Release 5.1

Business Portal for Microsoft Dynamics GP 2010. User s Guide Release 5.1 Business Portal for Microsoft Dynamics GP 2010 User s Guide Release 5.1 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and

More information

Crystal Reports Payroll Exercise

Crystal Reports Payroll Exercise Crystal Reports Payroll Exercise Objective This document provides step-by-step instructions on how to build a basic report on Crystal Reports XI on the MUNIS System supported by MAISD. The exercise will

More information

USER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3]

USER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3] Pro-curo Software Ltd USER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3] CONTENTS Everyday use... 3 Logging on... 4 Main Screen... 5 Adding locations... 6 Working with locations... 7 Duplicate...

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

McAfee Endpoint Encryption Reporting Tool

McAfee Endpoint Encryption Reporting Tool McAfee Endpoint Encryption Reporting Tool User Guide Version 5.2.13 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local

More information

Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014

Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014 June 2014 These release notes provide information about Dell. About New features s Known issues System requirements Product licensing Getting started with Security Explorer Globalization About Dell About

More information

Backup Assistant. User Guide. NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6

Backup Assistant. User Guide. NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6 Backup Assistant User Guide NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6 Liability Disclaimer NEC Unified Solutions, Inc. reserves the right to change the specifications, functions,

More information

Sage 200 Web Time & Expenses Guide

Sage 200 Web Time & Expenses Guide Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than

More information

Decision Support AITS University Administration. Web Intelligence Rich Client 4.1 User Guide

Decision Support AITS University Administration. Web Intelligence Rich Client 4.1 User Guide Decision Support AITS University Administration Web Intelligence Rich Client 4.1 User Guide 2 P age Web Intelligence 4.1 User Guide Web Intelligence 4.1 User Guide Contents Getting Started in Web Intelligence

More information

Sage Abra SQL HRMS Reports. User Guide

Sage Abra SQL HRMS Reports. User Guide Sage Abra SQL HRMS Reports User Guide 2010 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks

More information

Vector HelpDesk - Administrator s Guide

Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Configuring and Maintaining Vector HelpDesk version 5.6 Vector HelpDesk - Administrator s Guide Copyright Vector Networks

More information

GP REPORTS VIEWER USER GUIDE

GP REPORTS VIEWER USER GUIDE GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated

More information

EPM Performance Suite Profitability Administration & Security Guide

EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

DCA. Document Control & Archiving USER S GUIDE

DCA. Document Control & Archiving USER S GUIDE DCA Document Control & Archiving USER S GUIDE Decision Management International, Inc. 1111 Third Street West Suite 250 Bradenton, FL 34205 Phone 800-530-0803 FAX 941-744-0314 www.dmius.com Copyright 2002,

More information

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1

Lepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1 Users Help Manual Lepide Event Log Manager Lepide Software Private Limited. Page 1 Users Help Manual for Lepide Event Log Manager Lepide Software Private Limited, All Rights Reserved This User Guide and

More information

Permissions Management for Site Admins

Permissions Management for Site Admins ControlPoint Publication Date: April 29, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software, or

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

How to monitor AD security with MOM

How to monitor AD security with MOM How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2010 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

Appendix A How to create a data-sharing lab

Appendix A How to create a data-sharing lab Appendix A How to create a data-sharing lab Creating a lab involves completing five major steps: creating lists, then graphs, then the page for lab instructions, then adding forms to the lab instructions,

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

Using SQL Reporting Services with Amicus

Using SQL Reporting Services with Amicus Using SQL Reporting Services with Amicus Applies to: Amicus Attorney Premium Edition 2011 SP1 Amicus Premium Billing 2011 Contents About SQL Server Reporting Services...2 What you need 2 Setting up SQL

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Getting Started with Vision 6

Getting Started with Vision 6 Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop

More information

EMC Documentum Webtop

EMC Documentum Webtop EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights

More information

Manual POLICY PATROL SIGNATURES FOR OUTLOOK, GOOGLE APPS & OFFICE 365

Manual POLICY PATROL SIGNATURES FOR OUTLOOK, GOOGLE APPS & OFFICE 365 Manual POLICY PATROL SIGNATURES FOR OUTLOOK, GOOGLE APPS & OFFICE 365 MANUAL Policy Patrol Signatures This manual, and the software described in this manual, are copyrighted. No part of this manual or

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

WatchDox for Windows. User Guide. Version 3.9.5

WatchDox for Windows. User Guide. Version 3.9.5 WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to

More information

GFI Product Manual. ReportPack Manual

GFI Product Manual. ReportPack Manual GFI Product Manual ReportPack Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

020112 2008 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or

020112 2008 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or Point of Sale Guide 020112 2008 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,

