SAS Security Design Best Practices, Validation and Monitoring

Size: px
Start display at page:

Download "SAS Security Design Best Practices, Validation and Monitoring"

Transcription

1 SAS Security Design Best Practices, Validation and Monitoring Today s event will begin at 3:00 PM ET. Audio will remain muted until the event begins. When we begin, audio will be heard through your computer speakers. To access audio by phone, dial the number below followed by the access code and #: US Toll-free: Toll/International: Access Code: # If you experience any technical difficulties, please contact WebEx Technical Support at Copyright SAS Institute Inc. All rights reserved.

2 SAS Security Design Best Practices, Validation and Monitoring Copyright SAS Institute Inc. All rights reserved.

3 Presenters Michelle Homes Founder and Business Development Manager, Metacoda Angie Hedberg Technical Consulting Manager, SAS Shelley Sessoms Community Manager, SAS External Communications Copyright SAS Institute Inc. All rights reserved.

4 SAS Administration & Deployment Community Online. Everyday. Communities.sas.com/deployment Copyright SAS Institute Inc. All rights reserved.

5 Copyr i g ht 2015, SAS Ins titut e Inc. All rights res er ve d. SAS, VALIDATION, AND MONITORING

6 SAS SECURITY DESIGN BEST PRACTICES INTRODUCTION Key highlights for today s presentation: SAS Metadata Security Design Best Practices Validation and monitoring techniques using Metacoda to ensure adherence to metadata security best practices File System Security Design Best Practices Based on security design best practices used within U.S. SAS Consulting SAS Global Forum 2017 Paper: Getting Started with Designing and Implementing a SAS 9.4 Metadata and File System Security Design (Authors: Angie Hedberg and Phil Hopkins) Assumption that attendees have basic knowledge of SAS security framework

7 METADATA #1: DEFINE AND IMPLEMENT PERSONAS Categorize all users in your organization based on their job function and usage of SAS software Define tasks that each persona will perform within SAS and list all SAS client applications that each persona may use Define functional security requirements for each persona For example: Administrators, Developers, Analysts, Report Creators, Consumers

8 METADATA #1: DEFINE AND IMPLEMENT PERSONAS For example: Administrators: Administrators will have full access to the SAS environment. They will perform user management, configure security, apply software upgrades and hotfixes, monitor the system, and troubleshoot end user issues. Administrators have full access to all SAS client applications. Developers: Developers will use a wide variety of SAS tools to create data, perform adhoc analysis and reporting, and generate data or reports to share with others. SAS client applications used by this persona might include: SAS Data Integration Studio, SAS Enterprise Guide, SAS Studio, and SAS Visual Analytics. Consumers: Consumers are read-only users that will consume web-based reports created by Developers. Consumers cannot create reports. Consumers will use the following SAS applications: SAS Visual Analytics and SAS Mobile BI.

9 METADATA #2: CREATE CUSTOM GROUPS AND ROLES FOR SIMPLICITY Default SAS groups and roles are typically narrowly focused on individual applications Create custom metadata groups that map to defined personas Create a custom role for each persona Assign capabilities across all relevant applications for each custom role Role object Group assigned to Role ROLE: Developer Developers Assign capabilities across applications

10 METADATA #2: CREATE CUSTOM GROUPS AND ROLES FOR SIMPLICITY Benefits: Simplifies the onboarding process of a new user by adding them to a single group which then grants all privileges they need in the system Allows SAS Administrators the ability to see all capabilities for a given persona by viewing a single role Note: there are some required roles with implicit capabilities, such as the Metadata Server roles. These roles must be included in your security design as well.

11 METADATA #3: USE ACTS INSTEAD OF ACES Access Control Entries (ACEs): explicit permission for some identity applied to some object Access Control Templates (ACTs): collection of ACEs saved as a pattern of permissions which can be applied to multiple objects The use of ACEs can be unmanageable, and lead to confusion or incorrect effective permissions due to user error ACTs are easier to design, implement, understand, and manage over time

12 METADATA #3: USE ACTS INSTEAD OF ACES Inherited Permission Directly applied via ACT X Directly applied via ACE

13 METADATA #4: ONLY USE GROUPS FOR ACTS Only identity groups should be used for building the rules within ACTs, never individual users This is a common best practice in any security model, but it is an important best practice and worth noting Allows for users to be easily added and removed from the system without impacting security implementation

14 METADATA #5: DENY BROADLY AND GRANT SPECIFICALLY ACTs should be defined by denying permissions to the broadest identity level possible and granting permissions more precisely to the groups that require access Implemented by denying PUBLIC or SASUSERS, then granting permissions selectively to groups Avoids potential permission conflicts and unintended effective permissions caused by user error Don t forget to grant back permissions to privileged identities

15 METADATA #5: DENY BROADLY AND GRANT SPECIFICALLY If your deployment requires access for PUBLIC users, then always broadly deny access to the PUBLIC identity in ACTs If your deployment does not allow any PUBLIC users, and PUBLIC users are denied all permissions on the Default ACT, or removed altogether from the Default ACT, then SASUSERS can be used for broad denial of permissions in ACTs

16 METADATA #6: IDENTIFY BUSINESS ACCESS PATTERNS AND DEFINE ACTS TO ENCAPSULATE THE PATTERNS Define business access patterns and build ACTs to implement the pattern For example: Private pattern, Write pattern, Register pattern, Update pattern By encapsulation, this means to define all permissions for all groups within a single ACT that are required to implement the access pattern The name of the ACT should clearly identify the access pattern

