Managing User Security: Roles and Scopes

Size: px
Start display at page:

Download "Managing User Security: Roles and Scopes"

Transcription

1 CHAPTER 10 These topics describe how Cisco ANA implements a two-dimensional security engine combining a role-based security mechanism with scopes (groups of NEs) that are granted to users. In addition, it describes managing users in the Cisco ANA platform, including defining users and passwords. Overview of User Authentication and Authorization, page 10-1 Steps for Setting Up Users and Scopes, page 10-5 Creating and Managing Scopes, page 10-6 Managing User Accounts and Controlling User Access, page 10-8 Deleting a Cisco ANA User Account, page Changing a User s Cisco ANA Password, page Overview of User Authentication and Authorization Cisco ANA uses a combination of methods to manage user authentication and authorization: User authentication can be managed locally by Cisco ANA or externally by an LDAP application. Either method can be used to validate user accounts and passwords, thus controlling who can log in to Cisco ANA. If you use Cisco ANA, user information and passwords are stored in the Cisco ANA database. If you use an external LDAP application, passwords are stored on the external LDAP server. See External Authentication, page User authorization is managed through a combination of user access roles and scopes: User access roles control the actions a user can perform in the Cisco ANA GUI clients. When a user s account is created, the user is assigned an access role that determines the user s default permissions. For more information, see User Access Roles and Default Permissions, page Scopes are groups of network elements that are created by administrators. Once a scope is created, you can assign it to users. A user s default permissions determine the actions the user can perform on the NEs in the scope. These actions are referred to as the user s security level on that scope. If desired, you can assign the user a more strict user access role for a scope. For more information, see Device Scopes, page

2 Overview of User Authentication and Authorization Chapter 10 Cisco ANA determines whether a user is authorized to perform a task as follows: For GUI-based tasks (tasks that do not affect devices), authorization is based on the default permission that is assigned to the user s account. For device-based tasks (tasks that do affect devices), authorization is based on the device scope assigned to the user s account that is, whether the device is in the user s assigned scopes and whether the user meets the minimum security level for that scope. User authorization information (roles and scopes) is always stored in the Cisco ANA database. The external LDAP server, if used, only stores passwords. External Authentication External authentication means that user authentication and passwords are validated by an external application, rather than by Cisco ANA. When Cisco ANA performs the authentication, Cisco ANA validates users by checking information that is saved in the Cisco ANA database. If you use an LDAP application, the information is validated by the external LDAP server. If Cisco ANA is using external authentication and cannot communicate with the LDAP server, the only user permitted to log back into Cisco ANA is root. This is because root is the LDAP emergency user, and is validated only by Cisco ANA. The root user can then log in to Cisco ANA, change the authentication method to local, and edit user accounts so that those users can subsequently log in. Cisco ANA uses LDAP version 3. If you want to use external authentication, you must do the following: Perform the necessary installation prerequisites. See the Cisco Active Network Abstraction Installation Guide. Configure Cisco ANA so that it can communicate with the LDAP server. See Using an External LDAP Server for Password Authentication, page If you are switching from external authentication to Cisco ANA authentication, you can import the user information from the LDAP server into Cisco ANA. That procedure is described in the Cisco Active Network Abstraction Installation Guide. User Access Roles and Default Permissions User access roles control the actions a user is authorized to perform in Cisco ANA. Cisco ANA provides five predefined security access roles that you can grant to users to enable system functions (see Table 10-1). Table 10-1 Role Viewer Operator OperatorPlus User Access Roles Views the network, links, events, and inventory. Has read-only access to the network and to nonprivileged system functions. Performs most day-to-day business operations such as managing alarms, manipulating maps, viewing network-related information, and managing business attachments. Manages the alarm lifecycle. 10-2

