6.0. Data Governance Edition. Data Governance Quick Start Guide
|
|
- Alexandrina Williamson
- 8 years ago
- Views:
Transcription
1 6.0 Data Governance Edition Data Governance Quick Start Guide
2 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Quest Software, Inc. The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA legal@quest.com Refer to our Web site ( for regional and international office information. Trademarks Quest, Quest Software, the Quest Software logo, and Simplicity at Work are trademarks of Quest Software and its subsidiaries. See for a complete list of Quest Software s trademarks. Other trademarks are property of their respective owners. Quest One Identity Manager Data Governance Edition - Data Governance Quick Start Guide Updated - August 2012 Software Version Third Party Contributions Quest One Identity Manager contains some third party components (listed below). Copies of their licenses may be found at COMPONENT LICENSE OR ACKNOWLEDGEMENT Boost Boost Software License - Version August 17th, 2003.NET logging library 1.0 Copyright , The Regents of the University of California. All rights reserved. BSD 4.4 License.
3 COMPONENT Dojo Toolkit 1.6 Google Open Sans 1.0 JQuery JQuery UI Mono.Security Novell.Directory.LDAP SharpZipLib spin.js Windows Installer XML toolset (aka WIX) ZLib.NET zlib LICENSE OR ACKNOWLEDGEMENT Copyright , The Dojo Foundation All Rights Reserved. BSD Simple License. Copyright January 2004 ( Apache 2.0 License. Copyright 2011, John Resig. MIT License. Copyright 2011, John Resig. MIT License. Copyright 2004 Novell, Inc. ( MIT License. Copyright 2003 Novell, Inc. ( MIT License. Copyright Mike Krueger, John Reilly. SharpZipLib License. Copyright 2011 Felix Gnass [fgnass at neteye dot de]. MIT License. Common Public License 1.0 Copyright 2006, ComponentAce ( All rights reserved. Copyright (C) Jean-loup Gailly and Mark Adler ZLib.NET License notice Copyright (c) 2006, ComponentAce All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of ComponentAce nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDEN- TAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PRO- CUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
4
5 CONTENTS CHAPTER 1 INTRODUCTION ABOUT THIS GUIDE SYSTEM REQUIREMENTS DEPLOYMENT OVERVIEW READY SERVICE ACCOUNTS AND MANAGED DOMAINS FOR DEPLOYMENT CONFIGURE MANAGED HOSTS LOCAL AND REMOTE AGENTS CONFIGURATION OPTIONS ADDING MANAGED HOSTS ADDING SHAREPOINT MANAGED HOSTS ADDING NETAPP ATTACHED STORAGE DEVICE, EMC CELERRA STORAGE DEVICE, OR CLUSTER MANAGED HOSTS VERIFY MANAGED HOSTS SYSTEM STATUS DATA GOVERNANCE OVERVIEW QUEST ONE IDENTITY MANAGER TOOLS USED TO GOVERN DATA IDENTIFYING DATA TO BE GOVERNED CHAPTER 2 STEP-BY-STEP WALKTHROUGHS PERSONAS COMPARE ACCOUNT ACCESS AND PERFORM GROUP MEMBERSHIP SIMULATIONS ESTABLISH DATA OWNERSHIP GOVERN DATA CREATE AN ACCESS POLICY WORK WITH GOVERNED DATA THROUGH DASHBOARDS AND VIEWS REQUEST DATA ACCESS THROUGH THE IT SHOP PERFORM AN ATTESTATION REVIEW OF DATA OWNERSHIP AND SECURITY SUBSCRIBE TO ACTIVITY AND ACCESS REPORTS CHAPTER 3 ABOUT QUEST SOFTWARE ABOUT QUEST SOFTWARE CONTACTING QUEST SOFTWARE, INC CONTACTING QUEST SUPPORT GLOSSARY INDEX
6 Quest One Identity Manager Data Governance Edition 6
7 1 Introduction About this Guide System Requirements Deployment Overview Data Governance Overview
8 Quest One Identity Manager Data Governance Edition About this Guide This document has been prepared to assist you in becoming familiar with Data Governance, an integral component of Quest One Identity Manager Data Governance Edition. This document is for network administrators, consultants, analysts, IT professionals responsible for deploying Data Governance in their organization, and Web Portal users. It provides typical use cases and step-by-step instructions to help you understand how to use Data Governance to secure the unstructured data in your organization. The Data Governance Edition Quick Start Guide is supplemented with the Data Governance Edition User Guide, which provides more detailed information about the Data Governance features, and includes instructions to help administrators perform day-to-day administrative activities. 8
9 Data Governance Quick Start Guide System Requirements Review the following section to ensure that your system meets the following minimum requirements. For complete Quest One Identity Manager system requirements (including those required for the client and the Web Portal), see the Quest One Identity Manager Release Notes. Data Governance Server To configure a Data Governance server, the user must belong to the Administrators group of the computer hosting the server. System Requirements: Windows Server 2003, Windows Server 2003 (R2), Windows Server 2008, Windows Server 2008 (R2), Windows SQL Server 2008 (R2) (64 bit non-itanium) quad core CPU 1024x 768 screen resolution with 16-bit color 100 GB free disk space 16 GB RAM Software Requirements:.Net 3.5 Service Pack 1 or later Microsoft SQL Server Enterprise Edition 2008 Service Pack 3 or later, Microsoft SQL Server Enterprise Edition 2008 R2 Service Pack 1 or later (compatibility level: 10) Oracle database 11g r2 Enterprise Edition version 11.2 and higher (patch level will vary with operating system platform). Quest only provides a 64-bit server for Data Governance. Ensure that the server installed on a given computer uses the correct architecture to match the installed operating system. Account Requirements: You must be an administrator of the computer on which you are installing the Data Governance Server. You must have the credentials of an account that can be used to create a database on the SQL server being used by the Data Governance Server. You must have the credentials of an account that can be used as a Service Account for your managed domains. For both the Web Portal and the Data Governance front ends, users must be logged in with an Active Directory user account from an Active Directory domain that's in the Identity Manager database. 9
10 Quest One Identity Manager Data Governance Edition Data Governance Activity Database System Requirements: quad core CPU 100 GB free disk space 16 GB RAM Agent Requirements System Requirements Update Rollup 1 for Windows Server 2000 with Service Pack 4, Windows Server 2003, Windows Server 2003 (R2), Windows Server 2008, or Windows Server 2008 (R2) (32 bit or non-itanium 64 bit) 500 MHz+ Processor 1024 MB RAM 100 MB free disk space for every 1,000,000 files / folders scanned Real-time file system updates and resource activity tracking are not supported on versions of ONTAP NetApp filers earlier than 7.3. Additionally, the following Network Attached Storage Devices are supported as managed hosts, but must be scanned remotely: NetApp 7.2 and 8.x(Data ONTAP)*, EMC Celerra 5.6 with Server Message Block 1.0. Windows 2008 and Windows 2008 (R2) failover clusters are supported as remote managed hosts types. Resource activity tracking is not supported for clusters. Report Requirements For Data Governance reports to function, proper authentication checks must be performed. This is accomplished by configuring the job server service to logon as an Active Directory account associated with an Employee who has been assigned the Data Governance Administrator application role. This job server must be configured with the SMTP Host server mask to ensure it is the job server that runs the reports. SharePoint Requirements\Recommendations Scanning SharePoint Server 2010 is supported. Standalone farms are not supported. Farms configured with only Local Users/Groups are not supported. Recommend installing the agent on a dedicated SharePoint 2010 Application Server in the farm and not on a Web Front server (to reduce processing load on the web front end server). Recommend 100 GB disk space on the SharePoint agent computer for data storage and scan post-processing activities. The space required is dependent on the number of sites, lists, and document libraries and the number of unique permissions gathered from the farm. Recommend 8 GB RAM for the SharePoint agent computer. Ensure that the service account configured for the SharePoint managed host is a SharePoint Farm Account (same account that is used to run the SharePoint timer service). 10
11 Data Governance Quick Start Guide Web Portal Requirements To access Quest One Identity Manager Data Governance Edition functionality in the Web Portal, you must configure IIS to use Integrated Authentication. If the web server hosting the Quest One Identity Manager Web Portal is running on the same computer as the Data Governance server you must set the ImpersonateWcfCalls IIS application setting to TRUE. If the web server hosting the Quest One Identity Manager Web Portal is running on a different computer than the Data Governance server you must include entries in the ExplicitlyAllowed- Identities.txt file for the IIS host computers ActiveDirectory account. Deployment Overview The following activities must be performed to have a fully functional Data Governance deployment: Install Quest One Identity Manager and Data Governance Configure the Identity Manager and Data Governance Activity database Synchronize your target environments (Active Directory and SharePoint) Install the Web Portal Map employees with the required Data Governance application roles Deploy managed hosts Recommended Deployment: Install Quest One Identity Manager Administrative and System Configuration tools on Windows workstation. Install Quest One Identity Manager Server Service on Windows Server with good connectivity to a database server. Install Quest One Identity Manager database on a dedicated Windows SQL Server. Install Quest One Identity Manager Web Portal on a dedicated Windows IIS Server. For detailed installation and configuration procedures, please see: Installing the Identity Manager on page 21 in the Quest One Identity Manager Getting Started Guide. Setting Up Active Directory Synchronization on page 236 in the Quest One Identity Management Guide. Setting Up SharePoint Farm Synchronization on page 354 in the Quest One Identity Management Guide. Quest One Identity Manager Web Portal Installation Guide and Quest One Identity Manager Web Portal User Guide. The Identity Manager Roles Model on page 87 in the Quest One Identity Manager Getting Started Guide. Configuring Data Governance on page 13 and Working with Managed Hosts on page 15 in the Quest One Identity Manager Data Governance Edition User Guide. 11
