Release Notes. Contents. Release Purpose. Platform Compatibility. SonicWALL Appliance / Firmware Compatibility. Directory Connector.
|
|
|
- Julianna Skinner
- 10 years ago
- Views:
Transcription
1 Directory Connector SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Enhancements in Directory Services Connector Known Issues... 4 Resolved Issues... 5 Overview of Dell SonicWALL Directory Services Connector... 7 About SonicWALL SSO and the SSO Agent with Active Directory... 8 About Novell edirectory Support and the Dell SonicWALL SSO Agent Related Technical Documentation Release Purpose Dell SonicWALL Directory Services Connector is a maintenance release that provides enhancements and fixes some known issues. It contains all the enhancements and fixes from version and earlier. Platform Compatibility SonicWALL Appliance / Firmware Compatibility SonicWALL Directory Services Connector version software is a supported release for use with the following SonicWALL platforms: SuperMassive 9200 / 9400 / 9600 running SonicOS 6.1 and above SuperMassive E10200 / E10400 / E10800 running SonicOS 6.0.x NSA 2600 / 3600 / 4600 / 5600 / 6600 running SonicOS 6.1 and above NSA E-Class E5500 / E6500 / E7500 / E8500 / E8510 running SonicOS 5.0 and above NSA 240 / 2400 / 3500 / 4500 / 5000 running SonicOS 5.0 and above NSA 220 / 220W / 250M / 250MW running SonicOS and above TZ 215 / 215W / 205 / 205W / 105 / 105W running SonicOS and above TZ 210 / 210W / 200 / 200W / 100 / 100W running SonicOS 5.0 and above TZ 190 / 190W / 180 / 180W running SonicOS 4.0 and above PRO 2040 / 3060 / 4060 / 4100 / 5060 running SonicOS 4.0 and above Note: SonicOS 5.5 or newer is required for Novell edirectory Support. Note: When configuring Active-Active on a SonicWALL SuperMassive E10000 Series appliance, SonicWALL Directory Services Connector version or newer is required.
2 Virtual Environment Compatibility Recommended Virtual Environments for Directory Services Connector version include: VMware ESX 5.5 VMware ESX 5.1 VMware ESX 4.x Microsoft Hyper-V 2012 R2 Microsoft Hyper-V 2008 R2 Virtual Machine host configuration requirements: OS - Windows Server 2008/2012 R2 32-bit/64-bit CPU Intel Xenon (4 processors) Memory - 4GB Domain Controller Server Compatibility SonicWALL Directory Services Connector version software is supported for use with Domain Controllers running the following operating systems: Windows Server 2012 R2 Windows Server 2012 Windows Server 2008 R2 Windows Server 2008 Windows Server 2003 Server Compatibility SonicWALL Directory Services Connector version software is supported for installation on 32-bit and 64-bit servers running the following operating systems: Windows Server 2012 Windows Server 2008 R2 Windows Server 2008 Windows Server 2003 On all Windows 32-bit and 64-bit servers, a.net Framework must be installed. The following versions of.net Framework are supported:.net Framework 4.5.NET Framework 4.0.NET Framework 3.5.NET Framework 3.0.NET Framework 2.0 The following Microsoft Windows operating systems and service packs are not supported as servers: Windows 8 All versions Windows 7 All versions Windows Vista All versions Windows XP All versions Windows 2000 All versions 2
3 Client Compatibility Release Notes Directory Services Connector is compatible with the following client operating systems for the purpose of determining the logged in username and other information necessary for user authentication: Windows 8 All versions Windows 7 All versions Windows Vista All versions Windows XP All versions Windows 2000 Professional Mac OS X Linux machines using Windows domain accounts, with SSO Agent set to use DC Security Log as the Query Source Linux/UNIX machines running Samba 3.0 or newer Enhancements in Directory Services Connector This section describes the enhancements that are included in Dell SonicWALL Directory Services Connector Agent-to-Agent Communication When multiple SSO Agents are configured in Directory Services Connector , these Agents can communicate with each other to share information. This allows a global user database to be shared among all SSO Agents. In previous releases, only standalone Agents were supported. The benefits of Agent-to-Agent Communication include: Shared User-detection Times - User detection information is shared among more than one Domain Controller (DC). For example, when agent1 fetches logs from DC1 and DC2, and agent2 fetches logs from DC3 and DC4, both agents can update each other when new users have been added. Even when user1 is logged on to DC3 or DC4, the Dell SonicWALL network security appliance is able to retrieve information from agent1. Both agents share user-identification times along with each add/update notification, which helps to identify recently logged-in users. Decreased Redundancy - When Query Source is set to DC Security Log and no fallback query method is configured, new and identified users logging in to that DC could be missed if that agent were to fail. Agentto-agent communication takes over for the failed agent, preserving currently-identified users and logs. It then begins fetching logs from the DC on the failed agent s behalf; ensuring that agents are always correctly reporting usernames. Smart NetAPI/WMI Scanners When one agent is overloaded with requests while other agents are comparatively free, polling requests can be transferred to one of the free agents. For more information, see About Agent-to-Agent Communication. NetBIOS Name Mapping The NetBIOS user name is now consistently sent to the network security appliance. In previous releases, the Agent sent either the NetBIOS user name or the Kerberos Realm user name, depending on the initial event ID when the user was discovered. Remote Debugging for SSO Windows Service Remote Debugging is a diagnostics feature that provides data from the service about a logged-in user, the last username sent to an appliance for any IP address, the logged-in user stored in the service for a specified IP address, and the scanner statistics that include information such as the number of threads running on a specific queue. 3
4 Agent-to-Domain Controller Time Synchronization A warning message has been added to alert users when the time synchronization mechanism between agents and Domain Controllers does not match. The message can be displayed after adding a new Domain Controller or Agent. Known Issues This section contains a list of known issues in the Directory Services Connector release. Symptom Condition / Workaround Issue The SSO Agent sends out a login notification to the appliance 10 seconds after sending a logout notification for a user who has logged off. In the Users > Status page in SonicOS, the user disappears after the logout, but reappears as an inactive user after the login notification 10 seconds later. The View Logs screen incorrectly displays the error message, Failed to get Domain Controller security log when using LogWatcher. The pop-up error dialog box is partially hidden behind the InstallShield wizard window when an incorrect password is entered for the Service User. The publisher is displayed as Unknown during installation. Occurs when the Domain Controller is a Windows Server 2003 machine and the agent is installed on a Windows Server bit machine, with Query Source set to DC Security Log. Does not occur when the DC is on Windows Server 2008 or when using LogWatcher. Occurs when the Add LogWatcher Support option is selected in the Configuration Tool, and other LogWatcher fields are correctly configured. Although the DC Security Log method is not used in this configuration, LogWatcher is not yet independent from DC Security Log, and so gives this error if the Domain Controller is not configured. Occurs when first entering the domain administrator credentials for the Domain Controller during Directory Connector installation. After a second attempt (still incorrect password), the error dialog is not hidden. Occurs when installing Directory Services Connector using the SoniCON.exe installer file