3 Chapter 10 Overview of User Authentication and Authorization Table 10-1 Role Configurator Administrator User Access Roles (continued) Performs tasks and tests related to configuration and activation of services, through Command Builder, Configuration Archive, NEIM, and activation commands. Manages the Cisco ANA system and its security using the Cisco ANA Manage GUI. User access roles are used in two ways: for default permissions and for device scope security levels. When you create a user account, you assign one user access role to the account. This role determines the user s default permissions, which in turn determine the GUI-based functions the user can perform (those that do not affect devices). The device-based operations (that do affect devices) the user can perform are controlled by the user s assigned device scopes. When a new user is defined as an Administrator, this user can perform all administrative actions, including opening all maps, working with all scopes, and managing the system using Cisco ANA Manage. These activities are performed with the highest privileges. Cisco ANA Manage supports multiple administrators. Once a user account is created, you can assign a device scope to the account. The device scope controls which devices a user can access, and the actions they can perform on those devices. For more information, see Device Scopes, page Device Scopes Device scopes are groups of managed NEs. Users can only access devices when a device scope has been assigned to their account. In this way, you can control the devices a user can access. Furthermore, you can designate a security level (user access role) within each scope that controls the actions users can perform on those NEs. (The GUI-based operations (that do not affect devices) are controlled by the user s default permissions.) Cisco ANA provides a predefined scope called All Managed Elements, which cannot be edited. It has these characteristics: The scope includes all network elements (as the name implies). This scope is automatically assigned to user accounts with Administrator privileges when the accounts are newly created. This is done by default. If necessary, you can edit the scope to have less privileges, or even delete it completely, which would give the Administrator full access to all GUI functions that do not affect devices. The scope can be assigned to non-administrator user accounts, but with lower privileges. For example, for an account with OperatorPlus privileges, you could assign the All Managed Devices scope to the account, but the highest available security level would be Configurator. Whenever the All Managed Elements scope is assigned to an Administrator either when the Administrator account is created or after increasing a user s privileges to Administrator role the scope has a unique (and recognizable) security level called Special. The Special security level is equivalent to the Administrator security level and grants the Administrator user complete access to the network devices. 10-3

4 Overview of User Authentication and Authorization Chapter 10 Note that a device scope can override a GUI user access role. Here is an example: 1. John has the Operator user access role (his default permission) for GUI operations. 2. John has the Configurator role for the device scope CE-SJ. John can perform Configurator operations on any devices in the device scope CE-SJ, even though his default permission is the Operator user access role. Table 10-2 describes the actions a user can perform in the GUI clients or in a scope, based on each user access role. Table 10-2 User Access Role Administrator Configurator Scope and GUI Functions Permitted According to User Access Roles GUI-Based Actions Permitted to Users with This Role Administrators are the only ones that can perform actions in Cisco ANA Manage, which means managing: Gateways, units, AVMs, VNEs. Event notifications Global settings: Database segments, event management settings, polling groups, protection groups, service disclaimers, report settings, and security settings (including user authentication method and password rules). Device scopes. User accounts. Manage static topology links. Workflow templates and workflows. Administrators are the only ones that can perform event management actions in Cisco ANA EventVision. Map management: Manage the maps that users are allowed to access. Map management: Create maps. Advanced tools: Ping and Telnet an NE directly from the client. Enable and disable port alarms. Cisco ANA Command Builder. Device Based (Scope) Actions Permitted to Users with This Role All Activation services: Add and publish activation commands on managed NE (regardless of whether the NE is inside or outside the Configurator s scope) 10-4

5 Chapter 10 Steps for Setting Up Users and Scopes Table 10-2 Scope and GUI Functions Permitted According to User Access Roles (continued) User Access Role OperatorPlus Operator Viewer GUI-Based Actions Permitted to Users with This Role Map management: Create new maps and add NEs. Edit, delete, and rename maps. Save maps. Map manipulation: Create and break aggregations. Change map layout. Set background image. Create business links. Map manipulation: Create and delete business tags. Application: Log into Cisco ANA NetworkVision. Change user password (if using local authentication). View the device list. View map. View link properties. Use table filter. Export from any table. Device Based (Scope) Actions Permitted to Users with This Role Map manipulation: Create business tags for NEs. Display network information: Include path tool traffic, rates, drops, or any dynamic data. Display network information: Refresh port information from NE. Display network and business tag information: View alarm list and alarm properties, and find alarms. Find and view attachments. View NE properties and inventory. Calculate and view affected parties. Open port utilization graph. Steps for Setting Up Users and Scopes Follow these steps to set up user accounts and device scopes: 1. Install licenses. This allows you to control and monitor the number of client and BQL connections over a limited or unlimited period of time based on the client licenses installed. For more information, see Cisco ANA Licensing, page Configure external authentication if you want to use an external LDAP server to store passwords and authenticate users. For more information, see Using an External LDAP Server for Password Authentication, page Define scopes. This enables you to group specific managed NEs so that users can view and manage those NEs based on their individual user role. For more information, see Creating and Managing Scopes, page