17 METADATA #6: IDENTIFY BUSINESS ACCESS PATTERNS AND DEFINE ACTS TO ENCAPSULATE THE PATTERNS Private Pattern: used to restrict read access to a specific group of users PUBLIC or SASUSERS: deny ReadMetadata, deny Read (d-rm, d-r) <Business Group>: grant ReadMetadata, Read (RM, R) SAS Administrators: grant ReadMetadata, Read (RM, R) SAS System Services: grant ReadMetadata, Read (RM, R) Write Pattern: enables full write access to objects PUBLIC or SASUSERS: deny WriteMetadata, deny Write, deny Create, deny Delete, and deny Administer (d-wm, d-w, d-c, d-d, d-a) <Functional Business Group>: grant WriteMetadata, Write, Create, Delete, and Administer (WM, W, C, D, A) SAS Administrators: grant Write, Create, Delete, and Administer (WM, W, C, D, A) SAS System Services: grant WriteMetadata (WM)

18 METADATA #6: IDENTIFY BUSINESS ACCESS PATTERNS AND DEFINE ACTS TO ENCAPSULATE THE PATTERNS Register Pattern: enables users to add ( register ) new objects into a metadata folder, but not update the folder itself PUBLIC or SASUSERS: deny WriteMetadata (d-wm) <Functional Business Group>: grant WriteMemberMetadata (WMM) SAS Administrators: grant WriteMetadata (WM) SAS System Services: grant WriteMetadata (WM) Update Pattern: enables users to modify metadata objects PUBLIC or SASUSERS: deny WriteMetadata (d-wm) <Functional Business Group>: grant WriteMetadata (WM) SAS Administrators: grant WriteMetadata (WM) SAS System Services: grant WriteMetadata (WM)

19 METADATA #6: IDENTIFY BUSINESS ACCESS PATTERNS AND DEFINE ACTS TO ENCAPSULATE THE PATTERNS SAS Administrators Update ACT PUBLIC or SASUSERS: deny WriteMetadata (d-wm) SAS Administrators: grant WriteMetadata (WM) SAS System Services: grant WriteMetadata (WM) Used to secure: Access Control Templates Groups and Roles Server components SAS Folders root metadata folder

20 METADATA #7: APPLY PERMISSIONS AT THE HIGHEST OBJECT LEVEL POSSIBLE ACTs should be applied on the highest object level possible to achieve the desired restrictions Define the metadata folder structure with this best practice in mind For example, apply ACT on a Reports folder and have those permissions inherit down to all reports created within the folder versus applying ACTs on each individual report object

21 METADATA #7: APPLY PERMISSIONS AT THE HIGHEST OBJECT LEVEL POSSIBLE Apply Hotels Private ACT Apply Hotels Marketing Private ACT Apply Hotels Marketing Developers Write ACT Apply Hotels Marketing Developers Register ACT

22 METADATA SUMMARY OF METADATA SECURITY BEST PRACTICES Define and Implement Personas Create Custom Groups and Roles for Simplicity Use ACTs instead of ACEs Only use Groups for ACTs Deny Broadly and Grant Specifically Identify Business Access Patterns and Define ACTs to Encapsulate the Patterns Apply Permissions at the Highest Object Level Possible

23 METADATA Monitoring and Validation of Metadata Security Design Best Practices

24 Where Metacoda helps SAS Apps SAS Metadata Server SAS Metadata Authorization Layer SAS Resources Metacoda helps here DB Auth Layer DB Resources Op Sys Auth Layer File / Other Resources

25 ABOUT METACODA. since 2007 Provide add-ons to SAS Software for enhanced metadata visibility and exploitation Metacoda Identity Sync Metacoda Security Plug-ins Metacoda Testing Framework Metacoda Utility Plug-ins - free Custom Tasks (for SAS Enterprise Guide & AMO) - free Goals: Improve your productivity through enhanced metadata visibility Helping to keep your SAS platform secure

26 BUSINESS PROBLEMS WE SOLVE Keeping SAS Users & Groups in sync with Active Directory Including large & complex directories all without code! Metacoda Identity Sync Knowing/documenting your SAS Metadata Security Easily showing an Auditor what someone has access to who has access to something Metacoda Security Plug-ins Verifying & proving to an Auditor your SAS Metadata Security is still intact and you can quickly detect and act on changes Metacoda Testing Framework

27 METADATA SECURITY TESTING: WHY? Over time we get changes from various user roles Production (Lev1) is it still adequately secured? tomorrow? next week? next month?

28 METADATA SECURITY TESTING: WHY? Test for consistency across multiple environments Production (Lev1) Test (Lev2) Development (Lev3) Test

29 METADATA SECURITY TESTING: WHY? Test for consistency during SAS version upgrades SAS 9.2 (Lev1) SAS 9.3 (Lev1) SAS 9.4 (Lev1) Test Test

30 TESTING A SINGLE ENVIRONMENT: TEST & REPEAT Tomorrow, Next Week, Next Month: Compare current state to desired state using previously exported Metadata Security Test XML files

31 CONSISTENCY TESTING DIFFERENT ENVIRONMENTS Export Metadata Security Test XML files from source environment to test for consistency in target environment.

32 TESTING FOR RECOMMENDED SECURITY PRACTICES Metacoda Security Testing Framework includes tests to help sites follow recommended security practices Choose from recommended practice tests you want to follow Adjust ignores list / exclusions (if necessary) Example provides in the Batch Interface package metacoda-plugins-batch\examples\sectest-run-tasks\metacoda-recommended-practices.xml

33 METADATA Demonstration

34 MULTIPLE AUTHORIZATION LAYERS There are multiple authorization layers in a SAS environment SAS Metadata Layer File System Layer Database Layer Each has its own authorization facility and permissions to consider

35 FILE SYSTEM #1: UNDERSTAND TOUCHPOINTS BETWEEN SAS METADATA AND THE FILE SYSTEM Not all metadata objects have a corresponding physical file, and not all files on the file system have a corresponding metadata object Administrators need to understand the associations between metadata objects and files so that you can intelligently define and properly secure the file system directory structure

