AlienVault. Unified Security Management 5.x Configuration Backup and Restore
|
|
|
- Jennifer Whitehead
- 10 years ago
- Views:
Transcription
1 AlienVault Unified Security Management 5.x Configuration Backup and Restore
2 USM 5.x Configuration Backup and Restore Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat Exchange, AlienVault OTX Reputation Monitor, AlienVault OTX Reputation Monitor Alert, AlienVault OSSIM, and OSSIM are trademarks or service marks of AlienVault, Inc. All other registered trademarks, trademarks or service marks are the property of their respective owners. Revision to This Document Date Revision Description April 30, 2015 Original document published for AlienVault USM version 5.0. June 4, 2015 Document updated to correct some typos and added the note on restoring OSSIM on USM. June 4, 2015 USM 5.x Configuration Backup and Restore Page 2 of 7
3 Contents Contents The Backup Process... 4 Managing Configuration Backups From the Web UI... 4 What Are Included in Configuration Backups... 4 When Are Configuration Backups Run... 5 Where Are Configuration Backups Stored... 5 How Are Configuration Backups Done in a Federated Environment... 5 The Restore Process... 6 June 4, 2015 USM 5.x Configuration Backup and Restore Page 3 of 7
4 The Backup Process The backup and restore procedures in USM 4.x requires jailbreaking the system and executing backup commands manually. In USM 5.0, this process has been improved. Users can backup and restore system configurations including system profile, network configuration, inventory data, policies, plugins, correlation directives and other basic settings. Backups are managed in the web UI and run automatically each day or as needed. Users can restore a USM system from a backup file via the AlienVault console. The Backup Process Managing Configuration Backups From the Web UI In the web UI, navigate to Configuration > Administration > Backups > Configuration, the configuration backups display in a table format. The columns are System, Date, Backup, Type, Version, Size, and Download. By default, backups are sorted by their timestamps, with the latest one at the top. To look for a backup, use the search box at the upper left hand corner. You can search on system (name or IP address), date, or type. To download the backups and store them locally, locate the backup and click the Download button towards the right. To delete one or more backups, select them by checking the square to the left of each backup, and then click the Delete button above the table towards the right. What Are Included in Configuration Backups System configuration (networking, system profile, USM basic configuration settings) Inventory data Policies Plugins (both default and customized) Correlation directives HIDS configurations Note: Security events and raw logs are NOT included in the backups. June 4, 2015 USM 5.x Configuration Backup and Restore Page 4 of 7
5 The Backup Process When Are Configuration Backups Run Backups are run at 7:00 am local time every day. They display as "Auto" under the Type column in the web UI. You can also run a backup yourself at any time. To run a backup manually 1. In the web UI, navigate to Configuration > Administration > Backups > Configuration. 2. Click Run Backup Now. A message comes up showing when the last backup was run and asking if you want to continue. 3. Select Yes to start the backup. These backups display as "Manual" under the Type column. When a backup process runs, we first do the following checks to make sure that normal USM operation is not interrupted: There isn't a re-configuration process running. There isn't another instance of backup or restore process running. There is enough disk space to create a configuration backup file. The backup process will not continue if any of the checks fails. To see the error messages in the backup logs, click View Backup Logs on Configuration > Administration > Backups > Configuration. Where Are Configuration Backups Stored Each USM appliance stores its configuration backup files as /var/alienvault/backup/configuration_<hostname>_<timestamp>.tar.gz Backups marked as Auto are rotated daily, and we maintain 10 backups on each appliance based on their timestamp. How Are Configuration Backups Done in a Federated Environment In a federated environment, where you have sensor(s) reporting to a USM Server (child server), which reports to another USM Server (federated server), keep the following in mind: June 4, 2015 USM 5.x Configuration Backup and Restore Page 5 of 7
6 The Restore Process Each USM Server (both child server and federated server) will only trigger automatic backups of itself and directly connected sensors. In other words, the federated server does not trigger automatic backups to its child servers. The backups are stored per AlienVault appliance. This means that each appliance will store its own backup file. In the web UI, there is a Show Backups for dropdown allowing you to choose which system you want to view. You can select the child server on the federated server, but not vice versa. On the federated server, you can run a manual backup of the child server. To do this, select the child server from the drop-down, and then click Run Backup Now. The Restore Process You can only restore a USM system from a backup file via the AlienVault console. When a restore process runs, we first do the following checks to make sure that the underlying system is ready and compatible: There isn't a re-configuration process running. There isn't another instance of backup or restore process running. The backup profile matches the system profile. In other words, you cannot restore a backup file from a USM Server on a USM Sensor. The version of the backup file is the same as the target system. This means that you cannot restore a USM v5.0 backup on a system that is running USM v4.x. There is enough disk space to restore the configuration backup. Note: You can restore an OSSIM backup on a USM or vice versa, as long as they are on the same version. Before restoring a backup file, you will need to transfer the file to the target system first. To do this, you can use an SFTP client on Windows OS, such as WinSCP; or the scp protocol on Linux-based systems. On the target system, you need to place the file in /var/alienvault/backup/ June 4, 2015 USM 5.x Configuration Backup and Restore Page 6 of 7
