FRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process

Size: px
Start display at page:

Download "FRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process"

Transcription

1 FRCC Secure Transfer & Storage Infrastructure Training for new data transfer process

2 Training Objects Understand the changes in regards to the data transfer process using PKI Installation Key management Preparation of Evidence Creating the encrypted file Transfer of file(s) to FRCC using new website 2

3 Installation Software Installation: Installing GNU Privacy Guard for Windows Gpg4Win 3

4 The program needs to be downloaded from Gpg4Win Web site Download the Current Release (top of the listing) 4

5 Double Click the downloaded file. Click OK, Click Next, 5

6 Click next on the license agreement page 6

7 Change the default selection to the following (Next Slide). 7

8 The only ones checked are Kleopatra, GpgEX, Gpg4Win Compendium. Click Next, More information on these option later in the presentation. 8

9 Click Next, 9

10 Select the options you would like, click next 10

11 Click Install 11

12 Completed, Click Next 12

13 Your choice, click finish 13

14 Key Ring/Manager Once the Gpg4Win has completed the installation process, you will find the following icons on your desktop, if you selected this option during installation. If not just use the windows menu. 14

15 Gpg4win is an installer for Windows and contains several Free Software components: GnuPG The core; this is the actual encryption tool. Kleopatra A certificate manager for OpenPGP and X.509 (S/MIME) and common crypto dialogs. This is your Key Ring/Manager GPA An alternative certificate manager for OpenPGP and X.509 (S/MIME). GpgOL A plugin for Microsoft Outlook 2003/2007/2010 ( encryption). * Rudimentary support Outlook 2010/2013 GpgEX A plugin for Microsoft Explorer (file encryption). Claws Mail A complete application with crypto support. Gpg4win Compendium The documentation (for beginner and advanced users), available in English and German. 15

16 16 Questions?

17 Key management Creation of your Public/Private key pair Accessing the FRCC Key Repository Public Key Storage Import FRCC Public Key Owner Trust & Certify Certificate on import 17

18 Key Management Creation of your key pair Kleopatra Select File then New Certificate 18

19 Key Management Select Create a personal OpenPGP key pair 19

20 Key Management Enter in all required information, click next when ready 20

21 Key Management Review information, if correct click create key 21

22 Key Management Having clicked the Create Key you will need to enter in a password/passphrase Needs to be as strong as possible Needs to be safe guarded 22

23 Key Management Key pair has been created Highly suggested to backup you public/private keys 23

24 Key Management Next step is to import FRCC public key, you can access our public key from here ompliance/frcc Public Key Storage 24

25 Key Management Must be signed in to access the files and/or folders Access the folder, download the key to your system for the import process, site will active in June

26 Key Management Import a public key 26

27 Key Management Find and import public key 27

28 Key Management Once import has completed, you will see confirmation that 1 key has been imported 28

29 Key Management Once a public key has been imported into your key manager, you must validate trust and certify the key. 29

30 Key Management Return to your key management program - Kleopatra, right click the key that has been imported. The menu will provided 2 selections (both are required) Change Owner Trust Certify Certificate 30

31 Key Management Menu selections Step #1 Step #2 31

32 Key Management Change Owner Trust 32

33 Key Management Certify Certificate Select the highlighted items to certify the certificate (key), click next when ready 33

34 Key Management Defaults are fine, click certify 34

35 Key Management You will be prompted for your password / passphrase, enter it and continue 35

36 Key Management Suggestions Backup your key pair to a very secure location Limit access to the private part of the key pair password/passphrase (this can be changed as needed by you) 36

37 37 Questions?

38 Preparation of Evidence Some key points: Understanding and the importance of sensitivity levels of data being sent New file naming convention of encrypted file Always include FRCC public key in all encrypted files sent 38

39 Preparation of Evidence Packaging Identify the sensitivity level of the data being transferred to FRCC Most Sensitive Sensitive General Transfer - includes uploading and downloading 39

40 Secure Transfer Most Sensitive evidence/information such as Firewall Rules (redacted) Network topologies including IP s or other documentation with extensive network address information Cyber vulnerability assessment results or reports containing specific vulnerabilities Physical Security Perimeter drawings Read only access, data will not be removed from the vault 40

41 Secure Transfer Sensitive evidence/information such as All other sensitive/confidential evidence/information submitted by registered entity Includes both O&P and CIP information Can be transferred and used on encrypted laptops etc. Will be removed/deleted from laptops etc. after use 41