6 Creating and Managing Scopes Chapter Define Cisco ANA user accounts. This enables you to define and manage user accounts, including the maps the user can access. For more information, see Managing User Accounts and Controlling User Access, page Grant scopes and roles to users. This enables you to manage general user account information, the list of scopes assigned to each user, and security access roles per scope. For more information, see Changing User Information and Disabling Accounts (General Tab), page Creating and Managing Scopes Cisco ANA Manage enables you to group specific managed NEs so that users can view and manage those NEs based on their user role or permission. After a scope is created, it can be assigned to a user. Multiple scopes can be assigned to a single user and a single scope can be assigned to multiple users. When the scope is assigned to a user, you must provide the user with security access roles that define the user s role within the assigned scope. See Changing User Information and Disabling Accounts (General Tab), page These topics explain how to manage scopes: Creating a Scope, page 10-6 Editing and Viewing Scope Properties, page 10-7 Deleting Scopes, page 10-7 Creating a Scope You must have Administrator privileges (user access role) to use this and all other functions in Cisco ANA Manage. To create a scope: Select Scopes in the Cisco ANA Manage window. Open the New Scope dialog box in one of the following ways: Right-click Scopes, then choose New Scope. Choose File > New Scope. Click New Scope in the toolbar. In the Scope field, enter a name for the scope. Specify the devices to include in the scope: To add devices to the scope, select the required devices from the Available Devices list and then click Add All or Add Selected to move the devices to the Active Devices list. To remove devices from the scope, select the devices in the Active Devices lists and then click Remove Selected or Remove All to move the devices to the Available Devices list. Note You can select multiple devices by using the Ctrl key. 10-6

7 Chapter 10 Creating and Managing Scopes Step 5 When the Active Devices list includes the required devices for the scope, click OK. The scope is saved and is displayed in the content area. Editing and Viewing Scope Properties Cisco ANA Manage enables you to edit or view the details of a scope. To edit or view scope properties: Step 5 Select Scopes in the navigation pane. Select the scope that you want to edit or view in the content area. Open the Properties dialog box for the scope in one of the following ways: Right-click the scope, then choose Properties. Choose File > Properties. Click Properties in the toolbar. For more information about the Properties dialog box, see Creating and Managing Scopes, page Edit and view the properties as required. Click OK. Deleting Scopes When a scope is deleted, it is deleted from all users who have the assigned scope. You must have Administrator privileges (user access role) to use this and all other functions in Cisco ANA Manage. To delete a scope: Select Scopes in the navigation pane. Select the scope that you want to delete in the content area. Note You can select multiple scopes by using the Ctrl key. Right-click the scope, then choose Delete. The scope is deleted and is removed from the content area. 10-7

8 Managing User Accounts and Controlling User Access Chapter 10 Managing User Accounts and Controlling User Access The Users windows enable you to define and manage user accounts. This includes managing general user information as well as security access rights and forced login changes, as required. You can also monitor a user s last login time. Configuring a new user account in Cisco ANA involves these steps: 1. Create the user account and assign the default permissions that will control the user s access to GUI functions. See Creating User Accounts and Assigning Default Permissions, page (Optional) Specify the maximum number of client connections and when the user must change their password. See Changing User Information and Disabling Accounts (General Tab), page Apply scopes and scope permissions that will control the user s access to network elements. See Controlling User Permissions and Access to Scopes (Security Tab), page (Optional) Control which existing maps a user can access. This feature is disabled by default, and users can only access the maps they create after their user account is enabled. To enable this feature and change configure user access to existing maps, see Controlling User Access to Maps (Maps Tab), page Creating User Accounts and Assigning Default Permissions A new user is created with the following predefined system defaults: No scopes are assigned to the user. The number of connections is unlimited. The password must be changed every 30 days. The maximum number of login attempts is 5. You must have Administrator privileges (user access role) to use this and all other functions in Cisco ANA Manage. To define a user account: Select Users in the Cisco ANA Manage window. Open the New User dialog box in one of the following ways: Right-click Users, then choose New User. Choose File > New User. Click New User in the toolbar. 10-8

9 Chapter 10 Managing User Accounts and Controlling User Access Enter the information required to define a new user: Field User Name Full Name External user only Password Confirm password Role Force password change at next login Enter the new user s name to be used for logging in. Note The username is unique and can contain a maximum of 20 characters. Special characters cannot be used. (Optional) Enter the full name of the user. Note Valid entries contain a maximum of 20 characters; special characters cannot be used. (Optional) Enter a free text description of the user. If checked, Cisco ANA will only let the user log in if the user s password can be validated by an external LDAP server. The password fields are disabled. (If external authentication is being used, the box is checked by default. See Using an External LDAP Server for Password Authentication, page 6-10.) Enter the new Cisco ANA password, which is then stored in the Cisco ANA database. (This field is disabled if the Non-ANA Authentication Only check box is checked.) Passwords must adhere to the global password rules set by the administrator (see Setting Global Password Rules, page 6-16). Reenter the new Cisco ANA password. In the drop-down list, choose the security access role that will be the user s default permissions. Note The permission applies only to activities or actions that are not related to an NE. For more information on the functionality that a user can perform, see User Access Roles and Default Permissions, page This check box is checked by default and forces the user to change the user password when they next log in. (This field is disabled if the Non-ANA Authentication Only check box is checked.) Click Create. The new username and default security access role are displayed in the content area. The basic user account is created. To verify your settings, see Changing User Information and Disabling Accounts (General Tab), page The user will not be able to see any network elements until you assign a scope to the user. See Controlling User Permissions and Access to Scopes (Security Tab), page

