Netwrix Auditor for File Servers
|
|
- Amelia Norman
- 8 years ago
- Views:
Transcription
1 Netwrix Auditor for File Servers Quick-Start Guide Version: 7.0 7/7/2015
2 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation of any features or functions, as this publication may describe features or functionality not applicable to the product release or version you are using. Netwrix makes no representations or warranties about the Software beyond what is provided in the License Agreement. Netwrix Corporation assumes no responsibility or liability for the accuracy of the information presented, which is subject to change without notice. If you believe there is an error in this publication, please report it to us in writing. Netwrix is a registered trademark of Netwrix Corporation. The Netwrix logo and all other Netwrix product or service names and slogans are registered trademarks or trademarks of Netwrix Corporation. Active Directory is a trademark of Microsoft Corporation. All other trademarks and registered trademarks are property of their respective owners. Disclaimers This document may contain information regarding the use and installation of non-netwrix products. Please note that this information is provided as a courtesy to assist you. While Netwrix tries to ensure that this information accurately reflects the information provided by the supplier, please refer to the materials provided with any non-netwrix product and contact the supplier for confirmation. Netwrix Corporation assumes no responsibility or liability for incorrect or incomplete information provided about non-netwrix products Netwrix Corporation. All rights reserved. 2/36
3 Table of Contents 1. Introduction Netwrix Auditor Overview 4 2. System Requirements Requirements for Audited System Requirements to Install Netwrix Auditor Hardware Requirements Software Requirements 7 3. Install the Product 8 4. Configure Windows File Servers for Auditing Configure Object-Level Access Auditing Configure Audit Object Access Policy Configure Event Log Size and Retention Settings Enable Remote Registry Service Create Managed Object to Audit File Servers Launch Initial Data Collection Make Test Changes See How Netwrix Auditor Enables Complete Visibility Review a Change Summary Browse Data with AuditIntelligence Search Review File Servers Overview Review the All File Servers Activity Report Related Documentation 36 3/36
4 1. Introduction 1. Introduction This guide is intended for the first-time users of Netwrix Auditor for File Servers. It can be used for evaluation purposes, therefore, it is recommended to read it sequentially, and follow the instructions in the order they are provided. After reading this guide you will be able to: Install and configure Netwrix Auditor Create a Managed Object to start auditing a Windows file server Launch data collection See how Netwrix Auditor brings real AuditIntelligence into your IT infrastructure and enables its complete visibility NOTE: This guide only covers the basic configuration and usage options for auditing Windows file servers with Netwrix Auditor. For advanced installation scenarios and configuration options, as well as for information on various reporting possibilities and other product features, refer to: Netwrix Auditor Installation and Configuration Guide Netwrix Auditor Administrator's Guide Netwrix Auditor User Guide 1.1. Netwrix Auditor Overview Netwrix Auditor is a change and configuration auditing platform that streamlines compliance, strengthens security and simplifies root cause analysis across the entire IT infrastructure. Netwrix Auditor enables complete visibility into both security configuration and data access by providing actionable audit data about who did what, when, and where, and who has access to what. Netwrix Auditor helps prevent security breaches caused by insider attacks, pass audits and minimize compliance costs or just keep tabs on what privileged users are doing in the environment and why. With over 6,000 customers from 28 industries and more than 70 industry awards, Netwrix Auditor is the only platform that combines both security configuration management and data access governance across the broadest variety of IT systems, including Active Directory, Exchange, File Servers, SharePoint, SQL Server, VMware, Windows Server and others. It also supports privileged user activity monitoring on all other systems, even if they do not produce any logs, via user activity video recording with the ability to search and replay. Netwrix Auditor brings AuditIntelligence with: Change and access auditing: determine who changed what, when, and where. AuditIntelligence search: browse audit data, investigate incidents and keep track of changes. 4/36
5 1. Introduction Configuration assessment: analyze current and past configurations with the state in time reports. Predefined reports: pass audits with a variety of out of the box reports and stay compliant with international standards. Netwrix Auditor employs AuditAssurance, a patent pending technology that does not have the disadvantages of native auditing or SIEM (Security Information and Event Management) solutions that rely on a single source of audit data. Netwrix Auditor utilizes an efficient, enterprise grade architecture that consolidates audit data from multiple independent sources and scalable two tiered Audit Archive (file based local Long Term Archive and short-term SQL-based Audit Database) holding consolidated audit data for 10 years or more. Netwrix Auditor for File Servers detects and reports on all changes made to Windows based file servers, EMC storages and NetApp Filer appliances, including modifications of files, folders, shares and permissions, as well as failed and successful access attempts. 5/36