42 Preparation of Evidence Packaging Use proper naming conventions of encrypted file prior to transfer XXXXX.ONP.YYYY-MM-DD.001.gpg File extension is added during creation Package number of file (001 to 999) Evidence, Audit, or Request Date Evidence Type (CIP, ENF, ONP, TFE, RAM, DTR) The first 5 characters of the file name are for the Entity Acronym, also known as short name. Proper naming allows for automation of FRCC data/evidence handling 42

43 Examples for file names With 3 character short name DEF.ONP gpg With a 4 character short name FMPA.ENF gpg With a 5 character short name COVPA.RAM gpg 43

44 Secure Evidence Packaging Step #1 Identify the evidence data to be sent, Create folder(s) based on sensitivity, place requested data in each folder as needed. ** Please note the individual file name(s) cannot exceed 99 characters in total, this includes dots, spaces, dashes, etc. The compression process used Gpg4Win will omit the file and the program doesn t provide any warning when doing this. 44

45 Secure Evidence Packaging Example: 45

46 Secure Evidence Packaging Step #2 - Check Sum/ Hash File Create a hash/check sum of your evidence and perform a virus check on all files Select evidence files and perform a virus check using your local anti-virus scan software. Include a copy of the anti-virus scan report in a TEXT file antivirus-check.txt as part of the evidence package Create a hash listing of all your evidence using SHA1 hashing. With the installation of Gpg4Win a set of tools are installed along with the software. One of the features is the ability is to produce a check sum file or hash of all files within a folder 46

47 Secure Evidence Packaging Step #3 Using the Gpg4Win checksum tool Select or highlight the evidence folder that contains all files to be encrypted, right click to access windows content menu. Select the menu option More GpgEX options, then select Create checksums. 47

48 Secure Evidence Packaging Once completed it will display where the check sum file has been placed. Step #3 Cont. 48

49 Secure Evidence Packaging Another tool that can produce the check sum/hash file is a utility called Multi-hasher which can be used to perform the hashing function. Execute Multihasher and select SHA-1 as the hashing algorithm and select folder or files of your target files. A copy of MultiHasher software can be downloaded from website: Step #3 Cont. 49

50 Secure Evidence Packaging Select the hash listing of the files and copy/paste it in a text file titled hash.txt. Include the text file with the evidence information you are packaging. Step #3 Cont. 50

51 Secure Evidence Packaging Step #4 Encryption The next steps will guide in the use of Gpg4Win to encrypt all the files into one encrypted file for sending to the FRCC 51

52 Secure Evidence Packaging Right click the evidence folder containing the files for encryption From the content menu select the Sign & encrypt Step #4 Cont. 52

53 Secure Evidence Packaging Default dialog menu, see next step for changes needed Click on button next to the Archive name (OpenPGP): To enter correct file name Step #4 Cont. 53

54 Secure Evidence Packaging Follow steps outlined below in the image, once ready click save Step #4 Cont. 54

55 Secure Evidence Packaging Using the image as a guide, check the settings on this menu, Then click next Step #4 Cont. 55

56 Secure Evidence Packaging Select the required certificates to use Step #4 Cont. 56

57 Secure Evidence Packaging Step #4 Cont. 57

58 Secure Evidence Packaging Signing Step #4 Cont. 58

59 Secure Evidence Packaging Once encryption completes you will see this dialog on the screen. The process has completed successfully Step #4 Cont. 59

60 Secure Evidence Packaging Checking our save folder we ll find the newly created file (note file extension has been added) Step #4 Cont. 60

61 61 Questions?

62 Secure Transfer Access to the new transfer site Signing in and Access Selecting the correct folder New Entity Secure File Transfer 62

63 Secure Transfer To access the site use the following url The direct link from the FRCC.COM compliance sidebar/menu OR Sign-in using your FRCC.COM website account name and password. 63

64 Secure Transfer 64

65 Secure Transfer After signing in you ll receive a welcome message 65

66 JAVA Security Warning When you sign in you may be prompted with a security warning from java. Follow your company policy in regards to these type of warnings. Default response is to check the Do not show this again for this app and web site and click the allow button. 66

67 Secure Transfer 67

68 Secure Transfer When accessing FRCC s Transfer site Select correct transfer folder Selection based on data sensitivity m XYZ FileArea XYZ File Area Entity Secure File Transfer Folder Secure Vault Secure Vault For Most Sensitive Data Secure Working Secure Working For Sensitive Data 68

