Proof of Concept. A New Data Validation Technique for Microsoft ASP.NET Web Applications. Foundstone Professional Services

Size: px
Start display at page:

Download "Proof of Concept. A New Data Validation Technique for Microsoft ASP.NET Web Applications. Foundstone Professional Services"

Transcription

1 Proof of Concept A New Data Validation Technique for Microsoft ASP.NET Web Applications Foundstone Professional Services February 2005

2 Introduction Despite significant awareness of security issues like Cross Site Scripting and SQL Injection, user input remains one of the primary causes of vulnerabilities in software applications. The process of screening the user entered input for malicious content is known as data validation. The Validator.NET tool from Foundstone was created from a research and development effort by Foundstone consultants to analyze the various options available to developers building Microsoft ASP.NET applications. It offers an alternative method to traditional techniques that may have some significant advantages over techniques like web application firewalls. Background Data validation has been traditionally used to capture and correct mistakes by the user and improve their usability experience. Validation checks play the role of a filter on user input, helping users enter valid and correct information. Data validation can be performed both on the client end and the server. The advantage of using client side data validation techniques includes instant feedback to the client while they enter data and a reduction of network latency due to repeated submits. However, the big disadvantage of using client side validation is that any adversary can simply bypass it and therefore client side validation provides little or no security assurance. Server side validation is performed under the control of the server systems and is therefore difficult to bypass. However understanding what to filter and how to do it is a constant challenge for software developers. Many authorities preach that developers should consider that all input is evil. Hackers frequently compromise software by encoding malicious content into innocuous looking input. The results are vulnerabilities such as SQL injection, path traversal and cross-site scripting. There are traditionally two types of techniques to apply filter rules; black lists and white lists. In a black list approach, the developer decides certain types of input like meta characters (<, >, etc) that he/she does not wish to allowed and explicitly denies them. In a white list approach, the developer explicitly specifies the input he/she will allow and denies everything else. White lists are the preferred security approach since it eliminates the possibility of malicious input. The alternative is to write code to check for every input field which is obviously a much more arduous approach. For the same reasons Foundstone, Inc. All Rights Reserved - 1

3 Microsoft has provided an extensive validation framework in ASP.NET to help developers perform data validation routines faster and in a more efficient manner. There are several technology options available to a developer to perform validation. The diagram below includes popular choices and highlights the advantages of different options as the developer implements validation closer to the code. 1. On the Web Network also known as a web application firewall or network proxies. Despite some marketing claims with revolutionary new categories, these tools intercept HTTP traffic to the application on the network and apply rules. 2. On the Web Server using plug-in frameworks such as ISAPI and NSAPI to capture and filter HTTP traffic to the application. 3. In the Code also known as Validation Filters. Web application firewalls are not the best solution since they are removed from the application and therefore have less control over the validation process. Architecturally, they are clearly in the wrong place to do the most effective job. Software must protect itself and a data stream approach on a component that is not connected to the application will not be able to provide a suitable amount of protection. Data validation requires the system to apply both rules and context Foundstone, Inc. All Rights Reserved - 2

4 Foundstone software security experts always recommend that clients build validation into the software code where possible. To assist this approach, Foundstone has developed the Validator.NET free tool. Using Microsoft s.net reflection application programming interface (API), Foundstone has developed a system that takes the binary output assembly (DLL) from an ASP.NET application and programmatically determine all of the input locations from server controls. The tool then allows the developer to apply rules to the input field which are saved in an XML rules file. This rules file can then be loaded in an HTTP Module. This is very similar to an ISAPI filter is executed by the code. As you can see from the diagram above this unique approach has many advantages over the proxy type solutions making it an attractive alternative to a web application firewall. This tool is released for free with source so people can understand the concept. It is part of the Foundstone S3i.NET Developer toolkit. NOTE: This tool is a proof of concept tool. It does not provide data validation for cookies and other key components and should not be used in production environments Foundstone, Inc. All Rights Reserved - 3

5 Validator.NET Features The major features of Validator.NET include: An efficient way to apply effective data validation techniques to existing ASP.NET applications Does not require access to source code and therefore does not change source code Integrates with any existing ASP.NET web application Is composed of 2 parts o Design Component called the Configuration Console o Runtime Component(HTTP Module) Provides a centralized repository of rule set, such that those rules can be repeatedly applied to multiple controls of the application Allows custom rules to be written to the granularity of every control on each form Generates a set of XML rules that can be deployed for multiple applications Foundstone, Inc. All Rights Reserved - 4