10 Managing User Accounts and Controlling User Access Chapter 10 Changing User Information and Disabling Accounts (General Tab) After you create a user account, when you view the user properties and select the General tab, you will see the information you entered when the account was created. You can further refine the account by controlling the number of GUI client connections for the user, or forcing them to change their password after a certain time. You can also disable or reenable a user account using the following procedure. You must have Administrator privileges (user access role) to use this and all other functions in Cisco ANA Manage. To view or edit general user information: Select Users in the Cisco ANA window. Right-click the required user, then choose Properties. The Properties dialog box is displayed with the General tab selected by default. Edit the general properties as required: Field User Name Last Login Full Name Enable account External user only Limit connections to The current username. The username cannot be modified. The date and time that the user last logged in. The user s full name. A description of the user. Check this check box to enable the user account, or uncheck the check box to disable the user account. The user account is automatically locked when the number of logins defined is exceeded (the Limit Connections to option is enabled). It is also locked if the user account is not active for a certain number of days, as configured in the Global Settings branch (see Automatically Disabling Accounts for Inactive Users, page 6-17); by default, this period is 30 days. You can manually lock or unlock a user s account at any time. A user whose account is locked cannot log into the system. If checked, Cisco ANA will only let the user log in if their password can be validated by an external LDAP server. The passwords entered in the Password field in this dialog box will be disabled, and the user will not be able to log in even if Cisco ANA switches back to local authentication. (If external authentication is being used, the box is checked by default. See Using an External LDAP Server for Password Authentication, page 6-10.) If you uncheck this check box, Cisco ANA prompts you for a new password that will be used for local authentication. The password is stored in the Cisco ANA database, and the Force Password fields become active. The number of Cisco ANA client sessions that the user can be running at any one time

11 Chapter 10 Managing User Accounts and Controlling User Access Field Force password change after days Force password change at next login If checked, it forces the user to change their password after a specific number of days. Uncheck this check box to allow the user to retain their current password indefinitely. If you check the check box, enter the number of days after which the user is forced to change their password. (This field is disabled if the Non-ANA Authentication Only check box is checked.) Check this check box to force the user to change their user password when they next log in. You can set this option at any time. (This field is disabled if the Non-ANA Authentication Only check box is checked.) Step 5 Click Apply to accept your entries. Click OK to close the Properties dialog box or click the Security tab to assign scopes to the user. (See Controlling User Permissions and Access to Scopes (Security Tab), page for more information.) Controlling User Permissions and Access to Scopes (Security Tab) The Security tab enables you to manage the user s capability to view and manage applications and NEs by applying user scopes and security access roles. Users cannot view any network elements until a scope is assigned to them. The scopes, and the level of access to the network elements, is controlled by the settings you specify in the following procedure. Note A user can have different security access roles for different scopes. You must have Administrator privileges (user access role) to use this and all other functions in Cisco ANA Manage. To assign a scope and security level to a user: Step 5 Select the Users branch in Cisco ANA. Right-click the required user, then choose Properties. In the User Properties dialog box, click the Security tab. In the Default drop-down list, choose the default security level for the user. By default, a new user is assigned the viewer security access role. The level that you select here is the value displayed in the ANA Users table. Click Add to add a scope to the active rights of the user

12 Managing User Accounts and Controlling User Access Chapter 10 Step 6 In the Security Level dialog box, choose the required scope and the appropriate security level within this scope for the user: Field Available Scopes Security Level Lists all predefined and unassigned scopes. Displays the security access roles for the defined scopes. For more information, see Device Scopes, page Step 7 Step 8 Click OK. The scope is added to the list of Active Rights in the Security tab. Click Apply, then OK. Controlling User Access to Maps (Maps Tab) You can use the Maps tab to control user access to existing maps. Note This feature is disabled by default. When logging in to Cisco ANA NetworkVision, new users do not have permission to view any existing maps; they can only access maps they create going forward. However, administrators can assign existing maps to new users by enabling this feature and manually assigning the maps. You must have Administrator privileges (user access role) to use this and all other functions in Cisco ANA Manage. To enable this feature. Log into the gateway as anauser (where anauser is the UNIX account for the Cisco ANA application, created when Cisco ANA is installed; an example of anauser is ana37), and change to the $ANAHOME/Main directory: # cd $ANAHOME/Main Run the following command (which is one line): # runregtool.sh -gs set site/mmvm/services/securitymanager/map-security-enabled true When the gateway server returns a success message, restart the gateway. To assign maps to a user (after enabling the feature): Select Users in the Cisco ANA window. Right-click the required user, then choose Properties. The User Properties dialog box is displayed

