PRODUCT DESCRIPTION. Version 0.01 (Alpha) By F. Scott Deaver Chief Technical Officer/Founder/Inventor February 27, 2017

Size: px
Start display at page:

Download "PRODUCT DESCRIPTION. Version 0.01 (Alpha) By F. Scott Deaver Chief Technical Officer/Founder/Inventor February 27, 2017"

Transcription

1 Certitude Digital s AMULET Corporate Container Simulation Package (AMULET CCS ) PRODUCT DESCRIPTION Version 0.01 (Alpha) By F. Scott Deaver Chief Technical Officer/Founder/Inventor February 27, 2017 Copyright Certitude Digital, Incorporated All rights reserved. Page 1

2 Table of contents Table of contents... 2 Introduction... 3 What is the Certitude Digital s AMULET Corporate Container Simulation package?... 3 Why are these applications and tools necessary?... 3 AMULET CCS package contents... 4 AMULET CCS Mass Migration Tool... 5 Internal work flow... 5 How bulk application of container-based AMULET protection works... 6 When items in a CRAP container to be simulated are already AMULET -protected... 7 Are you both the intellectual property owner and the CRAP container owner?... 7 If the digital asset is not yet protected with container-criteria simulation AMULET criteria... 8 User interface User interface details AMULET CCS Virtual Container Change Monitoring Tool AMULET CCS virtual container *.ccs file AMULET CCS Virtual Container File Viewer and Editor Copyright Certitude Digital, Incorporated All rights reserved. Page 2

3 Introduction What is the Certitude Digital s AMULET Corporate Container Simulation package? Certitude Digital s AMULET Corporate Container Simulation (or AMULET CCS or even ACCS in the short form) package is a collection of applications, tools, services and helper utilities to quickly and efficiently use Certitude Digital AMULETs to wrap effective fail-safe cybersecurity around very large numbers of digital assets as files residing in existing Container-Related Asset Protection (CRAP) folders, disk drives, servers, server farms, the cloud, and other aggregates and collections. The package can also be used to simulate CRAP container behaviors around collections of AMULET protected digital assets so that they can be safely accessed from legacy utilities, operating systems, file systems, and other infrastructure that could otherwise handle and expect only legacy CRAP structures and limitations. Why are these applications and tools necessary? The inherent design flaws and security weakness of legacy CRAP technologies (which you know as the traditional file folders, disk drives, browsers, operating systems, servers, server farms, and cloud infrastructure we have all become used to) have rendered those technologies unsustainable in the modern cybersecurity age. To understand more about CRAP technologies and the differences between them and Certitude Digital AMULETs, see the article entitled AMULET intellectual property protection vs. Container-Related Asset Protection (CRAP) at However, those older technologies are so ubiquitous, universal really, and the anticipations and expectations of those kinds of behavior are built into so many applications and systems that they cannot just simply be replaced in order to accommodate better cybersecurity approaches. So, the AMULET protection strategies were designed from inception so that they could be inserted between (in essence) the digital asset and its container, such that the digital asset s relationship with its container was not disturbed in any way yet the digital asset would automatically gain all of the security that goes with the AMULET, including fail-safety. Even better, AMULETs can also include among their sophisticated environment criteria the same primitive criteria CRAP technologies use, in order to synchronize those simpler criteria between the two technologies. Even better yet, multiple layers of AMULETs can be inserted essentially between a CRAP container and a digital asset, and protected digital assets can also reference multiple AMULETs for protection that means the primitive security criteria of the CRAP the technology can be separated into its own unique AMULET to ensure synchronized protection for the digital asset with the container between both technologies while in the CRAP container. When leaving the CRAP container, the AMULET containing CRAP technology primitive criteria can optionally be stripped off the exiting version of the digital asset, if desired. This design ensures the most robust and flexible security possible for the digital asset at all times and under all circumstances. The Certitude Digital AMULET CCS package comes into play because when organizations with large existing inventories of CRAP technologies need to add AMULET security, it is often under emergency conditions, and even when not, needs to be done in a way that does not disrupt their ongoing business or operations. Copyright Certitude Digital, Incorporated All rights reserved. Page 3

4 AMULET CCS package contents The Certitude Digital AMULET CCS consists of the following major standalone components along with several helper utilities, Software Development Kit tools and libraries, automation scripts, and support utilities to aid users in the use and adaptation of the primary components to their own environments as to allow them to build their own utilities and tools in those situations where it is desirable to do so. Each of the primary AMULET CCS components will be provided with their Graphical User Interface elements expressed as both online web tools as well as desktop utilities for major workstation operating systems (to support servers which should not be exposed to a public internet). The primary AMULET CCS components are: 1. The AMULET CCS Mass Migration Tool this is the workhorse user component used to deploy AMULET simulation-of-container-criteria protections in bulk to large collections of both currently-unprotected and already AMULET -protected digital assets; 2. The AMULET CCS Virtual Container Change Monitoring Tool - this server operating system tray application component is provided as a user convenience and is not required by other AMULET CCS components. It supplies a useful means for Container-Related Asset Protection (CRAP) system administrators to synchronize the uniform application of container-securitycriteria-simulation AMULETs to new digital assets entering the container (and optionally, removal of container-security-criteria-simulation AMULETsv from digital assets exiting the container) via notifications of specific digital asset activity; 3. The AMULET CCS virtual container *.ccs file this persistent binary collection of virtual container simulation metadata is usually stored on a hard drive as a file, and contains information about the contents of a virtual container, including digital assets in that container to which container-security-criteria-simulation AMULETs have been applied. It is provided as a user convenience and is not required by the runtime operations of the virtual container it supports recording work done by the AMULET CCS Mass Migration Tool and is used by the AMULET CCS Virtual Container File Viewer and Editor for displaying and editing that recording; 4. The AMULET CCS Virtual Container File Viewer and Editor - this tool allows viewing and editing of the AMULET CCS virtual container *.ccs file as an aid to system administrators in keeping the actual contents of Container-Related Asset Protection (CRAP) collections in sync with the inventory of digital assets to which container-security-criteria-simulation AMULETs have been applied in virtual containers. It is provided as a user convenience and is not required by the runtime operations of the virtual container. Copyright Certitude Digital, Incorporated All rights reserved. Page 4