6 Installation Instructions for Validator.NET Step 1 Download Validator.NET from the Foundstone web site - Before running the installation program, you must have the.net Framework Version 1.1 or later installed on a Windows XP or Windows 2003 PC. You can download the.net framework here: When you double click the installation file for Validator.NET, you will be presented with an installation splash screen like the one on the following page. Click next to begin the installation process. Step 2 Click next to agree to the Foundstone License Agreement Foundstone, Inc. All Rights Reserved - 5

7 Step 3 Select the Folder where you would like to install Validator.NET. The default location is C:\Program Files\Foundstone Free Tools\Validator.NET\. Step 4 Click Next to begin the installation of Validator.NET Foundstone, Inc. All Rights Reserved - 6

8 Step 5 Click close and if no errors occurred during the installation process, you will be presented with an installation complete splash screen Foundstone, Inc. All Rights Reserved - 7

9 What to do if the Installer Fails The installer checks to ensure you have the.net Framework installed and that you meet the minimum requirements for installation. If installation fails for any reason we suggest running windows Update and reinstalling the latest.net framework Foundstone, Inc. All Rights Reserved - 8

10 How to Use Validator.NET To use Validator.NET, start the tool through the start menu. The first screen the user encounters is the Configuration Console (Design Component) Foundstone, Inc. All Rights Reserved - 9

11 The file menu has the following options: Open Assembly File This option loads an existing.net web application Assembly i.e. a.dll file. Open Project With this option the user can open a Project that has been previously saved. Export Current Project The user can save the current/existing Project using this option. Exit The user can use this option to exit the application Foundstone, Inc. All Rights Reserved - 10

12 The Rule menu has the following options Load Rule File with this option, the user can load an existing rule file into the project. The rule file consists of validation rules that have previously been defined. Note that this file will have a.rule extension for identification Create Rule File this option is used to create a new rule file that has custom rules defined by the user using the rule creating utility as described later Foundstone, Inc. All Rights Reserved - 11

13 The Install menu has the following options: Install HTTP Module - option we can install HTTP runtime validation module for an asp.net web project. The HTTP runtime module uses the rule and project file for validation Foundstone, Inc. All Rights Reserved - 12

14 The Help menu includes the following: Help Provides a user guide with instructions and examples to use the tool About Foundstone Validator.NET Version, copyright and developer credits About Foundstone Professional Services Background about the people who developed this tool Write Secure Code - ASP.NET Secure coding practices in ASP.NET by Foundstone Foundstone, Inc. All Rights Reserved - 13

15 Open Assembly File To Load an application assembly file, click on File, then on Open Assembly File, as shown below Foundstone, Inc. All Rights Reserved - 14

16 The next step requires you to specify the path to open the Assembly file from. For example, the tool is provided with a test web application called FooWeb that has a corresponding FooWeb Assembly File (.dll) as shown below: Foundstone, Inc. All Rights Reserved - 1

17 Opening the FooWeb Assembly file would load it in the Configuration console as shown in the screen shot below: After the Assembly file has been successfully loaded in the configuration console, a tree structure is displayed as shown in the screen-shot above. The root of the tree is the name of the application, in this case FooWeb Foundstone, Inc. All Rights Reserved - 1

18 On expanding the FooWeb tree, another set of child nodes are displayed. These are the various web forms or web pages (Details, Login, Welcome) associated with the FooWeb application Foundstone, Inc. All Rights Reserved - 1

19 On further expanding the tree, the various controls in each of the form are displayed as child nodes: Foundstone, Inc. All Rights Reserved - 2

20 Loading the Rule File To load an existing Rule File, click the file menu and then choose the Load Rule File as shown below: Foundstone, Inc. All Rights Reserved - 3

21 On selecting the Load Rule File, the following screen appears and shows the existing Rule files. Click the Open button to load an already defined Rule file. Using an existing Rule file you can add the previously defined validation rules to the controls in the forms Foundstone, Inc. All Rights Reserved - 1

22 To add a validation rule on any control, right-click on the control and then click Add Foundstone, Inc. All Rights Reserved - 1