6 2. System Requirements 2. System Requirements This section lists the requirements for the systems that are going to be audited with Netwrix Auditor, and for the computer where the product is going to be installed Requirements for Audited System The table below provides the requirements for the systems that can be audited with Netwrix Auditor for File Servers: Audited System Supported Versions File Servers Windows Desktop OS: Windows Vista SP2 (32 and 64-bit) and above Windows Server OS: Windows Server 2008 SP2 (32 and 64-bit) and above 2.2. Requirements to Install Netwrix Auditor This section provides the requirements for the computer where Netwrix Auditor is going to be installed. Refer to the following sections for detailed information: Hardware Requirements Software Requirements Hardware Requirements Before installing Netwrix Auditor, make sure that your hardware meets the following requirements: Hardware Component Minimum Recommended Processor Intel or AMD 32 bit, 2 GHz Intel Core 2 Duo 2x 64 bit, 3 GHz RAM 2 GB 8 GB Disk space 500 MB physical disk space for the product installation 30 GB for file-based Long-Term Archive 500 MB for SQL Server-based Audit Database where audit data is going to be stored 6/36
7 2. System Requirements Hardware Component Minimum Recommended NOTE: These are rough estimations, calculated for evaluation of Netwrix Auditor for File Servers. Refer to Netwrix Auditor Installation and Configuration Guide for complete information on the Netwrix Auditor disk space requirements. Screen resolution 1280 x x 1080 and higher Software Requirements The table below lists the minimum software requirements for the Netwrix Auditor installation: Component Requirements Operating system Desktop OS: Windows 7 SP1 (64-bit) and above Server OS: Windows Server 2008 R2 SP1 and above NOTE: 32-bit operating systems are not supported. Framework.Net Framework 3.5 SP1 Additional software Windows Installer 3.1 and above 7/36
8 3. Install the Product 3. Install the Product To install Netwrix Auditor 1. Download Netwrix Auditor Unpack the installation package. The following window will be displayed on successful operation completion: 3. Follow the instructions of the setup wizard. When prompted, accept the license agreement. 4. On the Select Installation Type step, select Full installation. 5. On the Destination Folder step, specify the installation folder. 6. Click Install. After a successful installation, Netwrix Auditor shortcuts will be added to the Start 8/36
9 3. Install the Product menu/screen and Netwrix Auditor Administrator Console will open. 9/36
10 4. Configure Windows File Servers for Auditing 4. Configure Windows File Servers for Auditing Before configuring the audit settings, consider that if you have multiple file shares frequently accessed by a significant number of users, it is reasonable to audit objects modification only. Tracking all access events may result in too much data written to the audit logs, whereas only some part of it may be of any interest. Note that audit flags must be set on every file share you want to audit. If you are going to audit an entire file server, consider the following: If you specify a single computer name, Netwrix Auditor will audit all shared folders on this computer. Note that Netwrix Auditor does not track content changes on folders whose name ends with the $ symbol (which are either hidden or administrative/system folders). In order for the report functionality to work properly, you need to configure audit settings for each share folder on the computer separately. Otherwise, reports will contain limited data and warning messages. For your convenience, if your file shares are stored within one folder (or disk drive), you can configure audit settings for this folder only. As a result, you will receive reports on all required access types applied to all file shares within this folder. It is not recommended to configure audit settings for system disks. To configure audit settings for Windows file servers, perform the following procedures: Configure Object-Level Access Auditing Configure Audit Object Access Policy Configure Event Log Size and Retention Settings Enable Remote Registry Service 4.1. Configure Object-Level Access Auditing Perform one of the following procedures depending on the OS: To configure Object-level access auditing on pre-windows Server 2012 versions To configure Object-level access auditing on Windows Server 2012 and above To configure Object-level access auditing on pre-windows Server 2012 versions 1. Navigate to the target file share, right-click it and select Properties. 2. In the <Share_Name> Properties dialog, select the Security tab and click Advanced. 3. In the Advanced Security Settings for <Share_Name> dialog, navigate to the Auditing tab, click 10/36
