ESET Remote Administrator 6. Version 6.0 Product Details

Size: px
Start display at page:

Download "ESET Remote Administrator 6. Version 6.0 Product Details"

Transcription

1 ESET Remote Administrator 6 Version 6.0 Product Details

2 ESET Remote Administrator 6.0 is a successor to ESET Remote Administrator V5.x, however represents a major step forward, completely new generation and approach to user-experience, performance, and architecture. The changes are described below. 1. NEW FEATURES Independent ESET Remote Administrator Agent By separation of remote management communication from ESET security products, administrator is able to achieve a state, which was not possible before. As the agent is independent, and policies are executed through it (agent executes the policies / tasks / events) the administrator can feel safe, even in case, when there is no direct connection to the server during the occurrence of critical event. Agent also simplifies the deployment, as it does not interfere with any critical operating system processes like standard security software. Via agent, the admin is able to install other (even 3rd) party software, and also perform an uninstall (via standard Windows uninstallation tasks). It also simplifies the infrastructure upgrade, as in case of a new ESET Remote Administrator Server / Agent version, customer is not forced to update also the security product. Server / Proxy architecture The approach towards the product architecture has been changed in the new ESET Remote Administrator 6. For deployment in simple & small organization (up to 1000 clients), a one-machine approach is sufficient. ESET Remote Administrator database performance has been fine-tuned to support installation on the same server as ESET Remote Administrator itself. Alongside the ESET Remote Administrator server, also Web Server with ESET Remote Administrator console is installed. This is a cost-effective solution that should fit to most customers. Console Web Server ERA Server Agent Agent Agent Agent Agent

3 Console Web Server ERA Server Distant link Proxy Proxy Agent Agent Agent For deployment in mid-sized environments (up to clients), ESET Remote Administrator architecture is engineered in a way that it offers a large level of flexibility and customization. Database can be located on a separate machine, as well as the server and the webserver. Remote locations do no longer need a server installation, only new ESET Remote Administrator Proxy which will collect and forward the aggregated data towards the main server. This minimizes network load, and also improves the stability of the network. Computer/Group centric approach New ESET Remote Administrator 6 focuses on computers (sometimes referenced as clients ). As a computer (client) we reference every machine that connects to ESET Remote Administrator, regardless the device type or machine type. This approach is similar to the Active Directory approach, which is now integrated into ESET Remote Administrator (provides automatic synchronization with AD and adopts its group structure). The console provides a simple overview on the hierarchical structure of groups. ESET Remote Administrator recognizes two types of groups. Static groups (each client could be a member of only one static group) and Dynamic groups. Membership in a dynamic group is triggered by meeting inclusion criteria defined in a dynamic group template. Main advantage of this approach is the possibility of assigning a policy to a dynamic group. If a machine is infected, and it enters the dynamic group infected machines with a strict security policy applied (firewall disables connection, device control disables all removable media, etc.) and relevant tasks are executed (on-demand scan with strict cleaning parameters). Entering a dynamic group can also trigger a notification and report generation. Web console The new ESET Remote Administrator 6 features a completely new web-based console. Developed together with a leading user-experience agency after a in-depth user research, it helps to address the needs of real users. It contains interactive dashboards with drill-down capability, intuitive computer / group lists with context menu navigation and clear status indication, separate threat list, informing about the recent discoveries of ESET security products, a section dedicated to reports with pre-defined report templates and huge customization options and detailed administration section, allowing to configure everything, from policies, tasks, triggers, notifications, dynamic group templates, licenses and access rights.

