LepideAuditor. Compliance Reports
|
|
- Jerome Holt
- 6 years ago
- Views:
Transcription
1 Compliance
2 Compliance Table of Contents 1. Introduction Purpose of this Document FISMA Compliance GLBA Compliance HIPAA Compliance PCI Compliance SAS Compliance SOX Compliance Support Trademarks Introduction Welcome to the Compliance document of LepideAuditor. This solution provides a comprehensive means of auditing Active Directory, Group Policy, Exchange Server, SharePoint, SQL Server, Exchange Online, Windows File Server, and NetApp Filer. It also lets you manage User Password Expiration Reminders, cleanup Active Directory, and perform Permission Analysis. 2. Purpose of this Document LepideAuditor comes with numerous predefined compliance reports. These reports can be browsed through Compliance section of Audit Tab and Web Console. These can be majorly divided into the following parts. 1. FISMA Compliance 2. GLBA Compliance 3. HIPAA Compliance 4. PCI Compliance 5. SAS Compliance 6. SOX Compliance These reports can be scheduled to be delivered through to the specific recipients on periodic intervals Lepide Software Pvt. Ltd. Page 2
3 Compliance 3. FISMA Compliance These reports let your server components compliant with the rules of FISMA Compliance. LepideAuditor generates the following reports in this category. Audit Policy Password Policy Password Age Policy Password Complexity Policy Password Encryption Policy Password History Policy Logon Hour Expiration Policy Force Logoff Policy Account Lockout Policy Lockout Duration Policy Enforce User Logon Restrictions Policy Idle Time to Suspend Inactive Sessions Policy Enforce Logon Policy This report shows all modified audit policies. This report shows all modified password policies. This report shows all modified password age policies. This report shows all modified password complexity policies. This report shows all modified password encryption policies. This report shows all modified password history policies. This report shows all modifications made to the logon hour expiration policy. This report shows all modifications made to the logoff policy. This report shows all modified account lockout policies. This report shows all modified lockout duration policies. This report shows all modifications made to the user logon restriction policy. This report shows all modifications made to the Idle Time to Suspend Inactive Sessions Policy. This report shows all modifications made to the enforce logon policy Lepide Software Pvt. Ltd. Page 3
4 Compliance Object's Dial-in Attribute User Expiry Workstation Restrictions Trust Policy Rename Administrator and Guest Policy This report shows all modifications made to the object's dial-in attribute. This report shows the user accounts with the modified expiry date in all added server components. This report shows all modifications made to the workstation restriction. This report shows all modifications made to the domain trusts. This report shows all modified rename administrator and guest policies. 4. GLBA Compliance These reports let your server components compliant with the rules of GLBA Compliance. LepideAuditor generates the following reports in this category. All in Group Policy File Permission Interactive Logon Policy Shared Folder This report shows all modified group policies. This report shows all modified file permissions. This report shows all modified interactive logon policies. This report shows all modified shared folders in all added server components. You can select the component for which you want to see this report Lepide Software Pvt. Ltd. Page 4
5 Compliance 5. HIPAA Compliance These reports let your server components compliant with the rules of HIPAA Compliance. LepideAuditor generates the following reports in this category. Computer's Network Access Policy Object's Dial-in Attribute User Expiry Shared Folder All Object Permissions User Deleted User Status Changed User's Logon Hours Attribute Computer Users Created User Password Reset and Changes Attempted This report shows all modified Computer's Network Access policies. This report shows all modifications made to the object's dial-in attribute. This report shows the user accounts with the modified expiry date in all added server components. This report shows all modified shared folders in all added server components. You can select the components for which you want to see this report. This report shows all modified object permissions in all added server components. This report shows all deleted users in all added server components. You can select the components for which you want to see this report. This report shows the users with the modified status such as enabled, disabled, locked, or unlocked in all added server components. You can select the components for which you want to see this report. This report shows all modifications made to the user logon hour attribute. This report shows all modified computers. This report shows all created users in all added server components. You can select the components for which you want to see this report. This report shows the users who attempted to reset or change their passwords Lepide Software Pvt. Ltd. Page 5