5 AMULET CCS Mass Migration Tool Internal work flow Copyright Certitude Digital, Incorporated All rights reserved. Page 5

6 How bulk application of container-based AMULET protection works The AMULET CCS Mass Migration tool does two things to resolve the security weakness of Container- Related Asset Protection (CRAP) digital asset collections. It wraps a templated generic AMULET around each and every previously-unprotected digital asset which can then be later custom-tailored with AMULET criteria uniquely defined to be made specific to that digital asset s security needs. As a general matter, in Certitude Digital AMULET systems, digital assets are protected by enciphering their contents in fail-safe fashion, using (among other things) the identifiers of an AMULET config file and one or more AMULETs within that config file. This process creates an unbreakable, unrecognizable fail-safe rendition of the digital asset that can moved anywhere at any time, can be copied an infinite number of times, and can be stored on any device anywhere without any threat of abuse, misuse, or theft to the intellectual property embedded in it, while at the same time creating an indestructible, yet virtual link, to the AMULET(s) (the digital asset and the AMULET do not have to even co-exist in the same space, as long as at each moment of invocation of the digital asset the relevant AMULET(s) is accessible to the rendering devices Certitude Digital AMULET framework). The relationship between unprotected digital assets, the AMULET enciphering that protects the digital asset, the virtual link(s) to AMULET(s), and each AMULET s relationship with its AMULET config file can be represented like so: Ordinarily, digital assets are protected with AMULETs by the authors, artists, producers, and/or developers who originally created the digital asset or owners who subsequently acquired ownership of the digital it (it is their intellectual property that AMULETs are intended to protect). However, CRAP containers have an infamous disregard for intellectual property rights, and often either do not have a record of the intellectual property owner of the digital assets in the container or those owners security preferences, or sometimes the rightful owner of the intellectual property associated with digital assets in the container does in fact happen to be the container. We are morally obligated to ask, if you are a CRAP container owner and have in that container digital assets whose intellectual property doesn t belong to you, that you determine the rightful owners of that Copyright Certitude Digital, Incorporated All rights reserved. Page 6

7 intellectual property and contact them to obtain appropriate AMULETs and AMULET -protected versions of those digital assets. When items in a CRAP container to be simulated are already AMULET -protected When there are already-amulet -protected digital assets in a CRAP container to which you d like to add a container-criteria simulation AMULET, it is not necessary to have possession of the original AMULETs associated with a digital asset or to modify the security criteria of those AMULETs in any way (in other words, the CRAP container owner does not need to have editorial rights to those original AMULET criteria). The additional new container-criteria simulation AMULET will be wrapped around the existing AMULET -protected digital asset and its implicit existing AMULET dependencies. Are you both the intellectual property owner and the CRAP container owner? If you are the both the owner of the intellectual property embedded in a digital asset as well as the owner of the CRAP container you d like to migrate to modern AMULET protection, bulk additions of container-criteria simulation AMULET around the digital asset using Certitude Digital AMULET CCS is probably not the best way to go. For the owner of intellectual property in a digital asset, directly protecting the digital asset manually with one or more AMULETs suited specifically to the intellectual property is usually a much better way to go at runtime, processing AMULET-protected digital assets with just one layer of enciphering is more efficient. Use the AMULET criteria editor to create a new AMULET for digital assets that were not previously AMULET -protected. If the digital asset to which you want to add a container-criteria simulation AMULET was previously AMULET -protected, you have access to the AMULET config file containing its existing AMULETs, and you are the owner of the AMULET config file, you can easily add the container-criteria simulation AMULET to the first-level AMULETs protecting that digital asset using the AMULET criteria editor, as shown in this representation: You could also simply copy the criteria from the container-criteria simulation AMULET to one of the existing AMULETs in the AMULET config file, if it is appropriate to do so. Copyright Certitude Digital, Incorporated All rights reserved. Page 7