69 Secure Transfer Folder Labeled XYZ File Area NEW Entity Secure File Transfer Folder Primarily used for FRCC to provide info to the registered entity, but could be used to submit general correspondence to the FRCC 69

70 Secure Transfer Folder Labeled Secure Vault Most Sensitive evidence/information such as Firewall Rules (redacted) Network topologies including IP s or other documentation with extensive network address information Cyber vulnerability assessment results or reports containing specific vulnerabilities Physical Security Perimeter drawings Read only access, data will not be removed from the vault 70

71 Secure Transfer Folder Labeled Secure Working Sensitive evidence/information such as All other sensitive/confidential evidence/information submitted by registered entity Includes both O&P and CIP information Can be transferred and used on encrypted laptops etc. Will be removed/deleted from laptops etc. after use 71

72 Secure Transfer Enabling Web Client Pro - Option Its recommend for easier uploading and navigation to switch to the Web Client Pro version of the interface. To enable this feature, access the Tools drop down menu, then click on the Enable Web Client Pro. You can receive additional JAVA Security Warnings when you enable this 72

73 Secure Transfer Additional Message(s) for Web Client Pro 73

74 Secure Transfer Web Pro Enabled 74

75 Secure Transfer Once you have web pro enabled Open (double click the folder for upload) 75

76 Secure Transfer Drag and Drop Files Once file is dropped into window transfer starts 76

77 Secure Transfer Once the transfer has completed successfully, a confirmation is sent FRCC will review received data and it has been correctly received based established policy and procedures using the sensitivity definitions provided, any data received incorrectly, a request will be made to resubmit by the entity 77

78 In Summary We have covered Installation Creation and import Public/Private Keys Packaging of Evidence Transfer of encrypted files to FRCC 78

79 Questions? If you have additional questions please send them to the following address, with subject line of PKI Training 79

FRCC Secure Data Transfer. Users Guide V1.5

FRCC Secure Data Transfer. Users Guide V1.5 FRCC Secure Data Transfer Users Guide V1.5 Table of Contents I. Introduction... 2 II. Part 1 - Software Installation... 3 III. Part 2 - Creating Your PKI Certificate... 7 IV. Part 3 - Importing FRCC Public

More information

Submitting Evidence to the Vault. FRCC CIP Spring Compliance Workshop May 13-16, 2013

Submitting Evidence to the Vault. FRCC CIP Spring Compliance Workshop May 13-16, 2013 Submitting Evidence to the Vault FRCC CIP Spring Compliance Workshop May 13-16, 2013 Objectives Explain the step-by-step process for submitting evidence to FRCC Vault Share what happens to the evidence

More information

ECE 646 Fall Lab 1: Pretty Good Privacy Setup

ECE 646 Fall Lab 1: Pretty Good Privacy Setup ECE 646 Fall 2017 Lab 1: Pretty Good Privacy Setup This setup should be completed before the lecture on Tuesday, October 3. Please read the general information about GNU Privacy Guard from Wikipedia available

More information

LAB :: PGP (Pretty Good Privacy)

LAB :: PGP (Pretty Good Privacy) LAB :: PGP (Pretty Good Privacy) GnuPG : GnuPG forms the heart of Gpg4win the actual encryption software. Kleopatra : The central certificate administration of Gpg4win, which ensures uniform user navigation

More information

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction ECE646 Fall 2012 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All

More information

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction

ECE646 Fall Lab 1: Pretty Good Privacy. Instruction ECE646 Fall 2015 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All

More information

Cryptography: Practice JMU Cyber Defense Boot Camp

Cryptography: Practice JMU Cyber Defense Boot Camp Cryptography: Practice 2013 JMU Cyber Defense Boot Camp Prerequisites This unit assumes that you have already known Symmetric-key encryption Public-key encryption Digital signature Digital certificates

More information

ReadyDoc Client Application Installation Instructions

ReadyDoc Client Application Installation Instructions ReadyDoc Client Application Installation Instructions Redtail Integration The ReadyDoc Cloud application is available at https://users.readydoc.com. ReadyCapture and ReadyDoc Control Center are two desktop-based

More information

FedLine Web Certificate Retrieval Procedures

FedLine Web Certificate Retrieval Procedures Version 2.0 Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures... 3 Installing the Federal Reserve Banks Certificate Authority

More information

Certificate Retrieval Procedures

Certificate Retrieval Procedures `` Certificate Retrieval Procedures Version 2.2 2018 Federal Reserve Banks Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures...