23 The screen with all the existing rules will pop up. Choose an existing rule or create a new rule. More details on creating new rules can be found in the Defining New Rules section of this paper. In our example User name, , Zip Code US, etc are the already defined rules. Now from the Validation Rule Chooser, select the required rule and click the Ok button Foundstone, Inc. All Rights Reserved - 1

24 For example, the txtusername control has been selected and the rule Username has been added to it. The new rule gets appended to the tree structure as shown in the screen shot below: For each web control, you can add as many rules as available Foundstone, Inc. All Rights Reserved - 1

25 Once a rule has been added, you can activate, deactivate, delete, copy and also move the rule up or down as per the requirement. On activating (by default the rule is activated) a rule the icon is blue and when you choose Deactivate, the icon becomes red Foundstone, Inc. All Rights Reserved - 1

26 Defining New Rules One of the features of the Validation Rule Chooser is that it allows you to define new rules. The Validator Rule Chooser is shown below: Foundstone, Inc. All Rights Reserved - 2

27 The important thing to note here is the Create New Rule button. Using the Create New Rule, we can add new rules to the existing rules. On selecting the Create New Rule option, the Rule Editor screen is displayed: Foundstone, Inc. All Rights Reserved - 3

28 This screen can be used to add/edit/delete rules. To add a new rule, click the New Rule button and a new pop-up dialog box appears. You are prompted to enter a new rule name, for example we are adding a new rule US Zip Code, as shown below: Foundstone, Inc. All Rights Reserved - 4

29 Once you click Ok, the new rule is displayed along with the existing rules as shown in the screen shot below: Foundstone, Inc. All Rights Reserved - 1

30 After adding a new rule, you can add the desired Validation Classes by clicking the Add Validation Class button. The Validation Classes available will be displayed by clicking the button and depending on the requirement, you can choose the validation class that needs to be added for the new rule. Here the Required Field Validator class has already been chosen and is displayed as shown in the above screen shot Foundstone, Inc. All Rights Reserved - 2

31 Once the required number of Validation Classes has been selected and the modifications made for a particular rule, you can save these changes by clicking the save icon on top of the screen. You can modify the required number of rules and then click on the Ok button resulting in the modifications being saved in a rule file. To delete a rule, you need to highlight the rule and click the Delete button, resulting in the rule getting deleted Foundstone, Inc. All Rights Reserved - 3

32 RunTime Component of Validator.NET ASP.NET allows extensibility features to applications. This includes processing the requests before and after being serviced by the application. This is very useful for writing custom HTTP modules to handle special case scenarios on applications. These HTTP modules can be used for writing custom authentication, authorization, and request handling routines. For ASP.NET applications, the request passes several stages before it is serviced by the application. The first handler in line is Internet Information Services (IIS). IIS maps the ASP.NET extensions to ASPNET_ISAPI.DLL. From there the request is forwarded to the working process of ASP.NET named ASPNET_WP.EXE. The request then becomes an instance of an HTTPContext and is handled by several ASP.NET classes. Later the request is passed to the HTTPApplication which maintains the application-scope methods, data and events. HTTPApplication then pushes the request to the available HTTPModule objects. There are several system level HTTP modules provided by ASP.NET. Some of the services provided by these modules are acquiring request state, authorizing requests, and updating request cache. The host s machine.config and the application s web.config settings determine the number of modules that are called. The final link in the chain of events is the HTTPHandler object that implements the interface IHttpHandler. For every request with an ASP.NET extension, ASP.NET checks the IHttpHandler implementation in web.config file. Here it is possible to map HTTP handlers to different URIs by making corresponding changes in the web.config file. The chain of events is shown in the diagram below: Foundstone, Inc. All Rights Reserved - 1