5 Resolved Issues This section contains a list of issues that are resolved in the Directory Services Connector release. Symptom Condition / Workaround Issue An invalid appliance or server IP address and port number are allowed during installation. The Windows Service Users for a second firewall appliance do not display in the SSO Agent until the SSO Agent is restarted. Keyboard shortcuts do not work in the Directory Connector Configurator. The SSO Agent sends the format domain/user to the firewall appliance, but the appliance displays the format as domain.user instead. The appliance IP, port number and edirectory server IP address are not properly validated during Directory Services Connector installation. In Demo mode, an event viewer error message is displayed and communication between the firewall appliance and the SSO Agent fails. The pop-up dialog box telling the admin to restart the SSO Agent service is not always displayed. The Set Default selection is not displayed in the right-click menu for either appliance in the DSC Configuration Tool. Occurs when installing the SSO Agent or Novell edirectory and an invalid IP address or port number is entered for the SonicWALL appliance or edirectory server. Occurs when two firewall appliances are associated with the SSO Agent. Upon switching the second appliance to the default, and then viewing the Windows Service Users, the Windows Service Users only display for the first appliance. Workaround: After setting the second firewall appliance as the default, restart the SSO Agent. Occurs when trying to use keyboard shortcuts while configuring the SSO Agent in the Directory Connector Configurator. Occurs when sending a packet to the firewall appliance. The SSO Agent does not keep the domain/user format. Occurs when invalid characters are accepted for the appliance IP and port number fields on the Appliance configuration page, and a valid IP address is rejected for the edirectory server on the Admin user page. Occurs when doing a load test in Demo mode using the DC Security query mode. For the load test, the registry on the SSO Agent server is changed to set LOADTEST=DEMO and the SSO Agent service is restarted. Occurs when the following fields are changed in the Properties screen by simply removing the last zero in the field: Cache refresh time Max thread count Scanner thread count Workaround: Clear the field and type in the new value. Occurs when a second appliance is set to the default after it is added in the Configuration Tool and encryption keys are generated for it, then keys are generated for the first appliance, then the changes are applied and the agent is restarted. When attempting to set the first appliance as the default, the Set Default option is not available /
6 Symptom Condition / Workaround Issue The Launch Directory Connector option is not displayed at the end of the InstallShield Wizard. The View Logs screen in the Configuration Tool does not display any log messages, although it shows a value for the number of messages and shows the date/time for the messages. Users need to re-enter credentials because the SSO Agent reports logons/logoffs as DC Log events that are not direct workstation logons/logoffs or screen lock/unlock events. The list of Windows Service Users in the SSO Agent database is not updated to stay in sync with the firewall. In the Directory Connector Configurator, the Users and Hosts window does not open a second time, after opening once. In SonicOS, testing the IP address of a client with a known active user displays No User Found as the result. Occurs when using the wizard to upgrade from a previous version of SonicWALL Directory Services Connector. Occurs when Directory Services Connector is installed on a 2008 R2 Hyper-V Host Server, after changing the query type to Diagnostic and adding the agent into the appliance, then checking the View Logs screen. Occurs when the SSO Agent is configured using the DC Logs + NetAPI query method, and the users access other services for which logon/logoff events are generated, such as Exchange or Windows File Shares. Occurs when some Windows Service Users are removed from the list configured on the Users > Settings page on the firewall. Occurs when attempting to open the Users and Hosts window a second time by right-clicking SonicWALL SSO Agent and then clicking on Users and Hosts. Occurs when WSL+NETAPI+WMI is configured as the Query Source for the SSO Agent, and the Check User option is tested in the Test Authentication Agent Settings screen of the SSO Agent configuration in Users > Settings on the firewall
7 Overview of Dell SonicWALL Directory Services Connector Dell SonicWALL Directory Services Connector allows Dell SonicWALL SuperMassive series, E-Class NSA series, NSA series, and TZ 215/210/205/200/105/100 series appliances to achieve transparent, automated Single- Sign-On (SSO) integration with both Active Directory and Novell edirectory, and allows SonicWALL PRO and TZ 190/180 series appliances to achieve Single-Sign-On (SSO) integration with Active Directory. The Dell SonicWALL appliance can use Active Directory or Novell edirectory to authenticate users and determine the filtering policies to assign to each user or user group. The Dell SonicWALL SSO Agent identifies users by IP address and automatically determines when a user has logged out to prevent unauthorized access. Dell SonicWALL Directory Services Connector also has an option for the SSO Agent to identify logged in user information from the Domain Controller's Windows Security Log. Along with the username information, Directory Services Connector sends the following information to the appliance: The Domain Controller on which information about logged in users is found. The User Detection mechanism used by the Agent to find logged in users. Note: It is normal for the system running Dell SonicWALL Directory Services Connector to have high CPU activity for the first 24 hours after installation, while the software creates a database of the user network. Dell SonicWALL Directory Services Connector and higher versions run as a 32-bit application. This improves the performance of 64-bit agent machines, especially in cases where the agent is set to use NETAPI or WMI as the Query Source. Upon identifying a logged in user or finding updated user information, the SSO Agent sends login notifications to the appliance in the following cases: If the Query Source is set to DC Security Log, the agent sends a notification with the User IP Address, User Name and Login Session ID, User ID Mechanisms, Domain Controller IP Address, and Login Time. If using NETAPI or WMI, the agent sends a login notification only if an In_Progress status was previously sent for the same IP address. The agent does not send a notification for an updated user, but only updates its internal cache with the updated user information. When the appliance sends a multi-user request to the SSO Agent and includes an Operation Timeout value, the agent divides the time by the number of IP addresses present in the request. If the query times out, it is aborted and an Operation_Time_Out status is included in the agent s reply to the appliance. The Dell SonicWALL SSO Agent is not supported in a Citrix or Terminal Services Environment. In these environments, you can use the Dell SonicWALL Terminal Services Agent (TSA) to communicate with Dell SonicWALL SSO. The TSA is not included as part of this release. For more information about the TSA, see the latest Terminal Services Agent Release Notes, the latest SonicOS Administrator s Guide and the SonicOS Enhanced Single Sign-On Feature Module, available on 7