13 Chapter 10 Deleting a Cisco ANA User Account Click the Maps tab. The Maps tab is divided into two parts: The left side displays a list of all available maps in the database that have not been assigned to the user. The right side displays all maps that have been assigned to the user and that the user can open and manage in Cisco ANA NetworkVision. The following buttons are displayed between the available maps and assigned maps lists in the Maps tab: Button Moves the selected map to the Assigned Maps list. Move the entire available map list to the Assigned Maps list. Removes a selected map from the assigned map list to the Available Map list. Removes the entire assigned map list to the Available Map list. Choose a map from the list of Available Maps, then click the required button to add the map to the list of Assigned Maps to the user. Note You can select multiple rows by using the Ctrl key. Step 5 Step 6 Choose and move maps between the two lists, as required, using the appropriate buttons. Click OK to confirm the user s assigned maps. Deleting a Cisco ANA User Account You must have Administrator privileges (user access role) to use this and all other functions in Cisco ANA Manage. To delete a user account: Select Users in the Cisco ANA window. In the content area, select the user account that you want to delete. Note You can select multiple rows by using the Ctrl key. Right-click the user, then choose Delete. The selected user is deleted, and is not displayed in the content area

14 Changing a User s Cisco ANA Password Chapter 10 Changing a User s Cisco ANA Password You can use Cisco ANA Manage to change a user s Cisco ANA password at any time. Passwords must adhere to the global password rules set by the administrator (see Setting Global Password Rules, page 6-16). The following procedures apply only if you are using Cisco ANA to validate users. If you are using an external LDAP application to manage passwords, you must change the passwords in the LDAP server. There are different procedures for administrators and for users, as described in the following. You must have Administrator privileges (user access role) to use this and all other functions in Cisco ANA Manage. Changing Passwords Procedure for Administrator To change a user s password as an administrator: Step 5 Step 6 Select Users in the Cisco ANA window. In the content area, select the user whose password you want to change. Right-click the required user, then choose Change Password. Enter the new password in the Password and Confirm Password fields. Click OK. A confirmation message is displayed. Click OK. Changing Passwords Procedure for Users Cisco ANA Manage also enables the current user to initiate a change of password. To change your password as a user: Step 5 Choose Tools > Change User Password. Enter the old password in the Old Password field. Enter the new password in the New Password and Confirm Password fields. Click OK. A confirmation message is displayed. Click OK

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

System Administration and Log Management

System Administration and Log Management CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

End User Configuration

End User Configuration CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.

More information

Creating Home Directories for Windows and Macintosh Computers

Creating Home Directories for Windows and Macintosh Computers ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory

More information

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054

More information

Integrating with IBM Tivoli TSOM

Integrating with IBM Tivoli TSOM Integration Notes Integrating with IBM Tivoli TSOM The Cascade Profiler integrates with the IBM Tivoli Security Operations Manager (TSOM) through the use of SNMP traps. It has been tested with TSOM Version

More information

EMC Documentum Webtop

EMC Documentum Webtop EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights

More information

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Active Directory integration with CloudByte ElastiStor

Active Directory integration with CloudByte ElastiStor Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level

More information

Protected Trust Directory Sync Guide

Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory

More information

Sample Configuration: Cisco UCS, LDAP and Active Directory

Sample Configuration: Cisco UCS, LDAP and Active Directory First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

StreamServe Persuasion SP5 Control Center

StreamServe Persuasion SP5 Control Center StreamServe Persuasion SP5 Control Center User Guide Rev C StreamServe Persuasion SP5 Control Center User Guide Rev C OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other international patents

More information

Setting the Management IP Address

Setting the Management IP Address This chapter includes the following sections: Management IP Address, page 1 Configuring the Management IP Address on a Blade Server, page 2 Configuring the Management IP Address on a Rack Server, page

More information

SQL Server Setup for Assistant/Pro applications Compliance Information Systems

SQL Server Setup for Assistant/Pro applications Compliance Information Systems SQL Server Setup for Assistant/Pro applications Compliance Information Systems The following document covers the process of setting up the SQL Server databases for the Assistant/PRO software products form

More information

TECHNICAL TRAINING LAB INSTRUCTIONS

TECHNICAL TRAINING LAB INSTRUCTIONS In this lab you will learn how to login to the TotalAgility Designer and navigate around it. You will also learn how to set common Server Settings, create a simple capture workflow business process, save,