7 The Restore Process To restore the backup file 1. Connect to the AlienVault Console via ssh or putty. The AlienVault Setup menu displays. 2. Select Maintenance & Troubleshooting, click <OK> or press Enter. 3. Select Backups, click <OK> or press Enter. 4. Select Restore configuration backup, click <OK> or press Enter. 5. Select the backup you want to restore, click <OK> or press Enter. A confirmation message displays. 6. Select <Yes> to continue or <No> to abort. The restore process starts. The system restarts automatically once the restore process finishes. If an SSH connection is used to perform the restoration process, and there is an IP address change, the network connection will be dropped. June 4, 2015 USM 5.x Configuration Backup and Restore Page 7 of 7
AlienVault. Unified Security Management 5.x Configuring a VPN Environment
AlienVault Unified Security Management 5.x Configuring a VPN Environment USM 5.x Configuring a VPN Environment, rev. 3 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Device Integration: CyberGuard SG565
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Device Integration: Citrix NetScaler
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
How to send emails triggered by events
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Monitoring VMware ESX Virtual Switches
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard
AlienVault Unified Security Management (USM) 5.1 Running the Getting Started Wizard USM v5.1 Running the Getting Started Wizard, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault
Device Integration: Cisco Wireless LAN Controller (WLC)
Complete. Simple. Affordable Device Integration: Cisco Wireless LAN Controller (WLC) Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM,
AlienVault Unified Security Management (USM) 4.15-5.x. Configuring High Availability (HA)
AlienVault Unified Security Management (USM) 4.15-5.x Configuring High Availability (HA) USM v4.15-5.x Configuring High Availability (HA), rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Device Integration: Checkpoint Firewall-1
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
SYSTEM BACKUP AND RESTORE (AlienVault USM 4.8+)
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
How to configure High Availability (HA) in AlienVault USM (for versions 4.14 and prior)
Complete. Simple. Affordable How to configure High Availability (HA) in AlienVault USM Copyright 2015 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM,
AlienVault. Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures
AlienVault Unified Security Management 4.4-5.x Offline Update and Software Restoration Procedures USM 4.4-5.x Offline Update and Software Restoration Procedures Copyright 2015 AlienVault, Inc. All rights
Deploying HIDS Client to Windows Hosts
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
How to enable File Integrity Monitoring (FIM)
Complete. Simple. Affordable How to enable File Integrity Monitoring (FIM) AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts
AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,
Suricata IDS. What is it and how to enable it
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Assets, Groups & Networks
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
AlienVault. Unified Security Management (USM) 4.8-5.x Initial Setup Guide
AlienVault Unified Security Management (USM) 4.8-5.x Initial Setup Guide Contents USM v4.8-5.x Initial Setup Guide Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault, AlienVault
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide
AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration
Module 1: Overview This module provides an overview of the AlienVault Unified Security Management (USM) solution. Upon completing this module, you will meet these objectives: Describe the goal of network
AlienVault Offline Key Activation
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Unified Security Management (USM) 5.2 Vulnerability Assessment Guide
AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
File Transfer with Secure FTP
File Transfer with Secure FTP The Princeton Review values the security of all client s information and would like to encourage all FTP file transfers to and from our clients be conducted utilizing a Secure
LifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
Moving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
Installing SQL Express. For CribMaster 9.2 and Later
Installing SQL Express For CribMaster 9.2 and Later CRIBMASTER USER GUIDE Installing SQL Express Document ID: CM9-031-03012012 Copyright CribMaster. 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
NovaBACKUP: VMware Plug-In
NovaBACKUP: VMware Plug-In Nathan Fouarge / NovaStor / April 2012 2012 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
Using Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud
CaseWare Time CaseWare Cloud Integration Guide For Time 2015 and CaseWare Cloud Copyright and Trademark Notice Copyright. 2015 CaseWare International Inc. ( CWI ). All Rights Reserved. Use, duplication,
DocuSign Connect for Salesforce Guide
Information Guide 1 DocuSign Connect for Salesforce Guide 1 Copyright 2003-2013 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign
QuickBooks Mac 2014 Getting Started Guide
QuickBooks Mac 2014 Getting Started Guide Financial Institution Support - OFX Connectivity Group Table of Contents QUICKBOOKS 2014 FOR MAC GETTING STARTED GUIDE... 3 ABOUT THIS GUIDE... 3 QUICKBOOKS 2014
McAfee Enterprise Security Manager 9.3.2
Release Notes McAfee Enterprise Security Manager 9.3.2 Contents About this release New features for 9.3.2 Upgrade instructions for 9.3.2 Find product documentation About this release This document contains
HELP DOCUMENTATION E-SSOM BACKUP AND RESTORE GUIDE
HELP DOCUMENTATION E-SSOM BACKUP AND RESTORE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by
Configuration Guide. Remote Backups How-To Guide. Overview
Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter
Configure Cisco Emergency Responder Disaster Recovery System
Configure Cisco Emergency Responder Disaster Recovery System Disaster Recovery System overview, page 1 Backup and restore procedures, page 2 Supported features and components, page 4 System requirements,
CASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
Conceptronic CFULLHDMA How to use Samba/CIFS and NFS
Conceptronic CFULLHDMA How to use Samba/CIFS and NFS For firmware version 01.09.10.06 and later 1. Introduction The Conceptronic CFULLHDMA is a streaming Full HD media player, based on the UPnP AV standard.