11 4. Configure Windows File Servers for Auditing Edit. 4. In a separate Advanced Security Settings for <Share_ Name> dialog, click Add to add a principal. You can also select Everyone (or another user-defined group containing users that are granted special permissions) and click Edit. NOTE: You can specify any other user group, but in this case Netwrix Auditor will send s with warnings on incorrect audit configuration. This will not affect the reports or data searches performed in the Netwrix Auditor client and the product will only audit user accounts that belong to the selected group. 5. Apply settings to your Auditing Entries depending on the access types that you want to audit. If you want to audit all access types (successful reads, modifications as well as failed reads and modifications attempts), you need to add three separate Auditing Entries for each file share. Otherwise, reports will contain limited data and warning messages. Auditing Entry Successful reads The Auditing Entry below shows Advanced Permissions for auditing successful reads only: 11/36
12 4. Configure Windows File Servers for Auditing Auditing Entry Apply onto Select "Files only" Access type Select "Successful" Advanced permissions Select "List folder / read data" Make sure that the Apply these auditing entries to objects and/or containers within this container only checkbox is cleared. Successful modifications The Auditing Entry below shows Advanced Permissions for auditing successful modifications only: 12/36
13 4. Configure Windows File Servers for Auditing Auditing Entry Apply onto Select "This folder, subfolders and files" Access type Select "Successful" Advanced permissions: Create files / write data Create folders / append data Write attributes Write extended attributes Delete subfolders and files Delete Change permissions Take ownership Make sure that the Apply these auditing entries to objects and/or containers within this 13/36
14 4. Configure Windows File Servers for Auditing Auditing Entry container only checkbox is cleared. Failed read and modification attempts The Auditing Entry below shows Advanced Permissions for auditing failed read and modifications attempts: Apply onto Select "This folder, subfolders and files" Access type Select "Failed" Advanced permissions: List folder / read data Create files / write data Create folders / append data Write attributes Write extended attributes 14/36
15 4. Configure Windows File Servers for Auditing Auditing Entry Delete subfolders and files Delete Change permissions Take ownership Make sure that the Apply these auditing entries to objects and/or containers within this container only checkbox is cleared. NOTE: If no data is present in reports, or the Who field contains the "system" value, refer to Netwrix Knowledge Base articles. To configure Object-level access auditing on Windows Server 2012 and above 1. Navigate to the target file share, right-click it and select Properties. 2. In the <Share_Name> Properties dialog, select the Security tab and click Advanced. 3. In the Advanced Security Settings for <Share_Name> dialog, navigate to the Auditing tab. 4. Click Add to add a new principal. You can also select Everyone (or another user-defined group containing users that are granted special permissions) and click Edit. 15/36
16 4. Configure Windows File Servers for Auditing 5. In the Auditing Entry for <Folder_Name> dialog, click the Select a principal link and specify Everyone. NOTE: You can specify any other user group, but in this case Netwrix Auditor will send s with warnings on incorrect audit configuration. The product will audit only user accounts that belong to the selected group. 6. Apply settings to your Auditing Entries depending on the access types that you want to audit. If you want to audit all access types (successful reads, modification as well as failed reads and modifications attempts), you need to add three separate Auditing Entries for each file share. Otherwise, reports will contain limited data and warning messages. Auditing Entry Successful reads The Auditing Entry below shows Advanced Permissions for auditing successful reads only: Type Set to "Success". Applies to Select "Files only". Advanced permissions Select "List folder / read data". Make sure that the Only apply these auditing settings to objects and/or containers within this container checkbox is cleared. 16/36
17 4. Configure Windows File Servers for Auditing Auditing Entry Successful modifications The Auditing Entry below shows Advanced Permissions for auditing successful modifications only: Type Set to "Success". Applies to Select "This folder, subfolders and files". Advanced permissions: Create files / write data Create folders / append data Write attributes Write extended attributes Delete subfolders and files Delete Change permissions Take ownership Make sure that the Only apply these auditing settings to objects and/or containers within this container checkbox is cleared. 17/36
18 4. Configure Windows File Servers for Auditing Auditing Entry Failed read and modification attempts The Auditing Entry below shows Advanced Permissions for auditing failed read and modifications attempts: Type Set to "Fail" Applies to Select "This folder, subfolders and files" Advanced permissions: List folder / read data Create files / write data Create folders / append data Write attributes Write extended attributes Delete subfolders and files Delete Change permissions Take ownership Make sure that the Only apply these auditing settings to objects and/or containers within this container checkbox is cleared. 18/36