6 Compliance 6. PCI Compliance These reports let your server components compliant with the rules of PCI Compliance. LepideAuditor generates the following reports in this category. Audit Policy User Expiry Workstation Restrictions Trust Policy All in Group Policy Shared Folder All Object Permissions User Status Changed Computer Computer Created Group Files and Folders Deleted Read Successful Failed Changed Attempts Read Failed This report shows all modified audit policies. This report shows the users with the modified expiry date in all added server components. This report shows all modifications made to the workstation restrictions. This report shows all modifications made to the domain trusts. This report shows all modified group policies. This report shows all modified shared folders in all added server components. You can select the components for which you want to see this report. This report shows all modified object permissions in all added server components. This report shows the users with the modified status such as enabled, disabled, locked or unlocked in all added server components. You can select the components for which you want to see this report. This report shows all modified computers. This report shows all created computers. This report shows all modified groups in all added server components. You can select the components for which you want to see this report. This report shows all deleted files and folders. This report shows all successful attempts to read the files. This report shows all failed attempts to change the file. This report shows all failed attempts to read the files Lepide Software Pvt. Ltd. Page 6
7 Compliance All in File Server This report shows all modifications in the file server. 7. SAS Compliance These reports let your server components compliant with the rules of SAS Compliance. LepideAuditor generates the following reports in this category. All in Group Policy File Permission Interactive Logon Policy Failed Change Attempts Read Failed Owner Modification Restricted Groups Policy This report shows all modified group policies. This report shows all modified file permissions. This report shows all modified interactive logon policies. This report shows all failed attempts to change the files. This report shows all failed attempts to read the files. This report shows all modifications made to the object ownership in all added server components. This report shows all modified restricted group policies. 8. SOX Compliance These reports let your server components compliant with the rules of SOX Compliance. LepideAuditor generates the following reports in this category Lepide Software Pvt. Ltd. Page 7
8 Compliance All in Group Policy Shared Folder All Object Permissions Computer Computer Created Group Failed Change Attempts All in File Server Schema All in Active Directory All in Exchange Server All in Exchange Online Site User NTDS Connection All Subnet Organizational Unit This report shows all modified group policies. This report shows all modified shared folders in all added server components. You can select the components for which you want to see this report. This report shows all modified object permissions in all added server components. This report shows all modified computers. This report shows all created computers. This report shows all modified groups in all added server components. You can select the components for which you want to see this report. This report shows all failed attempts to change the files. This report shows all modifications made to the file server. This report shows all Active Directory schema modifications. This report shows all modified Active Directory objects. This report shows all modified Exchange Server objects. This report shows all modified Exchange Online objects. This report shows all modified sites. This report shows all modified users in all added server components. You can select the components for which you want to see this report. This report shows all modifications made to the NTDS. This report shows all modifications related to the connection objects. This report shows all modified subnets. This report shows all modified organizational units Lepide Software Pvt. Ltd. Page 8
9 Compliance Mailbox All DNS Zone User Renamed All in SharePoint All in SQL Server This report shows all modified mailboxes. This report shows all modifications made to the DNS Zones. This report shows the renamed users. This report shows all modified SharePoint Server objects. This report shows all modified server and database objects of SQL Server. 9. Support If you are facing any issues whilst installing, configuring or using the solution, you can connect with our team using the below contact information. Product experts USA/Canada: UK/Europe: +44 (0) Rest of the World: +91 (0) Technical gurus USA/Canada: UK/Europe: +44(0) Rest of the World: +91(0) Alternatively, visit to chat live with our team. You can also your queries to the following addresses: To read more about the solution, visit Trademarks LepideAuditor, LepideAuditor App, LepideAuditor App Server, LepideAuditor (Web Console), LepideAuditor Logon/Logoff Audit Module, LepideAuditor for Active Directory, LepideAuditor for Group Policy Object, LepideAuditor for Exchange Server, LepideAuditor for SQL Server, LepideAuditor SharePoint, Lepide Object Restore Wizard, Lepide Active Directory Cleaner, Lepide User Password Expiration Reminder, and LiveFeed are registered trademarks of Lepide Software Pvt Ltd. All other brand names, product names, logos, registered marks, service marks and trademarks (except above of Lepide Software Pvt. Ltd.) appearing in this document are the sole property of their respective owners. These are purely used for informational purposes only Lepide Software Pvt. Ltd. Page 9