33 HTTP Modules A HTTP module implements the System.Web.IHttpModule interface public interface IHttpModule { void Dispose(); void Init(HttpApplication context); } The HTTP modules can be called through the configuration of web.config file. The Init and Dispose methods are called by ASP.NET at runtime after mapping the entry from the web.config file. The Init and Dispose methods provide the ability to attach the module to HttpApplication. Using these methods, the module can hook into a number of events exposed by the HTTPApplication. The developer can now implement even handlers that provide access to request before the request is processed by the application. Foundstone uses this extensibility feature of ASP.NET to implement data validation routines for all the fields of the application. The checks are implemented based on the validation rules applied for the various input fields of the application in the design phase. The run time component uses the.rule and.project files to ensure that all fields match the input validation conditions defined. The installation utility in the next section, places the compiled assembly into the application s bin directory along with the rule and project file created in the design phase. The following are the changes made in the web.config of the application. Under the <appsettings> add <add key="fs_httpmodule_xmlrulesdatabase" value="bin"/> <add key="fs_httpmodule_validator_formmappings" value="project XML file path for the web project" /> <add key="fs_httpmodule_validator_rules" value="rules XML file path for the web project" /> Under the <system.web> add <httpmodules> <add name="fs_httpmodule" type="foundstone.fs_httpmodule, FS_HttpModule" /> </httpmodules> For complete information on the working of HTTPModules please refer Foundstone, Inc. All Rights Reserved - 2

34 Installing the HTTP Validation Module The HTTP Validation Module validates the contents of the fields in a web page using the rule and project file. The HTTP Module for a web project is installed using menu option Install->Install HTTP Module Foundstone, Inc. All Rights Reserved - 3

35 It launches a program which installs the HTTP Module. Enter the path to rule file or can browse to the rule file by clicking the button next to the field. The third field is for the path to the root folder of the web project. Here the FooWeb project is located in the webroot directory of the IIS Foundstone, Inc. All Rights Reserved - 4

36 Clicking the install button copies the rule file, project file and HTTP module to the bin directory of the published web project and modifies the web.config file of the web project so that the HTTP runtime validation module uses the rule files. Installing HTTP Validation Module on a Remote Server. To install the HTTP Module on a remote server you need to copy the following files, along with the web project. 1. Rule file created with the main console application. 2. Project file for the project created by the console application. 3. FS_HTTP runtime validation module. 4. HTTP module installer.exe file located in the directory of installation of Validator.NET. Once the web project is published on the server, you need to follow the same steps for installing the HTTP Module for a local web project explained earlier. Here the FS_HTTPmodule.dll should be in the same directory as the HTTP module installer.exe. After launching the module installer program, you need to set the path to the rule file, project file and directory to the root of the web project. Once the path fields are correctly set, clicking the install button installs the HTTP runtime validation module for the web project Foundstone, Inc. All Rights Reserved - 1

37 About Foundstone Professional Services Foundstone Professional Services, a division of McAfee, offers a unique combination of services and education to help organizations continuously and measurably protect the most important assets from the most critical threats. Through a strategic approach to security, Foundstone identifies, recommends, and implements the right balance of technology, people, and process to manage digital risk and leverage security investments more effectively. Foundstone s Secure Software Security Initiative (S3i ) services help organizations design and engineer secure software. By building in security throughout the Software Development Lifecycle, organizations can significantly reduce their risk of malicious attacks and minimize costly remediation efforts. Services include: Source Code Audits Software Design and Architecture Reviews Threat Modeling Web Application Penetration Testing Software Security Metrics and Measurement For more information about Foundstone S3i services, go to Foundstone S3i training is designed to teach programmers and application developers how to build secure software and to write secure code. Classes include: Building Secure Software Writing Secure Code Java (J2EE) Writing Secure Code ASP.NET (C#) Ultimate Web Hacking For the latest course schedule, go to Foundstone, Inc. All Rights Reserved - 2

38 Acknowledgements Mark Curphey, Dinis Cruz, David Raphael, Rudolph Araujo, Shanit Gupta, Seemanta Patnaik, Sanjit Rath, and Saurabh Asthana provided time, dedication, knowledge, and support to make this possible Foundstone, Inc. All Rights Reserved - 3

Using Foundstone CookieDigger to Analyze Web Session Management

Using Foundstone CookieDigger to Analyze Web Session Management Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.