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Strategic Asset Tracking System User Guide

Strategic Asset Tracking System User Guide Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data

More information

Administering Cisco ISE

Administering Cisco ISE CHAPTER 8 This chapter describes the administrative activities for the Cisco Identity Services Engine (ISE) and how to perform them. The following topics are covered: Logging In, page 8-1 System Time and

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Chapter 15: Forms. User Guide. 1 P a g e

Chapter 15: Forms. User Guide. 1 P a g e User Guide Chapter 15 Forms Engine 1 P a g e Table of Contents Introduction... 3 Form Building Basics... 4 1) About Form Templates... 4 2) About Form Instances... 4 Key Information... 4 Accessing the Form

More information

Microsoft Office 365 online archive features and FAQs

Microsoft Office 365 online archive features and FAQs Microsoft Office 365 online archive features and FAQs 1 Contents Contents... 2 Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 3 Office 365 Archive... 4 Office 365 Archive

More information

EMC Smarts Network Configuration Manager

EMC Smarts Network Configuration Manager EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015

More information

LogMeIn Network Console Version 8 Getting Started Guide

LogMeIn Network Console Version 8 Getting Started Guide LogMeIn Network Console Version 8 Getting Started Guide April 2007 1. About the Network Console... 2 2. User Interface...2 3. Quick Start... 2 4. Network & Subnet Scans...3 5. Quick Connect...3 6. Operations...

More information

ATX Document Manager. User Guide

ATX Document Manager. User Guide ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2010 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

Backup Assistant. User Guide. NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6

Backup Assistant. User Guide. NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6 Backup Assistant User Guide NEC NEC Unified Solutions, Inc. March 2008 NDA-30282, Revision 6 Liability Disclaimer NEC Unified Solutions, Inc. reserves the right to change the specifications, functions,

More information

FTP, IIS, and Firewall Reference and Troubleshooting

FTP, IIS, and Firewall Reference and Troubleshooting FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the

More information

HIPAA Compliance Use Case

HIPAA Compliance Use Case Overview HIPAA Compliance helps ensure that all medical records, medical billing, and patient accounts meet certain consistent standards with regard to documentation, handling, and privacy. Current Situation

More information

SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server.

SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server. Contents For Administrators... 3 Set up SourceAnywhere... 3 SourceAnywhere Service Configurator... 3 Start Service... 3 IP & Port... 3 SQL Connection... 4 SourceAnywhere Server Manager... 4 Add User...

More information

Skybot Scheduler Release Notes

Skybot Scheduler Release Notes Skybot Scheduler Release Notes The following is a list of new features and enhancements included in each release of Skybot Scheduler. Skybot Scheduler 3.3 Oracle interface The new Skybot Scheduler Oracle

More information

Your Question. Net Report Answer

Your Question. Net Report Answer Your Question Article: 00120 Question: How to Configure External Authentication for Net Report Web Portal Net Report Answer Introduction Security devices can be used to control access to network resources.

More information

Video Administration Backup and Restore Procedures

Video Administration Backup and Restore Procedures CHAPTER 12 Video Administration Backup and Restore Procedures This chapter provides procedures for backing up and restoring the Video Administration database and configuration files. See the following

More information

Training Module 1: Administration (logical) (for Privia version 5.9)

Training Module 1: Administration (logical) (for Privia version 5.9) Training Module : Administration (logical) (for Privia version.9) Copyright 0 by Privia LLC. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

FileMaker Security Guide The Key to Securing Your Apps

FileMaker Security Guide The Key to Securing Your Apps FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account

More information

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management

More information

HDAccess Administrators User Manual. Help Desk Authority 9.0

HDAccess Administrators User Manual. Help Desk Authority 9.0 HDAccess Administrators User Manual Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks

More information

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE

PRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are

More information

Configuring WMI on Windows Vista and Windows Server 2008 for Application Performance Monitor

Configuring WMI on Windows Vista and Windows Server 2008 for Application Performance Monitor Configuring WMI on Windows Vista and Windows Server 2008 for Application Performance Monitor Revised 1/22/2008 Requirements...1 Checking Application Performance Monitor Credentials Group Memberships...1

More information

10.3.1.8 Lab - Configure a Windows 7 Firewall

10.3.1.8 Lab - Configure a Windows 7 Firewall 5.0 10.3.1.8 Lab - Configure a Windows 7 Firewall Print and complete this lab. In this lab, you will explore the Windows 7 Firewall and configure some advanced settings. Recommended Equipment Step 1 Two

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 FTP Server Configuration Table of contents Overview... 2 IIS FTP server configuration... 2 Installing FTP v7.5 for IIS... 2 Creating an FTP site with basic authentication...