36 FILE SYSTEM #1: UNDERSTAND TOUCHPOINTS BETWEEN SAS METADATA AND THE FILE SYSTEM Content Type Metadata Object File System File SAS Visual Analytics Report or Exploration SAS Enterprise Miner Project X X SAS Enterprise Guide Project maybe on client file system or SAS server file system SAS Data Set maybe X X SAS Program File (or Macro code) Custom Format X X SAS Data Integration Studio Job X maybe (if code deployed)

37 FILE SYSTEM #2: MIMIC THE METADATA FOLDER STRUCTURE At a high level, the metadata folder structure and the file system directory structure should mirror one another For example, if the metadata folder structure is organized by Business Units and Departments, the same organizational hierarchy should be used to define the file system directory structure Subfolders defined in metadata for specific object types might not all map to subdirectories on the file system, and vice versa for physical files that do not exist in metadata In addition, permissions should be similar between metadata and the file system This simplifies the end user experience and allows for a consistent navigation path

38 FILE SYSTEM #2: MIMIC THE METADATA FOLDER STRUCTURE Mimic the Metadata folder structure on the file system X /enterprise /hotels X /shared /shared /marketing /data /data /macros /formats /data /data_integration /em_projects /formats /programs /scheduled_jobs /storedprocesses

39 FILE SYSTEM #3: DEFINE SERVICE ACCOUNTS BASED ON THE REQUIRED SECURITY GRANULARITY Define multiple service accounts according to the security granularity required For example, you can implement a unique service account per Tenant or Business Unit Service accounts are commonly used for: Scheduled jobs Stored Process Server File system directory owner (on UNIX)

40 FILE SYSTEM #4: USE SETGID PERMISSION ON DIRECTORIES (FOR UNIX) To facilitate file sharing on UNIX systems, specify the setgid permission on directories Ensures all new files created within the directory will inherit the same group owner as the parent directory The setgid permission will also inherit down to newly created subdirectories Greatly improves the end-user experience

41 FILE SYSTEM PULLING THE FILE SYSTEM BEST PRACTICES TOGETHER Directory Owner Group Owner Permissions Root Directory Subdirectories Description sas sas 755 /sasdata Root directory for SAS permanent data and code parks_srv parks 2750 /parks Line of Business specific root directory parks_srv parks 2770 /data Parks: SAS data or views parks_srv parks 2770 /data_integration Parks: DI root directory for code, data, deployed jobs parks_srv parks 2770 /em_projects Parks: shared SAS Enteprise Miner projects parks_srv parks 2770 /formats Parks: custom formats parks_srv parks 2770 /programs Parks: SAS program (code) files parks_srv parks 2770 /scheduled_jobs Parks: deployed jobs for scheduling parks_srv parks 2770 /storedprocesses Parks: stored process code files hotels_srv hotels 2750 /hotels Line of Business specific root directory hotels_srv hotels 2770 /data Hotels: SAS data or views hotels_srv hotels 2770 /data_integration Hotels: DI root directory for code, data, deployed jobs hotels_srv hotels 2770 /em_projects Hotels: shared SAS Enteprise Miner projects hotels_srv hotels 2770 /formats Hotels: custom formats hotels_srv hotels 2770 /programs Hotels: SAS program (code) files hotels_srv hotels 2770 /scheduled_jobs Hotels: deployed jobs for scheduling hotels_srv hotels 2770 /storedprocesses Hotels: stored process code files sas sas 755 /sasusers Root directory for individual personal user folders <user> sas 700 /<user> Implicit "SASUSER" library configured to this path

42 FILE SYSTEM SUMMARY OF FILE SYSTEM SECURITY BEST PRACTICES Understand Touchpoints between SAS Metadata and the File System Mimic the Metadata Folder Structure Define Service Accounts based on Required Security Granularity Use SETGID Permission on Directories (for UNIX)

43 REFERENCES PULLING METADATA AND FILE SYSTEM TOGETHER TO BUILD A SECURITY MODEL 10-Step Process for creating a SAS security model SAS Global Forum 2017 Paper: Getting Started with Designing and Implementing a SAS 9.4 Metadata and File System Security Design Additional SAS Security Resources: SAS 9.4 Intelligence Platform: Security Administration Guide Five Papers on SAS 9.4 Security Model Design (Author: David Stern) Model-Design-part-1/ta-p/ (part 1) Model-Design-part-2/ta-p/ (part 2)

44 REFERENCES POSTS AND PAPERS ON METACODA METADATA TESTING FRAMEWORK Blog: Following SAS GEL Security Rules with Metacoda Security Tests Blog: Testing Conditional Grants in SAS Visual Analytics Blog: Testing Recommended Practices with SAS Metadata Security Blog: SAS Metadata Security Testing SAS Global Forum 2014 Paper

45 Any questions? Please use the Q&A panel to submit questions. Copyright SAS Institute Inc. All rights reserved.

46 @SASSoftware SAS Software, SASUsersgroup SASSoftware SAS, SAS Users Group communities.sas.com blogs.sas.com/content Copyright SAS Institute Inc. All rights reserved.

47 Director+ attend for free Students attend for free (Academic Faculty = 50% off) Early Bird Discount until July 31! Register Today! C opyr i g ht 2017, SAS Ins titut e Inc. All rights res er ve d.

48 Thank you! sas.com Copyright SAS Institute Inc. All rights reserved.

SAS Metadata Security 201: Security Basics for a New SAS Administrator

SAS Metadata Security 201: Security Basics for a New SAS Administrator ABSTRACT Paper 1293-2017 SAS Metadata Security 201: Security Basics for a New SAS Administrator Charyn Faenza, F.N.B. Corporation The purpose of this paper is to provide an overview of SAS metadata security

More information

Test for Success: Automated Testing of SAS Metadata Security Implementations Paul Homes Metacoda

Test for Success: Automated Testing of SAS Metadata Security Implementations Paul Homes Metacoda Test for Success: Automated Testing of SAS Metadata Security Implementations Paul Homes Metacoda About Metacoda SAS Alliance Silver Member since 2007 Provide add-ons to SAS Software for enhanced metadata

More information

Best Practices with SAS 9 Metadata Security

Best Practices with SAS 9 Metadata Security Best Practices with SAS 9 Metadata Security Paul Homes SAS Forum ANZ (12Aug2010) SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc.