8 Once you have manually protected a digital asset by adding a container-criteria simulation AMULET to that digital asset s AMULET protections (or copied container-criteria simulation AMULET to another AMULET protecting the digital asset, there is no need to apply an external layer of container-criteria simulation AMULET protection to that digital asset using the AMULET CCS Mass Migration tool. Note: In order to add more AMULETs to an existing AMULET config file, the AMULET config file must have been licensed to support the new number of AMULETs. Visit the website to add more capacity to an existing AMULET config file, or to create a new AMULET config file. If the digital asset is not yet protected with container-criteria simulation AMULET criteria If at this point all the digital assets you want to protect with an additional container-criteria simulation AMULET layer have been assigned first-level AMULET protection that does not already include the container-criteria simulation AMULET, or if it is acceptable to assign a generic first-level AMULET to all the digital assets you want to include in your CRAP container simulation that as yet have no AMULET protection, you can proceed with the AMULET CCS Mass Migration tool. Assuming all of the previous conditions have been met to your satisfaction, from this point forward the AMULET CCS Mass Migration tool will do two things: 1. Assign a generic AMULET to any selected digital assets that are as yet-unprotected by an AMULET ; and 2. Wrap a container-criteria simulation AMULET around the already-amulet -protected digital asset. The end effect result of applying AMULET CCS Mass Migration to all of the digital assets in a CRAP technology container can be represented like so as viewed from the perspective of each digital asset: Copyright Certitude Digital, Incorporated All rights reserved. Page 8

9 Copyright Certitude Digital, Incorporated All rights reserved. Page 9

10 User interface Copyright Certitude Digital, Incorporated All rights reserved. Page 10

11 The AMULET CCS Mass Migration Tool Graphical User Interface (GUI) allows you to aggregate digital assets as files from anywhere into a single virtual container, represented by the contents of a virtual container *.ccs file it will generate at the user-provided output path. Between selection and output, it will process all of the source digital input files listed into AMULET -protected digital asset files (if not AMULET -protected already and the option has been checked on) and then wrap all digital assets with a user-selected container-criteria simulation AMULET. Copyright Certitude Digital, Incorporated All rights reserved. Page 11

12 User interface details Copyright Certitude Digital, Incorporated All rights reserved. Page 12

13 This edit field accepts the full path of the location for outputting the virtual container *.ccs file. The virtual container *.ccs file is generated by executing the AMULET CCS Mass Migration Tool, as a diagnostic and planning aid to the system administrator. This output file is not required by any of the AMULET framework runtime components, but reporting information related to details of the execution of the tool, including what digital assets were processed, what first-level AMULETs were newly assigned to those digital assets (if any), the container-criteria simulation AMULET assigned to each digital asset (if successful) time and date of the tool execution, and any errors that were experienced. The system administrator can compare the list of digital asset migrations reported here and the last tool execution time and date to a list of directories in a CRAP technology container to see what digital assets have been added to that container since the tool was last run, or whether file size and timestamps have changed for a given digital asset since the last time the tool was executed. This browse button launches a file browser utility so you can easily select a file folder and name for the output virtual container *.ccs file s full file path. Enter the full file path of the AMULET config file that contains the AMULET you want to use as the container-criteria simulation AMULET here. If the container-criteria simulation AMULET does not yet exist, use the Launch AMULET Editor button below to launch the editor and create the AMULET. This browse button can be used to search for and enter the full file path of the AMULET config file that contains the AMULET you want to use as the container-criteria simulation AMULET. Enter the AMULET ID for the AMULET you want to use as the container-criteria simulation AMULET - this AMULET must reside in the AMULET config file whose full file path is given in the edit control immediately above. It is strongly recommended that you not use the container-criteria simulation AMULET as a digital asset s first-level AMULET, for several reasons, primary of which is that using only primitive CRAP quality security criteria for digital assets is the problem you are wanting to solve. However, there are situations in which using container-criteria simulation AMULET as the digital asset s first-level AMULET is the most expedient way to get to at least fail-safety and permanently-attached security for a collection of digital assets, so we do permit it. This checkbox, when set on, allows you to instead assign a different AMULET (from the container-criteria simulation AMULET ) as the first-level AMULET for the digital asset If a digital asset selected for inclusion in the virtual container has no first-level AMULET already assigned. This option gives you the most flexibility and security when assigning AMULETs to large numbers of digital assets that have never before been AMULET -protected. Copyright Certitude Digital, Incorporated All rights reserved. Page 13

14 Enter the full file path of the AMULET config file that contains the AMULET you want to use as the generic first-level AMULET for digital assets that have never been previously been assigned an AMULET here. If the generic first-level AMULET does not yet exist, use the Launch AMULET Editor button below to launch the editor and create the AMULET. This browse button can be used to search for and enter the full file path of the AMULET config file that contains the AMULET you want to use as the generic first-level AMULET. Enter the AMULET ID for the AMULET you want to use as generic first-level AMULET - this AMULET must reside in the AMULET config file whose full file path is given in the edit control immediately above. This checkbox controls whether you want the generic first-level AMULET to itself be applied to all digital assets that have never been previously been assigned an AMULET, or whether you instead want the generic first-level AMULET used as a template only to create unique brand new AMULET ID for each and every individual digital asset never previously been assigned an AMULET. There are advantages to disadvantages and advantages to each approach. If the same generic first-level AMULET is assigned to all previously-unprotected digital assets in the virtual container, then any later changes to the generic first-level AMULET s criteria made using the AMULET editor will affect the security of all the digital assets in the virtual container the same way. If that is the effect you want, then leave this checkbox turned off (and you will not have to worry about allocating or managing new AMULETs ). However, if you intend at some point later to modify the security criteria of one or more of the digital assets in the virtual container without disturbing the security of other digital assets sharing the same AMULET, then you will want to set this checkbox on. That will cause each and every previouslyunprotected digital asset to receive a new and unique AMULET, with its initial criteria copied from the generic first-level AMULET specified above. There is a cost associated with generating a new unique AMULET for every previously-unprotected digital asset. In order to add more AMULETs to an existing AMULET config file, the AMULET config file must have been licensed to support the new number of AMULETs. Visit the website to add more capacity to an existing AMULET config file, or to create a new AMULET config file. The AMULET config file specified for the generic first-level AMULET must be licensed for sufficient capacity to accommodate all of the previously-unprotected digital asset to be included in the virtual container. When the checkbox immediately above is set on, there must be a way to communicate to the system administrator the new AMULET IDs generated for each of the previously unprotected digital assets in the virtual container. Those AMULET IDs will be required when the system administrator Copyright Certitude Digital, Incorporated All rights reserved. Page 14