10 Compliance Microsoft, Active Directory, Group Policy Object, Exchange Server, Exchange Online, SharePoint, and SQL Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. NetApp is a trademark of NetApp, Inc., registered in the U.S. and/or other countries Lepide Software Pvt. Ltd. Page 10
LepideAuditor. Data Discovery and Classification
Data Discovery and Classification Table of Contents 1. Introduction... 2 2. Features of... 2 2.1. Discover, Classify and Tag Sensitive Data... 2 2.2. Instant Insight into Your Sensitive Data... 2 3. How
More informationLepideAuditor SIEM Integration
Table of Contents 1. Introduction... 2 2. How to Configure Your SIEM Solution with... 2 3. Configuring to be Used with a SIEM Application... 4 4. Support... 8 5. Trademarks... 9 1. Introduction Maximize
More informationLepideAuditor. Current Permission Report
Table of Contents 1. Introduction... 3 2. Current Permission Scan Settings... 3 2.1 Configure SQL Server... 3 2.2 Stale Object Settings... 5 2.3 Available Options to manage the data set... 6 2.3.1 Add
More informationLepideAuditor. Configure Mailbox Access Auditing
Configure Mailbox Access Auditing Table of Contents 1. Introduction... 3 2.... 3 4. Support... 17 5. Copyright... 17 6. Warranty Disclaimers and Liability Limitations... 17 7. Trademarks... 18 2017 Lepide
More informationHow to Configure File Server Resource Manager in Windows Server 2012 R2 and Above
How to Configure File Server Resource Manager in Windows Server 2012 R2 and Above Table of Contents Introduction... 3 Installing the role... 3 Initial Configuration... 4 Creating a Classification Property...11
More informationPredefined Regular Expressions to be Used in File Server Resource Manager (FSRM)
Predefined Regular Expressions to be Used in File Server Resource Manager (FSRM) Description REGEX Examples (Separated by comma) URL ([\d\w-.]+?\.(a[cdefgilmnoqrstuwz] b[abdefghijmnorstvwyz] c[acdfghiklmn
More informationLepideAuditor. Installation and Configuration Guide
Installation and Configuration Guide Table of Contents 1. Introduction... 6 2. Requirements and Prerequisites... 6 2.1 System Requirements... 6 2.2 Supported Servers for Auditing... 7 2.3 Prerequisites
More informationHIPAA Controls. Powered by Auditor Mapping.
HIPAA Controls Powered by Auditor Mapping www.tetherview.com About HIPAA The Health Insurance Portability and Accountability Act (HIPAA) is a set of standards created by Congress that aim to safeguard
More informationLepideAuditor for File Server. Installation and Configuration Guide
LepideAuditor for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNetwrix Auditor. Administration Guide. Version: /31/2017
Netwrix Auditor Administration Guide Version: 9.5 10/31/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation
More informationQuest Enterprise Reporter 2.0 Report Manager USER GUIDE
Quest Enterprise Reporter 2.0 Report Manager USER GUIDE 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationNetWrix VMware Change Reporter Version 3.0 Enterprise Edition Administrator s Guide
NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Administrator s Guide Table of Contents NetWrix VMware Change Reporter Concepts... 1 Product Editions... 1 How It Works... 2 Deploying Product...
More informationNETWRIX CHANGE REPORTER SUITE
NETWRIX CHANGE REPORTER SUITE QUICK-START GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNetWrix Account Lockout Examiner Version 4.0 User Guide
NetWrix Account Lockout Examiner Version 4.0 User Guide Table of Contents Introduction... 1 Product Architecture... 1 About Security Roles... 2 Default Installation Folders, Virtual Directory, and Startup
More informationNETWRIX PASSWORD EXPIRATION NOTIFIER
NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationKernel Migrator for Exchange
Kernel Migrator for Exchange Decommission Exchange Server 2007 Server 2003 ecommission Exchange Server 2003 Contents 1. Introduction... 3 2. Steps for decommissioning Exchange Server 2007... 3 3. Backup
More informationProduct Overview. Netwrix Auditor. Presenter: Jeff Melnick Manager of Sales Engineering x 971
Product Overview Netwrix Auditor Presenter: Jeff Melnick Manager of Sales Engineering Jeff.Melnick@netwrix.com 888-638-9749 x 971 About Netwrix Corporation Year of foundation: 2006 Headquarters location:
More informationNetWrix VMware Change Reporter Version 3.0 Enterprise Edition Quick Start Guide
NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Quick Start Guide Table of Contents NetWrix VMware Change Reporter Concepts... 1 How It Works... 2 Deploying Product... 3 System Requirements...