More information

SAS 9.4 Management Console: Guide to Users and Permissions

SAS 9.4 Management Console: Guide to Users and Permissions SAS 9.4 Management Console: Guide to Users and Permissions SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2015. SAS 9.4 Management Console: Guide

More information

Hands-Off SAS Administration Using Batch Tools to Make Your Life Easier

Hands-Off SAS Administration Using Batch Tools to Make Your Life Easier Paper SAS1857-2015 Hands-Off SAS Administration Using Batch Tools to Make Your Life Easier ABSTRACT Eric Bourn, Amy Peters, and Bryan Wolfe, SAS Institute Inc., Cary, NC As a SAS Intelligence Platform

More information

SAS 9.4 Management Console: Guide to Users and Permissions

SAS 9.4 Management Console: Guide to Users and Permissions SAS 9.4 Management Console: Guide to Users and Permissions SAS Documentation September 19, 2017 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2013. SAS 9.4 Management

More information

SAS Metadata Security Journey prepare to be audited!

SAS Metadata Security Journey prepare to be audited! SAS Metadata Security Journey prepare to be audited! SAS Metadata Security 301 AUDITING YOUR SAS ENVIRONMENT Authors Charyn Faenza Vice President And Manager First National Bank Charyn is responsible for

More information

SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other

SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other Who Watches The Watchers? @AndrewAtANJ Presenter Andrew Howell, ANJ Solutions Andrew has been a SAS user for 18 years, mainly as a self-employed consultant, based in Melbourne Australia but having worked

More information

SAS 9.2 Intelligence Platform. Security Administration Guide

SAS 9.2 Intelligence Platform. Security Administration Guide SAS 9.2 Intelligence Platform Security Administration Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. SAS 9.2 Intelligence Platform: Security Administration

More information

Platform Overview and What s New in SAS 9.4 Architecture

Platform Overview and What s New in SAS 9.4 Architecture Platform Overview and What s New in SAS 9.4 Architecture Platform Overview Metadata Server Cluster SAS Environment Manager How to Encrypt data and passwords 2 Platform Overview Metadata Server Cluster

More information

Time Series Studio 12.3

Time Series Studio 12.3 SAS Time Series Studio 12.3 Administrator s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2013. SAS Time Series Studio 12.3: Administrator's

More information

Time Series Studio 13.1

Time Series Studio 13.1 SAS Time Series Studio 13.1 Administrator s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2013. SAS Time Series Studio 13.1: Administrator's

More information

What s New in Enterprise Jeff Simpson Sr. Systems Engineer

What s New in Enterprise Jeff Simpson Sr. Systems Engineer What s New in Enterprise 7.1.3 Jeff Simpson Sr. Systems Engineer SAS Enterprise Guide 7.13 The new DATA Step Debugger is a tool that enables you to find logic errors in a DATA step program. With the DATA

More information

Certkiller.A QA

Certkiller.A QA Certkiller.A00-260.70.QA Number: A00-260 Passing Score: 800 Time Limit: 120 min File Version: 3.3 It is evident that study guide material is a victorious and is on the top in the exam tools market and

More information

Grant permissions sql server Grant permissions sql server 2008.zip

Grant permissions sql server Grant permissions sql server 2008.zip Grant permissions sql server 2008 Grant permissions sql server 2008.zip 12/01/2011 I am trying to set column level permissions on a table in SQL Server 2008. These are the steps I took: Right-click on

More information

Using Metadata Queries To Build Row-Level Audit Reports in SAS Visual Analytics

Using Metadata Queries To Build Row-Level Audit Reports in SAS Visual Analytics SAS6660-2016 Using Metadata Queries To Build Row-Level Audit Reports in SAS Visual Analytics ABSTRACT Brandon Kirk and Jason Shoffner, SAS Institute Inc., Cary, NC Sensitive data requires elevated security

More information

Best Practice for Creation and Maintenance of a SAS Infrastructure

Best Practice for Creation and Maintenance of a SAS Infrastructure Paper 2501-2015 Best Practice for Creation and Maintenance of a SAS Infrastructure Paul Thomas, ASUP Ltd. ABSTRACT The advantage of using metadata to control and maintain data and access to data on databases,

More information

NTFS File and Folder Permissions. Windows Server Ins and Outs of NTFS permissions in Windows Server 2012.

NTFS File and Folder Permissions. Windows Server Ins and Outs of NTFS permissions in Windows Server 2012. NTFS File and Folder Permissions Windows Server 2012. Microsoft have made lot of improvements in Server 2012. One of the major changes is Server Manager. Server Manager is now linked with almost all the

More information

SAS Model Manager 2.3

SAS Model Manager 2.3 SAS Model Manager 2.3 Administrator's Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2010. SAS Model Manager 2.3: Administrator's Guide. Cary,

More information

What's New - Technical in Microsoft Dynamics AX 2012 for Implementation Course 80165A: 1 Day; Instructor-Led

What's New - Technical in Microsoft Dynamics AX 2012 for Implementation Course 80165A: 1 Day; Instructor-Led What's New - Technical in Microsoft Dynamics AX 2012 for Implementation Course 80165A: 1 Day; Instructor-Led About this Course This one-day instructor-led course provides students with an introduction

More information

SAS Viya 3.3 Administration: Identity Management

SAS Viya 3.3 Administration: Identity Management SAS Viya 3.3 Administration: Identity Management Identity Management Overview................................................................. 2 Getting Started with Identity Management......................................................