4 Role-based management The new ESET Remote Administrator 6 allows the administrator to create multiple user accounts and define individual (customizable) sets of privileges for them. In case of multi-location deployment, it allows admin to create a superior admin with the rights to define general company policies and a set of local administrators, being able to view & manage only their local clients. Reviewer privilege is also available, to offer harmless access to relevant employees, for example within internal security department, to be able to oversee the status of the network. Improved policy management The approach towards management of policies has been completely changed. In new ESET Remote Administrator, administrator is able to define policies per product, and clearly specify their mutual relationship. The more specific policy overwrites the more general policy; however there is now a possibility to force the policy setting, meaning it could not be overwritten by another policy down the hierarchy. Also settings, which are kept in default values can be forced, meaning that nobody will be able to change them. Each policy will show in which groups and for which clients it is applied, and on each client, there will be a clear indication what policies are being applied and what is the resulting configuration, respecting the mutual relationship between policies. Policies are being executed on agent, resulting in such a state that even without a connection to ESET Remote Administrator server; the agent is able to apply policies assigned to a specific dynamic group, in case client enters such. This brings a completely new level of usability and management. Last, but not least, unified & simplified design of the configuration settings has been adopted, to provide clean and matching user interface for the settings configuration known from ESET security products. ESET will provide policy templates with pre-defined values for each of its security products, respecting needs of various customer groups (restrictive policy, soft policy, policy specified for laptops, policy specified for server usage, etc.). Configurable triggers By configuring a variety of triggers, the administrator is able to specify when a specific task is executed. You can define scheduled triggers (set for a specific date & time for once or multiple (repeating) occurrences) or define specific conditions to be met to run the task. Triggers can be paired with dynamic groups (taking into account membership, size, time period), resulting in a such state that when specified criteria paired to a specific dynamic group (e.g. infected computers) are met, a resulting action is taken (e.g. a notification is generated, on-demand scan is started etc.). You can even set triggers for specific event types, as recorded in the log file of a particular product. New approach towards tasks An administrator using ESET Remote Administrator is now able to create his own list of tasks, according to specific needs, which could be then saved, and used later. Tasks are created in a wizard-like approach, when the console clearly indicates all the necessary data to be filled in prior to their execution. Tasks are clearly sorted out for the specific ESET security products. ESET will provide a list of pre-configured tasks, which when executed on specific clients (possible even via context menu directly in client list), will perform desired action.

5 Dramatically enhanced reporting options Reporting is an extremely demanded feature, allowing administrators and decision makers to have clear insight into the status of the network in real time, or anytime in the past. In the new ESET Remote Administrator, possibilities of reporting are limitless. Custom report templates enable admins to define the right set of data for each of them, combining the proper data values and visualizing them in a proper form. Reports can be viewed directly in ESET Remote Administrator, exported into PDF, and also mailed, in a form of report notification. ESET will of course provide a set of pre-defined report templates, which will make ESET Remote Administrator ready for general use from the moment of installation. Also, this new approach optimizes the database performance, as ESET Remote Administrator will collect only data which will be used for report generation. Other logs won t be downloaded, but will be stored on clients. Report templates will be stored in a separate list, with a clear indication of output, and human understandable description. Each report template could be also shown as a dashboard element. By these options, administrators could achieve an excellent level of visibility into their company computer network status in real time, just by logging into ESET Remote Administrator console. Customizable notifications Most of the administrators are not connected to ESET Remote Administrator all around the day. However, each of them desires to be informed in case something goes wrong. By creating a proper notification options, administrator can be alerted when something bad has happened. Notifications can be configured in a wizard-like style, and are generally triggered by a list of pre-defined templates. Templates are mapped towards dynamic groups membership, and also executed by specific indications (active threats, outdated operating system, outdated security product, low storage device capacity) and also by other events, as recorded in event logs. ESET will provide pre-defined notifications, which when configured properly will make ESET Remote Administrator ready to alert administrators in a matter of minutes. Simplified product deployment Initial deployment of new security software is always a key task. In new ESET Remote Administrator, it is split into two steps. First, the ESET Remote Administrator Agent is deployed, and second, the agent executes the installation of an ESET Security product. As the agent is a small piece of software, which does not mess with key operating system processes its installation is more trouble-free. ESET Remote Administrator automatically determines the type of agent to be installed according to the target operating system. Agent downloads and installs the product with parameters via standard installation scripts. Installation is now simpler, and more intuitive. New licensing system License management is in a centerpiece for business customers. With new ESET Remote Administrator 6, admins have a clear insight into the license status of each computer, and each license. Together with a new online ESET License Administrator, which allows customers to pair their license with their own unique address (or even multiple addresses) and view a real status of each license, with clear indications of errors, it enhances the control over the licenses for ESET security products. The customer is now able to define which exact license is being applied to which specific group / client. In-product license manager enables admins to create notifications based on license status, and even show the clear licensing status in the product dashboard.