More informationNETWRIX GROUP POLICY CHANGE REPORTER
NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationNetWrix Group Policy Change Reporter
NetWrix Group Policy Change Reporter Version 7 Enterprise Edition Quick Start Guide Contents NetWrix Group Policy Change Reporter Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 4 1.2 LICENSING...
More informationInstallation & Activation Guide. Lepide Exchange Recovery Manager
Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights reserved under the
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 6.5 9/26/2014 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationNetwrix Auditor Competitive Checklist
Netwrix Auditor Competitive Checklist DATA COLLECTION AND STORAGE Non-intrusive architecture Operates without agents so it never degrades system performance or causes downtime. Certified collection of
More informationNETWRIX ACTIVE DIRECTORY CHANGE REPORTER
NETWRIX ACTIVE DIRECTORY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationOne Identity Active Roles 7.2. Access Templates Available out of the Box
One Identity Active Roles 7.2 Available out of the Box Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationGDPR Controls and Netwrix Auditor Mapping
GDPR Controls and Netwrix Auditor Mapping www.netwrix.com Toll-free: 888-638-9749 About GDPR The General Data Protection Regulation (GDPR) is a legal act of the European Parliament and the Council (Regulation
More informationUser Manual. Active Directory Change Tracker
User Manual Active Directory Change Tracker Last Updated: March 2018 Copyright 2018 Vyapin Software Systems Private Ltd. All rights reserved. This document is being furnished by Vyapin Software Systems
More informationDigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Quick Start Guide Version 5 DATA PROTECTION REMOTE ACCESS SECURE COMMUNICATION STRONG AUTHENTICATION ACCESS RECOVERY SINGLE SIGN-ON DigitalPersona Pro Enterprise DigitalPersona
More informationNetwrix Auditor. Event Log Export Add-on Quick-Start Guide. Version: 8.0 6/3/2016
Netwrix Auditor Event Log Export Add-on Quick-Start Guide Version: 8.0 6/3/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More information1. All domain user accounts, and who can change the security permissions protecting them
Gold Finger The World s Only Accurate Resultant-Access and Security Assessment, Audit and Reporting Solution for Active Directory The Top-100 Reports that Gold Finger can generate, on-demand, in real-time,
More informationWhat s new in UserLock 5?
What s new in UserLock 5? 1. New interface... 2 1.1. Windows console... 2 1.2. console... 7 2. Reports... 8 2.1. General... 8 2.2. How to schedule a report and send it automatically by mail... 9 2.3. New
More informationGLBA Compliance. with O365 Manager Plus.
GLBA Compliance with O365 Manager Plus www.o365managerplus.com About GLBA The Gramm-Leach-Bliley Act (GLB Act or GLBA) is also known as the Financial Modernization Act of 1999. It is a United States federal
More informationKernel for Exchange Server. Installation and Configuration Guide
Kernel for Exchange Server Installation and Configuration Guide Table of Contents Table of Contents... 2 1. Introduction... 3 2. Requirements and Prerequisites... 3 2.1 Basic System Requirements... 3 2.2
More informationLab Configure Windows Local Security Policy
Introduction In this lab, you will configure Windows Local Security Policy. Windows Local Security Policy is used to configure a variety of security requirements for stand-alone computers that are not
More informationActive Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2017 CionSystems Inc., All Rights Reserved
More informationNetWrix SharePoint Change Reporter
NetWrix SharePoint Change Reporter Version 2.0 Freeware and Standard Editions Quick Start Guide Table of Contents Table of Contents...2 1. Introduction...3 1.1. What is NetWrix SharePoint Change Reporter?...