More information

NorthClark Computing, Inc. Bill of Material and Parts Master Maintenance. Administrator s Guide

NorthClark Computing, Inc. Bill of Material and Parts Master Maintenance. Administrator s Guide ERP Consulting Web Development Custom Programming Solutions Desktop & Web Applications for Manfact NorthClark Computing, Inc. Bill of Material and Parts Master Maintenance Administrator s Guide Web and

More information

ProSystem fx Engagement

ProSystem fx Engagement ProSystem fx Engagement Admin Guide October 2009 Copyright 2009 CCH INCORPORATED. A Wolters Kluwer business. All Rights Reserved. Material in this publication may not be reproduced or transmitted, in any

More information

Web Intelligence User Guide

Web Intelligence User Guide Web Intelligence User Guide Office of Financial Management - Enterprise Reporting Services 4/11/2011 Table of Contents Chapter 1 - Overview... 1 Purpose... 1 Chapter 2 Logon Procedure... 3 Web Intelligence

More information

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Xcalibur. Foundation. Administrator Guide. Software Version 3.0 Xcalibur Foundation Administrator Guide Software Version 3.0 XCALI-97520 Revision A May 2013 2013 Thermo Fisher Scientific Inc. All rights reserved. LCquan, Watson LIMS, and Web Access are trademarks,

More information

OneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31

OneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31 OneStop Reporting 3.7 Installation Guide Updated: 2013-01-31 Copyright OneStop Reporting AS www.onestopreporting.com Table of Contents System Requirements... 1 Obtaining the Software... 2 Obtaining Your

More information

Utilities. 2003... ComCash

Utilities. 2003... ComCash Utilities ComCash Utilities All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or

More information

Introduction to Microsoft Access 2003

Introduction to Microsoft Access 2003 Introduction to Microsoft Access 2003 Zhi Liu School of Information Fall/2006 Introduction and Objectives Microsoft Access 2003 is a powerful, yet easy to learn, relational database application for Microsoft

More information

Business Intelligence Tutorial

Business Intelligence Tutorial IBM DB2 Universal Database Business Intelligence Tutorial Version 7 IBM DB2 Universal Database Business Intelligence Tutorial Version 7 Before using this information and the product it supports, be sure

More information

File System Auditor Release Notes

File System Auditor Release Notes File System Auditor Release Notes WHAT'S NEW IN FILE SYSTEM AUDITOR? To see what is new in File System Auditor, please see article Q14974 INFO: File System Auditor 2.x Version History in the ScriptLogic

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

BusinessObjects Enterprise InfoView User's Guide

BusinessObjects Enterprise InfoView User's Guide BusinessObjects Enterprise InfoView User's Guide BusinessObjects Enterprise XI 3.1 Copyright 2009 SAP BusinessObjects. All rights reserved. SAP BusinessObjects and its logos, BusinessObjects, Crystal Reports,

More information

Exclaimer Signature Manager 2.0 User Manual

Exclaimer Signature Manager 2.0 User Manual Exclaimer Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 info@exclaimer.com Contents GETTING STARTED... 10 Signature Manager Overview... 11 How does it Work?... 11 But That's Not All...... 12 And

More information

USER GUIDE. Unit 2: Synergy. Chapter 2: Using Schoolwires Synergy

USER GUIDE. Unit 2: Synergy. Chapter 2: Using Schoolwires Synergy USER GUIDE Unit 2: Synergy Chapter 2: Using Schoolwires Synergy Schoolwires Synergy & Assist Version 2.0 TABLE OF CONTENTS Introductions... 1 Audience... 1 Objectives... 1 Before You Begin... 1 Getting

More information

Javelina Software, LLC 3524 South River Terrace Edgewater, MD 21037 USA

Javelina Software, LLC 3524 South River Terrace Edgewater, MD 21037 USA User's Guide Copyright 2002-2009 Javelina Software, LLC All rights reserved. No part of this document may be reproduced in any form or by any means without the express written permission of Javelina Software,

More information

Ultimus and Microsoft Active Directory

Ultimus and Microsoft Active Directory Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: documents@ultimus.com

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

EMCO Network Inventory 5.x

EMCO Network Inventory 5.x EMCO Network Inventory 5.x Quick Start User Guide EMCO Software Ltd. Contents What is EMCO Network Inventory?... 1 Professional vs. Enterprise Edition... 1 Licensing Modes... 3 Main Features of EMCO Network

More information

Getting Started The Windows SharePoint Services Window

Getting Started The Windows SharePoint Services Window QUICK Source Microsoft Windows SharePoint Services 3.0 for Windows Server 2003 Getting Started The Windows SharePoint Services Window Browser Toolbars - allow the user to navigate in the browser. Link