8 About SonicWALL SSO and the SSO Agent with Active Directory Single Sign-On (SSO) is a transparent user authentication mechanism that provides privileged access to multiple network resources with a single workstation login. Dell SonicWALL security appliances provide SSO functionality using the SonicWALL Single Sign-On Agent (SSO Agent) to identify user activity based on workstation IP address. SSO is configured in the Users > Settings page of the SonicOS management interface. SSO is separate from the authentication method for login settings, which can be used at the same time for authentication of VPN/L2TP client users or administrative users. SonicWALL Single Sign-On Solution Architecture with Active Directory or LDAP 8
9 When installed without the Novell edirectory Support option, the Dell SonicWALL SSO Agent identifies users by IP address using a protocol compatible with Active Directory and automatically determines when a user has logged out to prevent unauthorized access. Based on data from the SSO Agent, the Dell SonicWALL security appliance queries LDAP or the local database to determine group membership. Memberships are optionally checked by firewall policies to control who is given access, and can be used in selecting policies for Content Filtering and Application Firewall to control what they are allowed to access. User names learned via SSO are reported in the Dell SonicWALL appliance logs of traffic and events from the users. The configured inactivity timer applies with SSO but the session limit does not, though users who are logged out are automatically and transparently logged back in when they send further traffic. Users logged into a workstation directly, but not logged into the domain, cannot be authenticated. For users that are not logged into the domain, an Authentication Required screen displays, indicating that a manual login is required for further authentication. Users that are identified, but lack the group memberships required by the configured policy rules, are redirected to an Access Barred page. To use Dell SonicWALL SSO, it is required that the SSO Agent be installed on a server that can communicate with the Active Directory server and with clients and the Dell SonicWALL security appliance directly using the IP address or using a path, such as VPN. The following requirements must be met in order to run the SSO Agent: Port 2258 must be open; the firewall uses UDP port 2258 by default to communicate with the SSO Agent; if a custom port is configured instead of 2258, then this requirement applies to the custom port Windows Server, with latest service pack.net Framework 2.0 or above NETAPI or WMI (unless using DC Windows Security Log as the Query Source) The SSO Agent must run under Domain Admin privileges The following sections provide more information about various features of the SSO Agent and Directory Connector Configuration Tool: About NETAPI and WMI...10 NETAPI / WMI Scanner...10 Non-Responsive Workstation Handling...11 About the Domain Controller Windows Security Log Method...12 Configuring the Domain Controller Information...17 About Agent-to-Agent Communication...21 About LogWatcher...24 LogWatcher Requirements...24 Installing LogWatcher...24 Configuring LogWatcher on the Domain Controller...25 Enabling Logon Audit on the Domain Controller...25 Configuring/Enabling LogWatcher in Directory Services Connector...28 Viewing LogWatcher Information in Users and Hosts Page...29 About the SSO Agent Cache...30 About Using Samba on Linux/UNIX Clients...30 Installing the SonicWALL SSO Agent with Active Directory...30 Using the Actions Menu...35 Users and Hosts Statistics...36 Dell SonicWALL Appliance SSO Agent Novell edirectory Solution Architecture...37 Installing the SonicWALL SSO Agent with Novell edirectory Support...38 LDAP over TLS with Novell edirectory
10 About NETAPI and WMI The SSO Agent can use either the NETAPI or WMI protocol to communicate with workstations. You can select the desired protocol as the Query Source option in the Directory Connector Configurator. NETAPI and WMI provide information about users that are logged into a workstation, including domain users, local users, and Windows services. NETAPI provides faster, though possibly slightly less accurate, performance. WMI provides slower, though possibly more accurate, performance. With NETAPI, Windows reports the last login to the workstation whether or not the user is still logged in. This means that after a user logs out from his computer, the appliance still shows the user as logged in when NETAPI is used. If another user logs onto the same computer, then at that point the previous user is logged out from the Dell SonicWALL appliance. NETAPI / WMI Scanner The SSO Agent Properties page in the DSC Configuration Tool provides the Enable Scanner checkbox to enable the NETAPI / WMI background scanner. The Scanner works with either NETAPI or WMI as the Query Source, and keeps track of logged in users from remote clients. Right-click the SSO Agent or use the Actions menu to go to the Properties page and set this option. Upon a user information request for any IP address from the appliance, the SSO Agent checks for the IP address in its cache. If the IP address is not present in the cache, the SSO Agent treats the request as the first request for that IP Address and adds the IP Address to its Scanner queue for further processing. Depending on the firmware version running on the appliance, the SSO Agent does one of the following when the entry is not present in its cache: Reply back to the appliance with an In_Progress status Not send any reply back to the appliance 10