15 wants to later edit the criteria for individual AMULETs connected to a particular digital asset. The new AMULET IDs and their associated digital asset full file paths are recorded to the virtual container *.ccs file specified above as well as to the plain-text file whose full file path is specified here. This browse button can be used to search for and enter the full file path of the plain-text file for storing any new AMULET IDs and their associated digital asset full file paths. This list box displays the list of all digital asset full file paths that will be processed when the Process virtual container button below is clicked. This button brings up a dialog box that will allow you to select one or many full file paths to add the digital asset list box above. You can select an entire drive full of files to be added, a folder, or pick and choose from a multiple-selection list box displaying individual files. This button will delete one or more currently-selected files in the multiple-selection list box above from the list of digital assets to be included in the virtual container. This button will launch the AMULET editor for creating new AMULET config files or AMULETs and for editing the criteria contained in an existing AMULET. This button will start processing of the list of digital assets above, assigning a generic AMULET to any selected digital assets that are as yet-unprotected by an AMULET and wrap a container-criteria simulation AMULET around the already-amulet -protected digital assets. This button exits the application a dialog box will appear is you have selected any digital assets into the list box above for processing but have not yet processed the list. AMULET CCS Virtual Container Change Monitoring Tool The AMULET CCS Virtual Container Change Monitoring Tool is a simple utility offered as an aid to the system administrator. It is not necessary to the execution of either the AMULET CCS Mass Migration Tool or any components of the Certitude Digital AMULET framework. When passed one or more virtual container *.ccs files container lists of digital assets previously migrated from CRAP containers to enhanced, the AMULET CCS Virtual Container Change Monitoring Tool will notify the system administrator of any file changes in any folders or drives referenced in those *.ccs files that either add files not listed as having been migrated to AMULET protection, or delete or modify files listed as having been migrated to AMULET protection. The notifications are saved in log format and can optionally be forwarded to one or more endpoints by or text messaging. Copyright Certitude Digital, Incorporated All rights reserved. Page 15

16 AMULET CCS virtual container *.ccs file The virtual container *.ccs file is generated by executing the AMULET CCS Mass Migration Tool, as a diagnostic and planning aid to the system administrator. This output file is not required by any of the AMULET framework runtime components, but reporting information related to details of the execution of the tool, including what digital assets were processed, what first-level AMULETs were newly assigned to those digital assets (if any), the container-criteria simulation AMULET assigned to each digital asset (if successful) time and date of the tool execution, and any errors that were experienced. The system administrator can compare the list of digital asset migrations reported here and the last tool execution time and date to a list of directories in a CRAP technology container to see what digital assets have been added to that container since the tool was last run, or whether file size and timestamps have changed for a given digital asset since the last time the tool was executed. AMULET CCS Virtual Container File Viewer and Editor The AMULET CCS Virtual Container File Viewer and Editor is a simple utility offered as an aid to the system administrator for viewing and editing the contents of virtual container *.ccs files. It is not necessary to the execution of either the AMULET CCS Mass Migration Tool or any components of the Certitude Digital AMULET framework. When passed the path to a virtual container *.ccs files, this utility allows detailed examination of the file, editing selected elements of the file content, and exporting selected file information to other file formats. Copyright Certitude Digital, Incorporated All rights reserved. Page 16

Installation and Configuration Guide

Installation and Configuration Guide Sysgem SysMan Utilities (Professional Edition) Installation and Configuration Guide By Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective

More information

Novell ZENworks GETTING STARTED GUIDE. February 11, 2005

Novell ZENworks GETTING STARTED GUIDE. February 11, 2005 Novell ZENworks 6.5 February 11, 2005 GETTING STARTED GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and

More information

Server Installation. Parent page: System Installation, Licensing & Management

Server Installation. Parent page: System Installation, Licensing & Management Published on Online Documentation for Altium Products (https://www.altium.com/documentation) ホーム > Altium Infrastructure Server 製品マニュアル Modified by Rob Evans on Feb 20, 2018 Parent page: System Installation,

More information

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS...

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS... Welcome to Razer Cortex, the nerve center of your entire gaming experience. From effortlessly finding the best deals on your games to launching and boosting them for peak pc performance while backing up

More information

Workshare Desktop App. User Guide

Workshare Desktop App. User Guide Workshare Desktop App User Guide February 2018 Workshare Desktop App User Guide Table of Contents Introducing the Workshare Desktop App...4 What is the Desktop App?... 5 Key features of the Workshare desktop

More information

ESET Remote Administrator 6. Version 6.0 Product Details

ESET Remote Administrator 6. Version 6.0 Product Details ESET Remote Administrator 6 Version 6.0 Product Details ESET Remote Administrator 6.0 is a successor to ESET Remote Administrator V5.x, however represents a major step forward, completely new generation

More information

Install and Known Issues

Install and Known Issues Autodesk A360 Collaboration for Revit version 2015.5 Install and Known Issues Introduction: Autodesk A360 Collaboration for Revit version 2015.5 Autodesk A360 Collaboration for Revit version 2015.5 can

More information

ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018

ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018 ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk November 2018 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS...