12 Quest One Identity Manager Data Governance Edition Ready Service Accounts and Managed Domains for Deployment Before you can gather information on the data in your enterprise, you must: Add and assign the credentials (service accounts) used to access resources on the computers within the domain. Select the domains that contain the computers and data that you want to manage. The operations within the Data Governance use different credentials. The following table details when the accounts are being used. Account Usage ACTIONS Manage Trustee Access, Report on Trustee Access Manage a domain Read a Trustees Group Membership Information Deploy an Agent Remove an Agent Synchronize Agent Service Accounts Restart an Agent Modify Resource Security Remotely Index Security Information MANAGED DOMAIN SERVICE ACCOUNT Group membership and trust read rights. Create container and service connection point objects in the target domain's System container. Service Account must have the right to log on to the Data Governance Server computer interactively. Group membership and trust read rights. Administrative rights on the target managed host (only during deployment). Administrative rights on the target managed host (only during removal). Administrator or Server Operators rights on the target managed host. Administrator or Server Operators rights on the target managed host. Modify the security of the object natively. AGENT SERVICE ACCOUNT Read security and list children rights for all roots and root children selected for scanning. 12
13 Data Governance Quick Start Guide To add a service account 1. In the Data Governance Navigation view, right-click Service accounts, and select New. 2. In the Change master data form, select the Active Directory account, and enter the password and comments. 3. Save your changes. To assign a service account 1. Select Data Governance in the Quest One Identity Manager Navigation view. 2. In the Navigation view, select Service accounts, double-click the required service account, and select Assign domains in the Tasks view. Available domains are shown in the bottom and can be added, and currently assigned domains are shown in the top and can be removed. 3. Right-click a domain and select to assign or remove domains as required. 4. Save the changes. Configure Managed Hosts A managed host is any network object that can host resources and can be assigned an agent to monitor security and resource activity. Currently supported hosts include Windows computers, Windows clusters, NetApp Attached Storage Devices, EMC Celerra Storage Devices, and SharePoint farms. Local and Remote Agents Local agents reside on the same computer as the managed host. When you deploy a local agent, it immediately scans all fixed volumes on the host computer. You can only use a single agent on a locally managed host; however, local agents provide the best performance and the most functionality. Windows computers use local agents. Remote agents reside on a remote computer other than the managed host, and require a service account with adequate credentials to read the security information. To improve performance, you can have multiple agents scanning a single host. You can use remote agents on Windows computers, and you must use them on Windows clusters, NAS and EMC devices. SharePoint agents are remotely managed and require a service account for the agents. They must be installed on a SharePoint server. Ensure that the service account configured for the SharePoint managed host is a SharePoint Farm Account (same account that is used to run the SharePoint timer service). Configuration Options Managed hosts must be properly configured for security indexing (and resource activity tracking, if applicable) to begin. An agent must be configured to communicate with the server and gather resource information. Until this is done, no security information will be stored or indexed for this computer. Agents are configured when you add or edit a managed host. The available configuration options vary on the type of managed host. Resource Scanning Resource activity tracking is available for locally managed Windows servers, SharePoint farms, and supported NetApp and EMC remotely managed hosts. It is used to collect data on identities, reads, writes, creates, deletes, renames and security changes on securable objects. 13