19 4. Configure Windows File Servers for Auditing NOTE: If no data is present in reports, or the Who field contains the "system" value, refer to Netwrix Knowledge Base articles Configure Audit Object Access Policy 1. Open the Group Policy Management console on any domain controller in the target domain: navigate to Start Administrative Tools Group Policy Management. 2. In the left pane, navigate to Forest: <domain_name> Domains, right-click <domain_ name> and select Create a GPO in this domain and Link it here. 3. Enter the name for the new GPO. 4. Right-click the newly created GPO and select Edit. 5. In the Group Policy Management Editor dialog, expand the Computer Configuration node on the left and navigate to Policies Windows Settings Security Settings Local Policies Audit Policy. 6. In the right pane, double-click Audit object access and select all checkboxes in the Audit object access Properties dialog. 19/36
20 4. Configure Windows File Servers for Auditing Refer to the Windows Server TechCenter article for more information: Create a new Group Policy object: Group Policy. If you want to use a local policy, refer for instructions in the following Windows Server TechCenter article: Define or modify auditing policy settings for an event category: Auditing. NOTE: You can configure Advanced audit policy to narrow the range of events tracked and recorded by the product, thus preventing your local Long- Term Archive and the Security event log from overfilling. See Netwrix Auditor Installation and Configuration Guide for more information Configure Event Log Size and Retention Settings The procedure below describes one of the possible ways to adjust event log settings. If you have multiple target computers, you need to perform this procedure on each of them. NOTE: If you move security log files from the default system folder to a non-default one, you must reboot your target server for the reports and search functionality to work properly. 1. On a target server, navigate to Start Programs Administrative Tools Event Viewer. 2. Navigate to Event Viewer tree Windows Logs, right-click Security and select Properties. 20/36
21 4. Configure Windows File Servers for Auditing 3. Make sure Enable logging is selected. 4. In the Maximum log size field specify the size 4GB. 5. Make sure Do not overwrite events (Clear logs manually) is cleared. If this option is selected, change the retention method by selecting another option: Overwrite events as needed (oldest events first). 21/36
22 4. Configure Windows File Servers for Auditing 4.4. Enable Remote Registry Service To enable the Remote Registry service 1. Navigate to Start Administrative Tools Services. 2. In the Services dialog, locate the Remote Registry service, right-click it and select Properties. 3. In the Remote Registry Properties dialog, make sure that the Startup type parameter is set to "Automatic" and click Start. 22/36
23 4. Configure Windows File Servers for Auditing 4. In the Services dialog, ensure that Remote Registry has the "Started" (on pre-windows Server 2012 versions) or the "Running" (on Windows Server 2012 and above) status. 23/36
24 5. Create Managed Object to Audit File Servers 5. Create Managed Object to Audit File Servers To start auditing your IT Infrastructure with Netwrix Auditor, you must create a Managed Object. A Managed Object is a container within Netwrix Auditor that stores information on the auditing scope, the Data Processing Account used for data collection, AuditIntelligence settings, etc. To create a Managed Object to audit file servers 1. On the main Netwrix Auditor Administrator Console page, click the File Servers tile to launch the New Managed Object wizard. 2. On the Select Managed Object Type step, select Computer Collection as a Managed Object type. 3. On the Specify Default Data Processing Account step, click Specify Account. Enter the default Data Processing Account (in the DOMAIN\user format) that will be used by Netwrix Auditor for data collection. For a full list of the rights and permissions required for the Data Processing Account, and instructions on how to configure them, refer to Netwrix Auditor Installation and Configuration Guide. 4. On the Specify Settings step, specify the settings that will be used for Change Summaries, reports and real-time alerts delivery: Setting SMTP server Port Sender address Description Enter your SMTP server name. Specify your SMTP server port number. Enter the address that will appear in the From field. NOTE: It is recommended to click Verify. The system will send a test message to the specified address and inform you if any problems are detected. SMTP Authentication User name Password Select this checkbox if your mail server requires the SMTP authentication. Enter a user name for the SMTP authentication. Enter a password for the SMTP authentication. 24/36
25 5. Create Managed Object to Audit File Servers Setting Confirm password Use Secure Sockets Layer encrypted connection (SSL) Implicit SSL connection mode Description Confirm the password. Select this checkbox if your SMTP server requires SSL to be enabled. Select this checkbox if the implicit SSL mode is used, which means that an SSL connection is established before any meaningful data is sent. 5. On the Specify Computer Collection Name step, enter the computer collection name. 6. On the AuditIntelligence Settings step, make sure that the Make audit data available via summary s only checkbox is cleared. By default, Audit Database is created automatically and is used to store collected audit data. Select one of the following: Automatically install and configure a new instance of SQL Server Express Edition to automatically install and configure SQL Server 2012 Express with Advanced Services. Use an existing SQL Server instance with SQL Server Reporting Services to use an already installed SQL Server instance. Complete the following fields: Option Description SQL Server Settings SQL Server instance Authentication Specify the name of the SQL Server instance to store audit data. Select the authentication type you want to use to connect to the SQL Server instance: Windows authentication SQL Server authentication User name Specify the account to be used to connect to the SQL Server instance. NOTE: This account must be granted the database owner (db_ owner) role and the dbcreator server role. See Netwrix Auditor Installation and Configuration Guide for more information. 25/36