More information

CyberLynk FTP Service Functional Description

CyberLynk FTP Service Functional Description CyberLynk FTP Service Functional Description - November 3, 2005 - Version 2.7 Presented by CyberLynk Network 10125 S. 52 nd Street Franklin, WI 53132 P: 414.858.9335 - F: 414.858.9336 www.cyberlynk.net

More information

Due: October 8, 2013: 7.30 PM

Due: October 8, 2013: 7.30 PM Jackson State University Department of Computer Science CSC 437-01/539-01 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 1: Lab Project on using PGP GNU Privacy Guard (GPG)

More information

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018 How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

SECURE DATA EXCHANGE

SECURE DATA EXCHANGE POLICY-DRIVEN SOLUTIONS FOR SECURE DATA EXCHANGE Sending and receiving data is a fundamental part of daily business for nearly every organization. Companies need to share financial transaction details,

More information

Document Signing Certificate Getting Started Guide

Document Signing Certificate Getting Started Guide Certificate Services Document Signing Certificate Getting Started Guide Using the SafeNet Authentication Client: 8.3 Document issue: 1.0 Date of issue: March 2017 For software release 12.1 Document Signing

More information

Comodo LoginPro Software Version 1.0

Comodo LoginPro Software Version 1.0 Comodo LoginPro Software Version 1.0 User Guide Guide Version 1.0.102512 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System

More information

File Reputation Filtering and File Analysis

File Reputation Filtering and File Analysis This chapter contains the following sections: Overview of, page 1 Configuring File Reputation and Analysis Features, page 5 File Reputation and File Analysis Reporting and Tracking, page 14 Taking Action

More information

InfoTransfer v2 Upload Guide

InfoTransfer v2 Upload Guide InfoTransfer v2 Upload Guide pressganey.com 800.232.8032 InfoTransfer v2 Upload Guide FEATURES Advantages over InfoTransfer v1 Uses a.net implementation of OpenPGP for encryption, removing dependency upon

More information

CIP 007 Compliance. Kevin B. Perry Dir, Critical Infrastructure Protection

CIP 007 Compliance. Kevin B. Perry Dir, Critical Infrastructure Protection CIP 007 Compliance Kevin B. Perry Dir, Critical Infrastructure Protection kperry@spp.org 501.614.3251 Agenda CIP 007 Purpose CIP 007 Requirement Overview Past Non Compliance Potential Non Compliance Concerns

More information

COURSE FILES. BLACKBOARD TUTORIAL for INSTRUCTORS

COURSE FILES. BLACKBOARD TUTORIAL for INSTRUCTORS OVERVIEW: Course Files provides file storage on the Blackboard server for a single course. Course Files within each course displays content for that specific course, not for other courses you teach. You

More information

Using Expressions Web to Edit an FCNet Department Web Site

Using Expressions Web to Edit an FCNet Department Web Site Using Expressions Web to Edit an FCNet Department Web Site Here are the steps to open and edit a site on the new FcWebDept shared department web site server using Microsoft Expression Web 4. The steps

More information

and File Encryption on ios with S/MIME and PGP

and File Encryption on ios with S/MIME and PGP Email and File Encryption on ios with S/MIME and PGP Peter Tondl Email and file encryption are no longer an issue in the desktop world. Either you do it or not. In any case, technology rarely fails. All

More information

rat Comodo Valkyrie Software Version 1.1 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

rat Comodo Valkyrie Software Version 1.1 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 rat Comodo Valkyrie Software Version 1.1 Administrator Guide Guide Version 1.1.122415 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo Valkyrie...

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Metasploit. Installation Guide Release 4.4

Metasploit. Installation Guide Release 4.4 Metasploit Installation Guide Release 4.4 TABLE OF CONTENTS About this Guide Target Audience...1 Organization...1 Document Conventions...1 Support...2 Support for Metasploit Pro and Metasploit Express...2

More information

Chancellor s Office Information Technology Services Corporate Information Management FIRMS Budget Review Hyperion Process

Chancellor s Office Information Technology Services Corporate Information Management FIRMS Budget Review Hyperion Process Step Open Internet Explorer and type in the following URL: http://peterson.calstate.edu:8080/hyperion/browse/login The Hyperion Login screen will display. Enter your User Id and Password > click on the