More informationCentrify Infrastructure Services
Centrify Infrastructure Services License Management Administrator s Guide December 2018 (release 18.11) Centrify Corporation Legal Notice This document and the software described in this document are furnished
More informationNETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 4.0 June 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationEnterprise Vault Guide for Outlook Users
Enterprise Vault Guide for Outlook Users (Full Functionality) 12.3 Enterprise Vault : Guide for Outlook Users Last updated: 2018-03-29. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 11.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
More informationMANAGING LOCAL AUTHENTICATION IN WINDOWS
MANAGING LOCAL AUTHENTICATION IN WINDOWS Credentials Manager Windows OS has a set of tools that help remedy some of the authentication challenges. For example, the Credential Manager in Windows 7 and newer
More informationUnified CCE Security Compliance for Windows Server 2012 R2
Unified CCE Security Compliance for Windows Server 2012 R2 This topic contains the security baseline for hardening Windows Server 2012 R2 Servers running Unified CCE. This baseline is essentially a collection
More information29 March 2017 SECURITY SERVER INSTALLATION GUIDE
29 March 2017 SECURITY SERVER INSTALLATION GUIDE Contents 1. Introduction... 2 1.1 Assumptions... 2 1.2 Prerequisites... 2 2. Required setups prior the Security Server Installation... 3 1.1 Create domain
More informationEnvelope Journaling for Microsoft Exchange 2003 Version 1.0
Barracuda Message Archiver Organizations using Microsoft Exchange 2003 can take advantage of its envelope journaling feature to send all messages along with all recipient information directly to the Barracuda
More informationVyapin Office 365 Management Suite
Vyapin Office 365 Management Suite Last Updated: December 2015 Copyright 2015 Vyapin Software Systems Private Limited. All rights reserved. This document is being furnished by Vyapin Software Systems Private
More informationFrameworkDirect Installation & User Guide
FrameworkDirect Installation & User Guide Version 1.0.184 FrameworkDirect Installation & User Guide 1 SoftWriters, Inc. has made every effort to ensure that this manual is correct and accurate, but reserves
More information6 Months Training Module in MS SQL SERVER 2012
6 Months Training Module in MS SQL SERVER 2012 Module 1 Installing and Configuring Windows Server 2012 Installing and Managing Windows Server 2012 Windows Server 2012 Overview Installing Windows Server
More informationAvaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface
Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Document ID: 13-603114 Release 2.2 July 2008 Issue No.1 2008 Avaya Inc. All Rights Reserved. Notice While reasonable
More informationDell Change Auditor 6.5. Event Reference Guide
Dell Change Auditor 6.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationHIPAA Compliance. with O365 Manager Plus.
HIPAA Compliance with O365 Manager Plus www.o365managerplus.com About HIPAA HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any
More informationFive critical features
Five critical features you need for effective Office 365 administration www.manageengine.com/active-directory-360 Table of contents 1. 2. 3. Introduction Office 365 management: Five things you can't do
More informationADMINISTRATOR'S GUIDE TO SECURITY: 1099 PRO PROFESSIONAL, ENTERPRISE & CORPORATE SUITE Pro, Inc
ADMINISTRATOR'S GUIDE TO SECURITY: 1099 PRO PROFESSIONAL, ENTERPRISE & CORPORATE SUITE 1099 Pro, Inc 1099 Pro Administrator's Guide to Security by 1099 Pro 1099 Pro Security & Administration Disclaimer
More informationNetworks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003
Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,
More informationNetwrix Auditor. Tips and Tricks: How To Create Custom Active Directory Alerts. Version: /22/2014
Netwrix Auditor Tips and Tricks: How To Create Custom Active Directory s Version: 6.5 10/22/2014 Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationFISMA Compliance. with O365 Manager Plus.
FISMA Compliance with O365 Manager Plus www.o365managerplus.com About FISMA The Federal Information Security Management Act (FISMA) is a United States federal law passed in 2002 that made it a requirement
More informationMetastorm BPM Release 7.6
Metastorm BPM Release 7.6 Administration Guide May 2008 Metastorm Inc. email: inquiries@metastorm.com http://www.metastorm.com Metastorm BPM Release 7.6 Copyrights and Trademarks 1996-2008 Metastorm Inc.
More informationANIXIS Password Reset
ANIXIS Password Reset Evaluator s Guide V3.22 Copyright 2003-2018 ANIXIS. All rights reserved. ANIXIS, ANIXIS Password Reset, Password Policy Enforcer, PPE/Web, Password Policy Client, Password Policy
More informationUser Manual. ARK for SharePoint-2007
User Manual ARK for SharePoint-2007 Table of Contents 1 About ARKSP (Admin Report Kit for SharePoint) 1 1.1 About ARKSP 1 1.2 Who can use ARKSP? 1 1.3 System Requirements 2 1.4 How to activate the software?
More informationHow to Survive an IT Audit and Thrive Off It!