6 Strengthened security Security is always a concern, even more when it is related to security software. ESET Remote Administrator 6 now utilizes Transport Layer Security (TLS) 1.0 standard (1.1 is planned) & for peer identification (server, proxy, server) an it creates and generates its own certificates (to digitally sing & encrypt communication between its individual components). Administrator is able to create his own PKI (public-key infrastructure) or utilize existing one (Active Directory). If the first approach is used, certificates & certification authority are crated during installation (or could be changed afterwards), and certificates are then assigned during deployment of each ESET Remote Administrator components. By utilizing certificates, admins achieve a more secure environment. Rogue detection sensor Detection of computers within the network is always crucial, as an unprotected and unmanaged computer represents a security risk. By deploying the new Rogue Detection sensor, a passive network probe, which searches for traces of computers on the network, the administrator will have a better level of visibility over the devices located within the corporate network. All discovered machines are automatically located in the lost & found group, from which admin can move them to specific static groups, and proceed with management tasks. 2. COMPONENTS ESET Remote Administrator 6 consists of several components: ESET Remote Administrator Server ESET Remote Administrator Server is the key component of the ESET Remote Administrator infrastructure. It handles the communication with agents, and it collects and stores all of the application data into the database. It s the heart & brain of the ESET Remote Administrator. ESET Remote Administrator Proxy The proxy is used to collect and aggregate data from computers in remote / distant locations and their forwarding to centralized ESET Remote Administrator server. This helps to optimize the overall load and server performance and also lowers the communication costs (data synchronization happens only in selected time period and only once for all clients behind proxy). ESET Remote Administrator Web-console Web console interprets the data stored in the ESET Remote Administrator database. It visualizes the vast amounts of data into clear dashboards, lists, and it also sends commands to agents and other ESET applications. ESET Remote Administrator Rogue Detection Sensor This part of ESET Remote Administrator infrastructure is used to discover rogue machines on the network. Quite often, even when ESET Remote Administrator server is synchronized with Active Directory, a rogue machine could appear and potentially spread an infection. RD sensor discovers all machines on the network, by listening to their traces. ESET Remote Administrator Agent ESET Remote Administrator Agent is a small GUI less application which executes the commands it receives from ESET Remote Administrator on connected clients. It executes the tasks, collects logs from the ESET applications, interprets and forces the policies and performs other valid tasks, as software deployment and general computer monitoring.

7 Feature ESET Remote Administrator 5.x problem ESET Remote Administrator V6 solution Multi - platform coverage Windows binaries only - subject to Microsoft licensing terms Windows and Linux compatible with all components Centralized management Multiple servers necessary to create organizational hierarchy with local access One central server using proxies to process data from distant branches, role & group based management Enhanced Database performance Size-limited internal database, high performance database only as external option Built-in industry standard - MS SQL - as the default database Clear computer identification Duplicating clients Unique client ID for each client Simplified remote deployment Hard to set up, error-prone remote push installation Pre-deployment conflict-free agent with other software uninstallation possibilities Interactive dashboards New licensing system Impossible to perform direct actions from the dashboard, required ESET Remote Administrator console Static license files, unclear indication of applied licenses on products Dashboards offering drill-down options New dynamic assignment of product licenses, dynamic license update in real-time Improved policy management Too-complex & not intuitive configuration editor New policy editor, with clear indication of applied values and applied policies for each client Pre-configured key product elements In default configuration, ESET Remote Administrator wasn t providing anything pre-configured, making the management for users difficult Pre-defined reports, tasks, notifications, policies are making the ESET Remote Administrator a more usable console Commonly used webservers, web browsers and databases supported with the new ESET Remote Administrator 6: Web Server Apache Tomcat 6+ Glassfish 3.1+ Supported Web Browsers Firefox 20+ Internet Explorer 9+ Chrome 23+ Safari 5+ (originally 4+) Opera 12+ Mobile web browsers Supported Databases MySQL 5.5+ Microsoft SQL Server 2008R2+ (all editions)