More information

Amazon WorkMail. User Guide Version 1.0

Amazon WorkMail. User Guide Version 1.0 Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2017 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection

More information

Comodo APT Assessment Tool

Comodo APT Assessment Tool rat Comodo APT Assessment Tool Software Version 1.1 Administrator Guide Guide Version 1.1.102815 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo

More information

Installation Instructions for Free Scheduler Plus Software IBS Show Promotion

Installation Instructions for Free Scheduler Plus Software IBS Show Promotion Installation Instructions for Free Scheduler Plus Software IBS Show Promotion Offer ends 1/12/17 limited copies available! Thank you for your decision to use our Free copy of Scheduling Plus to help streamline

More information

How to install Internet Security for Android app

How to install Internet Security for Android app How to install Internet Security for Android app 1. Go to Google Play Store app. 2. In the dialog window enter Kaspersky Mobile Antivirus: Web Security & AppLock. Tap INSTALL to allow the app to install

More information

Additional Network Workstation Windows XP Installation Guide

Additional Network Workstation Windows XP Installation Guide Additional Network Workstation Windows XP Installation Guide 1 Table of Contents I. Verify Hardware and Optimize Work Station 3 II. Download Software 10 III. Install Software 13 2 I. Verify Hardware and

More information

Kaseya 2. Installation guide. Version R8. English

Kaseya 2. Installation guide. Version R8. English Kaseya 2 Kaseya Server Setup Installation guide Version R8 English October 24, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018 How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

PGP(R) Desktop Version 10.1 for Mac OS X Release Notes

PGP(R) Desktop Version 10.1 for Mac OS X Release Notes Page 1 of 8 PGP(R) Desktop Version 10.1 for Mac OS X Release Notes Thank you for using this PGP Corporation product. These Release Notes contain important information regarding this release of PGP Desktop

More information

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide February 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator

More information

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files SFTP Connection How to connect via SFTP & upload Files Version 1.3 November 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...

More information

Odette CA Help File and User Manual

Odette CA Help File and User Manual How to Order and Install Odette Certificates For a German version of this file please follow this link. Odette CA Help File and User Manual 1 Release date 31.05.2016 Contents Preparation for Ordering an

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

Symantec Endpoint Protection Installation Guide

Symantec Endpoint Protection Installation Guide Symantec Endpoint Protection 11.0 Installation Guide SYMANTEC ENDPOINT PROTECTION 11.0 TABLE OF CONTENTS A NEW SECURITY APPLICATION... 1 INTRODUCTION... 1 WHAT IS SYMANTEC ENDPOINT PROTECTION (SEP) 11.0?...

More information

Exostar LDAP Proxy/Secure Setup Guide September 2017

Exostar LDAP Proxy/Secure  Setup Guide September 2017 Exostar LDAP Proxy/Secure Email Setup Guide September 2017 Copyright 2017 Exostar, LLC All rights reserved. 1 Table of Contents Email Encryption Set-up Outlook 2003... 4 Digitally Signing an Email... 4

More information

CleanMyPC User Guide

CleanMyPC User Guide CleanMyPC User Guide Copyright 2017 MacPaw Inc. All rights reserved. macpaw.com CONTENTS Overview 3 About CleanMyPC... 3 System requirements... 3 Download and installation 4 Activation and license reset

More information

Laserfiche Agenda Workflow Training. Submitting an Agenda Item Through Laserfiche Web Access Version 10.2

Laserfiche Agenda Workflow Training. Submitting an Agenda Item Through Laserfiche Web Access Version 10.2 Laserfiche Agenda Workflow Training Submitting an Agenda Item Through Laserfiche Web Access Version 10.2 May 2017 Contents LASERFICHE LASERFICHE AGENDA REVIEW WORKFLOW... 3 IMPORTING DOCUMENTS INTO WEB

More information

Centrify for Dropbox Deployment Guide

Centrify for Dropbox Deployment Guide CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of

More information

Workshare Professional 10. Getting Started Guide

Workshare Professional 10. Getting Started Guide Workshare Professional 10 Getting Started Guide Introducing Workshare Professional 10 Workshare is dedicated to helping professionals compare, protect and share their documents. New features Compare Excel

More information

User Guide. BlackBerry Workspaces for Windows. Version 5.5

User Guide. BlackBerry Workspaces for Windows. Version 5.5 User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing

More information

How to Submit Settlement Inquiry Remedy Tickets

How to Submit Settlement Inquiry Remedy Tickets How to Submit Settlement Inquiry Remedy Tickets Defense Finance and Accounting Service Integrity - Service - Innovation BMC REMEDY AR SYSTEM First log into Web Remedy: https://dcii-cat- web.dfas.mil/arsys/forms/fin-ss72z2/home-

More information

User Guide For Version 4.0

User Guide For Version 4.0 User Guide For Version 4.0 Easy-to-use, Complete Cyber Cafe Management Software by icafe Manager User Guide Contents Chapter 1: Introduction 7 1.1 About the Manual 7 1.2 Intended Audience 7 1.3 Conventions

More information

Qualys Cloud Platform (VM, PC) v8.x Release Notes

Qualys Cloud Platform (VM, PC) v8.x Release Notes Qualys Cloud Platform (VM, PC) v8.x Release Notes Version 8.18.1 April 1, 2019 This new release of the Qualys Cloud Platform (VM, PC) includes improvements to Vulnerability Management and Policy Compliance.

More information

INSTALLATION AND CONFIGURATION

INSTALLATION AND CONFIGURATION INSTALLATION AND CONFIGURATION filesmart - Installation and Configuration Table of Contents filesmart - Installation and Configuration... 2 Table of Contents... 2 Server Installation Instructions... 3

More information

Select the Akeni Pro Server installation file that matches your operating system and double-click on the file.

Select the Akeni Pro Server installation file that matches your operating system and double-click on the file. Akeni Pro Server Administration Guide (Version 2) Contents Chapter 1 Chapter 2 Chapter 3 Getting Started.: 1 Pro Server Installation.: 2 Launching Akeni Pro Server.: 3 Pro Client Installation.: 4 Launching

More information

Participant User Guide, Version 2.6

Participant User Guide, Version 2.6 Developers Integration Lab (DIL) Participant User Guide, Version 2.6 3/17/2013 REVISION HISTORY Author Date Description of Change 0.1 Laura Edens Mario Hyland 9/19/2011 Initial Release 1.0 Michael Brown

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical

More information

Mend for Eclipse quick start guide local analysis

Mend for Eclipse quick start guide local analysis The Semmle Mend for Eclipse plugin allows users to view Semmle results in Eclipse. This document describes how to install and use the plugin for local analysis. You can install the plugin using a Semmle

More information

Colligo Briefcase. for Good Technology. Administrator Guide

Colligo Briefcase. for Good Technology. Administrator Guide for Good Technology Administrator Guide Contents Introduction... 2 Target Audience... 2 Overview... 2 Key Features... 2 Platforms Supported... 2 SharePoint Security & Privileges... 3 for Good Technology...

More information

W H IT E P A P E R. Salesforce Security for the IT Executive

W H IT E P A P E R. Salesforce Security for the IT Executive W HITEPAPER Salesforce Security for the IT Executive Contents Contents...1 Introduction...1 Background...1 Settings Related to Security and Compliance...1 Password Settings... 1 Session Settings... 2 Login

More information

IMPORTANT. Installing your EASE Scan Tool Software

IMPORTANT. Installing your EASE Scan Tool Software Thank You for purchasing the EASE Diagnostics Scan Tool! Video install instructions to supplement these print instructions are available, if necessary, at www.fixcarsfaster.com. The videos are broken down

More information

Comprehensive Mitigation

Comprehensive Mitigation Comprehensive Mitigation Jenny Anderson Compliance Engineer - CIP janderson.re@spp.org 501.614.3299 July 25, 2013 Goals and Benefits of Mitigation Mitigation should lessen the risk of unintended consequences

More information

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files

Regulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files SFTP Connection How to connect via SFTP & upload Files Version 1.2 October 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...

More information

Ralph Durkee Independent Consultant Security Consulting, Security Training, Systems Administration, and Software Development

Ralph Durkee Independent Consultant  Security Consulting, Security Training, Systems Administration, and Software Development Ralph Durkee Independent Consultant www.rd1.net Security Consulting, Security Training, Systems Administration, and Software Development PGP and GnuPG Rochester OWASP Agenda: Generic Public Key Encryption

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information

GUIDE. MetaDefender Kiosk Deployment Guide

GUIDE. MetaDefender Kiosk Deployment Guide GUIDE MetaDefender Kiosk Deployment Guide 1 SECTION 1.0 Recommended Deployment of MetaDefender Kiosk(s) OPSWAT s MetaDefender Kiosk product is deployed by organizations to scan portable media and detect