More information

Intelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully

Intelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully Intelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully Thomas Rohrmann, Michael Probst Analytics Experience 2016, Rome #analyticsx C opyr i g ht 2016,

More information

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide February 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator

More information

How to Host WebEx Meetings

How to Host WebEx Meetings How to Host WebEx Meetings Instructions for ConnSCU Faculty and Staff using ConnSCU WebEx Table of Contents How Can Faculty and Staff Use WebEx?... 3 Inviting Meeting Participants... 3 Tips before Starting

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

SAS STUDIO. A pretty big deal! Copyr i g ht 2012, SAS Ins titut e Inc. All rights res er ve d.

SAS STUDIO. A pretty big deal! Copyr i g ht 2012, SAS Ins titut e Inc. All rights res er ve d. A pretty big deal! 1.12.2014 INTRODUCTION A pretty big deal! Web-based programming interface to SAS It runs in your browser, which means that end users don't have to install anything (when connecting to

More information

Content Modeling for Administrators

Content Modeling for Administrators Content Modeling for Administrators Getting Started Guide ImageNow Version: 6.7.x Written by: Product Documentation, R&D Date: September 2016 2014 Perceptive Software. All rights reserved CaptureNow, ImageNow,

More information

12/05/2017. Geneva ServiceNow Custom Application Development

12/05/2017. Geneva ServiceNow Custom Application Development 12/05/2017 Contents...3 Applications...3 Creating applications... 3 Parts of an application...22 Contextual development environment... 48 Application management... 56 Studio... 64 Service Creator...87

More information

Using Zoom. Hosting a Live Classroom

Using Zoom. Hosting a Live Classroom Using Zoom Hosting a Live Classroom To host a Zoom session, you will need to download the Zoom application. You can download the app from this site: https://zoom.us/download/. Otherwise, when you try and

More information

SAS Intelligence Platform

SAS Intelligence Platform SAS Publishing SAS 9.1.3 Intelligence Platform Desktop Application Administration Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. SAS 9.1.3 Intelligence

More information

Web Site Guidelines. University of Texas at El Paso. Prepared by: The Office of Information Resources and Planning. November 16, 2004.

Web Site Guidelines. University of Texas at El Paso. Prepared by: The Office of Information Resources and Planning. November 16, 2004. Web Site Guidelines University of Texas at El Paso Prepared by: The Office of Information Resources and Planning November 16, 2004 Page 1 of 24 REVISION HISTORY Revision Code Revision Date Comments - 11/16/2004

More information

SAS Forecast Server 3.1. Administrator s Guide to Installation and Configuration

SAS Forecast Server 3.1. Administrator s Guide to Installation and Configuration SAS Forecast Server 3.1 Administrator s Guide to Installation and Configuration The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. SAS Forecast Server 3.1: Administrator

More information

One of the primary features of 5-Star Students is the ability to capture and store attendance data during school events.

One of the primary features of 5-Star Students is the ability to capture and store attendance data during school events. Conducting Events This guide will assist you with planning and conducting events using 5-Star Students Determine which events you ll track using 5-Star Students Understand requirements and options for

More information

Making do with less: Emulating Dev/Test/Prod and Creating User Playpens in SAS Data Integration Studio and SAS Enterprise Guide

Making do with less: Emulating Dev/Test/Prod and Creating User Playpens in SAS Data Integration Studio and SAS Enterprise Guide Paper 419 2013 Making do with less: Emulating Dev/Test/Prod and Creating User Playpens in SAS Data Integration Studio and SAS Enterprise Guide David Kratz, d-wise Technologies ABSTRACT Have you ever required

More information

Creating a Departmental Standard SAS Enterprise Guide Template

Creating a Departmental Standard SAS Enterprise Guide Template Paper 1288-2017 Creating a Departmental Standard SAS Enterprise Guide Template ABSTRACT Amanda Pasch and Chris Koppenhafer, Kaiser Permanente This paper describes an ongoing effort to standardize and simplify

More information

Policy Manager in Compliance 360 Version 2018

Policy Manager in Compliance 360 Version 2018 Policy Manager in Compliance 360 Version 2018 Policy Manager Overview 3 Create a Policy 4 Relate a Policy to Other Policies, Departments, and Incidents 8 Edit a Policy 10 Edit a Policy by Using the Edit

More information

SharePoint 2016 Site Collections and Site Owner Administration

SharePoint 2016 Site Collections and Site Owner Administration SharePoint Course - 55234 SharePoint 2016 Site Collections and Site Owner Administration Length 5 days Audience This course is intended for those who provide site collection and site administration and

More information

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations 98-367 MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations Which are common symptoms of a virus infection? (Lesson 5 p 135-136) Poor system performance. Unusually low

More information

WebEx Training Center Tutorial for Cornell Faculty

WebEx Training Center Tutorial for Cornell Faculty CORNELL UNIVERSITY WebEx Training Center Tutorial for Cornell Faculty Getting Started Guide Academic Technologies Last Updated: Spring 2014 Email atc_support@cornell.edu if you need additional assistance

More information

SAS Forecast Server 3.1. Administrator s Guide to Report Administration Tasks

SAS Forecast Server 3.1. Administrator s Guide to Report Administration Tasks SAS Forecast Server 3.1 Administrator s Guide to Report Administration Tasks The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. SAS Forecast Server 3.1: Administrator

More information

Microsoft Core Solutions of Microsoft SharePoint Server 2013

Microsoft Core Solutions of Microsoft SharePoint Server 2013 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20331 - Core Solutions of Microsoft SharePoint Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This course will provide you with the

More information

CTC BIM Suites Installation and Configuration Guide

CTC BIM Suites Installation and Configuration Guide CTC BIM Suites Installation and Configuration Guide Contents CTC Express Tools Overview...5 General Security Requirements Summary...5 Revit Workstations...5 Network Floating License Servers...6 Upgrading