26 5. Create Managed Object to Audit File Servers Option Password Description Enter a password. SQL Server Reporting Services Settings Report Server URL Report Manager URL User name Password Specify the Report Server URL. Make sure that the resource is reachable. Specify the Report Manager URL. Make sure that the resource is reachable. Specify the account to be used to connect to SSRS. Enter a password. 7. On the State-in-Time Reports step, you can enable or disable State-in-Time Reports. This feature allows generating reports on your system's configuration state at a specific moment of time in addition to change reports. If enabled, snapshots will be created daily and written to the audit database. This option is unavailable if the AuditIntelligence settings are not configured. 8. On the Add Items to Computer Collection step, click Add to select items that you want to audit. You can add several items to collection. In the dialog that opens, select the Windows File Share item type and provide a path to a shared resource. 9. On the Select Data Collection Method step, enable the Use Lightweight Agents option. If enabled, an agent will be installed automatically on the audited computer, collect and prefilter data, and return it in a highly compressed format. This significantly improves data transfer and minimizes the impact on the target computers' performance. 10. On the Configure File Server Auditing Settings step, enter your and specify types of access you want to track. 11. On the last step, review your Managed Object settings and click Finish to exit the wizard. The newly created Managed Object will appear under the Managed Objects node. 26/36
27 6. Launch Initial Data Collection 6. Launch Initial Data Collection When a new Managed Object is created, Netwrix Auditor starts collecting data from the audited IT infrastructure. The first data collection gathers information on the audited system's current configuration state. Netwrix Auditor uses this information as a benchmark to collect data on changes. After the first data collection has finished, an notification is sent to your stating that the analysis has completed. In order not to wait until a scheduled data collection, launch it manually. To launch data collection manually 1. In the Netwrix Auditor Administrator Console, navigate to Managed Objects your_managed_ Object_name. 2. In the right pane, click Run. 3. Check your mailbox for an notification and make sure that the data collection has completed successfully. 27/36
28 7. Make Test Changes 7. Make Test Changes Now that the product has collected a snapshot of the audited system's current configuration state, you can make test changes to see how they will be reported by Netwrix Auditor. For example, make the following test changes: Create a new file/folder in your file share Delete a file from your file share Modify a file in your file share NOTE: Before making any test changes to your environment, ensure that you have the sufficient rights, and that the changes conform to your security policy. 28/36
29 8. See How Netwrix Auditor Enables Complete Visibility 8. See How Netwrix Auditor Enables Complete Visibility After you have made test changes to the audited environment, you can see how Netwrix Auditor brings real AuditIntelligence into your IT infrastructure and enables its complete visibility. This section explains how to review your test changes in the Netwrix Auditor client and Change Summary. To launch the Netwrix Auditor client Navigate to Start Netwrix Auditor. Review the following for additional information: Review a Change Summary Browse Data with AuditIntelligence Search Review File Servers Overview Review the All File Servers Activity Report 29/36
30 8. See How Netwrix Auditor Enables Complete Visibility In order not to wait until a scheduled data collection and a Change Summary generation, launch data collection manually. See Launch Initial Data Collection for more information Review a Change Summary A Change Summary is that lists all changes that occurred since the last Change Summary delivery. By default, a Change Summary is generated daily at 3:00 AM and delivered to the specified recipients. You can also launch data collection and a Change Summary generation manually. After the data collection has completed, check your mailbox for a Change Summary and see how your test changes are reported: The example Change Summary provides the following information: Column Action Description Shows the type of action that was performed on the object. Added Removed Modified Object Type Shows the type of the object. 30/36