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

VSP18 Venafi Security Professional

VSP18 Venafi Security Professional VSP18 Venafi Security Professional 13 April 2018 2018 Venafi. All Rights Reserved. 1 VSP18 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for:

More information

How to Download and Re-upload a PDF File in WCMS

How to Download and Re-upload a PDF File in WCMS How to Download and Re-upload a PDF File in WCMS Login to WCMS. Click on the folder icon to expand it. (Icon is the left of the folder name). Select the folder that contains the file. Select the document

More information

OneSecure VPN Remote User Installation & Configuration Guide

OneSecure VPN Remote User Installation & Configuration Guide OneSecure VPN Remote User Installation & Configuration Guide 3/11/2015 CONTENTS Download Client Software 02 Install Client Software 03 Enable Client Software 07 Configure the Connection 08 WELCOME Welcome

More information

Datasheet - Sitekit CMS Secure Forms

Datasheet - Sitekit CMS Secure Forms Datasheet - Sitekit CMS Secure Forms Registered Office Business Unit Role Document Type Document Author Document Checked by Sitekit Ltd Sitekit House Broom Place Portree Isle of Skye IV51 9HL Sitekit.Solutions

More information

PCI Compliance Assessment Module with Inspector

PCI Compliance Assessment Module with Inspector Quick Start Guide PCI Compliance Assessment Module with Inspector Instructions to Perform a PCI Compliance Assessment Performing a PCI Compliance Assessment (with Inspector) 2 PCI Compliance Assessment

More information

Tier II Portal Tutorial. Latest Revision January

Tier II Portal Tutorial. Latest Revision January Tier II Portal Tutorial Latest Revision January 2018 2018 Topics to be covered 1. Creating the Tier2Submit file 2. Accessing the portal 3. Populating the input fields on the portal 4. Uploading your Tier2Submit

More information

MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide

MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide Document Control Number: 7055011 Contract Number: DMS-13/14-024 Prepared for: Florida Department of Management Services Division of Departmental

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 2.1 November 2011 R3 Copyright 2011, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Cloud Security Whitepaper

Cloud Security Whitepaper Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4

More information

DoubleTime 8.0 Standalone & Workstation Server. Installation Guide

DoubleTime 8.0 Standalone & Workstation Server. Installation Guide DoubleTime 8.0 Standalone & Workstation Server Page 2 Table of Contents Minimum System Requirements... 3 Preparing to Install/Upgrade DoubleTime... 4 Installing the Stand-Alone version of DoubleTime -

More information

Configuring Funk Odyssey Software, Avaya AP-3 Access Point, and Avaya

Configuring Funk Odyssey Software, Avaya AP-3 Access Point, and Avaya Configuring Funk Odyssey Software, Avaya AP-3 Access Point, and Avaya 802.11a/b Wireless Client for User Authentication (802.1x) and Data Encryption - Issue 1.0 Abstract These Application Notes describe

More information

Version: 4.0. Quatrix Data Sheet. January 2018 Author: Maytech

Version: 4.0. Quatrix Data Sheet. January 2018 Author: Maytech Version: 4.0 Quatrix Data Sheet January 2018 Author: Maytech Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring

More information

Azure for On-Premises Administrators Practice Exercises

Azure for On-Premises Administrators Practice Exercises Azure for On-Premises Administrators Practice Exercises Overview This course includes optional practical exercises where you can try out the techniques demonstrated in the course for yourself. This guide

More information

Security Architecture

Security Architecture Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to

More information

The PKI Certificate Manager will require to be upgraded before renewing your certificates:

The PKI Certificate Manager will require to be upgraded before renewing your certificates: HCN Technical Support KBA: This article applies to Product(s): Blue Chip 2.1 (Medicare Australia Online) Summary: PKI certificates are the basis of an encryption technology used for the secure transmission

More information

My Documentum for the Desktop (MDD)

My Documentum for the Desktop (MDD) My Documentum for the Desktop (MDD) Learning Objectives In this Job Aid, you will learn how to: 1 Launch MDD page 3 2 Connect and login page 5 3 Link Image Files in Documentum page 8 to InDesign Files

More information

SECARDEO. certbox. Help-Manual. Secardeo GmbH Release:

SECARDEO. certbox. Help-Manual. Secardeo GmbH Release: certbox Help-Manual Secardeo GmbH Release: 02.12.2014 certbox Help Manual 02.12.2014 Table of Contents 1 Search and retrieve Public Key Certificates... 1 1.1 Search by an e-mail address... 1 1.2 Download

More information

The following security and privacy-related audits and certifications are applicable to the Lime Services:

The following security and privacy-related audits and certifications are applicable to the Lime Services: LIME SECURITY, PRIVACY, AND ARCHITECTURE Last Updated: September 26, 2016 FinAccel s Corporate Trust Commitment FinAccel (FinAccel Pte Ltd) is committed to achieving and maintaining the trust of our customers.