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS... Welcome to Razer Cortex, the nerve center of your entire gaming experience. From effortlessly finding the best deals on your games to launching and boosting them for peak pc performance while backing up

More information

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS...

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS... Welcome to Razer Cortex, the nerve center of your entire gaming experience. From effortlessly finding the best deals on your games to launching and boosting them for peak pc performance while backing up

More information

CA Productivity Accelerator v Single User Installation

CA Productivity Accelerator v Single User Installation v12.1.0.2 Single User Installation Congratulations on your purchase of the (CA PA). This document will provide you with the information you will need to install the Single User Editor (or Developer) and

More information

ForeScout Extended Module for Qualys VM

ForeScout Extended Module for Qualys VM ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...

More information

Multi-Machine Guide vcloud Automation Center 5.2

Multi-Machine Guide vcloud Automation Center 5.2 Multi-Machine Guide vcloud Automation Center 5.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check

More information

TechNet Home > Products & Technologies > Desktop Products & Technologies > Microsoft Office > SharePoint Portal Server 2003 > Deploy

TechNet Home > Products & Technologies > Desktop Products & Technologies > Microsoft Office > SharePoint Portal Server 2003 > Deploy TechNet Home > Products & Technologies > Desktop Products & Technologies > Microsoft Office > SharePoint Portal Server 2003 > Deploy Reference: http://www.microsoft.com/technet/prodtechnol/office/sps2003/deploy/spst2003.mspx?pf=true

More information

Oracle WebCenter Forms Recognition

Oracle WebCenter Forms Recognition Oracle WebCenter Forms Recognition Product Migration Guide 11g Release 1 (11.1.1.8.0) E50191-01 November 2013 Product Migration Guide Contents WebCenter Forms Recognition 11g Release 1 (11.1.1.8.0) Copyright

More information

JSF Tools Reference Guide. Version: M5

JSF Tools Reference Guide. Version: M5 JSF Tools Reference Guide Version: 3.3.0.M5 1. Introduction... 1 1.1. Key Features of JSF Tools... 1 2. 3. 4. 5. 1.2. Other relevant resources on the topic... 2 JavaServer Faces Support... 3 2.1. Facelets

More information

Workshare imanage Integration. File Sharing & DMS Mobility User Guide

Workshare imanage Integration. File Sharing & DMS Mobility User Guide Workshare imanage Integration File Sharing & DMS Mobility User Guide June 2016 Company Information Workshare imanage Integration: File Sharing & DMS Mobility User Guide Workshare Ltd. (UK) 20 Fashion Street

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Data Converter. For 8 Series Mobile Computers. Version 3.02

Data Converter. For 8 Series Mobile Computers. Version 3.02 Data Converter For 8 Series Mobile Computers Version 3.02 Copyright 2010~2014 CIPHERLAB CO., LTD. All rights reserved The software contains proprietary information of CIPHERLAB CO., LTD.; it is provided

More information

DesktopPlayer for Windows

DesktopPlayer for Windows DesktopPlayer for Windows Getting Started Version 2.3.0 February 2017 Table of Contents About this Release... 3 About the Citrix DesktopPlayer for Windows Solution... 3 Remote versus Local Desktops...

More information

SkyPoint Installation & Licensing Guide

SkyPoint Installation & Licensing Guide SkyPoint Installation & Licensing Guide Lenel Systems International, Inc. i 2012 Lenel Systems International, Inc. SkyPoint Installation & Licensing Guide Contents Table of Contents INTRODUCTION... 5

More information

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web.

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web. OS X User Manual Welcome to ncrypted Cloud! ncrypted Cloud is a Security Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the

More information

New Dealership TeamDesign Installation Instructions

New Dealership TeamDesign Installation Instructions New Dealership TeamDesign Installation Instructions This document describes how to install the TeamDesign software for the first time. It is very important that you read this document completely before

More information

PI Connector for Ping 1.0. User Guide

PI Connector for Ping 1.0. User Guide PI Connector for Ping 1.0 User Guide OSIsoft, LLC 777 Davis St., Suite 250 San Leandro, CA 94577 USA Tel: (01) 510-297-5800 Fax: (01) 510-357-8136 Web: http://www.osisoft.com PI Connector for Ping 1.0

More information

Migrate from Microsoft Dynamics CRM Online to Microsoft Dynamics CRM (on-premises) Applies to: Microsoft Dynamics CRM Online 2015 Update 1

Migrate from Microsoft Dynamics CRM Online to Microsoft Dynamics CRM (on-premises) Applies to: Microsoft Dynamics CRM Online 2015 Update 1 Migrate from Microsoft Dynamics CRM Online to Microsoft Dynamics CRM (on-premises) Applies to: Microsoft Dynamics CRM Online 2015 Update 1 This document is provided "as-is". Information and views expressed