11 The SSO Agent initially starts a configurable number of threads (Scanner Thread Count). These threads periodically query the IP addresses that are present in the Scanner queue. After completing each query, the agent adds or updates the user or error information in its cache. Upon identifying the user via NETAPI or WMI, the agent sends a login notification with the user name if an In_Progress status was previously sent for the same IP Address. If no reply was previously sent, the user information is simply cached. Bad IP Address Handling by Scanner If the query returns an error for any IP address and the SSO Agent is not able to identify the user information, the agent treats the IP address as a Bad IP. This can occur for network devices such as printers, non-windows computers or other workstations that do not understand the query options. While processing requests in the Scanner queue, the agent will skip any Bad IP addresses and add the IP address to the back of the queue for the next fetch. Priority Queues in the Scanner Several enhancements for the Scanner are included in Dell SonicWALL Directory Services Connector and newer versions. These features provide better scalability when processing a high rate of user authentication requests, and work best when used with corresponding updates in the appliance firmware. Those updates are in the following Dell SonicWALL appliance firmware versions: SonicOS and newer SonicOS and newer The enhanced Scanner differentiates IP addresses into three queues, each with a specified priority: New IP request (High Priority) Succeeded IP (Mid Priority) Bad IP (Low Priority) Any IP address for which the agent already sent an In Progress status is treated as High Priority. For any IP Address present in either the Mid Priority queue or Bad IP queue, if the difference between the current time and the time of the last request is greater than session time, the agent will drop that IP address and move on to process another address in the queue. The number of processing threads allocated for the scanner is divided into three categories: High 70% of threads Mid 20% of threads Low 10% of threads This thread allocation is dynamic and depends on the frequency of requests for identifying new IP addresses from the appliance. This dynamic thread allocation ensures that no thread is idle or wasted in any scenario. To ensure that the agent will not process any IP address that has not been polled from the appliance for a considerable amount of time, the agent maintains the session time and the time of the last request from the appliance for each IP address. This allows the agent to minimize the queue size, ensures that threads are not wasted, and prevents unnecessary traffic from the agent for IP addresses that are not polled from the appliance. The session time can be modified from Windows registry settings using the registry value SESIONTIME. Non-Responsive Workstation Handling The handling of non-responsive workstations to queries from WMI and NETAPI is optimized in Dell SonicWALL Directory Services Connector. The appliance repeatedly polls the SSO Agent with multi-user requests, and often sends more than one such request at a time. The number of concurrent requests increases when workstations do not respond to the requests, potentially overloading the agent. To avoid this, a timeout mechanism is included in multi-user requests from the appliance. If the request does not complete within this time, the agent silently aborts it. 11
12 About the Domain Controller Windows Security Log Method Dell SonicWALL Directory Services Connector provides an option for the SSO Agent to identify logged in user information from the Domain Controller's Windows Security Log (DC Security Log or WSL). When using DC Security Log mode, Directory Services Connector fetches security logs from the configured Domain Controller. It uses SonicWALL SSO UDP Protocol version 4.0. The DC Security Log method works in a fully trusted domain environment where all users are domain users using domain accounts to access Windows or Linux workstations. The DC Security Log method can optionally be used with either NETAPI or WMI as a fall back to support user identification from non-domain Windows PCs or Domain PCs using local accounts. Altogether, there are three Query Source options involving the DC Security Log: DC Security Log Users are identified from the Domain Controller's Windows Security Log; use this option if all users log into the domain. DC Security Log + NETAPI In addition to using the DC Security Log, this option provides a fall back to using NETAPI to identify users. In case the SSO agent fails to identify users from the Domain Controller, it uses traditional NETAPI queries to the user s workstation to fetch user information. DC Security Log + WMI In addition to using the DC Security Log, this option provides a fall back to using WMI to identify users. In case the SSO agent fails to identify users from the Domain Controller, it uses traditional WMI queries to the user s workstation to fetch user information. To use DC Security Log mode in Dell SonicWALL Directory Services Connector, ensure that the Agent machine has the following minimum requirements: Multi-Core processors: 2 or more, or a dual CPU Speed: 2GHz+ RAM: 2GB, minimum Note: For single core processors, CPU spikes may reach up to 100% periodically while using DC Security Log mode in Dell SonicWALL Directory Services Connector. To avoid this, optimization is provided for reading security logs. Also an option is available to read the security logs in current time, minimizing the initial log processing time. By default, all of the DC Security Log options require a Domain Administrator account or Local Administrator account on the Domain Controller to read the DC Security Log. The account information is entered during the configuration, described below. If an account with administrator privileges is not available, user identification via the Domain Controller Security Log can be configured for WMI with a non-administrator domain account. User identification via the Domain Controller Security Log can also be configured by using WMI with a Non-Administrator domain account. Although this option does not require use of the administrator domain account, it still requires read access to the security log, which can be accomplished by configuring a non-admin account. For more information, refer to the Configuring a Non-Admin Domain Account for SSO Agent to Read Domain Security Logs technical note in the Support > Product Documentation page for supported Dell SonicWALL appliances on Windows Server uses the DC Security Log to record logon/logoff events and/or other security-related events specified by the system's audit policy. If the audit policy is set to record logins, a successful domain login records the user's user name and computer name in the Security Log. On Windows Server 2003 and above, the computer s IP address is also logged. To configure the DC Security Log method in Directory Services Connector, perform the following steps: 1. In the Directory Connector Configuration Tool, right-click SonicWALL SSO Agent in the left pane. 12
13 2. Select Properties. 13
14 3. In the right pane in the Query Source field, select one of the following options: DC Security Log DC Security Log + NETAPI DC Security Log + WMI DC Security Log + WMI + NETAPI 14
15 4. Select the desired number of seconds for the Event Polling Time fields. The Event Polling Time option is visible only if one of the DC Security Log options is selected in the Query Source field. The SSO Agent fetches event logs from the Domain Controller on a regular time interval to discover updated user information. The Event Polling Time option provides a way to specify this interval. The minimum is 5 seconds, and the maximum is 300 seconds, with a default of 10 seconds. 15