14 Quest One Identity Manager Data Governance Edition Security Index Roots Security index roots determine the unstructured data for which a security index is maintained. A security index root is the root of an NTFS directory tree to be scanned by an agent, or a point in your Share- Point farm hierarchy below which everything is scanned. The agent monitors the specified roots for changes to security settings. The agent by default will do a full scan of the computer for local managed hosts and SharePoint hosts. The security index roots available for scanning differ for local and remote agents. Scanning Schedule Through the Scan Schedule tab on the managed host master data, you can set the time and frequency with which the agent scans the target computer. For remote agents, you must enable the Immediately scan on agent restart option if you want the agent to scan immediately when it is added or if you want the agent to rescan the security index roots when the service is restarted. Real-time File System Security Index Updates The Real time file system security index updating option causes the agent to watch for change on the file system of the target managed host (create, delete, and rename operations, as well as DACL,SACL, and Owner changes). This results in a more up to date security index. Adding Managed Hosts To add a managed host with a local agent 1. In the Navigation view, select Managed hosts. 2. In the Tasks view, select Add managed host. 3. Select Locally Managed Windows Computer and click Add. 4. In the General tab, select the computer to scan from the Server list. When you install a locally managed host, you have the option of automatically installing the agent with the host, or manually installing the agent at a later date. Although it is recommended that you install the agent with the host, so you can properly configure it, if you are unable to do so due to a firewall or other security issues, you can manually install it after you set up the managed host. On the Agent Details page, choose External for the deployment method, and then run the Agent.msi file located in the Data Governance installation folder on the locally managed host. You must now decide if you want to enable resource activity tracking for the agent. 5. Select the Resource Activity tab, and configure the resource activity tracking. 6. Select the Aggregation period. As resource activity is continuously tracked, this period is used to group together the results over a period of time. 7. To limit network traffic, select Enable activity synchronization window. 8. To excluded accounts and objects from tracking, click the Manage Exclusions button and select the objects to exclude. a) Select to add or remove users or groups, file extensions or folders to be monitored for resource activity. b) Use the Export and Import buttons on their respective tabs to export and import a list of SIDs, file types, or folders to exclude. For file extensions, you can enter a Category name to group any extensions you add to the exclusions list. c) Select OK to save the changes. 14
15 Data Governance Quick Start Guide 9. To selectively scan a host, select the Security Index Roots tab, and select Add security index roots from the Tasks view. For a local host, you need to add and save your changes before you can add a security index root. For a remote host, you need to add and save your changes, then add an agent and save your changes before you can add a security index root. 10. Choose the directory to be scanned and the required agent, and click OK. Local agents by default scan all local fixed volumes on their host computer. 11. Save your changes. To add a managed host with a remote agent 1. In the Navigation view, select Managed hosts. 2. In the Tasks view, select Add managed host. 3. Select the Remotely Managed Windows Computer option, and click Add. For remotely managed hosts, the first remote agent should be added during the host s initial deployment. You can manually add more remote agents later, if needed. 4. In the General tab, select the computer to scan from the Server drop down list. Real-time file system security index updating and Rescan on error are checked by default. 5. Save your changes. 6. Select the Agents tab, and click Add agent in the Tasks view. 7. Select the agent host computer from the Server location list, and select a service account with sufficient permissions to access both the target computer and the agent host. Save the agent data. An agent requires a service account that has the right to read security information on the remote host. This account is configured separately, and then selected when you deploy the agent. 8. Select the newly created managed host in the Result list, and select the Scanning Schedule tab to set the time and frequency with which the agent scans the target computer. 9. Select the Security Index Roots tab to select the roots to scan. More than one remote agent may be configured to scan a managed host provided each agent scans different security index roots. A given security index root can be scanned by only one agent. 10. Select Add security index roots in the Tasks view, select the required roots, and click OK. 11. Save your changes. The Data Governance server will add the managed host (after it has been added and saved) and deploy the agents (once it has been configured and saved) to scan for information. Adding SharePoint Managed Hosts SharePoint farms are similar to remotely managed hosts in that they require an associated service account, even though they are installed locally on a SharePoint server. Like a locally managed host, you have the option of selectively including and excluding objects to be scanned by its agent. Please see Appendix B: EMC Celerra, NetApp Filer, and SharePoint Configuration Details on page 79 in the Quest One Identity Manager Data Governance Edition User Guide before adding this type of managed host. The following procedure requires a SharePoint synchronization to have been performed. For details, see Setting Up SharePoint Farm Synchronization on page 354 in the Quest One Identity Manager Identity Management Guide. 15