8 3. SYSTEM REQUIREMENTS Operating System Server Agent Proxy RD Sensor Windows Server 2008 x64 R2 SP1 Windows Server 2008 x86 SP2 Windows Server 2008 x64 SP2 Windows Server 2012 x64 Windows Server 2012 x64 R2 Microsoft Small Business Server 2011 x64 Standard Microsoft Small Business Server 2011 x64 Essential Windows XP x86 SP3 Windows XP x64 SP2 Windows Vista x86 SP2 Windows Vista x64 SP2 Windows 7 x86 SP1 Windows 7 x64 SP1 Windows 8 x86 Windows 8 x64 Windows 8.1 x86 Windows 8.1 x64 Ubuntu LTS and higher x86/x64 Cent OS 6.5 and higher x86/x64 Note: Please note that installation of ESET Remote Administrator 6 Server & Proxy is no longer officially supported on desktop Windows operating systems. This is due to the violation of Microsoft licensing terms, which do not allow this type of server-like usage.

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

ESET Remote Administrator v6 Getting Started Guide for MSPs January 2017

ESET Remote Administrator v6 Getting Started Guide for MSPs January 2017 ESET Remote Administrator v6 Getting Started Guide for MSPs January 2017 Table of Contents Table of Contents... 2 Environmental Pre-requisites... 3 Installing ESET Remote Administrator (ERA)... 4 Configuring

More information

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business.

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business. Endpoint Protection Antivirus and Antispyware Eliminates all types of threats, including viruses, rootkits, worms and spyware. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers

More information

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes. SOLUTION OVERVIEW Enterprise-grade security management solution providing visibility, management and reporting across all OSes. What is an endpoint security management console? ESET Security Management

More information

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................

More information

Verint Enterprise Feedback Management TM. EFM 15.1 FP3 Release Overview October 2016

Verint Enterprise Feedback Management TM. EFM 15.1 FP3 Release Overview October 2016 Verint Enterprise Feedback Management TM EFM 15.1 FP3 Release Overview October 2016 Table of Contents Welcome to 15.1 FP3... 1 Advanced Dashboard... 1 Custom Filters By Question... 2 Custom Filter Groups...

More information

SOLUTION OVERVIEW. Manage your network security for up to 250 seats from a single cloud-based console

SOLUTION OVERVIEW. Manage your network security for up to 250 seats from a single cloud-based console SOLUTION OVERVIEW Manage your network security for up to 250 seats from a single cloud-based console 2 With ESET Cloud Administrator, you can manage your company network security without the need to buy,

More information

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Introduction No matter how hard you work to educate your employees about the constant and evolving threats

More information

ObserveIT 7.1 Release Notes

ObserveIT 7.1 Release Notes ObserveIT 7.1 Release Notes In This Document About This Release... 2 New Features and Enhancements... 2 Backward Compatibility... 3 New Supported Platforms... 3 Resolved Issues... 4 Known Issues... 4 Limitations...

More information

Table of Contents Release Notes 2013/03/25. Introduction in OS Deployment Manager. in Security Manager System Requirements

Table of Contents Release Notes 2013/03/25. Introduction in OS Deployment Manager. in Security Manager System Requirements Release Notes Release Notes 2013/03/25 Table of Contents Introduction... 3 Deployment Manager... 3 New Features in Deployment Manager... 3 Security Manager... 6 New Features in Security Manager... 6 OS

More information

Performing an ObserveIT Upgrade Using the Interactive Installer

Performing an ObserveIT Upgrade Using the Interactive Installer Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

INSIGHTS, POWERED BY INSIDEVIEW

INSIGHTS, POWERED BY INSIDEVIEW INSIGHTS, POWERED BY INSIDEVIEW Installation Guide Product Version 4.3 JANUARY, 2019 Table of Contents Chapter 1: Introduction to Insights, powered by InsideView...3 What s New in this Release?... 4 Chapter

More information

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. HP JetAdvantage Insights Deployment Guide This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. 1. Overview HP JetAdvantage Insights provides