16 5. To save information about previously identified users when the SSO Agent service is restarted, select the Preserve users during service restart checkbox. Upon restarting the SSO Agent service, the user information is restored. Because the SSO Agent must be restarted for Properties changes to take effect, this allows the agent to maintain current user information across these restarts. To avoid restoring outdated information, if the backup is older than 15 minutes, the information is not restored. If this option is unchecked when using DC Security Log, the user information is not saved during a service restart. When the next user information request comes in for a previously logged in user, the DC logs are checked, but there is no new logon event and so the user is not identified. If the Query Source is set to DC Security Log only, the SSO Agent will send no user information to the appliance. If Query Source is set to DC Security Log with NETAPI or WMI, the agent will do a NETAPI or WMI query to the user PC to identify the user. 6. Next, configure the Domain Controller information in the Directory Connector Configurator, including the IP address of the DC, the administrator account, and the password. 16
17 Configuring the Domain Controller Information Only machines configured with a Domain Controller role can be set as the Domain Controller in the Directory Connector Configurator. 1. In the Directory Connector Configuration Tool, right-click Domain Controller in the left pane. 2. Select Add. 3. In the right pane on the Edit tab, type the DC IP address into the IP Address field. 4. In the Administrator User field, enter the domain and admin user name separated by a backslash, such as snwl\administrator. 5. In the Administrator Password field, type in the password for the admin user. 6. In the Initial Fetch Time field, select the time of day for the SSO Agent to begin service startup and fetch event logs from the Domain Controller for the first time. All event logs are fetched before the SSO Agent service is started. 17
18 7. To test the connection to the Domain Controller using the IP address and user credentials, click Test Connection. If the IP address does not belong to a machine with a role of Domain Controller, the Configurator will not accept the configuration and an error message is displayed. 8. If the IP address belongs to a machine with a role of Domain Controller, no error is displayed. Click OK. 9. Repeat this procedure to add another Domain Controller. Setting Group Policy to Enable Logon Audit on Windows Server 2008 Logon audit may need to be enabled on the Windows Server machine. To enable logon audit on Windows Server 2008, perform the following steps: 1. Start the Group Policy Management Console. 2. Browse to the following location: Domain Name > Domains > Domain Name > Group Policy Objects, where "Domain Name" is replaced with your domain. 3. Under Group Policy Objects, right-click on Default Domain Policy and select Edit. 18
19 The Group Policy Management Editor window is displayed. 4. Double-click on Audit account logon events and select Success. Click OK. 5. Double-click on Audit logon events and select Success. Click OK. 6. Double-click on Audit Directory Service Access and select Success. Click OK. 7. Double-click on Audit Object Access and select Success. Click OK. 8. Close the Group Policy window. Setting Group Policy to Enable Logon Audit on Windows Server 2003 By default, logon audit is disabled on Windows Server To enable logon audit on Windows Server 2003, perform the following steps: 1. Start the Group Policy Management Console. 2. Browse to the following location: Domain Name > Domains > Domain Name > Group Policy Objects, where "Domain Name" is replaced with your domain. 19
20 3. Right-click on Group Policy Objects and select New. 4. Give your policy a name and click OK. 5. Expand the Group Policy Objects folder and find your new policy. Right-click on the policy and select Edit Browse to the following location: Policy Name > Computer Configuration > Windows Settings > Security Settings > Local Policies > Audit Policy. 7. Left click on Audit Policy. The policy settings are displayed in the right pane. 8. Double-click on Audit account logon events and select Success. Click OK. 20
21 9. Double-click on Audit logon events and select Success. Click OK. 10. Double-click on Audit Directory Service Access and select Success. Click OK. 11. Close the Group Policy window. About Agent-to-Agent Communication Dell SonicWALL Directory Services Connector agents can communicate and share information (such as global user-databases) between agents. This feature is available when Query Source is set to DC Security Log and/or NetAPI/WMI. Agents share information only when the NetAPI/WMI Query Source is used without the scanner enabled. To enable agent synchronization (Agent-to-Agent Communication): 1. In the Directory Connector Configuration Tool, right-click SonicWALL SSO Agent in the left pane. 2. Select Properties. The agent configuration settings screen appears. 3. Select the Allow Agent synchronization checkbox and enter 2260 (the default port for Agent-to-Agent Communication) in the Agent sync Port field. Note: This option is only available when Query Source is set to DC Security Log and/or NetAPI/WMI. 21
22 4. Click OK. Release Notes Remote SSO Agents is added to the left panel of the SonicWALL Directory Connector Configurator tree. 22
23 5. Right-click on Remote SSO Agents and select Add SSO Agent. 6. In the IP Address field, enter the IP address of the agent with which you want to share information. 7. In the Port field, enter the port number of the respective agent configured to communicate with the shared agent. The default port is Repeat these steps for all other agents. Note: Use Agent-to-Agent communication only on agents with the same Query Source. 23
24 About LogWatcher LogWatcher is a Windows service that runs on each Domain Controller. Its fetches the security event log, parses the log events, and sends user logon/logoff information to the SSO agent and/or the Dell SonicWALL network security appliance. LogWatcher is most suitable in a distributed DC environment where the DC logs are replicated across multiple Domain Controllers. LogWatcher Requirements 1. The Domain Controller must be running Windows Server 2003 or higher. 2. Microsoft Visual C Redistributable Package (x86) (for Windows Server 2008 and above) or Microsoft Visual C Redistributable Package (x86) (for Windows Server 2003) must be installed on the Domain Controller. Microsoft Visual C Redistributable Package (x86) (for Windows Server 2008 and above): Microsoft Visual C Redistributable Package (x86) (for Windows Server 2003): 3. The Domain Controller must have Microsoft Core XML Services (MSXML) 6.0 (also known as Microsoft MSXML Parser 6.0) installed: 4. The Domain Controller must have logon audit enabled. 5. The LogWatcher Service only works with SSO Agent and higher. 6. The SSO Agent must be configured for LogWatcher support. Installing LogWatcher The LogWatcher installer is available on MySonicWALL with the SSO group in the Download Center. The installation setup program checks for pre-requisites during the installation process. LogWatcher can be installed on all Domain Controllers. After installation, LogWatcher needs to be configured to communicate with the SSO Agent and Directory Services Connector. The administrator must open the install folder and change the DCConfig.xml as described below. A readme.txt file is launched at the end of the installation which describes this procedure. 24