16 Quest One Identity Manager Data Governance Edition To add a SharePoint managed host 1. In the Navigation view, select Managed hosts. 2. In the Tasks view, select Add managed host. 3. Select SharePoint Farm, and click Add. 4. In the General tab, select the SharePoint farm to scan from the drop-down list. 5. Select the Agent Details tab, and select the required service account. 6. Select Scanning Schedule tab to set the time and frequency with which the agent scans the target computer. You must now decide if you want to enable resource activity tracking for the agent. 7. Select the Resource Activity tab, and configure the resource activity tracking. 8. Select the Aggregation period. As resource activity is continuously tracked, this period is used to group together the results over a period of time. 9. To limit network traffic, select Synchronize only between these times and set the start and end time. 10. To exclude accounts, click the Manage exclusions button and select the accounts to exclude. 11. The default for SharePoint managed hosts is to scan all data roots if no roots are specified. To selectively scan a managed host, select the Security Index Roots tab, and Configure security index roots in the Tasks view. 12. Select the directory and objects that you want included and excluded from the scan, and the required agent, and click OK. 13. Save your changes. Adding NetApp Attached Storage Device, EMC Celerra Storage Device, or Cluster Managed Hosts Cluster are supported for Windows 2008 and 2008 R2 failover configurations only. You can add these as managed hosts, with remote agents. Please see Appendix B: EMC Celerra, NetApp Filer, and SharePoint Configuration Details on page 79 in the Data Governance Edition User Guide before adding this type of managed host. To add a NetApp or EMC device or cluster as a managed host 1. In the Navigation view, select Managed hosts. 2. In the Tasks view, select Add managed host. 3. Select Windows Cluster, NetApp Storage Device, or EMC Celerra Storage Device, and click Add. 4. Select a computer from the Server drop down list and save your changes. Real-time file system security index updating and Rescan on error are checked by default. 5. Select the Agents tab and Add agent in the Tasks view, and select a service account with sufficient permissions to access the target computer. 6. Select Scanning Schedule to set the time and frequency with which the agent scans the target computer. These settings will apply to all agents on this host. 7. For EMC Celerra and Net App, select the Resource Activity tab, and configure the resource activity tracking. 16
17 Data Governance Quick Start Guide 8. Select the Aggregation period. As resource activity is continuously tracked, this period is used to group together the results over a period of time. 9. To limit network traffic, click the Enable activity synchronization window and set the start and end time. 10. To exclude accounts, click the Manage exclusions button and select the accounts to exclude. The EMC CEPA interface allows only one vendor or vendor's product to subscribe to CEPA Auditing events for a given computer. To overcome this limitation, you can use the Quest Common Event Enabler (QCEE) service. Select the required QCEE server to use for auditing activity and real time file system security index updating. 11. Save your changes. The Data Governance server will add the managed host (after it has been added and saved) and deploy the agents (once it has been configured and saved) to scan for information. Security index roots cannot be configured until the agent has been configured and saved. The exception to this rule, is if you are deploying managed hosts through the Add Multiple Managed Hosts task. From here you can configure the security index roots before deploying remote agents. 12. Select the Security Index Roots tab to select the roots to scan. 13. Select Add security index roots in the Tasks view, select the required roots, and click OK. 14. Save your changes. Verify Managed Hosts System Status When you first deploy a managed host it takes a few minutes for the agent to start collecting data. As the state changes, a regular refresh will allow you to see the changes. To check the state of all managed hosts in your environment In the Navigation view, select Managed hosts. The status column contains the current state of the your managed host. 17