More information

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

ChromQuest 5.0 Chromatography Data System

ChromQuest 5.0 Chromatography Data System ChromQuest 5.0 Chromatography Data System Administrator Guide CHROM-97251 Revision A March 2008 2008 Thermo Fisher Scientific Inc. All rights reserved. Surveyor is a registered trademark of Thermo Fisher

More information

Managing users. Account sources. Chapter 1

Managing users. Account sources. Chapter 1 Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service

More information

Reference and Troubleshooting: FTP, IIS, and Firewall Information

Reference and Troubleshooting: FTP, IIS, and Firewall Information APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the

More information

PRiSM Security. Configuration and considerations

PRiSM Security. Configuration and considerations PRiSM Security Configuration and considerations Agenda Security overview Authentication Adding a User Security Groups Security Roles Asset Roles Security Overview Three Aspects of Security Authentication

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

Managing User Accounts

Managing User Accounts Managing User Accounts This chapter includes the following sections: Configuring Local Users, page 1 Active Directory, page 2 Viewing User Sessions, page 6 Configuring Local Users Before You Begin You

More information

In this lab you will explore the Windows XP Firewall and configure some advanced settings.

In this lab you will explore the Windows XP Firewall and configure some advanced settings. 16.3.2 Lab: Configure Windows XP Firewall Print and complete this lab. In this lab you will explore the Windows XP Firewall and configure some advanced settings. Recommended Equipment Two computers directly

More information

Setting up an MS SQL Server for IGSS

Setting up an MS SQL Server for IGSS Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3

More information

Using SQL Reporting Services with Amicus

Using SQL Reporting Services with Amicus Using SQL Reporting Services with Amicus Applies to: Amicus Attorney Premium Edition 2011 SP1 Amicus Premium Billing 2011 Contents About SQL Server Reporting Services...2 What you need 2 Setting up SQL

More information

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3 Wavelink Avalanche Mobility Center Java Console User Guide Version 5.3 Revised 17/04/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,

More information

FTP Server Configuration

FTP Server Configuration FTP Server Configuration For HP customers who need to configure an IIS or FileZilla FTP server before using HP Device Manager Technical white paper 2 Copyright 2012 Hewlett-Packard Development Company,

More information

Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2

Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2 Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2 End-User Authentication Using Active Directory and Network Policy Server C ONTENTS Introduction to NPS Authentication with AD... 2 Registering the NPS

More information

Group Management Server User Guide

Group Management Server User Guide Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

How to Obtain an OPC License--5. Creating a System Code 5 Entering an Authorization Code 6. Getting Started with SNMP Editor--7

How to Obtain an OPC License--5. Creating a System Code 5 Entering an Authorization Code 6. Getting Started with SNMP Editor--7 Contents Introduction--1 Product definition 1 Implementing SNMP 2 Integrating SNMP into the user interface 3 Components of OPC SNMP Gateway 4 How to Obtain an OPC License--5 Creating a System Code 5 Entering

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

F9 Integration Manager

F9 Integration Manager F9 Integration Manager User Guide for use with QuickBooks This guide outlines the integration steps and processes supported for the purposes of financial reporting with F9 Professional and F9 Integration

More information

How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1

How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1 Managing user roles in SCVMM How to Create a Delegated Administrator User Role... 2 To create a Delegated Administrator user role... 2 Managing User Roles... 3 Backing Up and Restoring the VMM Database...

More information

SafeGuard Enterprise Administrator help

SafeGuard Enterprise Administrator help SafeGuard Enterprise Administrator help Product version: 5.60 Document date: April 2011 Contents 1 The SafeGuard Management Center...4 2 Log on to the SafeGuard Management Center...5 3 Operating steps

More information

Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical

Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical Instructions for Configuring a SAS Metadata Server for Use with JMP Clinical These instructions describe the process for configuring a SAS Metadata server to work with JMP Clinical. Before You Configure

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski [email protected]

[The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski [email protected] All rights reserved. Redistribution

More information

10.3.1.10 Lab - Configure a Windows XP Firewall

10.3.1.10 Lab - Configure a Windows XP Firewall 5.0 10.3.1.10 Lab - Configure a Windows XP Firewall Print and complete this lab. In this lab, you will explore the Windows XP Firewall and configure some advanced settings. Recommended Equipment Step 1