More information

GUIDE TO STORAGE CHARGEBACKS WITH DATADVANTAGE

GUIDE TO STORAGE CHARGEBACKS WITH DATADVANTAGE GUIDE TO STORAGE CHARGEBACKS WITH DATADVANTAGE OVERVIEW Chargebacks let companies allocate costs to internal corporate users and departments or cost centers. Simply put: a chargeback is a bill from the

More information

Nortel Quality Monitoring Search and Replay Guide

Nortel Quality Monitoring Search and Replay Guide Nortel Quality Monitoring Search and Replay Guide NN44480-106 Product release 7.0 Standard 02.02 November 2009 Nortel Quality Monitoring Search and Replay Guide Publication number: NN44480-106 Product

More information

Enterprise Data Access Management in a Multi-Tenant SAS BI environment

Enterprise Data Access Management in a Multi-Tenant SAS BI environment Paper 891-2017 Enterprise Data Access Management in a Multi-Tenant SAS BI environment ABSTRACT Chun-Yian Liew, ING Bank N.V. Sometimes it might be beneficial to share a SAS Business Intelligence environment

More information

WHAT IS THE CONFIGURATION TROUBLESHOOTER?

WHAT IS THE CONFIGURATION TROUBLESHOOTER? Paper 302-2008 Best Practices for SAS Business Intelligence Administrators: Using the Configuration Troubleshooter to Keep SAS Solutions and SAS BI Applications Running Smoothly Tanya Kalich, SAS Institute

More information

AN INTRODUCTION TO OUTLOOK WEB ACCESS (OWA)

AN INTRODUCTION TO OUTLOOK WEB ACCESS (OWA) INFORMATION TECHNOLOGY SERVICES AN INTRODUCTION TO OUTLOOK WEB ACCESS (OWA) The Prince William County School Division does not discriminate in employment or in its educational programs and activities against

More information

Oracle User Productivity Kit 11 Implementation Consultant Essentials - Exam Study Guide

Oracle User Productivity Kit 11 Implementation Consultant Essentials - Exam Study Guide Oracle User Productivity Kit 11 Implementation Consultant Essentials - Exam Study Guide Margy Girdzius Director, Partner Enablement WWA&C Objective & Audience Objective Help you prepare to take the Oracle

More information

AWS Service Catalog. User Guide

AWS Service Catalog. User Guide AWS Service Catalog User Guide AWS Service Catalog: User Guide Copyright 2017 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in

More information

SharePoint User Manual

SharePoint User Manual SharePoint User Manual Developed By The CCAP SharePoint Team Revision: 10/2009 TABLE OF CONTENTS SECTION 1... 5 ABOUT SHAREPOINT... 5 1. WHAT IS MICROSOFT OFFICE SHAREPOINT SERVER (MOSS OR SHAREPOINT)?...

More information

SAS Model Manager 2.2. Tutorials

SAS Model Manager 2.2. Tutorials SAS Model Manager 2.2 Tutorials The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. SAS Model Manager 2.2: Tutorials. Cary, NC: SAS Institute Inc. SAS Model Manager

More information

Setting Up Jive for SharePoint Online and Office 365. Introduction 2

Setting Up Jive for SharePoint Online and Office 365. Introduction 2 Setting Up Jive for SharePoint Online and Office 365 Introduction 2 Introduction 3 Contents 4 Contents Setting Up Jive for SharePoint Online and Office 365...5 Jive for SharePoint Online System Requirements...5

More information

20331B: Core Solutions of Microsoft SharePoint Server 2013

20331B: Core Solutions of Microsoft SharePoint Server 2013 20331B: Core Solutions of Microsoft SharePoint Server 2013 Course Details Course Code: Duration: Notes: 20331B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Project management integrated into Outlook

Project management integrated into Outlook Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: November 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com

More information

Administering SAS Enterprise Guide 4.2

Administering SAS Enterprise Guide 4.2 Administering SAS Enterprise Guide 4.2 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. Administering SAS Enterprise Guide 4.2. Cary, NC: SAS

More information

Using the Calendar. Microsoft Outlook Web App. University Information Technology Services. Learning Technologies, Training & Audiovisual Outreach

Using the Calendar. Microsoft Outlook Web App. University Information Technology Services. Learning Technologies, Training & Audiovisual Outreach Using the Calendar Microsoft Outlook Web App University Information Technology Services Learning Technologies, Training & Audiovisual Outreach Copyright 2017 KSU Division of University Information Technology

More information

Crystal Enterprise. Overview. Contents. Installation FAQ: Crystal Enterprise 9 & 10

Crystal Enterprise. Overview. Contents. Installation FAQ: Crystal Enterprise 9 & 10 : Crystal Enterprise 9 & 10 Overview Contents This document has been compiled in an effort to assist you both in determining installation requirements for your Crystal Enterprise (CE) installation as well

More information

Exam Questions Demo Microsoft. Exam Questions Windows Server Administration Fundamentals

Exam Questions Demo   Microsoft. Exam Questions Windows Server Administration Fundamentals Microsoft Exam Questions 98-365 Windows Server Administration Fundamentals Version:Demo 1.Distributed File System (DFS) is used to: A. Delegate permissions to a global distribution group. B. Implement

More information

AvePoint Cloud Governance. Release Notes

AvePoint Cloud Governance. Release Notes AvePoint Cloud Governance Release Notes January 2018 New Features and Improvements AvePoint Cloud Governance now includes a My Groups report, which shows users a list of Office 365 groups they own or are

More information

SAS Platform Strategy Prepared for FANS usergroup. Mike Frost, Director, Product Management Fiona McNeill, Global Product Marketing