18 Quest One Identity Manager Data Governance Edition Data Governance Overview Control over your organization s data is vital to eliminate issues such as security breaches, loss of sensitive information, or non compliance with external and internal guidelines. There is a need to govern access to unstructured data available to employees through file servers, SharePoint sites, and NAS devices. Business owners and IT administrators can collaborate to align IT infrastructure and security goals with the overall company strategy by providing: Activity details both from an identity (user) and resource (data) perspective. Visibility and control over who has access and the type of access to resources within your environment. Access to self-service access request workflows and services. Ability to define access control policies and pro-actively triage any compliance violations. Ability to enable business owners to approve who can gain access to the data they own. Ability to periodically attest to resource access to meet compliance objectives. Key processes in securing and controlling access to your data. 18
19 Data Governance Quick Start Guide Quest One Identity Manager Tools Used to Govern Data Governing unstructured data enables data access management, preserves data integrity, and provides content owners with the tools and workflows to manage their own data. The workflows required to manage data cross the Manager/Identity Manager and the Web Portal. Administrator and Web Portal user tasks The Manager/Identity Manager is the tool administrators use to perform their daily work. The Web Portal is the interface that makes Quest One Identity Manager Data Governance Edition visible to end users. An essential component is the web-based employee self-service request portal, which is realized through the IT Shop. Using simple, standardized forms, each employee is able to request access for the resources they need to perform their day-to-day duties. The Web Portal also includes dashboards, views, and reports that provide a breadth of information to provide auditors, compliance/security officers, manager, and business owners with the information they need to ensure compliance to internal and external guidelines. It is through the Web Portal as well, that resource access and ownership can be attested to and compliance policy violation will be addressed. IT administrators are focused on maintaining an optimal and secure storage/access infrastructure. They will use the Manager/Identity Manager to: Provide visibility on who can and is accessing what resources, where are the stale groups and stale data through a detailed security view. Manage access and edit security settings on the resources. Create a bridge to the business by helping identify and assign the business owner for resources. Secure unstructured data through placing them under governance and publishing to the IT Shop, thereby enabling self service requests that provide compliance checks. 19
20 Quest One Identity Manager Data Governance Edition Security Admins use the Manager/Identity Manager to: Identify and manage: User access to enterprise resources such as files, folders, share across NTFS, NAS Devices and SharePoint. Service accounts and their enterprise activities All users/groups that have access to a specific enterprise resource Unresolved SIDs Child resource access that deviate from the parent Top active resources and users Probable business owner of a resource Perform What If access modeling including: Comparing two user accounts/groups to identify the impact of adding/removing users to/from groups. Identifying why two employees in the same department have different access rights. The business has a need to empower the workforce to access to the resources they need while ensuring continuous compliance and accountability of the stakeholders. Through the Web Portal, users have access to: Self-service requests that streamline how people obtain access to the data they need. Access certification processes that ensure proper allocations of resources. Policy enforcement system that guides stakeholders including compliance officer (who provide the governance on how things should be done and how goals are met); Managers (who provide the tactical execution on how access is provided, how compliance is achieved, and how least privilege principles are fulfilled); and Auditors (who complete traceability of processes in place, how things are done, and who is are accountable). Views, dashboards and reports that enable the business owner to see the access employees have to all the resources they own and the resource activity on those resources. The compliance/security officer also uses the dashboards and views to access information on governed data, attestations, and policies. Identifying Data to be Governed The process of identifying data to be governed is continuously adaptive in nature. Those responsible for identifying the data may include the business owner, the administrator, the compliance officer, and managers. Consider the following when selecting the data that should be governed: Monitor Top Active Content and Top Active Users reports and views in the Web Portal to identify content that is potentially valuable to the organization. Identify enterprise applications that can export data to flat files and highlight them as potentially needing to be governed. These files may contain sensitive data. Identify content with several access points. For example, if a content is available to Everyone, All Sales, or All Employees you would assume that it is meant for public consumption. However, sensitive file may be placed in the public area either in error or through malicious intent. It is important to assign a high risk index to content with wide access points and bring them under control. Identify groups with a large number of members and investigate their resource access. Sensitive information could be inadvertently available to people through their memberships. Talk to business owners. They are stakeholders in making the data governance process suc- 20