31 8. See How Netwrix Auditor Enables Complete Visibility Column What Where Who When Details Description Shows the name of the changed object or its path. Shows the name of the server where the change occurred. Shows the name of the account under which the change was made. Shows the exact time when the change occurred. Shows the before and after values of the modified object, object attributes, etc Browse Data with AuditIntelligence Search Netwrix Auditor brings real AuditIntelligence into your IT infrastructure and enables its complete visibility. Netwrix Auditor provides a convenient search interface for investigating incidents and browsing audit data collected across the entire IT infrastructure. When running a search in Netwrix Auditor you are not limited to a certain audited system, change type or object name. Netwrix Auditor allows creating flexible searches in order to get precise results on who changed what, when, and where. After you have launched the initial data collection, made test changes to your environment and run data collection again, you can take advantage of audit search. To browse your audit data and see you test changes 1. On the main Netwrix Auditor page, navigate to Search. 2. Add search filters to your search by clicking on a corresponding icon and providing a value. By default, all entries that contain this filter value are shown. For exact match, use quotation marks. Filters are used to limit your search results. Netwrix Auditor allows you to create a unique set of filters: Add different filters to your search. Search results will be sorted by all selected filters as they work as logical conjunction (Who: Administrator AND Action: Added). Specify several values in the same filter to search for any of them (e.g. Action: Modified OR Action: Removed). To do it, select a filter again and specify a new value. For example, consider adding these filters: 31/36
32 8. See How Netwrix Auditor Enables Complete Visibility Filter Value Specify your account name, as you performed test changes. Specify your file server name. NOTE: Refer to Netwrix Auditor User Guide for detailed instructions on how to apply filters and change match types. As a result, you will see the following filters in the Search field: 3. Click Search. 4. Now, you can limit your search and modify it right from the search results. Double-click on any entry that contains excess data, select Exclude from search and specify a filter, e.g. Action: Read to leave information on modifications and removals only. 32/36
33 8. See How Netwrix Auditor Enables Complete Visibility Your Search field will be updated, the Action not filter will be added. Make sure to click Search again to update your search results. 5. Having reviewed your search results, navigate to Tools. Click Export data to save your search results as a *.pdf or *.csv file. Click Save search to save the selected set of filters. This search will be added to Saved Searches section on the main Netwrix Auditor page so that you will be able to access it instantly. Refer to Netwrix Auditor User Guide for detailed instructions on how to create data searches Review File Servers Overview Enterprise Overview provide a high-level overview of activity trends by date, user, server, object type or audited system in your IT infrastructure. The Enterprise diagram aggregates data on all Managed Objects and all audited systems, while system-specific diagrams provide quick access to important statistics within one audited system. 33/36
34 8. See How Netwrix Auditor Enables Complete Visibility After you have launched the initial data collection, made test changes to your environment and run data collection again, you can take advantage of the File Servers Overview. To see how your changes are reported with File Servers Overview 1. On the main Netwrix Auditor page, navigate to the Enterprise Overview section. 2. Click the File Servers tile to open it. 3. Review your changes. 4. Click on any chart to jump to a table report with the corresponding grouping and filtering of data Review the All File Servers Activity Report Netwrix Auditor allows generating audit reports based on Microsoft SQL Server Reporting Services (SSRS). The Netwrix Auditor client provides a wide variety of predefined reports that aggregate data from the entire audited IT infrastructure, an individual system, or a Managed Object. Change reports can be found under the Reports File Servers File Servers Activity and provide a narrower insight into what is going on in the audited infrastructure and help you stay compliant with various standards and regulations (FISMA, HIPAA, PCI, SOX, etc.). 34/36
35 8. See How Netwrix Auditor Enables Complete Visibility After you have launched the initial data collection, made test changes to your environment and run data collection again, you can take advantage of the reports functionality. To see how your changes are listed in the report 1. In the Netwrix Auditor client, navigate to Reports File Servers File Servers Activity. 2. Select the All File Servers Activity report. 3. Click View to open the report. 35/36
36 9. Related Documentation 9. Related Documentation The table below lists all documents available to support Netwrix Auditor for File Servers: Document Netwrix Auditor Installation and Configuration Guide Netwrix Auditor Administrator's Guide Netwrix Auditor User Guide Netwrix Auditor Release Notes Description Provides detailed instructions on how to install Netwrix Auditor, and explains how to configure your environment for auditing. Provides a detailed explanation of the Netwrix Auditor features and step-by-step instructions on how to configure and use the product. Provides detailed instruction on how to enable complete visibility with AuditIntelligence provided by Netwrix Auditor. Contains a list of the known issues that customers may experience with Netwrix Auditor 7.0, and suggests workarounds for these issues. 36/36
Netwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNetwrix Auditor for Windows Server
Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationNetwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationNetwrix Auditor for Windows File Servers
Netwrix Auditor for Windows File Servers Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNetwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015
Netwrix Auditor Administrator's Guide Version: 7.1 10/30/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation
More informationNETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationNETWRIX CHANGE REPORTER SUITE
NETWRIX CHANGE REPORTER SUITE QUICK-START GUIDE Product Version: 2.0 November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNetWrix SQL Server Change Reporter
NetWrix SQL Server Change Reporter Version 2.2 Administrator Guide Contents NetWrix SQL Server Change Reporter Administrator Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
More informationNetwrix Auditor. Installation and Configuration Guide. Version: 7.0 8/10/2015
Netwrix Auditor Installation and Configuration Guide Version: 7.0 8/10/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNETWRIX USER ACTIVITY VIDEO REPORTER
NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationNetWrix Exchange Change Reporter
NetWrix Exchange Change Reporter Version 7 Administrator s Guide Contents NetWrix Exchange Change Reporter Administrator s Guide 1. INTRODUCTION... 4 1.1 KEY FEATURES... 5 1.2 LICENSING... 6 1.3 HOW IT
More informationNETWRIX CHANGE NOTIFIER
NETWRIX CHANGE NOTIFIER FOR SQL SERVER QUICK-START GUIDE Product Version: 2.6.194 February 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationCONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR
CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use
More informationNetWrix SQL Server Change Reporter
NetWrix SQL Server Change Reporter Version 2.2 Enterprise Edition Quick Start Guide Contents NetWrix SQL Server Change Reporter Enterprise Edition Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES...
More informationNETWRIX DISK SPACE MONITOR
NETWRIX DISK SPACE MONITOR QUICK-START GUIDE Product Version: 1.2 February 2015 Copyright 2015 Netwrix Corporation. All Rights Reserved Legal Notice The information in this publication is furnished for
More informationNetWrix Server Configuration Monitor
NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
More informationNetWrix File Server Change Reporter. Quick Start Guide
NetWrix File Server Change Reporter Quick Start Guide Introduction... 3 Product Features... 3 Licensing... 3 How It Works... 4 Getting Started... 5 System Requirements... 5 Setup... 5 Additional Considerations...
More informationINSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES
INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES TECHNICAL ARTICLE November 2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationNetwrix Auditor. CEF Export Add-on Quick-Start Guide. Version: 8.0 6/3/2016
Netwrix Auditor CEF Export Add-on Quick-Start Guide Version: 8.0 6/3/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationCONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES
CONFIGURING MICROSOFT SQL SERVER REPORTING SERVICES TECHNICAL ARTICLE November/2011. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationLepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
More informationNetWrix Logon Reporter V 2.0
NetWrix Logon Reporter V 2.0 Quick Start Guide Table of Contents 1. Introduction... 3 1.1. Product Features... 3 1.2. Licensing... 4 1.3. How It Works... 5 1.4. Report Types Available in the Advanced Mode...
More informationNETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
More informationTROUBLESHOOTING INCORRECT REPORTING OF THE WHO CHANGED PARAMETER
TROUBLESHOOTING INCORRECT REPORTING OF THE WHO CHANGED PARAMETER TECHNICAL ARTICLE Product Version: 3.0 December/2011. Legal Notice The information in this publication is furnished for information use
More informationNetWrix Privileged Account Manager Version 4.0 Quick Start Guide
NetWrix Privileged Account Manager Version 4.0 Quick Start Guide Table of Contents Table of Contents... 2 1. Introduction... 3 1.1. What is NetWrix Privileged Account Manager?... 3 1.2. Licensing... 3
More informationLepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER USER GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from NetWrix
More informationNetWrix Account Lockout Examiner Version 4.0 Administrator Guide
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email
More informationNetWrix Exchange Mail Archiver Version 1.5 Administrator Guide
NetWrix Exchange Mail Archiver Version 1.5 Administrator Guide Contents 1. Introduction... 3 1.1. What is the NetWrix Exchange Mail Archiver?...3 1.2. Product Architecture...4 1.3. Licensing...5 1.4. System
More informationNetwrix Auditor. Role-Based Access. Version: 7.1 10/27/2015
Netwrix Auditor Role-Based Access Version: 7.1 10/27/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation
More informationNetWrix USB Blocker Version 3.6 Quick Start Guide
NetWrix USB Blocker Version 3.6 Quick Start Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Getting Started...5 3.1.