SAS Platform Strategy Prepared for FANS usergroup. Mike Frost, Director, Product Management Fiona McNeill, Global Product Marketing SAS Platform Strategy Prepared for FANS usergroup Mike Frost, Director, Product Management Fiona McNeill, Global Product Marketing Information is subject to change. Q1 2017 Q2 2017 Q3 2017 Q4 2017 H1

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 7 Permissions

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Lab # 7 Permissions Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Lab # 7 Permissions Objective: Network Lab # 7 Permissions Define permissions. Explain the characteristics

More information

Lasso Your Business Users by Designing Information Pathways to Optimize Standardized Reporting in SAS Visual Analytics

Lasso Your Business Users by Designing Information Pathways to Optimize Standardized Reporting in SAS Visual Analytics Paper 2960-2015 Lasso Your Business Users by Designing Information Pathways to Optimize Standardized Reporting in SAS Visual Analytics ABSTRACT Stephen Overton, Zencos Consulting SAS Visual Analytics opens

More information

Practical Introduction to SharePoint 2007

Practical Introduction to SharePoint 2007 Page 1 of 6 Practical Introduction to SharePoint 2007 (By Sven Homan, Dinamika Services Inc., June 15, 2008) WHAT ON EARTH IS THAT SHAREPOINT? SharePoint coins its name from words share and point, which

More information

Course 55197A: Microsoft SharePoint Server 2016 for the Site Owner/Power User

Course 55197A: Microsoft SharePoint Server 2016 for the Site Owner/Power User Skip to main content Course 55197A: Microsoft SharePoint Server 2016 for the Site Owner/Power User - Course details Course Outline Module 1: The Role of the Site Owner This module provides an introduction

More information

TAS Self Service Reporting Overview

TAS Self Service Reporting Overview TAS provides several self service reporting tools. This document briefly describes how to access them and gives a basic explanation of their functionality. It does not attempt to explain how to use the

More information

Planning and Administering SharePoint 2016

Planning and Administering SharePoint 2016 Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the

More information

"Charting the Course... MOC A: SharePoint 2016 Site Collections and Site Owner Administration. Course Summary

Charting the Course... MOC A: SharePoint 2016 Site Collections and Site Owner Administration. Course Summary MOC 55234 A: 2016 Site Collections Course Summary Description This five-day instructor-led course is intended for power users and IT professionals who are tasked with working within the 2016 environment

More information

Oracle Application Express: Administration 1-2

Oracle Application Express: Administration 1-2 Oracle Application Express: Administration 1-2 The suggested course agenda is displayed in the slide. Each lesson, except the Course Overview, will be followed by practice time. Oracle Application Express:

More information

My SAS Grid Scheduler

My SAS Grid Scheduler ABSTRACT Paper 1148-2017 My SAS Grid Scheduler Patrick Cuba, Cuba BI Consulting No Batch Scheduler? No problem! This paper describes the use of a SAS DI Studio job that can be started by a time dependent

More information

Implementing Data Models and Reports with Microsoft SQL Server Exam Summary Syllabus Questions

Implementing Data Models and Reports with Microsoft SQL Server Exam Summary Syllabus Questions 70-466 Implementing Data Models and Reports with Microsoft SQL Server Exam Summary Syllabus Questions Table of Contents Introduction to 70-466 Exam on Implementing Data Models and Reports with Microsoft

More information

Microsoft Dynamics CRM 2011 Customization and Configuration

Microsoft Dynamics CRM 2011 Customization and Configuration Microsoft Dynamics CRM 2011 Customization and Configuration Number: MB2-866 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Microsoft EXAM MB2-866 Microsoft Dynamics

More information

ITaP Confluence Guide. Instructions for Getting Started with Confluence a Purdue

ITaP Confluence Guide. Instructions for Getting Started with Confluence a Purdue ITaP Confluence Guide Instructions for Getting Started with Confluence a Purdue This instruction set was developed by ITaP for instructor and student use. For comments, suggestions, correction, etc. please

More information

SharePoint 2016 Site Collections and Site Owner Administration

SharePoint 2016 Site Collections and Site Owner Administration SharePoint 2016 Site Collections and Site Owner Administration Course 55234A - Five days - Instructor-led - Hands-on Introduction This five-day instructor-led course is intended for power users and IT

More information

Outrun Your Competition With SAS In-Memory Analytics Sascha Schubert Global Technology Practice, SAS

Outrun Your Competition With SAS In-Memory Analytics Sascha Schubert Global Technology Practice, SAS Outrun Your Competition With SAS In-Memory Analytics Sascha Schubert Global Technology Practice, SAS Topics AGENDA Challenges with Big Data Analytics How SAS can help you to minimize time to value with

More information

EMC Documentum Composer

EMC Documentum Composer EMC Documentum Composer Version 6.5 SP2 User Guide P/N 300-009-462 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2008 2009 EMC Corporation. All

More information

55035: Microsoft SharePoint Server 2013 for the Site Owner/Power User

55035: Microsoft SharePoint Server 2013 for the Site Owner/Power User 55035: Microsoft SharePoint Server 2013 for the Site Owner/Power User Description This training class is designed for SharePoint Site Owners, Site Collection Administrators and SharePoint Server Administrators

More information

Access Control. Steven M. Bellovin September 13,

Access Control. Steven M. Bellovin September 13, Access Control Steven M. Bellovin September 13, 2016 1 Security Begins on the Host Even without a network, hosts must enforce the CIA trilogy Something on the host the operating system aided by the hardware

More information

SAS Inventory Optimization 5.1

SAS Inventory Optimization 5.1 SAS Inventory Optimization 5.1 System Administration Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Insitute Inc. 2011. SAS Inventory Optimization 5.1: System

More information

HORTICOPIA Professional

HORTICOPIA Professional HORTICOPIA Professional Networking User Guide Horticopia, Inc. www.horticopia.com October 2017 Table of Contents I. Quick Start 2 II. System Requirements 3 III. Installing HORTICOPIA Professional 4 1.