How to Survive an IT Audit and Thrive Off It! Presenter: Adam Stetson Presales Engineer Adam.Stetson@netwrix.com 1.201.490.8840 x2907 Agenda Compliance Overview Continuous Compliance Control Processes
More informationSupport for the HIPAA Security Rule
white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe
More informationFTD MERCURY X2 IMPLEMENTATION GUIDE FOR PA-DSS
FTD MERCURY X2 IMPLEMENTATION GUIDE FOR PA-DSS FTD Mercury X2 Implementation Guide for PA-DSS 2010 Florists Transworld Delivery, Inc. All Rights Reserved. Last Updated: March 1, 2010 Last Reviewed: February
More informationUser Manual. Admin Report Kit for Windows Enterprise (ARKWE) v.7.4
User Manual Admin Report Kit for Windows Enterprise (ARKWE) v.7.4 Table of Contents 1 About Admin Report Kit for Windows Enterprise (ARKWE)... 1 1.1 System requirements... 2 1.2 Who can use ARKWE?... 2
More informationReference manual Integrated database authentication
BUSINESS SOFTWARE Reference manual Integrated database authentication Installation and configuration ii This document is intended for Agresso Business World Consultants and customer Super Users, and thus
More informationNetWrix Privileged Account Manager Version 4.1 User Guide
NetWrix Privileged Account Manager Version 4.1 User Guide Table of Contents 1. Introduction... 1 1.1 About Security Roles... 1 2. Configuring Product... 2 2.1 Configuring Child Folders... 2 2.2 Configuring
More informationW H I T E P A P E R : T E C H N I C A L. Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving
W H I T E P A P E R : T E C H N I C A L Enterprise Vault 8.0 Security Model for Microsoft SharePoint Archiving Rob Forgione Technical Field Enablement March 2009 White Paper: Symantec Technical Contents
More informationIBM Security Identity Manager Version Administration Topics
IBM Security Identity Manager Version 6.0.0.5 Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics ii IBM Security Identity Manager Version 6.0.0.5: Administration
More informationEasiShare ios User Guide
Copyright 06 Inspire-Tech Pte Ltd. All Rights Reserved. Page of 44 Copyright 06 by Inspire-Tech Pte Ltd. All rights reserved. All trademarks or registered trademarks mentioned in this document are properties
More informationDOCAVE ONLINE. Your Cloud. Our SaaS. A Powerful Combination. Online Services. Technical Overview ADMINISTRATION BACKUP & RESTORE
Online Services Technical Overview DOCAVE ONLINE Your Cloud. Our SaaS. A Powerful Combination. ADMINISTRATION Centralized Management Manage SharePoint Online security, settings, configurations, and content
More informationCopyright
This video will look at configuring the default password policy in Active Directory. These setting determines setting like how long a user password will be, if the password needs to complex, and how many
More informationPassword Reset PRO INSTALLATION GUIDE
Password Reset PRO INSTALLATION GUIDE This guide covers the new features and settings available in Password Reset PRO. Please read this guide completely to ensure a trouble-free installation. January 2009
More informationOneGate Linux Client. Release Notes. Version Thinspace Technology Ltd Published: 03 JULY Updated:
OneGate Linux Client Version 4.1.2 Release Notes Thinspace Technology Ltd Published: 03 JULY 2015 Updated: Copyright (c) 2015 Thinspace Technology Ltd. Overview This document outlines the installation
More informationVMware Horizon Session Recording Fling:
VMware Horizon Session Recording Fling: The VMware Horizon Session Recording fling allows administrators to record VMware Blast Extreme sessions to a central server for playback. These recordings can be
More informationCopyright
Active Directory allows multiple password policies to be created in the same domain. This is referred to as fine grained password policy. This video looks at how to use multiple passwords policies applying
More informationUSER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5
USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationIntegrate Microsoft Office 365. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: March 5, 2017 Abstract This guide provides instructions to configure Office 365 to generate logs for critical events. Once EventTracker is configured to collect
More informationUser Manual. Dockit SharePoint Manager
User Manual Dockit SharePoint Manager Last Updated: December 2017 Copyright 2017 Vyapin Software Systems Private Ltd. All rights reserved. This document is being furnished by Vyapin Software Systems Private
More informationEnterprise Vault Requesting and Applying an SSL Certificate and later
Enterprise Vault Requesting and Applying an SSL Certificate 10.0.3 and later Enterprise Vault : Requesting and Applying an SSL Certificate Last updated: 2018-04-12. Legal Notice Copyright 2018 Veritas
More informationDatasheet. Only Workspaces delivers the features users want and the control that IT needs.