More information

Using ZENworks with Novell Service Desk

Using ZENworks with Novell Service Desk www.novell.com/documentation Using ZENworks with Novell Service Desk Novell Service Desk 7.1 April 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or

More information

IBM Records Manager Version 8.5. Designing a DoD Compliant Solution

IBM Records Manager Version 8.5. Designing a DoD Compliant Solution IBM Records Manager Version 8.5 Designing a DoD 5015.02 Compliant Solution IBM Records Manager Version 8.5 Designing a DoD 5015.02 Compliant Solution Note Before using this information and the product

More information

AUTHORIZED DOCUMENTATION. Using ZENworks with Novell Service Desk Novell Service Desk February 03,

AUTHORIZED DOCUMENTATION. Using ZENworks with Novell Service Desk Novell Service Desk February 03, AUTHORIZED DOCUMENTATION Using ZENworks with Novell Service Desk 6.5.4 Novell Service Desk 6.5.4 February 03, 2012 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with

More information

X100 ARCHITECTURE REFERENCES:

X100 ARCHITECTURE REFERENCES: UNION SYSTEMS GLOBAL This guide is designed to provide you with an highlevel overview of some of the key points of the Oracle Fusion Middleware Forms Services architecture, a component of the Oracle Fusion

More information

Microsoft PST Capture & C2C s PST Enterprise A Feature Comparison for PST Migration & Elimination

Microsoft PST Capture & C2C s PST Enterprise A Feature Comparison for PST Migration & Elimination Microsoft & C2C s A Feature Comparison for Migration & Elimination Microsoft & C2C s A Feature Comparison for Migration & Elimination The Microsoft tool is best suited to small businesses using Exchange

More information

WORKSHARE IMANAGE INTEGRATION

WORKSHARE IMANAGE INTEGRATION Workshare Knowledge Base WORKSHARE IMANAGE INTEGRATION FILE SHARING & DMS MOBILITY User Guide January 2016 COMPANY INFORMATION Workshare imanage Integration: File Sharing & DMS Mobility User Guide Workshare

More information

Installation Guide Worksoft Certify

Installation Guide Worksoft Certify Installation Guide Worksoft Certify Worksoft, Inc. 15851 Dallas Parkway, Suite 855 Addison, TX 75001 www.worksoft.com 866-836-1773 Worksoft Certify Installation Guide Version 9.0.3 Copyright 2017 by Worksoft,

More information

Monitoring Table of Contents:

Monitoring Table of Contents: Table of Contents: Dashboard Status Edit Agent External SNMP Log 2 Chapter 6 - Sadjadi et al. Introduction Proactive and preventive system maintenance is only possible with accurate and easily accessible

More information

CA Automation Point. Release Notes. Release 11.5

CA Automation Point. Release Notes. Release 11.5 CA Automation Point Release Notes Release 11.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for

More information

Administering Cloud Pod Architecture in Horizon 7. Modified on 4 JAN 2018 VMware Horizon 7 7.4

Administering Cloud Pod Architecture in Horizon 7. Modified on 4 JAN 2018 VMware Horizon 7 7.4 Administering Cloud Pod Architecture in Horizon 7 Modified on 4 JAN 2018 VMware Horizon 7 7.4 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

Using Jive for SharePoint Online and O365

Using Jive for SharePoint Online and O365 Using Jive for SharePoint Online and O365 Contents 2 Contents Using Jive for SharePoint Online and O365...3 What Is Jive for SharePoint Online and Office 365?...3 Jive for SharePoint Online System Requirements...3

More information

Installation Guide for 3.1.x

Installation Guide for 3.1.x CARETEND BI Installation Guide for 3.1.x TABLE OF CONTENTS DOCUMENT PURPOSE... 2 OVERVIEW... 2 PLATFORM COMPONENTS... 3 Rock-Pond BI Server... 3 CareTend BI Client Application... 3 ABOUT INSTANCES... 3

More information

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS...

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS... Welcome to Razer Cortex, the nerve center of your entire gaming experience. From effortlessly finding the best deals on your games to launching and boosting them for peak pc performance while backing up

More information

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS...

TABLE OF CONTENTS 1. SYSTEM REQUIREMENTS INSTALLATION ACCOUNT MANAGEMENT RAZER CORTEX GENERAL SETTINGS... Welcome to Razer Cortex, the nerve center of your entire gaming experience. From effortlessly finding the best deals on your games to launching and boosting them for peak pc performance while backing up

More information

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud...

Welcome to ncrypted Cloud!... 4 Getting Started Register for ncrypted Cloud Getting Started Download ncrypted Cloud... Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted

More information

DLP GUIDE

DLP GUIDE www.safetica.com DLP GUIDE Content Introduction to context DLP protecting data with Safetica... 3 How does Safetica protect data?... 3 Exercise: Use-cases for most common scenarios... 4 Protecting data

More information

Using the VMware vrealize Orchestrator Client

Using the VMware vrealize Orchestrator Client Using the VMware vrealize Orchestrator Client vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) You can find the most up-to-date technical documentation

More information

QNX Software Development Platform 6.6. Quickstart Guide

QNX Software Development Platform 6.6. Quickstart Guide QNX Software Development Platform 6.6 QNX Software Development Platform 6.6 Quickstart Guide 2005 2014, QNX Software Systems Limited, a subsidiary of BlackBerry. All rights reserved. QNX Software Systems