More information

Voyant Connect User Guide

Voyant Connect User Guide Voyant Connect User Guide WELCOME TO VOYANT CONNECT 3 INSTALLING VOYANT CONNECT 3 MAC INSTALLATION 3 WINDOWS INSTALLATION 4 LOGGING IN 4 WINDOWS FIRST LOGIN 6 MAKING YOUR CLIENT USEFUL 6 ADDING CONTACTS

More information

Module 4: Access Control

Module 4: Access Control Module 4: Access Control Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University, Jackson, MS 39232 E-mail: natarajan.meghanathan@jsums.edu Access Control In general,

More information

BEST PRACTICES ARCHIVE in contentaccess

BEST PRACTICES  ARCHIVE in contentaccess BEST PRACTICES EMAIL ARCHIVE in contentaccess Use case: Email Archive configuration for companies with up to 2,000 mailboxes This section is intended to give an overview about how to configure email archiving.

More information

Options for managing Shared Folders

Options for managing Shared Folders Shared Folders A Shared Folder is a special folder in your vault that you can use to securely and easily share sites and notes with other people in your Enterprise. Changes to the Shared Folder are synchronized

More information

OVERVIEW OF THE SAS GRID

OVERVIEW OF THE SAS GRID OVERVIEW OF THE SAS GRID Host Caroline Scottow Presenter Peter Hobart MANAGING THE WEBINAR In Listen Mode Control bar opened with the white arrow in the orange box Copyr i g ht 2012, SAS Ins titut e Inc.

More information

RWT Network System Installation Guide

RWT Network System Installation Guide RWT Network System Installation Guide Copyright 2003, Talking Fingers, Inc. Page 1 of 48 This document is Copyright 2003 by Talking Fingers, Inc. All rights are reserved. This document may not be copied

More information

ITaP Confluence Guide. Instructions for Getting Started with Confluence a Purdue

ITaP Confluence Guide. Instructions for Getting Started with Confluence a Purdue ITaP Confluence Guide Instructions for Getting Started with Confluence a Purdue This instruction set was developed by ITaP for instructor and student use. For comments, suggestions, correction, etc. please

More information

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database For multiple versions Have documentation feedback? Submit a Documentation Feedback support ticket using

More information

Windows Server 2008 Active Directory Resource Kit

Windows Server 2008 Active Directory Resource Kit Windows Server 2008 Active Directory Resource Kit Stan Reimer, Mike Mulcare, Conan Kezema, Byron Wright w MS AD Team PREVIEW CONTENT This excerpt contains uncorrected manuscript from an upcoming Microsoft

More information

Tzunami Deployer Confluence Exporter Guide

Tzunami Deployer Confluence Exporter Guide Tzunami Deployer Confluence Exporter Guide Supports extraction of Confluence Enterprise contents and migrate to Microsoft SharePoint using Tzunami Deployer. Version 2.7 Table of Content PREFACE... I INTENDED

More information

Business Requirements Document (BRD) Template

Business Requirements Document (BRD) Template Business Requirements Document (BRD) Template Following is a template for a business requirements document (BRD). The document includes many best practices in use today. Don t be limited by the template,

More information

Microsoft Dynamics CRM Online Deployment (MB2-706)

Microsoft Dynamics CRM Online Deployment (MB2-706) Microsoft Dynamics CRM Online Deployment (MB2-706) Administer Microsoft Dynamics CRM Identify deployment considerations Describe the hardware and software requirements for Microsoft Dynamics CRM; explain

More information

AppDev StudioTM 3.2 SAS. Migration Guide

AppDev StudioTM 3.2 SAS. Migration Guide SAS Migration Guide AppDev StudioTM 3.2 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. SAS AppDev TM Studio 3.2: Migration Guide. Cary, NC: SAS Institute Inc.

More information

SAS Enterprise Miner 14.1

SAS Enterprise Miner 14.1 SAS Enterprise Miner 14.1 Administration and Configuration SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS Enterprise Miner 14.1: Administration

More information

DataFlux Web Studio 2.5. Installation and Configuration Guide

DataFlux Web Studio 2.5. Installation and Configuration Guide DataFlux Web Studio 2.5 Installation and Configuration Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. DataFlux Web Studio 2.5: Installation and Configuration

More information

Course Content. This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification.

Course Content. This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification. Course Content Course Description: This five-day course will teach you how to plan, configure, and manage the advanced features in a environment. The special areas of focus for this course include implementing

More information

Tzunami Deployer Confluence Exporter Guide

Tzunami Deployer Confluence Exporter Guide Tzunami Deployer Confluence Exporter Guide Supports extraction of Confluence Enterprise contents and migrate to Microsoft SharePoint using Tzunami Deployer. Version 3.2 Table of Contents PREFACE... II

More information

SAS Studio 3.7: Administrator s Guide

SAS Studio 3.7: Administrator s Guide SAS Studio 3.7: Administrator s Guide SAS Documentation March 7, 2018 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2017. SAS Studio 3.7: Administrator s Guide. Cary,

More information

DocAve. Release Notes. Governance Automation Online. Service Pack 8

DocAve. Release Notes. Governance Automation Online. Service Pack 8 DocAve Governance Automation Online Release Notes Service Pack 8 Issued September 2016 New Features and Improvements Added support for the Group Report. This report displays information for all Office

More information

Episerver CMS. Administrator User Guide

Episerver CMS. Administrator User Guide Episerver CMS Administrator User Guide Episerver CMS Administrator User Guide 17-6 Release date 2017-12-04 Table of Contents 3 Table of contents Table of contents 3 Introduction 9 Features, licenses and

More information

General Access Control Model for DAC

General Access Control Model for DAC General Access Control Model for DAC Also includes a set of rules to modify access control matrix Owner access right Control access right The concept of a copy flag (*) Access control system commands General

More information