More information

Design Authorization Systems Using SecureUML

Design Authorization Systems Using SecureUML Design Authorization Systems Using SecureUML By Rudolph Araujo & Shanit Gupta, Foundstone Professional Services February 2005 Overview This whitepaper describes the Foundstone SecureUML template, a Microsoft

More information

Como configurar o IIS Server para ACTi NVR Enterprise

Como configurar o IIS Server para ACTi NVR Enterprise Como configurar o IIS Server para 20101/1/26 NVR is a Windows based video surveillance software that requires Microsoft IIS (Internet Information Services) 6 or above to operate properly. If you already

More information

How to Install and Setup IIS Server

How to Install and Setup IIS Server How to Install and Setup IIS Server 2010/9/16 NVR is a Windows based video surveillance software that requires Microsoft IIS (Internet Information Services) to operate properly. If you already have your

More information

AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence

AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence Corey Benninger The AJAX Storage Dilemna AJAX (Asynchronous JavaScript and XML) applications are constantly looking for ways to increase

More information

Sitecore Ecommerce Enterprise Edition Installation Guide Installation guide for administrators and developers

Sitecore Ecommerce Enterprise Edition Installation Guide Installation guide for administrators and developers Installation guide for administrators and developers Table of Contents Chapter 1 Introduction... 2 1.1 Preparing to Install Sitecore Ecommerce Enterprise Edition... 2 1.2 Required Installation Components...

More information

Installing the ASP.NET VETtrak APIs onto IIS 5 or 6

Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 2 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 3... 3 IIS 5 or 6 1 Step 1- Install/Check 6 Set Up and Configure VETtrak ASP.NET API 2 Step 2 -...

More information

BusinessObjects Enterprise XI Release 2

BusinessObjects Enterprise XI Release 2 BusinessObjects Enterprise XI Release 2 How to configure an Internet Information Services server as a front end to a WebLogic application server Overview Contents This document describes the process of

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4 Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites

More information

FTP, IIS, and Firewall Reference and Troubleshooting

FTP, IIS, and Firewall Reference and Troubleshooting FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the

More information

McAfee VirusScan Enterprise for Linux 1.7.0 Software

McAfee VirusScan Enterprise for Linux 1.7.0 Software Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Administrator s Guide

Administrator s Guide Attachment Save for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4 3. System

More information

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide NFIRS 5.0 Software Version 5.3 Prepared for: Directorate of Preparedness and Response (FEMA) Prepared by:

More information

Reference and Troubleshooting: FTP, IIS, and Firewall Information

Reference and Troubleshooting: FTP, IIS, and Firewall Information APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved. Client Portal blue Installation Guide v1.

Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved. Client Portal blue Installation Guide v1. Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved Client Portal blue Installation Guide v1.1 Overview This document will walk you through the process of installing

More information

OrgPublisher 11 Web Administration Installation for Windows 2008 Server

OrgPublisher 11 Web Administration Installation for Windows 2008 Server OrgPublisher 11 Web Administration Installation for Windows 2008 Server Table of Contents Web Administration Installation Guide for Windows 2008 Server Installing IIS 7 on Server 2008... 4 Installing OrgPublisher

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

Adding ELMAH to an ASP.NET Web Application

Adding ELMAH to an ASP.NET Web Application Logging Error Details with ELMAH Introduction The preceding tutorial examined ASP.NET's health monitoring system, which offers an out of the box library for recording a wide array of Web events. Many developers

More information

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States

More information

Administrator s Guide

Administrator s Guide MAPILab Disclaimers for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4

More information

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual TIBCO Spotfire Automation Services 6.5 Installation and Deployment Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Getting Started with the Ed-Fi ODS and Ed-Fi ODS API

Getting Started with the Ed-Fi ODS and Ed-Fi ODS API Getting Started with the Ed-Fi ODS and Ed-Fi ODS API Ed-Fi ODS and Ed-Fi ODS API Version 2.0 - Technical Preview October 2014 2014 Ed-Fi Alliance, LLC. All rights reserved. Ed-Fi is a registered trademark

More information

CitectSCADA V7.20 WebClient Quick Start Guide

CitectSCADA V7.20 WebClient Quick Start Guide CitectSCADA V7.20 WebClient Quick Start Guide - 1 - Table of Contents Introduction... - 3-1. Architecture... - 4 - Server Side Configuration... - 6-2. Software Requirements... - 7-2.1 IIS Setup on Windows

More information

Dovico Timesheet v12 INSTALLATION GUIDE

Dovico Timesheet v12 INSTALLATION GUIDE v12 TABLE OF CONTENTS System Requirements... 1 NEW INSTALLATION... 2 UPGRADE from a previous version of Dovico Timesheet 5 System Requirements Deployment Options Either installed on your server or use

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

SSLSmart Smart SSL Cipher Enumeration

SSLSmart Smart SSL Cipher Enumeration Author: Gursev Singh Kalra Managing Consultant Foundstone Professional Services Table of Contents SSLSmart Smart SSL Cipher Enumeration... 1 Table of Contents... 2 Introduction... 3 SSLSmart Features...