How to configure Exchange Smart Host
How to configure Exchange Smart Host In Exchange 2003, it's possible to configure a smarthost on the Default SMTP Virtual Server but, if you do it this way, you can only set a single smarthost. The preferred
Moving the Web Security Log Database
Moving the Web Security Log Database Topic 50530 Web Security Solutions Version 7.7.x, 7.8.x Updated 22-Oct-2013 Version 7.8 introduces support for the Web Security Log Database on Microsoft SQL Server
SharePoint Wiki Redirect Installation Instruction
SharePoint Wiki Redirect Installation Instruction System Requirements: Microsoft Windows SharePoint Services v3 or Microsoft Office SharePoint Server 2007. License management: To upgrade from a trial license,
HELP DOCUMENTATION E-SSOM BACKUP AND RESTORE GUIDE
HELP DOCUMENTATION E-SSOM BACKUP AND RESTORE GUIDE Copyright 1998-2012, Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by
NetBackup Backup, Archive, and Restore Getting Started Guide
NetBackup Backup, Archive, and Restore Getting Started Guide UNIX, Windows, and Linux Release 6.5 Veritas NetBackup Backup, Archive, and Restore Getting Started Guide Copyright 2007 Symantec Corporation.
Browser Client 2.0 Admin Guide
Browser Client is a web-based application that allows users to point their browser at a URL and view live video from a set of Intellex units. Browser Client 2.0 is compatible with Intellex 3.2 software.
Setting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
uh6 efolder BDR Guide for Veeam Page 1 of 36
efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder
ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000
ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252
Printer Driver Installation Guide
Fujitsu Dot Matrix Printer DL Series Printer Driver Installation Guide - Windows 7 - Windows Server 2008 R2 Rev.01: April 12, 2010 IMPORTANT NOTE TO USERS For Windows 7 / Windows Server 2008 R2, install
Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum
Maintenance Guide Outpost Firewall 4.0 Personal Firewall Software from Agnitum Abstract This document is intended to assist Outpost Firewall users in installing and maintaining Outpost Firewall and gets
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in
Copyright 2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,
Copyright 2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Installing Microsoft Exchange Integration for LifeSize Control
Installing Microsoft Exchange Integration for LifeSize Control September 2005 Part Number 132-00002-001, Version 1.1 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize
Attix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks
vsphere Replication for Disaster Recovery to Cloud
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
Install SQL Server 2014 Express Edition
How To Install SQL Server 2014 Express Edition Updated: 2/4/2016 2016 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders.
HIPAA Compliance Use Case
Overview HIPAA Compliance helps ensure that all medical records, medical billing, and patient accounts meet certain consistent standards with regard to documentation, handling, and privacy. Current Situation
Managing the System Event Log
Managing the System Event Log This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers
Upgrading a computer to Windows 10 with PetLinx
25 August, 2015 Upgrading a computer to Windows 10 with PetLinx Microsoft have recently released Windows 10 and offered it as a free upgrade for user of Windows 7 and 8/8.1. In most cases, computers with
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides
Knowledge Base Articles
Knowledge Base Articles 2005 Jalasoft Corp. All rights reserved. TITLE: How to configure and use the Jalasoft Xian Syslog Server. REVISION: Revision : B001-SLR01 Date : 11/30/05 DESCRIPTION: Jalasoft has
Netflow Collection with AlienVault Alienvault 2013
Netflow Collection with AlienVault Alienvault 2013 CONFIGURE Configuring NetFlow Capture of TCP/IP Traffic from an AlienVault Sensor or Remote Hardware Level: Beginner to Intermediate Netflow Collection
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Export & Backup Guide
Eport & Backup Guide Welcome to the WebOffice and WorkSpace eport and backup guide. This guide provides an overview and requirements of the tools available to etract data from your WebOffice or WorkSpace
Symantec Backup Exec System Recovery Granular Restore Option User's Guide
Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under
Verizon Wireless Field Force Manager. Windows Mobile Devices
Verizon Wireless Field Force Manager User Guide for Windows Mobile Devices Verizon Wireless Field Force Manager User Guide for Windows Mobile Devices Table of Contents Application Requirements...3 Windows
Miami University RedHawk Cluster Connecting to the Cluster Using Windows
Miami University RedHawk Cluster Connecting to the Cluster Using Windows The RedHawk cluster is a general purpose research computing resource available to support the research community at Miami University.