More information

McAfee Security Management Center

McAfee Security Management Center Data Sheet McAfee Security Management Center Unified management for next-generation devices Key advantages: Single pane of glass across the management lifecycle for McAfee next generation devices. Scalability

More information

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust

More information

Upgrading an ObserveIT One-Click Installation

Upgrading an ObserveIT One-Click Installation Upgrading an ObserveIT One-Click Installation This document was written for ObserveIT Enterprise version 7.6.1. This document uses screenshots and procedures written for Windows Server 2012 R2 and SQL

More information

Windows Intune Trial Guide Getting the most from your Windows Intune trial. Simplify PC management. Amplify productivity.

Windows Intune Trial Guide Getting the most from your Windows Intune trial. Simplify PC management. Amplify productivity. Windows Intune Trial Guide Getting the most from your Windows Intune trial. Simplify PC management. Amplify productivity. CONTENTS 2 Overview 2 Trial Setup 3 Getting Started with the Administration Console

More information

ForeScout Extended Module for Carbon Black

ForeScout Extended Module for Carbon Black ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent

More information

Sophos Enterprise Console advanced startup guide

Sophos Enterprise Console advanced startup guide Sophos Enterprise Console advanced startup guide For distributed installations Product version: 5.3 Document date: April 2015 Contents 1 About this guide...4 2 Planning installation...5 2.1 Planning the

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

Acronis Monitoring Service

Acronis Monitoring Service Acronis Monitoring Service PRODUCT DOCUMENTATION Table of contents 1 About the Acronis Monitoring Service...4 2 Software Requirements...4 3 Understanding basic concepts...5 4 Getting started...7 4.1 Setting

More information

Security Challenges: Integrating Apple Computers into Windows Environments

Security Challenges: Integrating Apple Computers into Windows Environments Integrating Apple Computers into Windows Environments White Paper Parallels Mac Management for Microsoft SCCM 2018 Presented By: Table of Contents Environments... 3 Requirements for Managing Mac Natively

More information

Windows 7 Deployment Key Milestones

Windows 7 Deployment Key Milestones Windows 7 Deployment Key Milestones 2012 2013 2014 Client Deployment and Management Tool Windows 7 Deployment Select Tool (3-6 months) Deployment Tool Architecture (1-2 months) Assess Hardware (1-2 months)

More information

Getting started with System Center Essentials 2007

Getting started with System Center Essentials 2007 At a glance: Installing and upgrading Configuring Essentials 2007 Troubleshooting steps Getting started with System Center Essentials 2007 David Mills System Center Essentials 2007 is a new IT management

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Administering System Center Configuration Manager ( A)

Administering System Center Configuration Manager ( A) Administering System Center Configuration Manager (20703-1A) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Describing the features Configuration Manager and

More information

SafeConsole On-Prem Install Guide

SafeConsole On-Prem Install Guide version 5.4 DataLocker Inc. December, 2018 Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 3 How do the devices become managed by SafeConsole?....................

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Mcafee epo. Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0

Mcafee epo.  Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0 Mcafee epo Number: MA0-100 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ McAfee MA0-100 McAfee Certified Product Specialist-ePO Practice Test Version: 4.0 Exam A QUESTION

More information

WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5

WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5 WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5 ObserveIT s award-winning insider threat management software combines user monitoring, behavioral analytics, and now policy enforcement

More information

Tanium Discover User Guide. Version 2.x.x

Tanium Discover User Guide. Version 2.x.x Tanium Discover User Guide Version 2.x.x June 27, 2017 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

INSIGHTS, POWERED BY INSIDEVIEW

INSIGHTS, POWERED BY INSIDEVIEW INSIGHTS, POWERED BY INSIDEVIEW Installation Guide Product Version 4.2 OCTOBER, 2017 Table of Contents Chapter 1: Introduction to Insights, powered by InsideView...3 What s New in this Release?... 4 Chapter

More information

"Charting the Course to Your Success!" MOC D Administering System Center 2012 Configuration Manager. Course Summary