25 Configuring LogWatcher on the Domain Controller The DCConfig.xml file is used for configuration. The following XML snippet shows how the data is stored in the DCConfig.xml file: <SONICWALL_LOG_WATCHER> <AGENTS> <AGENT> <IP_ADDRESS> </IP_ADDRESS> <PORT_NO>2259</PORT_NO> </AGENT> </AGENTS> <SEC_KEY>abc123</SEC_KEY> <IGNORE_TIME>10</IGNORE_TIME> <LOG_LEVEL>0</LOG_LEVEL > <LW_PORT_NO>2259</LW_PORT_NO> <DC_IP> </DC_IP> </SONICWALL_LOG_WATCHER> The above data fields are defined as follows: IP_ADDRESS PORT_NO SEC_KEY IGNORE_TIME (in seconds) LOG_LEVEL IP address of the SSO Agent Port number of the SSO Agent for receiving the UDP packet Secret Key for encrypting the packet data Used to avoid successive user logon/logoff; default value is 10 seconds Can have any of three values: 0 (NOLOGS) Do not log any messages 1 (ERRORSONLY) Log only Error messages 2 (DIAGNOSTIC) Log all messages LW_PORT_NO DC_IP LogWatcher port for sending the UDP packet IP address of the Domain Controller Enabling Logon Audit on the Domain Controller By default, the logon audit is disabled on Windows Server To enable logon audit, perform the following steps: 1. Start the Group Policy Management Console. 2. As shown in the example below, browse to the following location: Forest: Domain Name-->Domains-->Domain Name-->Group Policy Objects (replace "Domain Name" with your domain) 25
26 3. Right-click on Group Policy Objects and select New. 4. Give your policy a name and click OK. 5. Expand the Group Policy Objects folder and find your new policy. Right-click on the policy and select Edit. 6. Browse to the following location: Policy Name-->Computer Configuration-->Windows Settings-->Security Settings-->Local Policies-->Audit Policy. 26
27 7. Left click on Audit Policy. The policy settings will be displayed in the right window. 8. Double-click on Audit account logon events and select Success and Failure. Click OK. 9. Double-click on Audit logon events and select Success and Failure. Click OK. 10. Close the Group Policy Window. 27
28 Configuring/Enabling LogWatcher in Directory Services Connector To configure LogWatcher in Directory Services Connector, perform the following steps: 1. In the DSC Configuration Tool, right-click the SSO Agent or use the Actions menu to open the Properties page of the SSO Agent. 2. Select DC Security Log in the Query Source drop-down list. 3. Select the Add LogWatcher Support checkbox. 4. Enter the LogWatcher Port number (default is 2259). 5. Enter the LogWatcher Shared Key. Note: The SSO port number and shared key in the DCConfig.xml file on the Domain Controller must be the same as the LogWatcher Port number and LogWatcher Shared Key. 28
29 Viewing LogWatcher Information in Users and Hosts Page The Users and Hosts page in the Directory Connector Configuration Tool shows the list of DC LogWatcher(s) that are communicating with DSC, and the time of the last packet received from each DC LogWatcher. It also displays the total number of logon and logoff packets received from DC LogWatcher(s). 29
30 About the SSO Agent Cache In DSC and newer, the SSO Agent does not cache any user information. Previously, the cache was used with a refresh rate of 60 seconds. The refresh rate is now set to zero seconds, which means no caching on the Agent side. User information will be fetched from the workstation for every request from the Dell SonicWALL appliance. The appliance default is to time out after 10 seconds and to retry up to six times, so the Agent will receive multiple requests from it if a NETAPI request is slow to complete. The agent will not initiate a new NETAPI request if the previous one is still going, but there may be situations where using the cache can help and having it disabled could be a small disadvantage: If a NETAPI request happens to take a multiple of 10 seconds, then the Agent s reply could cross over with a request retry from the appliance. This would cause the Agent to initiate another NETAPI request where, if using a non-zero refresh rate for the cache, it would simply repeat the last reply from its cache. If a reply from the Agent somehow got lost, the appliance would re-send after 10 seconds and the Agent would make another NETAPI request where otherwise it would reply from its cache. When using the SSO Agent cache, be sure to consider the following: No caching (refresh time set to zero) in the Agent gives faster detection of changes in user information, but using the cache avoids possible unnecessary extra NETAPI/WMI requests when problems occur. The cache is disabled by default, which is a good setting for a network in which the NETAPI/WMI requests work well and give few errors. If significant numbers of NETAPI/WMI errors are being shown in the statistics, then setting the cache refresh time to about 60 seconds may help to reduce them. The Agent's cache refresh time should never be set greater than the user polling period set on the appliance. About Using Samba on Linux/UNIX Clients Samba 3.0 or newer can be installed on Linux/UNIX clients for use with Dell SonicWALL SSO. Samba is a software package used on Linux/UNIX machines to give them access to resources in a Windows domain (via Samba s smbclient utility). A user working on a Linux PC with Samba in a Windows domain can be identified via SSO, but it requires proper configuration of the Linux PC, and possibly some reconfiguration of the appliance, as described in the Using Single Sign-On with Samba technote, available on: Without Samba, Linux PCs do not support the Windows networking requests that are used by the SonicWALL SSO Agent, and hence do not work with SonicWALL SSO when either NETAPI or WMI is selected as the Query Source. Linux users can still get access, but will need to log in to do so. They can be redirected to the login prompt if policy rules are set to require authentication. Without Samba, the other option for using SonicWALL SSO with Linux clients is to select DC Security Log as the Query Source. See the About the Domain Controller Windows Security Log Method section for more information about this feature. Installing the SonicWALL SSO Agent with Active Directory When using SSO with Windows, install the SonicWALL SSO Agent on a host on your network that has access to the Active Directory server and all client workstations. Note: The default user cache time (refresh time) is set to 0 seconds, which means the information about identified users is not cached on the agent. To install the Dell SonicWALL SSO Agent, perform the following steps: 1. Download one of the following installation programs, depending on your computer: SonicWALL Directory Connector (32-bit) exe SonicWALL Directory Connector (64-bit) exe You can find these on under Directory Services Connector. 30
31 2. Double-click the installation program to begin installation. 3. If prompted, install the Microsoft.NET framework. 4. In the Welcome screen, click Next to continue the installation. 5. In the License Agreement screen, accept the terms of the license agreement, and then click Next. 6. In the Customer Information screen, enter your username and the name of the company that owns the workstation where you are installing the Directory Connector, select the application use privileges, and then click Next. 7. Select the destination folder. To use the default folder, C:\Program Files\SonicWALL\DCON, click Next. To specify a custom location, click Change, select the folder, and click Next. 31
32 8. On the Custom Setup page, the installation icon is displayed by default next to the SonicWALL SSO Agent feature. Click Next. 9. In the next screen, click Install to install Directory Connector. 32