More information

WEST LIVENOTE ADMINISTRATION WEST CASE NOTEBOOK/WEST LIVENOTE

WEST LIVENOTE ADMINISTRATION WEST CASE NOTEBOOK/WEST LIVENOTE WEST LIVENOTE ADMINISTRATION WEST CASE NOTEBOOK/WEST LIVENOTE JULY 2009 WEST LIVENOTE ADMINISTRATION USER GUIDE WEST CASE NOTEBOOK/WEST LIVENOTE JULY 2009 West Customer Service West LiveNote Administration

More information

NetFlow Auditor Manual Getting Started

NetFlow Auditor Manual Getting Started NetFlow Auditor Manual Getting Started Setting up NetFlow Check if your Routers or Switches Supports NetFlow. Almost all Cisco devices support NetFlow since its introduction in the 11.1 train of Cisco

More information

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide October 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator

More information

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the

More information

Troubleshooting Failover in Cisco Unity 8.x

Troubleshooting Failover in Cisco Unity 8.x CHAPTER 16 Troubleshooting Failover in Cisco Unity 8.x This chapter describes methods for troubleshooting Cisco Unity failover. See the following sections: Failover Configuration Wizard Does Not Finish

More information

EPM Performance Suite Profitability Administration & Security Guide

EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects

More information

Does the GC have an online document management solution?

Does the GC have an online document management solution? This FAQ contains: Web File Services definition Access web file services Create a WFS folder Upload a document Email a link to a document folder Create WFS subscription Cancel existing subscription Create

More information

Fairfield University Using Xythos for File Sharing

Fairfield University Using Xythos for File Sharing Fairfield University Using Xythos for File Sharing Version 7.0 Table of Contents I: Manage your Department Folder...2 Your Department Folder... 2 II: Sharing Folders and Files Inside of Fairfield U...3

More information

Security Assertion Markup Language (SAML) Site Manager Setup

Security Assertion Markup Language (SAML) Site Manager Setup Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and

More information

Changing Passwords in Cisco Unity 8.x

Changing Passwords in Cisco Unity 8.x CHAPTER 9 Changing Passwords in Cisco Unity 8.x This chapter contains the following sections: Changing Passwords for the Cisco Unity 8.x Service Accounts (Without Failover), page 9-1 Changing Passwords

More information

Integrating idrac 7 with Microsoft Active Directory

Integrating idrac 7 with Microsoft Active Directory Integrating idrac 7 with Microsoft Active Directory Whitepaper Author: Jim Slaughter This document is for informational purposes only and may contain typographical errors and technical inaccuracies. The

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Microsoft Corporation. Project Server 2010 Installation Guide

Microsoft Corporation. Project Server 2010 Installation Guide Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

Using the Advanced GUI

Using the Advanced GUI This chapter contains the following sections: Toggling Between Basic and Advanced GUI Modes, page 1 About Getting Started with APIC Examples, page 2 Switch Discovery with the APIC, page 2 Configuring Network

More information

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without

More information

Administration: Users and Roles

Administration: Users and Roles Last Update: September 2011 Release 7.5 Administration: Users and Roles This lesson is specifically designed for administrators responsible for user security settings in the Astra Schedule system. Astra

More information

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software

Secrets of Event Viewer for Active Directory Security Auditing Lepide Software Secrets of Event Viewer for Active Directory Security Auditing Windows Event Viewer doesn t need any introduction to the IT Administrators. However, some of its hidden secrets, especially those related

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

OPENGATE SMALL BUSINESS SOFTWARE

OPENGATE SMALL BUSINESS SOFTWARE OPENGATE SMALL BUSINESS SOFTWARE VERSION 1.1 Administrator's Guide Version 10.10.2009 This document is copyright 2007-2009 OpenGate Software. The information contained in this document is subject to change

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email

More information

formerly Help Desk Authority 9.1.2 Quick Start Guide

formerly Help Desk Authority 9.1.2 Quick Start Guide formerly Help Desk Authority 9.1.2 Quick Start Guide 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

Configure Single Sign on Between Domino and WPS

Configure Single Sign on Between Domino and WPS Configure Single Sign on Between Domino and WPS What we are doing here? Ok now we have the WPS server configured and running with Domino as the LDAP directory. Now we are going to configure Single Sign

More information

email-lead Grabber Business 2010 User Guide

email-lead Grabber Business 2010 User Guide email-lead Grabber Business 2010 User Guide Copyright and Trademark Information in this documentation is subject to change without notice. The software described in this manual is furnished under a license

More information

10.3.1.9 Lab - Configure a Windows Vista Firewall

10.3.1.9 Lab - Configure a Windows Vista Firewall 5.0 10.3.1.9 Lab - Configure a Windows Vista Firewall Print and complete this lab. In this lab, you will explore the Windows Vista Firewall and configure some advanced settings. Recommended Equipment Step

More information