Charting the Course to Your Success! MOC D Administering System Center 2012 Configuration Manager. Course Summary Description Course Summary This course describes how to configure and manage a site and its associated site systems. The course focuses on day-to-day management tasks for. Objectives At the end of this

More information

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

Comodo Endpoint Security Manager Professional Edition Software Version 3.3 Comodo Endpoint Security Manager Professional Edition Software Version 3.3 Quick Start Guide Guide Version 3.2.022615 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Endpoint Security

More information

ForeScout App for IBM QRadar

ForeScout App for IBM QRadar How-to Guide Version 2.0.0 Table of Contents About IBM QRadar Integration... 3 Use Cases... 3 Visualization of CounterACT Endpoint Compliance Status & Connectivity... 3 Agent Health and Compliance for

More information

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER Course 10747D; Duration: 5 Days; Instructor-led WHAT YOU WILL LEARN This course describes how to configure

More information

McAfee Red and Greyscale

McAfee Red and Greyscale epolicy Orchestrator version 4.0 Quick Reference Card Product Updates DAT File Updates Database server McAfee Download Site 1 2 4 Threat Notification epolicy Orchestrator Server and Master Repository 6

More information

SafeConsole On-Prem Install Guide

SafeConsole On-Prem Install Guide SafeConsole On-Prem Install Guide This guide applies to SafeConsole 5.0.5 Introduction This guide describes how to install a new SafeConsole server on Windows using the SafeConsole installer. As an option,

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Risk Intelligence. Quick Start Guide - Data Breach Risk

Risk Intelligence. Quick Start Guide - Data Breach Risk Risk Intelligence Quick Start Guide - Data Breach Risk Last Updated: 19 September 2018 --------------------------- 2018 CONTENTS Introduction 1 Data Breach Prevention Lifecycle 2 Choosing a Scan Deployment

More information

Administering System Center 2012 Configuration Manager

Administering System Center 2012 Configuration Manager Course 10747: Administering System Center 2012 Configuration Manager Page 1 of 8 Administering System Center 2012 Configuration Manager Course 10747: 4 days; Instructor-Led Introduction This four-day instructor-led

More information

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code:

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code: Course 10747D: Administering System Center 2012 Configuration Manager Exam Code: 70-243 Course Outline Module 1: Overview of System Center 2012 R2 Configuration Manager In this module, you will learn about

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Sophos Enterprise Console

Sophos Enterprise Console advanced startup guide Product Version: 5.5 Contents About this guide... 1 Planning installation... 2 Planning the installation of Enterprise Console... 2 Planning database security... 4 Planning the computer

More information

Comodo Endpoint Security Manager Business Edition Software Version 2.0

Comodo Endpoint Security Manager Business Edition Software Version 2.0 Comodo Endpoint Security Manager Business Edition Software Version 2.0 Administrator Guide Guide Version 2.0.020212 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents

More information

10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER 10747D: ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER DURATION 5 days INTRODUCTION This course describes how to configure and manage a System Center 2012 R2 Configuration Manager site and its

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.4.0 Revision B Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix Version 1.1 Table of Contents About BigFix Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 About Support for Dual Stack Environments... 5 Concepts, Components,

More information

Jetico Central Manager Administrator Guide

Jetico Central Manager Administrator Guide Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number

More information

10747D: Administering System Center 2012 Configuration Manager

10747D: Administering System Center 2012 Configuration Manager 10747D: Administering System Center 2012 Course Details Course Code: 10747D Elements of this syllabus are subject to change. About this course Duration: Notes: 5 days This course syllabus should be used

More information

StreamSets Control Hub Installation Guide

StreamSets Control Hub Installation Guide StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information

Metasploit. Installation Guide Release 4.4

Metasploit. Installation Guide Release 4.4 Metasploit Installation Guide Release 4.4 TABLE OF CONTENTS About this Guide Target Audience...1 Organization...1 Document Conventions...1 Support...2 Support for Metasploit Pro and Metasploit Express...2

More information

Course A: Administering System Center Configuration Manager

Course A: Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Overview: This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large