More informationNetwrix Auditor. Virtual Appliance Deployment Guide. Version: 8.0 8/1/2016
Netwrix Auditor Virtual Appliance Deployment Guide Version: 8.0 8/1/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationNTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
More informationNETWRIX IDENTITY MANAGEMENT SUITE
NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationServer Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
More informationNovell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
More informationSecrets of Event Viewer for Active Directory Security Auditing Lepide Software
Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related
More informationNetWrix USB Blocker. Version 3.6 Administrator Guide
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
More informationActive Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
More informationNetwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure
Netwrix Auditor Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure netwrix.com netwrix.com/social 01 Product Overview Netwrix Auditor
More informationHow To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
More informationVERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
More informationNetWrix SQL Server Change Reporter. Quick Start Guide
NetWrix SQL Server Change Reporter Quick Start Guide NetWrix SQL Server Change Reporter Quick Start Guide Contents Introduction...3 Product Features...3 Licensing...4 How It Works...5 Getting Started...6
More informationFile Auditor for NAS, Net App Edition
File Auditor for NAS, Net App Edition Installation Guide Revision 1.2 - July 2015 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for
More informationQuadro Configuration Console User's Guide. Table of Contents. Table of Contents
Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...
More information[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net
Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net All rights reserved. Redistribution
More informationEnterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
More informationDell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationSymantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
More informationHow To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (
GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationLepide Event Log Manager. Users Help Manual. Lepide Event Log Manager. Lepide Software Private Limited. Page 1
Users Help Manual Lepide Event Log Manager Lepide Software Private Limited. Page 1 Users Help Manual for Lepide Event Log Manager Lepide Software Private Limited, All Rights Reserved This User Guide and
More informationVERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationDell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3. User Guide
Dell MessageStats for Lync and the MessageStats Report Pack for Lync & OCS 7.3 User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationDesktop Surveillance Help
Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationAcronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
More informationStruxureWare Power Monitoring 7.0.1
StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions
More informationInstalling GFI MailArchiver
Installing GFI MailArchiver Introduction This chapter highlights important points you should take into consideration before installing GFI MailArchiver on your network, so that you can make the best decisions
More informationNTP Software File Reporter Analysis Server
NTP Software File Reporter Analysis Server Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for installing NTP Software File Reporter Analysis Server from an administrator
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationTable of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
More informationEnterprise Manager. Version 6.2. Administrator s Guide
Enterprise Manager Version 6.2 Administrator s Guide Enterprise Manager 6.2 Administrator s Guide Document Number 680-017-017 Revision Date Description A August 2012 Initial release to support version
More informationLenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
More informationDell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationInstalling GFI MailArchiver
Installing GFI MailArchiver Introduction This chapter highlights important points you should take into consideration before installing GFI MailArchiver on your network, so that you can make the best decisions
More informationManual POLICY PATROL SECURE FILE TRANSFER
Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
More information2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
More informationEnterprise Reporter Report Library
Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports
More informationRecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More information7.5 7.5. Spotlight on Messaging. Evaluator s Guide
7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationStep-by-Step Guide for Microsoft Advanced Group Policy Management 4.0
Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Microsoft Corporation Published: September 2009 Abstract This step-by-step guide describes a sample scenario for installing Microsoft
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationInstalling Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
More informationVeeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
More informationTROUBLESHOOTING GUIDE
Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,
More informationExclaimer Signature Manager 2.0 User Manual
Exclaimer Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 info@exclaimer.com Contents GETTING STARTED... 10 Signature Manager Overview... 11 How does it Work?... 11 But That's Not All...... 12 And
More informationInstalling GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationUser Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
More informationEkran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
More informationKaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
More informationInstalling GFI MailArchiver
Installing GFI MailArchiver Introduction This chapter highlights important points you should take into consideration before installing GFI MailArchiver on your network, so that you can make the best decisions
More informationOnline Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
More informationAbout Recovery Manager for Active
Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System
More informationOnline Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationSymantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
More informationPOLICY PATROL MFT. Manual
POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationAbout This Guide... 4. Signature Manager Outlook Edition Overview... 5
Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System
More informationAdministration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201
Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table
More information