More information

Oracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E July 2018

Oracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E July 2018 Oracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E89810-04 July 2018 Copyright 2010, 2018, Oracle and/or its affiliates. All rights reserved. This software and

More information

Managing AON Security

Managing AON Security CHAPTER 4 This chapter describes AON functions relating to security, authentication, and authorization. It includes the following topics. Managing Keystores, page 4-1 Configuring Security Properties, page

More information

Cyber Essentials Questionnaire Guidance

Cyber Essentials Questionnaire Guidance Cyber Essentials Questionnaire Guidance Introduction This document has been produced to help companies write a response to each of the questions and therefore provide a good commentary for the controls

More information

Comodo Offline Updater Utility Software Version

Comodo Offline Updater Utility Software Version Comodo Offline Updater Utility Software Version 1.2.30701.2 i User Guide Guide Version 1.2.011811 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Introduction to

More information

Lab: Securing with PGP

Lab: Securing  with PGP Objectives Understand the concept of public keys, signing, and encrypting email with PGP. Background GNUPG (or GNU Privacy guard) is a free implementation of the OpenPGP standard (RFC 4880) as a tool for

More information

AT&T Toggle. 2/3/2014 Page i

AT&T Toggle. 2/3/2014 Page i Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media... 4 AT&T

More information

Workspace ONE UEM Integration with OpenTrust CMS Mobile 2. VMware Workspace ONE UEM 1811

Workspace ONE UEM Integration with OpenTrust CMS Mobile 2. VMware Workspace ONE UEM 1811 Workspace ONE UEM Integration with OpenTrust CMS Mobile 2 VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you

More information

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures

PKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures Public Key Infrastructures Public Key Infrastructure Definition and Description Functions Components Certificates 1 2 PKI Services Security Between Strangers Encryption Integrity Non-repudiation Key establishment

More information

KNOXPLANS for New Users

KNOXPLANS for New Users KNOXPLANS for New Users Version 9.1, October 2018 Contents KNOXPLANS for New Users... 1 Welcome to KnoxPlans, Version 9.1... 2 Recommended Client Hardware and O/S Specifications... 2 Browser Requirements...

More information

July 18, (Revision 3)

July 18, (Revision 3) 3D Tool 2.0 User Guide July 18, 2011 (Revision 3) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security,

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows BackupVault Desktop & Laptop Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Blueraq Networks Ltd, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft

More information

VMware AirWatch: Directory and Certificate Authority

VMware AirWatch: Directory and Certificate Authority Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates

More information

AT&T Toggle. 12/12/2013 Page i

AT&T Toggle. 12/12/2013 Page i Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle Messaging...

More information

Security Information & Policies

Security Information & Policies Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER

More information

Kerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook

Kerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class  , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook Kerio Cloud Cloud Hosted Enterprise-Class Email, Calendars, Contacts, Tasks, and Instant Messaging Twitter LinkedIn Facebook Presented by Adam Bielawski June 15, 2016 Why Kerio? Kerio provides safe, simple,

More information

Better Practice Elements for Audit Preparation

Better Practice Elements for Audit Preparation Better Practice Elements for Audit Preparation David Cerasoli, CISSP Manager, CIP Audits John Muir Director, Compliance Monitoring 3/23/2018 1 This presentation will cover the major milestones of an audit,

More information

Abila Nonprofit Online. Connection Guide

Abila Nonprofit Online. Connection Guide Abila Nonprofit Online This is a publication of Abila, Inc. Version 1.x 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names

More information

EntraPass Installation Guide Kantech-OnBoard systems

EntraPass Installation Guide Kantech-OnBoard systems EntraPass Installation Guide Overview Purpose ExacqVision recorders now include Kantech EntraPass Corporate Edition software. The purpose of this document is to guide the technician or installer through

More information