More information

EnterpriseLink Benefits

EnterpriseLink Benefits EnterpriseLink Benefits GGY a Moody s Analytics Company 5001 Yonge Street Suite 1300 Toronto, ON M2N 6P6 Phone: 416-250-6777 Toll free: 1-877-GGY-AXIS Fax: 416-250-6776 Email: axis@ggy.com Web: www.ggy.com

More information

Jetico Central Manager. Administrator Guide

Jetico Central Manager. Administrator Guide Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.4.7 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

Vendor: Microsoft. Exam Code: Exam Name: TS: Microsoft System Center Operations Manager 2007, Configuring. Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: TS: Microsoft System Center Operations Manager 2007, Configuring. Version: Demo Vendor: Microsoft Exam Code: 70-400 Exam Name: TS: Microsoft System Center Operations Manager 2007, Configuring Version: Demo Question: 1 You have a System Center Operations Manager 2007 environment. You

More information

CORNERSTONE CONNECT REDESIGN Phase 2 (new UI!) GLOBAL SEARCH CONNECT (new UI!)

CORNERSTONE CONNECT REDESIGN Phase 2 (new UI!) GLOBAL SEARCH CONNECT (new UI!) 1 CORNERSTONE CONNECT REDESIGN Phase 2 (new UI!) The next phase of Cornerstone Connect is here! The user interface and experience of Knowledge Bank and Communities have been completely redesigned. This

More information

Administering System Center 2012 Configuration Manager

Administering System Center 2012 Configuration Manager Administering System Center 2012 Configuration Manager Duration: 5 Days Course Code:10747D About this Course This course describes how to configure and manage a System Center 2012 R Configuration Manager

More information

CA GovernanceMinder. CA IdentityMinder Integration Guide

CA GovernanceMinder. CA IdentityMinder Integration Guide CA GovernanceMinder CA IdentityMinder Integration Guide 12.6.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

This section of the release notes is reserved for notable changes and new features since the prior version.

This section of the release notes is reserved for notable changes and new features since the prior version. Release Notes Browsium Proton 4.2 Product Version: 4.2.0 Release Notes Updated: 3 April 2017 About this Release This document lists new features and known issues as of the release date. If you discover

More information

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER

ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER Course Code: 20703-1a Duration 5 days Introduction This five-day course describes how to use Configuration and its associated site systems to efficiently

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager Course 20703-1A 5 Days Instructor-led, Hands on Course Information This five-day course describes how to use Configuration Manager and its associated site

More information

Micro Focus Desktop Containers

Micro Focus Desktop Containers White Paper Security Micro Focus Desktop Containers Whether it s extending the life of your legacy applications, making applications more accessible, or simplifying your application deployment and management,

More information

Pro-face Connect User Guide for GateManager

Pro-face Connect User Guide for GateManager Pro-face Connect User Guide for GateManager Preface The information provided in this documentation contains general descriptions and/or technical characteristics of the performance of the products contained

More information

This section of the release notes is reserved for notable changes and new features since the prior version.

This section of the release notes is reserved for notable changes and new features since the prior version. Release Notes Browsium Proton 4.1 Product Version: 4.1.0 Release Notes Updated: 15 October 2016 About this Release This document lists new features and known issues as of the release date. If you discover

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Administering System Center Configuration Manager 20703-1; 5 Days; Instructor-led Course Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently

More information

Administering System Center Configuration Manager

Administering System Center Configuration Manager Course 20703-1A: Administering System Center Configuration Manager Course Outline Module 1: Managing computers and mobile devices in the enterprise This module describes the features of Configuration Manager

More information

Administrering System Center 2012 Configuration Manager vd

Administrering System Center 2012 Configuration Manager vd Administrering System Center 2012 Configuration Manager vd Varighed: 5 Days Kursus Kode: M10747 Beskrivelse: Dette kursus er erstattet af M20696. Find kurset her M20696 This five-day instructor-led course

More information

Tanium Discover User Guide. Version 2.5.1

Tanium Discover User Guide. Version 2.5.1 Tanium Discover User Guide Version 2.5.1 May 07, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is believed