33 10. To configure a common service account that the SSO Agent will use to log into a specified Windows domain, enter the username of an account with administrative privileges in the Username field, the password for the account in the Password field, and the domain name of the account in the Domain Name field. Click Next. 11. Enter the IP address of your SonicWALL security appliance in the SonicWALL Appliance IP field. Type the port number for the same appliance in the SonicWALL Appliance Port field. Enter a shared key (a hexadecimal number from 1 to 16 digits in length) in the Shared Key field, using an even number of digits. Click Next to continue. 33
34 12. Wait for the installation to complete. The status bar displays while the SonicWALL SSO Agent installs. 13. When installation is complete, optionally select the Launch SonicWALL Directory Connector checkbox to launch the Dell SonicWALL Directory Connector Configuration tool, and then click Finish. 34
35 Using the Actions Menu Release Notes The Actions menu in the Directory Connector Configuration Tool provides options for viewing the log entries, viewing users and hosts, using the diagnostic tool, and refreshing the display. It also provides options for managing the SSO Agent Windows service. The option to set the Service Logon User is available in the Actions drop-down menu. You can start or stop the Windows service from the Actions menu. All of the Actions menu options are also available on the right-click menu for the SonicWALL SSO Agent from within the Configuration Tool. 35
36 Users and Hosts Statistics Release Notes The Users and Hosts page of the DSC Configuration Tool displays the number of requests received from the appliance and the number of replies sent back to it. For DC Security Log, the page displays the number of event log entries parsed and the number of event log entries fetched from each Domain Controller. For more information about configuring and using the Dell SonicWALL SSO Agent, see the SonicOS Administrator s Guide and the SonicOS Enhanced Single Sign-On Feature Module, available on 36
37 About Novell edirectory Support and the Dell SonicWALL SSO Agent Novell edirectory together with the Dell SonicWALL SSO Agent and a Dell SonicWALL network security appliance running SonicOS 5.5 or higher provides a solution for user authentication and the management of access to network resources and online content. Dell SonicWALL Appliance SSO Agent Novell edirectory Solution Architecture The user logs into the network and authenticates with edirectory. The user initiates a request for an Internet resource (such as a Web page, an audio or video stream, or a chat program). The Dell SonicWALL network security appliance detects the request. The Dell SonicWALL appliance queries the SSO Agent. The SSO Agent queries the edirectory server about the user. The SSO Agent communicates the user s content filtering policies to the Dell SonicWALL appliance, based on the user s individually assigned policies and any policies inherited from groups and from organizational units. The Dell SonicWALL appliance allows, logs, or blocks the user s request, based on the user s content filtering policies. 37
38 Installing the SonicWALL SSO Agent with Novell edirectory Support Install the SSO Agent on a host on your network that has access to the Novell edirectory server and all client workstations. It does not need to run on a machine with Novell Client installed. To install the SSO Agent with Novell edirectory Support, perform the following steps: 1. Download one of the following installation programs, depending on your computer: SonicWALL Directory Connector (32-bit) exe SonicWALL Directory Connector (64-bit) exe You can find these on under Directory Services Connector. 2. Double-click the installation program to begin installation. 3. If prompted, install the Microsoft.NET framework. 4. In the Welcome screen, click Next to continue the installation. 5. In the License Agreement screen, accept the terms of the license agreement, and then click Next. 6. In the Customer Information screen, enter your username and the name of the company that owns the workstation where you are installing the SSO Agent, select the application use privileges, and then click Next. 38
39 7. Select the destination folder. To use the default folder, C:\Program Files\SonicWALL\DCON, click Next. To specify a custom location, click Change, select the folder, and click Next. 8. On the Custom Setup page, select the Novell edirectory Support feature for installation. Click Next. 39
40 9. In the Ready to Install the Program screen, click Install. 10. In the Default SSO Agent SonicWALL Appliance Configuration screen, enter the Dell SonicWALL appliance information and then click Next: o SonicWALL Appliance IP Type in the Dell SonicWALL appliance IP address. o SonicWALL Appliance Port Type in the port used by the SSO Agent to communicate with the Dell SonicWALL appliance. The default port is o Shared Key Type in a hexadecimal number of up to 16 characters (use an even number of characters) to use as the key for encrypting messages between the SSO Agent and the Dell SonicWALL appliance. You must also enter the same key when configuring the appliance to use Dell SonicWALL SSO. 40
41 11. In the Novell edirectory Admin User Configuration screen, enter the information for the Novell edirectory server, and then click Next: Server IP Address edirectory Server IP Address Server Port edirectory Server Port (389 by default) Login Username Login username for the administrator account to access the edirectory server Password Password for the administrator account to access the edirectory server Context edirectory context in which the administrator account for the edirectory server resides These same settings can be modified after installation by right-clicking on edirectory in the Directory Connector Configuration Tool. 12. When installation is complete, optionally select the Launch SonicWALL Directory Connector checkbox to launch the Dell SonicWALL Directory Connector, and then click Finish. For more information about configuring and using Dell SonicWALL SSO with Novell edirectory support, see the SonicOS Single Sign-On Feature Module and the latest SonicOS Administrator s Guide, available on 41
42 LDAP over TLS with Novell edirectory The SSO Agent supports Novell edirectory connections secured by Transport Layer Security (TLS). TLS provides secure encryption of communications and verifies the server certificate. The software on your LDAP server must support TLS. To enable Novell edirectory connections using LDAP over TLS, perform the following steps: 1. In the Directory Connector Configuration Tool, right-click edirectory in the left pane and select Properties. 2. In the right pane, select the Enable Encrypted Port checkbox. 3. Type the port number into the SSL/TLS Port field. This can be port 636 or another configured port. 4. Click OK. 42
43 Related Technical Documentation Release Notes Dell SonicWALL user guides and reference documentation is available at the Dell SonicWALL Technical Documentation Online Library: For basic and advanced deployment examples, refer to SonicOS Guides and SonicOS TechNotes available on the website. Last updated: 7/24/
Release Notes. Contents. Release Purpose. Platform Compatibility. SonicWALL Appliance / Firmware Compatibility. Directory Connector.