6.0. Data Governance Edition. Data Governance Deployment Guide
6.0 Data Governance Edition Data Governance Deployment Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationDATA GOVERNANCE EDITION
Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationformerly Help Desk Authority 9.1.3 Upgrade Guide
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationChangeAuditor 6.0 For Windows File Servers. Event Reference Guide
ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationWeb Portal Installation Guide 5.0
Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationformerly Help Desk Authority 9.1.3 HDAccess Administrator Guide
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656
More information7.5 7.5. Spotlight on Messaging. Evaluator s Guide
7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationChangeAuditor 5.6. For Windows File Servers Event Reference Guide
ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More information2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
More informationFOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More information8.7. Resource Kit User Guide
8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under
More information4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
More informationQuest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide
Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More informationObject Level Authentication
Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required
More information6.7. Quick Start Guide
6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationDell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationSecurity Explorer 9.5. User Guide
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationDell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationDell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS
Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationQuick Connect Express for Active Directory
Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationFoglight 1.0.0.0. Cartridge for Active Directory Installation Guide
Foglight 1.0.0.0 Cartridge for Active Directory Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDefender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationformerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual
formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,
More informationDell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationActive Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
More informationQuest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationEnterprise Reporter Report Library
Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports
More informationAbout Recovery Manager for Active
Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System
More informationQuest Collaboration Services 3.5. How it Works Guide
Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationDell Statistica Document Management System (SDMS) Installation Instructions
Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationTop 10 Most Popular Reports in Enterprise Reporter
Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software
More information10.6. Auditing and Monitoring Quest ActiveRoles Server
10.6 Auditing and Monitoring Quest ActiveRoles Server 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationDell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide
Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationFoglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide
Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More information8.7. Target Exchange 2010 Environment Preparation
8.7 Target Exchange 2010 Environment Preparation 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document
More informationChangeAuditor 6.0. Web Client User Guide
ChangeAuditor 6.0 Web Client User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationDell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
More informationDell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationDell Spotlight on Active Directory 6.8.4. Deployment Guide
Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationIntroduction to Version Control in
Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any
More informationQuest vworkspace Virtual Desktop Extensions for Linux
Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.
More informationSpotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
More informationUsing Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
More informationDell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide
Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationDell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
More informationActiveRoles 6.8. Web Interface User Guide
ActiveRoles 6.8 Web Interface User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationSecurity Explorer 9.5. About Security Explorer 9.5. New features. June 2014
June 2014 These release notes provide information about Dell. About New features s Known issues System requirements Product licensing Getting started with Security Explorer Globalization About Dell About
More informationQuest ChangeAuditor 4.8
Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide
More informationDefender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationFoglight 5.5.5. Managing Microsoft Active Directory Installation Guide
Foglight 5.5.5 Managing Microsoft Active Directory 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationDell InTrust 11.0 Best Practices Report Pack
Complete Product Name with Trademarks Version Dell InTrust 11.0 Best Practices Report Pack November 2014 Contents About this Document Auditing Domain Controllers Auditing Exchange Servers Auditing File
More informationTroubleshooting Guide 5.1. Quest Workspace ChangeBASE
Troubleshooting Guide 5.1 Quest Workspace ChangeBASE [Type text] 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationformerly Help Desk Authority 9.1.3 HDAccess User Manual
formerly Help Desk Authority 9.1.3 HDAccess User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA
More informationFoglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server
Foglight for SQL Server 5.6.5.2 Managing SQL Server Database Systems Getting Started Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationNew Features and Enhancements
Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements
More informationFoglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server
Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More informationFoglight for Oracle. Managing Oracle Database Systems Getting Started Guide
Foglight for Oracle Managing Oracle Database Systems Getting Started Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationQuick Connect for Cloud Services
Quick Connect for Cloud Services Version 3.5 Administrator Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationformerly Help Desk Authority 9.1.2 Quick Start Guide
formerly Help Desk Authority 9.1.2 Quick Start Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationFoglight. Managing Hyper-V Systems User and Reference Guide
Foglight Managing Hyper-V Systems User and Reference Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationActiveRoles 6.9. Quick Start Guide
ActiveRoles 6.9 Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationNETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationSecurity Analytics Engine 1.0. Help Desk User Guide
2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationFOR SHAREPOINT. Quick Start Guide
Quick Apps v6.2 FOR SHAREPOINT Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationLepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
More informationHow to Deploy Models using Statistica SVB Nodes
How to Deploy Models using Statistica SVB Nodes Abstract Dell Statistica is an analytics software package that offers data preparation, statistics, data mining and predictive analytics, machine learning,
More informationSystem Requirements and Platform Support Guide
Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationQuest Privilege Manager Console 1.1.1. Installation and Configuration Guide
Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationCA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for
More informationLepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
More informationDell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationDell One Identity Quick Connect for Cloud Services 3.6.1
Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved
More informationMicrosoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
More informationDell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
More informationDell Recovery Manager for Active Directory 8.6.3
Dell Recovery Manager for Active Directory 8.6.3 May 15, 2015 These release notes provide information about the Dell Recovery Manager for Active Directory release. Resolved Issues Known Issues System Requirements
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationEnterprise Self Service Quick start Guide
Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.
More informationDell Security Explorer 9.6
Dell June 2015 These release notes provide information about Dell. About New features Resolved issues Known issues System requirements Product licensing Getting started with Security Explorer Globalization
More informationCompanion for MS Analysis Server, v4
Companion for MS Analysis Server, v4 Application Deployment Guide 2012 Enterprise Software Solutions, LLC ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationDell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationSymantec AntiVirus Corporate Edition Patch Update
Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationChangeAuditor 5.7. What s New
ChangeAuditor 5.7 What s New 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a
More informationSpotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations
More informationActive Directory Manager Pro Quick start Guide
Active Directory Manager Pro Quick start Guide Software version 5.0.0.0 JUNE 2014 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2014 CionSystems Inc., All
More informationQuest SQL Optimizer 6.5. for SQL Server. Installation Guide
Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationCitrix Systems, Inc.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
More informationUnderstanding and Configuring Password Manager for Maximum Benefits
Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password
More informationSpotlight on Active Directory 6.8.1. Quick Start Guide
Spotlight on Active Directory 6.8.1 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationUsage Analysis Tools in SharePoint Products and Technologies
Usage Analysis Tools in SharePoint Products and Technologies Date published: June 9, 2004 Summary: Usage analysis allows you to track how websites on your server are being used. The Internet Information
More informationCloud Identity Management Tool Quick Start Guide
Cloud Identity Management Tool Quick Start Guide Software version 2.0.0 October 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2013 CionSystems Inc., All
More informationDell One Identity Quick Connect for Cloud Services 3.6.0
Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved
More informationAudit Management Reference
www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More information2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer
What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationHow to Quickly Create Custom Applications in SharePoint 2010 or 2013 without Custom Code
How to Quickly Create Custom Applications in SharePoint 2010 or 2013 without Custom Code A Guide through Web Parts in Quick Apps for SharePoint By Dan Barker, product manager, Dell Software Table of Contents
More informationFoglight. Dashboard Support Guide
Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationDell One Identity Manager Scalability and Performance
Dell One Identity Manager Scalability and Performance Scale up and out to ensure simple, effective governance for users. Abstract For years, organizations have had to be able to support user communities
More information