More information

Verint EFM 15.2 FP1 Release Overview

Verint EFM 15.2 FP1 Release Overview Verint EFM 15.2 FP1 Release Overview In April of 2018, Verint will release version 15.2 FP1 of the Enterprise Feedback Management (EFM) solution. Verint Public Cloud SaaS customers will receive this update

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.4.3 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5

More information

: Administration of Symantec Endpoint Protection 14 Exam

: Administration of Symantec Endpoint Protection 14 Exam 250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks

More information

Data Leak Prevention

Data Leak Prevention Data Leak Prevention Safetica ESET Technology Alliance Data Leak Prevention by Safetica Safetica security software offers a full DLP (Data Leak Prevention) solution which covers a wide range of security

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.2

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.2 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.2 This document supports the version of each product listed and supports all subsequent versions until the document

More information

10.4 infinity Release Notes

10.4 infinity Release Notes 10.4 infinity Release Notes 02.06.2014 Copyright Raynet GmbH (Germany, Paderborn HRB 3524). All rights reserved. Complete or partial reproduction, adaptation, or translation without prior written permission

More information

AVG Business Edition Remote Administration

AVG Business Edition Remote Administration AVG Business Edition Remote Administration User Manual Document revision AVG.02 (1/7/2018) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

PRO, PRO+, and SERVER

PRO, PRO+, and SERVER AliveChat Overview PRO, PRO+, and SERVER Version 1.2 Page 1 Introducing AliveChat 4. Our Latest Release for 2008! Mac, Windows, or Linux - All You Need is a Web Browser Access AliveChat anywhere you have

More information

Workstation Configuration Guide

Workstation Configuration Guide Workstation Configuration Guide August 13, 2018 Version 9.6.134.78 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 4 1.1 Considerations

More information

Dolby Conference Phone 3.1 configuration guide for West

Dolby Conference Phone 3.1 configuration guide for West Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San

More information

Executive Summery. Siddharta Saha. Downloaded from

Executive Summery. Siddharta Saha. Downloaded from 1 Executive Summery In the last quarter of century the world has seen a tremendous growth in IT and IT enabled services. IT infrastructure of any organization is the most precious since business process

More information

Intellicus Enterprise Reporting and BI Platform

Intellicus Enterprise Reporting and BI Platform Getting Started with Intellicus Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Getting Started with Intellicus i Copyright 2012 Intellicus

More information

Edge Device Manager Quick Start Guide. Version R15

Edge Device Manager Quick Start Guide. Version R15 Edge Device Manager Quick Start Guide Version R15 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates

More information

Learning Secomea Remote Access (Using SiteManager Embedded for Windows)

Learning Secomea Remote Access (Using SiteManager Embedded for Windows) Secomea GateManager BASIC Guide Learning Secomea Remote Access (Using SiteManager Embedded for Windows) This guide is intended for first time users of the Secomea remote access solution, who need a practical

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst ESG Lab Review Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst Abstract: This ESG Lab Review documents hands-on testing of Shavlik

More information

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved. Install and upgrade Qlik Sense Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik

More information

ESET REMOTE ADMINISTRATOR PLUG-IN For Kaseya Technical Setup and User Guide. Click here to download the latest version of this document

ESET REMOTE ADMINISTRATOR PLUG-IN For Kaseya Technical Setup and User Guide. Click here to download the latest version of this document ESET REMOTE ADMINISTRATOR PLUG-IN For Kaseya Technical Setup and User Guide Click here to download the latest version of this document ESET REMOTE ADMINISTRATOR PLUG-IN FOR KASEYA Copyright 2017 by ESET,

More information

Installation Guide. Qlik Sense Copyright QlikTech International AB. All rights reserved.

Installation Guide. Qlik Sense Copyright QlikTech International AB. All rights reserved. Installation Guide Qlik Sense 2.0.1 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense, QlikView,

More information

MOC ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER

MOC ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER ONE STEP AHEAD. MOC 10747 ADMINISTERING SYSTEM CENTER 2012 CONFIGURATION MANAGER Length: 5 Days Level: 300 Technology: Microsoft System Center 2012 Configuration Manager Delivery Method: Instructor-led

More information