Directory Connector SonicOS Contents Release Purpose... 1 Platform Compatibility... 1 Known Issues... 3 Resolved Issues... 5 Enhancements in Directory Services Connector 3.6.23... 7 Overview of Dell SonicWALL
Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7
Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 4 Overview... 7 About SonicWALL Single Sign-On
Single Sign-On in SonicOS Enhanced 5.6
Single Sign-On in SonicOS Enhanced 5.6 Document Scope This document describes how to install and configure the Single Sign-On feature in the SonicOS Enhanced 5.6 release. This document contains the following
SONICWALL SONICOS ENHANCED 5.6 SINGLE SIGN-ON
You can read the recommendations in the user guide, the technical guide or the installation guide for SONICWALL SONICOS ENHANCED 5.6 SINGLE SIGN-ON. You'll find the answers to all your questions on the
Single Sign-On in SonicOS Enhanced 5.5
Single Sign-On in SonicOS Enhanced 5.5 Document Scope This document describes how to install and configure the Single Sign-On feature in the SonicOS Enhanced 5.5 release. This document contains the following
Dell SonicWALL Directory Services Connector 4.0.18
Dell SonicWALL Directory Services Connector 4.0.18 June 2015 These release notes provide information about the Dell SonicWALL Directory Services Connector 4.0.18 release. About Directory Services Connector
Configuring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
Single Sign-On in SonicOS Enhanced 4.0
Single Sign-On in SonicOS Enhanced 4.0 Document Scope This document describes how to plan, design, implement, and maintain the Single Sign-On feature in the SonicWALL SonicOS Enhanced 4.0. This document
Single Sign-On. Document Scope. Single Sign-On
Single Sign-On Document Scope This document describes how to plan, design, implement, and maintain the Single Sign-On feature in the SonicWALL SonicOS 5.1 Enhanced. This document contains the following
Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS
SonicOS User Identification Using the Domain Controller Security Log Contents Supported Platforms... 1 Event Viewer... 1 Configuring Group Policy to Enable Logon Audit... 2 Events in Security Log... 4
Synchronizer Installation
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
NETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Table of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
TechNote. Contents. Overview. System or Network Requirements. Deployment Considerations
Network Security Read Domain Security Logs Contents Overview... 1 System or Network Requirements... 1 Deployment Considerations... 1 Configuring Non-Administrator Accounts for WMI Remote Access... 2 Glossary
Avalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
XenClient Enterprise Synchronizer Installation Guide
XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V
XenDesktop Implementation Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation
with the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.
with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Diamond II v2.3 Service Pack 4 Installation Manual
Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange User Mailbox Backup and Restore feature
Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015
Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this
LepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc.
Pro Bundle Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 About the Communications Agent Add-On... 3 Other SureSync Add-Ons... 4 File Locking
Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide
Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Table of Contents TABLE OF CONTENTS... 3 1.0 INTRODUCTION... 1 1.1 HOW TO USE THIS GUIDE... 1 1.2 TOPIC SUMMARY...
Installing and Configuring WhatsUp Gold
Installing and Configuring WhatsUp Gold This guide provides information about installing and configuring WhatsUp Gold v14.2, including instructions on how to run the WhatsUp web interface through an Internet
2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies,
Desktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual
2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: [email protected] Information in this document
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
2XApplication Server XG v10.1
2XApplication Server XG v10.1 Introduction 1 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are
2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies,
Enterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies,
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
Request Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide PROTECTION AT THE SPEED OF BUSINESS Introduction The SonicWALL Global VPN Client creates a Virtual Private Network (VPN) connection between your computer and the
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
2XApplication Server XG v10.6
2XApplication Server XG v10.6 Introduction 1 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are
Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide
Dell SonicWALL Aventail 10.6.5 Connect Tunnel User Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Cloud Services ADM. Agent Deployment Guide
Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License
ThinPoint Quick Start Guide
ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...
NETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
User-ID. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
User-ID Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
INSTALL AND CONFIGURATION GUIDE. Atlas 5.1 for Microsoft Dynamics AX
INSTALL AND CONFIGURATION GUIDE Atlas 5.1 for Microsoft Dynamics AX COPYRIGHT NOTICE Copyright 2012, Globe Software Pty Ltd, All rights reserved. Trademarks Dynamics AX, IntelliMorph, and X++ have been
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
Aspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
Installation Notes for Outpost Network Security (ONS) version 3.2
Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
Installation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
7.x Upgrade Instructions. 2015 Software Pursuits, Inc.
7.x Upgrade Instructions 2015 Table of Contents INTRODUCTION...2 SYSTEM REQUIREMENTS FOR SURESYNC 7...2 CONSIDERATIONS BEFORE UPGRADING...3 TERMINOLOGY CHANGES... 4 Relation Renamed to Job... 4 SPIAgent
Quick Start Guide for VMware and Windows 7
PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
Velocity Web Services Client 1.0 Installation Guide and Release Notes
Velocity Web Services Client 1.0 Installation Guide and Release Notes Copyright 2014-2015, Identiv. Last updated June 24, 2015. Overview This document provides the only information about version 1.0 of
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
SonicOS Enhanced 5.7.0.2 Release Notes
SonicOS Contents Platform Compatibility... 1 Key Features... 2 Known Issues... 3 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 6 Related Technical Documentation... 11 Platform Compatibility
Installation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
Discovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
Active Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent
Active Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3
Remote Support Jumpoint Guide: Unattended Access to Computers in a Network 3. Requirements and Considerations to Install a Jumpoint 4.
Jumpoint Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective owners.
XStream Remote Control: Configuring DCOM Connectivity
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
Hosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
How To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF)
Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF) Introduction SonicWALL Unified Threat Management (UTM) appliances running SonicOS Enhanced 3.0 support
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
EventTracker Enterprise v7.3 Installation Guide
EventTracker Enterprise v7.3 Installation Guide Publication Date: Sep 11, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help the users to install
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
GE Healthcare Life Sciences UNICORN 5.31. Administration and Technical Manual
GE Healthcare Life Sciences UNICORN 5.31 Administration and Technical Manual Table of Contents Table of Contents 1 Network setup... 1.1 Network terms and concepts... 1.2 Network environment... 1.3 UNICORN
Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide
Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live
SonicWALL SRA Virtual Appliance Getting Started Guide
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started
Quick Start - Virtual Server idataagent (VMware)
Page 1 of 24 Quick Start - Virtual Server idataagent (VMware) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data Minimal
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Docufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
Advanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
WhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide
IBM Security QRadar Version 7.1.0 (MR1) WinCollect User Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 59. Copyright
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Nexio Connectus with Nexio G-Scribe
Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and
Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