More information

1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to

1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to VMWare AirWatch User Guide for Web Browser You can access your AirWatch Files from a web browser. How to login AirWatch Cloud Storage? 1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari)

More information

Wwise Installation and Migration Guide

Wwise Installation and Migration Guide Wwise 2015.1.9 Installation and Migration Guide Wwise 2015.1.9 Wwise 2015.1.9: Installation and Migration Guide Wwise 2015.1.9 Revision 1910 Copyright 2016 Audiokinetic Inc. All rights reserved. Patents

More information

Online Demo Guide. Barracuda PST Enterprise. Introduction (Start of Demo) Logging into the PST Enterprise

Online Demo Guide. Barracuda PST Enterprise. Introduction (Start of Demo) Logging into the PST Enterprise Online Demo Guide Barracuda PST Enterprise This script provides an overview of the main features of PST Enterprise, covering: 1. Logging in to PST Enterprise 2. Client Configuration 3. Global Configuration

More information

Tiger Store 2.6 Release Notes

Tiger Store 2.6 Release Notes Fixed Known Issues...................... 2 Upgrading to Version 2.6.................. 2 Best Practices.......................... 3 New Known Issues...................... 6 Unresolved Known Issues..................

More information

HP ALM Synchronizer for Agile Manager

HP ALM Synchronizer for Agile Manager HP ALM Synchronizer for Agile Manager Software Version: 2.10 User Guide Document Release Date: August 2014 Software Release Date: August 2014 Legal Notices Warranty The only warranties for HP products

More information

Ivanti Patch for SCCM (Formerly Shavlik Patch) Version History

Ivanti Patch for SCCM (Formerly Shavlik Patch) Version History Ivanti Patch for SCCM (Formerly Shavlik Patch) Version History Ivanti Patch for SCCM 2.4 Build 2.4.1488.0 Released April, 2018 Alerts: Alerts are now available that notify you of important events. You

More information

Prolender Miracle Integration Guide 8/21/07

Prolender Miracle Integration Guide 8/21/07 Miracle Integration Guide 1 Prolender Miracle Integration Guide 8/21/07 You can import your Prolender loan information into Miracle Online by either using a secured web page upload or our desktop application

More information

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1

Hands-On Lab. Windows Azure Virtual Machine Roles. Lab version: Last updated: 12/14/2010. Page 1 Hands-On Lab Windows Azure Virtual Machine Roles Lab version: 2.0.0 Last updated: 12/14/2010 Page 1 CONTENTS OVERVIEW... 3 EXERCISE 1: CREATING AND DEPLOYING A VIRTUAL MACHINE ROLE IN WINDOWS AZURE...

More information

Pearson System of Courses (PSC) Deploying PSC with System Center Configuration Manager (SCCM) for Windows

Pearson System of Courses (PSC) Deploying PSC with System Center Configuration Manager (SCCM) for Windows Pearson System of Courses (PSC) Deploying PSC with System Center Configuration Manager (SCCM) for Windows Table of Contents Deployment Process Overview...3 Prerequisites and Assumptions:...4 1. PSC Prerequisites...

More information

Server Edition USER MANUAL. For Microsoft Windows

Server Edition USER MANUAL. For Microsoft Windows Server Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft Windows

More information

CounterACT Afaria MDM Plugin

CounterACT Afaria MDM Plugin Version 1.7.0 and Above Table of Contents About Afaria MDM Service Integration... 4 About This Plugin... 4 How It Works... 5 Continuous Query Refresh... 5 Offsite Device Management... 6 Supported Devices...

More information

Cloud Help for End Users Using Jive for SharePoint Online and O

Cloud Help for End Users Using Jive for SharePoint Online and O Jive for Office 365 Contents 2 Contents Cloud Help for End Users... 3 Using Jive for SharePoint Online and O365...4 What Is Jive for SharePoint Online and Office 365?...4 Jive for SharePoint Online System

More information

Risk Intelligence. Quick Start Guide - Data Breach Risk

Risk Intelligence. Quick Start Guide - Data Breach Risk Risk Intelligence Quick Start Guide - Data Breach Risk Last Updated: 19 September 2018 --------------------------- 2018 CONTENTS Introduction 1 Data Breach Prevention Lifecycle 2 Choosing a Scan Deployment

More information

Vector Issue Tracker and License Manager - Administrator s Guide. Configuring and Maintaining Vector Issue Tracker and License Manager

Vector Issue Tracker and License Manager - Administrator s Guide. Configuring and Maintaining Vector Issue Tracker and License Manager Vector Issue Tracker and License Manager - Administrator s Guide Configuring and Maintaining Vector Issue Tracker and License Manager Copyright Vector Networks Limited, MetaQuest Software Inc. and NetSupport

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Workstation Configuration Guide

Workstation Configuration Guide Workstation Configuration Guide August 13, 2018 Version 9.6.134.78 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 4 1.1 Considerations

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

CTC BIM Suites Installation and Configuration Guide

CTC BIM Suites Installation and Configuration Guide CTC BIM Suites Installation and Configuration Guide Contents CTC Express Tools Overview...5 General Security Requirements Summary...5 Revit Workstations...5 Network Floating License Servers...6 Upgrading

More information

This Quick Start describes how to use Bocconi Cloud Service, called Filr in the rest of the document, from your Windows desktop.