More information

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials

More information

How to configure the DBxtra Report Web Service on IIS (Internet Information Server)

How to configure the DBxtra Report Web Service on IIS (Internet Information Server) How to configure the DBxtra Report Web Service on IIS (Internet Information Server) Table of Contents Install the DBxtra Report Web Service automatically... 2 Access the Report Web Service... 4 Verify

More information

FTP Server Configuration

FTP Server Configuration FTP Server Configuration For HP customers who need to configure an IIS or FileZilla FTP server before using HP Device Manager Technical white paper 2 Copyright 2012 Hewlett-Packard Development Company,

More information

Central Administration User Guide

Central Administration User Guide User Guide Contents 1. Introduction... 2 Licensing... 2 Overview... 2 2. Configuring... 3 3. Using... 4 Computers screen all computers view... 4 Computers screen single computer view... 5 All Jobs screen...

More information

Application Security Testing. Generic Test Strategy

Application Security Testing. Generic Test Strategy Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication

More information

BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008

BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008 BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008 BUILDER 3.0 1 Table of Contents Chapter 1: Installation Overview... 3 Introduction... 3 Minimum Requirements...

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

dotdefender for IIS User Guide dotdefender for IIS - Manual Version 1.0

dotdefender for IIS User Guide dotdefender for IIS - Manual Version 1.0 dotdefender for IIS User Guide dotdefender for IIS - Manual Version 1.0 Table of Contents Chapter 1 Introduction... 5 1.1 Overview... 5 1.2 Components... 5 1.3 Benefits... 6 1.4 Organization of this Guide...

More information

EVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc.

EVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc. WA2088 WebSphere Application Server 8.5 Administration on Windows Student Labs Web Age Solutions Inc. Copyright 2013 Web Age Solutions Inc. 1 Table of Contents Directory Paths Used in Labs...3 Lab Notes...4

More information

1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS

1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS 1. CONFIGURING REMOTE ACCESS TO SQL SERVER EXPRESS From the Start menu, point to All Programs, point to Microsoft SQL Server 2005, point to Configuration Tools, and then click SQL Server Configuration

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

SIMS Multi-user Installation Instructions

SIMS Multi-user Installation Instructions SIMS Multi-user Installation Instructions 2011 SIMS Software TABLE OF CONTENTS REQUIREMENTS... 3 COMMON REQUIREMENTS... 3 DATABASE REQUIREMENTS... 3 SERVER REQUIREMENTS... 3 INSTALLING SIMS CLIENT... 5

More information

Access It! Universal Web Client Integration

Access It! Universal Web Client Integration Page 1 of 6 Last Updated: Friday, November 16, 2012 Access It! Universal Web Client Integration Overview This document outlines the steps needed to setup the Access It! Universal Web Client. The following

More information

Safewhere*ADFS2Logging

Safewhere*ADFS2Logging Safewhere*ADFS2Logging User Guidelines Version: 1.0 Date: 18-06-2013 Globeteam A/S AD FS 2.0 HTTP Logging Module & Trace Logging, version 1.0 P a g e 1 Contents Introduction... 4 HTTP Logging Module...

More information

FrontDesk. (Server Software Installation) Ver. 1.0.1. www.frontdeskhealth.com

FrontDesk. (Server Software Installation) Ver. 1.0.1. www.frontdeskhealth.com FrontDesk (Server Software Installation) Ver. 1.0.1 www.frontdeskhealth.com This document is the installation manual for installing the FrontDesk Server, Kiosk/Touch Screen, and License Management Tool

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

TIBCO Spotfire Automation Services Installation and Configuration

TIBCO Spotfire Automation Services Installation and Configuration TIBCO Spotfire Automation Services Installation and Configuration Software Release 7.0 February 2015 Updated March 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Federated Identity Service Certificate Download Requirements

Federated Identity Service Certificate Download Requirements Federated Identity Service Certificate Download Requirements Version 3.2 Exostar, LLC February 14, 2013 Table of Contents Introduction... 1 Purpose... 1 FIS System Requirements... 2 Adding Exostar as a