Datasheet Secure SECURE Enterprise ENTERPRISE File FILE Sync, SYNC, Sharing SHARING and AND Content CONTENT Collaboration COLLABORATION BlackBerry Workspaces makes enterprises more mobile and collaborative,
More informationAvePoint Online Services 2
2 User Guide Service Pack 7 Issued August 2017 Table of Contents What s New in this Guide...6 About...7 Versions: Commercial and U.S. Government Public Sector...7 Submitting Documentation Feedback to AvePoint...8
More informationOne Identity Active Roles 7.2. User's Guide
One Identity Active Roles 7.2 User's Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationTop Critical Changes to Audit
Top Critical Changes to Audit in Microsoft SharePoint PRESENTER: Roy Lopez Systems Engineer Roy.Lopez@netwrix.com 1.201.490.8840 x2833 How to Ask Questions 1. Type your question here 2. Click Send Agenda
More informationDigital Certificate Service (DCS) - User Guide
Digital Certificate Service (DCS) - User Guide Information Security Branch Contents Using this Guide... 3 User Requirements... 3 Secure E-mail Messaging... 4 Send a Secure E-mail Message... 4 Receive a
More informationVector Issue Tracker and License Manager - Administrator s Guide. Configuring and Maintaining Vector Issue Tracker and License Manager
Vector Issue Tracker and License Manager - Administrator s Guide Configuring and Maintaining Vector Issue Tracker and License Manager Copyright Vector Networks Limited, MetaQuest Software Inc. and NetSupport
More informationTalkMaster FOCUS. Text to Speech Folder Console Reference Manual
TalkMaster FOCUS Text to Speech Folder Console Reference Manual Table of Contents Getting Started... 1 Welcome... 1 Release Notes... 1 Preliminary Configuration Process... 1 Logon... 1 Overview... 2 Setup
More informationUser Guide. Version R94. English
AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
More informationNetSupport ServiceDesk Product Manual Version 3.10
NetSupport ServiceDesk Product Manual Version 3.10 Manual COPYRIGHT (C) 2013 NetSupport Ltd. All rights reserved. The Information in this document is subject to change without notice. NetSupport Ltd. reserves
More informationCentrify Infrastructure Services
Centrify Infrastructure Services Evaluation Guide for Windows November 2017 (release 2017.2) Centrify Corporation Legal notice This document and the software described in this document are furnished under
More informationActivant Eagle PA-DSS Implementation Guide
ACTIVANT EAGLE PA-DSS IMPLEMENTATION GUIDE PA-DSS IMPLEMENTATION GUIDE Activant Eagle PA-DSS Implementation Guide EL2211 This manual contains reference information about software products from Activant
More informationHow to create a System Logon Account in Backup Exec for Windows Servers
How to create a System Logon Account in Backup Exec for Windows Servers Problem How to create a System Logon Account in Backup Exec for Windows Servers Solution The Backup Exec System Logon Account (SLA)
More informationCISNTWK-11. Microsoft Network Server. Chapter 4
CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows
More informationTransport Gateway Installation / Registration / Configuration
CHAPTER 2 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.
More informationUser Guide. Version R92. English
AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationLastPass Enterprise Recommended Policies Guide
LastPass Enterprise Recommended Policies Guide This document will help guide you through common scenarios and selecting policies to enable on your LastPass Enterprise account. We will not cover all policies
More informationNetwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer
Netwrix Auditor Visibility platform for user behavior analysis and risk mitigation Mason Takacs Systems Engineer Agenda Product Overview Product Demonstration Q&A About Netwrix Auditor Netwrix Auditor
More informationDell Change Auditor for Active Directory 6.5. User Guide
Dell Change Auditor for Active Directory 6.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationXIA Automation Server
Administrator's Guide Version: 3.1 Copyright 2017, CENTREL Solutions Table of contents About... 6 Installation... 7 Installation Requirements (Server)... 8 Prerequisites (Windows 2016 / 2012)... 9 Prerequisites
More informationSophos Mobile Control startup guide. Product version: 7
Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure
More information