More information

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd. GFI LANguard 9.0 ReportPack Manual By GFI Software Ltd. http://www.gfi.com E-mail: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

NETWRIX CHANGE NOTIFIER

NETWRIX CHANGE NOTIFIER NETWRIX CHANGE NOTIFIER FOR SQL SERVER QUICK-START GUIDE Product Version: 2.6.194 February 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

1 Introduction 2 Installation 3 Getting Started: Default Reports 4 Custom Reports 5 Scheduling Reports

1 Introduction 2 Installation 3 Getting Started: Default Reports 4 Custom Reports 5 Scheduling Reports GFI Product Manual The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied, including but

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Avaya Network Configuration Manager User Guide

Avaya Network Configuration Manager User Guide Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

Auditing manual. Archive Manager. Publication Date: November, 2015

Auditing manual. Archive Manager. Publication Date: November, 2015 Archive Manager Publication Date: November, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,

More information

Setting Up ALERE with Client/Server Data

Setting Up ALERE with Client/Server Data Setting Up ALERE with Client/Server Data TIW Technology, Inc. November 2014 ALERE is a registered trademark of TIW Technology, Inc. The following are registered trademarks or trademarks: FoxPro, SQL Server,

More information

Enterprise Vault Installing and Configuring

Enterprise Vault Installing and Configuring Enterprise Vault Installing and Configuring Enterprise Vault 6.0 Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, VERITAS, the VERITAS Logo, and Enterprise

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows

Dell InTrust 11.0. Auditing and Monitoring Microsoft Windows 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Microsoft Access 2010 handout

Microsoft Access 2010 handout Microsoft Access 2010 handout Access 2010 is a relational database program you can use to create and manage large quantities of data. You can use Access to manage anything from a home inventory to a giant

More information

Basic Web Development @ Fullerton College

Basic Web Development @ Fullerton College Basic Web Development @ Fullerton College Introduction FC Net Accounts Obtaining Web Space Accessing your web space using MS FrontPage Accessing your web space using Macromedia Dreamweaver Accessing your

More information

ArchestrA Log Viewer User s Guide Invensys Systems, Inc.

ArchestrA Log Viewer User s Guide Invensys Systems, Inc. ArchestrA Log Viewer User s Guide Invensys Systems, Inc. Revision A Last Revision: 7/3/07 Copyright 2007 Invensys Systems, Inc. All Rights Reserved. All rights reserved. No part of this documentation shall

More information

How To Set Up Total Recall Web On A Microsoft Memorybook 2.5.2.2 (For A Microtron)

How To Set Up Total Recall Web On A Microsoft Memorybook 2.5.2.2 (For A Microtron) Total Recall Web Web Module Manual and Customer Quick Reference Guides COPYRIGHT NOTICE Copyright 1994-2009 by DHS Associates, Inc. All Rights Reserved. All TOTAL RECALL, TOTAL RECALL SQL, TOTAL RECALL

More information

Chapter 15: Forms. User Guide. 1 P a g e

Chapter 15: Forms. User Guide. 1 P a g e User Guide Chapter 15 Forms Engine 1 P a g e Table of Contents Introduction... 3 Form Building Basics... 4 1) About Form Templates... 4 2) About Form Instances... 4 Key Information... 4 Accessing the Form

More information

formerly Help Desk Authority 9.1.2 Quick Start Guide

formerly Help Desk Authority 9.1.2 Quick Start Guide formerly Help Desk Authority 9.1.2 Quick Start Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Vyapin Office 365 Management Suite

Vyapin Office 365 Management Suite Vyapin Office 365 Management Suite Last Updated: May 2015 Copyright 2015 Vyapin Software Systems Private Limited. All rights reserved. This document is being furnished by Vyapin Software Systems Private

More information

Dell InTrust 11.0. Real-Time Monitoring Guide

Dell InTrust 11.0. Real-Time Monitoring Guide Dell InTrust 11.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

PowerLogic ION Enterprise 6.0

PowerLogic ION Enterprise 6.0 70002-0298-00 06/2009 PowerLogic ION Enterprise 6.0 Power management software User guide Notices This section describes the symbols used in this guide. Danger This alerts you to things that may cause

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

InfoView User s Guide. BusinessObjects Enterprise XI Release 2

InfoView User s Guide. BusinessObjects Enterprise XI Release 2 BusinessObjects Enterprise XI Release 2 InfoView User s Guide BusinessObjects Enterprise XI Release 2 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,

More information

TIBCO Spotfire Automation Services 6.5. User s Manual

TIBCO Spotfire Automation Services 6.5. User s Manual TIBCO Spotfire Automation Services 6.5 User s Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

SolarWinds Migrating SolarWinds NPM Technical Reference

SolarWinds Migrating SolarWinds NPM Technical Reference SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

More information