More information

SSO Plugin. J System Solutions. Upgrading SSO Plugin 3x to 4x - BMC AR System & Mid Tier. http://www.javasystemsolutions.com

SSO Plugin. J System Solutions. Upgrading SSO Plugin 3x to 4x - BMC AR System & Mid Tier. http://www.javasystemsolutions.com SSO Plugin Upgrading SSO Plugin 3x to 4x - BMC AR System & Mid Tier J System Solutions JSS SSO Plugin Upgrading 3x to 4x Introduction... 3 [Prerequisite] Generate a new license... 4 [Prerequisite] Download

More information

LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide

LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...

More information

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency

More information

metaengine DataConnect For SharePoint 2007 Configuration Guide

metaengine DataConnect For SharePoint 2007 Configuration Guide metaengine DataConnect For SharePoint 2007 Configuration Guide metaengine DataConnect for SharePoint 2007 Configuration Guide (2.4) Page 1 Contents Introduction... 5 Installation and deployment... 6 Installation...

More information

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014 QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

XIA Configuration Server

XIA Configuration Server XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide

Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72 User Guide Contents 1 Introduction... 4 2 Requirements... 5 3 Important Note for Customers Upgrading... 5 4 Installing the Web Reports

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

Exchange Mailbox Protection Whitepaper

Exchange Mailbox Protection Whitepaper Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange

More information

OneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31

OneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31 OneStop Reporting 3.7 Installation Guide Updated: 2013-01-31 Copyright OneStop Reporting AS www.onestopreporting.com Table of Contents System Requirements... 1 Obtaining the Software... 2 Obtaining Your

More information

EMC Documentum Repository Services for Microsoft SharePoint

EMC Documentum Repository Services for Microsoft SharePoint EMC Documentum Repository Services for Microsoft SharePoint Version 6.5 SP2 Installation Guide P/N 300 009 829 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

Pro-Watch Software Suite Installation Guide. 2013 Honeywell Release 4.1

Pro-Watch Software Suite Installation Guide. 2013 Honeywell Release 4.1 Pro-Watch Software Suite Release 4.1 Installation Guide Document 7-901073V2 Pro-Watch Software Suite Installation Guide 2013 Honeywell Release 4.1 Copyright 2013 Honeywell. All rights reserved. Pro-Watch

More information

R i o L i n x s u p p o r t @ r i o l i n x. c o m 1 / 3 0 / 2 0 1 2

R i o L i n x s u p p o r t @ r i o l i n x. c o m 1 / 3 0 / 2 0 1 2 XTRASHARE INSTALLATION GUIDE This is the XtraShare installation guide Development Guide How to develop custom solutions with Extradium for SharePoint R i o L i n x s u p p o r t @ r i o l i n x. c o m

More information

Braindumps.C2150-810.50 questions

Braindumps.C2150-810.50 questions Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the

More information

Securely Registering Applications

Securely Registering Applications Author: Neelay S Shah Senior Software Security Consultant Foundstone Professional Services Table of Contents Securely Registering Applications 1 Table of Contents 2 Abstract 3 Introduction 4 Discussion

More information

Configuring your email client to connect to your Exchange mailbox

Configuring your email client to connect to your Exchange mailbox Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add

More information

XenDesktop Implementation Guide

XenDesktop Implementation Guide Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation

More information

TIBCO Spotfire Metrics Prerequisites and Installation

TIBCO Spotfire Metrics Prerequisites and Installation TIBCO Spotfire Metrics Prerequisites and Installation Software Release 6.0 November 2013 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo

More information

Installation of IR under Windows Server 2008

Installation of IR under Windows Server 2008 Installation of IR under Windows Server 2008 Installation of IR under windows 2008 involves the following steps: Installation of IIS Check firewall settings to allow HTTP traffic through firewall Installation

More information

DataCove. Installation Instructions for Search Plug-in for Microsoft Outlook 2007 & 2010 (All Users)

DataCove. Installation Instructions for Search Plug-in for Microsoft Outlook 2007 & 2010 (All Users) Installation Instructions for Search Plug-in for Microsoft Outlook 2007 & 2010 (All Users) System Requirements: Windows XP, Vista or 7 Outlook 2007 or 2010 32 bit Editions 1GB of RAM Microsoft.NET Framework

More information

Online Vulnerability Scanner Quick Start Guide

Online Vulnerability Scanner Quick Start Guide Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.