Adding Outlook to a Blackberry, Downloading, Installing and Configuring Blackberry Desktop Manager
Adding Outlook to a Blackberry, Downloading, Installing and Configuring Blackberry Desktop Manager The following instructions work for the District provided Blackberrys from Sprint, but I think it should
Using Time Machine to Backup Multiple Mac Clients to SNC NAS and 1000
Using Time Machine to Backup Multiple Mac Clients to SNC NAS and 1000 Application Note Abstract This application note describes how to use Time Machine to backup multiple Mac clients to SNC NAS and 1000.
SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide
vcenter Operations Management Pack for SAP HANA Installation and Configuration Guide This document supports the version of each product listed and supports all subsequent versions until a new edition replaces
Upgrading Redwood Engine Software. Version 2.0.x to 3.1.0
Upgrading Redwood Engine Software Version 2.0.x to 3.1.0 December 2013 APP NOTE Table of Contents 1 Introduction... 3 1.1 Backing Up the Redwood Engine Configuration, Statistics, and Log Files... 3 2 Checking
Managing the System Event Log
This chapter includes the following sections: System Event Log, page 1 Viewing the System Event Log for an Individual Server, page 2 Viewing the System Event Log for the Servers in a Chassis, page 2 Configuring
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
Administrator s Guide for the Polycom Video Control Application (VCA)
Administrator s Guide for the Polycom Video Control Application (VCA) Version 1.1 November 2007 Edition 3725-26448-004/A Trademark Information Polycom and the Polycom logo design are registered trademarks
McAfee SIEM Alarms. Setting up and Managing Alarms. Introduction. What does it do? What doesn t it do?
McAfee SIEM Alarms Setting up and Managing Alarms Introduction McAfee SIEM provides the ability to send alarms on a multitude of conditions. These alarms allow for users to be notified in near real time
Personal Call Manager User Guide. BCM Business Communications Manager
Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008
5.6.2 Optional Lab: Restore Points in Windows Vista
5.6.2 Optional Lab: Restore Points in Windows Vista Introduction Print and complete this lab. In this lab, you will create a restore point and return your computer back to that point in time. Recommended
Acronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
Setting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Distribution List Manager User s Manual
Distribution List Manager User s Manual Welcome... 2 Configuring the Add-in... 3 Settings Tab... 3 Advanced Tab... 4 Troubleshooting... 5 Distribution List Manager Copyright 2008 Sperry Software Inc. P
Juniper Networks Management Pack Documentation
Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133
Managing Cisco ISE Backup and Restore Operations
CHAPTER 14 This chapter describes the Cisco Identity Services Engine (ISE) database backup and restore operations, which include Cisco ISE application configuration and Cisco Application Deployment Engine
How do I set up a branch office VPN tunnel with the Management Server?
Fireware How To VPN How do I set up a branch office VPN tunnel with the Management Server? Introduction Using the WatchGuard Management Server, you can make fully authenticated and encrypted IPSec tunnels
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core
StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.
INSTALLATION GUIDE Datapolis Process System v 4.2.0.4294
Datapolis.com, ul Wiktorska 63, 02-587 Warsaw, Poland tel. (+48 22) 398-37-53; fax. (+ 48 22) 398-37-93, [email protected] INSTALLATION GUIDE Datapolis Process System v 4.2.0.4294 Last modification
BSDI Advanced Fitness & Wellness Software
BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the
Maintaining the Content Server
CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down
Uni Sales Analysis CRM Extension for Sage Accpac ERP 5.5
SAGE ACCPAC OPTIONS Sage Accpac Options Uni Sales Analysis CRM Extension for Sage Accpac ERP 5.5 User Guide 2008 Sage Software, Inc. All rights reserved. Sage Software, Sage Software logos, and all Sage