More information

OPC Unified Architecture - Connectivity Guide

OPC Unified Architecture - Connectivity Guide OPC Unified Architecture - Connectivity Guide January, 2010 Ref. 01.02 Kepware Technologies Table of Contents 1. Overview... 1 2. Prerequisites... 1 3. Security... 2 3.1 Automatic... 2 3.2 Exchange...

More information

WEBCONNECT INSTALLATION GUIDE. Version 1.96

WEBCONNECT INSTALLATION GUIDE. Version 1.96 WEBCONNECT INSTALLATION GUIDE Version 1.96 Copyright 1981-2015 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Sage 300 ERP 2012. Sage CRM 7.1 Integration Guide

Sage 300 ERP 2012. Sage CRM 7.1 Integration Guide Sage 300 ERP 2012 Sage CRM 7.1 Integration Guide This is a publication of Sage Software, Inc. Version 2012 Copyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product

More information

Installation Guidelines (MySQL database & Archivists Toolkit client)

Installation Guidelines (MySQL database & Archivists Toolkit client) Installation Guidelines (MySQL database & Archivists Toolkit client) Understanding the Toolkit Architecture The Archivists Toolkit requires both a client and database to function. The client is installed

More information

File Share Navigator Online 1

File Share Navigator Online 1 File Share Navigator Online 1 User Guide Service Pack 3 Issued November 2015 Table of Contents What s New in this Guide... 4 About File Share Navigator Online... 5 Components of File Share Navigator Online...

More information

Python for Series 60 Platform

Python for Series 60 Platform F O R U M N O K I A Getting Started with Python for Series 60 Platform Version 1.2; September 28, 2005 Python for Series 60 Platform Copyright 2005 Nokia Corporation. All rights reserved. Nokia and Nokia

More information

HIRSCH Velocity Web Console Guide

HIRSCH Velocity Web Console Guide HIRSCH Velocity Web Console Guide MAN012-1112 HIRSCH Velocity Web Console Guide MAN012-1112, November 2012 Version 1.1 Copyright 2012 Identive Group. All rights reserved. ScramblePad and ScrambleProx are

More information

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email

More information

To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.

To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008. Znode Multifront - Installation Guide Version 6.2 1 System Requirements To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server

More information

How to set up popular firewalls to work with Web CEO

How to set up popular firewalls to work with Web CEO How to set up popular firewalls to work with Web CEO Contents How to set up popular firewalls to work with Web CEO... 1 Setting up Agnitum Outpost Firewall 2.5... 2 Setting up Black ICE 3... 6 Setting

More information

PLEASE NOTE: The client data used in these manuals is purely fictional.

PLEASE NOTE: The client data used in these manuals is purely fictional. Welcome! CAREWare Quick Start guides will walk you through the basics of setting up, managing and using the main CAREWare functions. It is intended for non-technical users who just need to get basic information

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

SINGLE SIGN-ON FOR MTWEB

SINGLE SIGN-ON FOR MTWEB SINGLE SIGN-ON FOR MTWEB FOR MASSTRANSIT ENTERPRISE WINDOWS SERVERS WITH DIRECTORY SERVICES INTEGRATION Group Logic, Inc. November 26, 2008 Version 1.1 CONTENTS Revision History...3 Feature Highlights...4

More information

Internet Information Services Integration Kit. Version 2.4. User Guide

Internet Information Services Integration Kit. Version 2.4. User Guide Internet Information Services Integration Kit Version 2.4 User Guide 2014 Ping Identity Corporation. All rights reserved. PingFederate Internet Information Services User Guide Version 2.4 June, 2014 Ping

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

AssetWise Performance Management. APM Remote Upgrade Guide

AssetWise Performance Management. APM Remote Upgrade Guide AssetWise Performance Management APM Remote Upgrade Guide Trademark Notice Bentley, the B Bentley logo, AssetWise, Ivara, the Ivara EXP logo, Ivara Work Smart, Aladon and RCM2 are either registered or

More information

McAfee Endpoint Encryption for PC 7.0

McAfee Endpoint Encryption for PC 7.0 Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

Citrix Access on SonicWALL SSL VPN

Citrix Access on SonicWALL SSL VPN Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring

More information