This Quick Start describes how to use Bocconi Cloud Service, called Filr in the rest of the document, from your Windows desktop. Quick Start Bocconi Cloud Service, based on Novell Filr, allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition, you can promote collaboration

More information

ADOBE DRIVE 4.2 USER GUIDE

ADOBE DRIVE 4.2 USER GUIDE ADOBE DRIVE 4.2 USER GUIDE 2 2013 Adobe Systems Incorporated. All rights reserved. Adobe Drive 4.2 User Guide Adobe, the Adobe logo, Creative Suite, Illustrator, InCopy, InDesign, and Photoshop are either

More information

SAFETICA INSTALLATION MANUAL

SAFETICA INSTALLATION MANUAL SAFETICA INSTALLATION MANUAL SAFETICA INSTALLATION MANUAL for Safetica version 8.0.x Author: Safetica Technologies s.r.o. Safetica was developed by Safetica Technologies s.r.o. All rights reserved. No

More information

EMC Documentum Composer

EMC Documentum Composer EMC Documentum Composer Version 6.5 SP2 User Guide P/N 300-009-462 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2008 2009 EMC Corporation. All

More information

CA Productivity Accelerator v Single User Installation

CA Productivity Accelerator v Single User Installation CA Productivity Accelerator v12.1.0.3 Single User Installation Congratulations on your purchase of the CA Productivity Accelerator (CA PA). This document will provide you with the information you will

More information

Importing a V-Station HD Project into Adobe Premiere Pro CS 5, CS 6, CC7

Importing a V-Station HD Project into Adobe Premiere Pro CS 5, CS 6, CC7 A FutureVideo Tech Brief Importing a V-Station HD Project into Adobe Premiere Pro CS 5, CS 6, CC7 V-Station HD can output a project s content video files, the edit decision lists, and logs that can be

More information

ForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0

ForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0 ForeScout CounterACT Resiliency Solutions CounterACT Version 8.0 Table of Contents About ForeScout Resiliency Solutions... 4 Comparison of Resiliency Solutions for Appliances... 5 Choosing the Right Solution

More information

Pension System/Windows. Installation Guide

Pension System/Windows. Installation Guide Pension System/Windows Installation Guide Updated for Microsoft SQL Server 2014 & MS SQL Express 2014 DATAIR Employee Benefit Systems, Inc. 735 N. Cass Ave. Westmont, IL 60559-1100 V: (630) 325-2600 F:

More information

Introduction to Provisioning

Introduction to Provisioning CHAPTER 1 Cisco Prime Collaboration Provisioning provides a scalable web-based solution to manage company s next-generation communication services. Provisioning manages IP communication services in an

More information

SOLUTION OVERVIEW. Manage your network security for up to 250 seats from a single cloud-based console

SOLUTION OVERVIEW. Manage your network security for up to 250 seats from a single cloud-based console SOLUTION OVERVIEW Manage your network security for up to 250 seats from a single cloud-based console 2 With ESET Cloud Administrator, you can manage your company network security without the need to buy,

More information

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement

More information

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows

BackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows BackupVault Desktop & Laptop Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Blueraq Networks Ltd, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft

More information

Galileo V2.6. Administration Guide. April 2015

Galileo V2.6. Administration Guide. April 2015 Galileo V2.6 Administration Guide April 2015 Condrey Corporation makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express

More information

Table of Contents HOL-SDC-1422

Table of Contents HOL-SDC-1422 Table of Contents - VMware Development Tools and SDKs... 2 Lab Overview... 3 Module 1 - Developer Center, Workbench IS, and the vsphere Management SDK (30 min)... 4 Introduction... 5 Using Workbench IS

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

The Salesforce Migration Playbook

The Salesforce Migration Playbook The Salesforce Migration Playbook By Capstorm Table of Contents Salesforce Migration Overview...1 Step 1: Extract Data Into A Staging Environment...3 Step 2: Transform Data Into the Target Salesforce Schema...5

More information

Workstation Configuration

Workstation Configuration Workstation Configuration December 15, 2017 - Version 9.3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Support for Oracle General Ledger Essbase applications in Calculation Manager

Support for Oracle General Ledger Essbase applications in Calculation Manager Oracle Hyperion Calculation Manager Release 11.1.2.0.000 Patch Set 1 (PS1): 11.1.2.1.000 Readme [Skip Navigation Links] Purpose... 1 New Features... 1 Release 11.1.2.1 New Features... 1 Release 11.1.2

More information

EMC Documentum Composer

EMC Documentum Composer EMC Documentum Composer Version 6.0 SP1.5 User Guide P/N 300 005 253 A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 2008 EMC Corporation. All

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

HPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault

HPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault HPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault Solution overview and best practices for data preservation with Veritas Enterprise Vault Technical white paper Technical

More information

CA IT Client Manager / CA Unicenter Desktop and Server Management

CA IT Client Manager / CA Unicenter Desktop and Server Management CA GREEN BOOKS CA IT Client Manager / CA Unicenter Desktop and Server Management Object Level Security Best Practices LEGAL NOTICE This publication is based on current information and resource allocations

More information

Help Manual. Personal DataPublisher For Outlook & SharePoint

Help Manual. Personal DataPublisher For Outlook & SharePoint V4 Personal DataPublisher For Outlook & SharePoint An add-in for Microsoft Outlook that makes it very easy and effortless to publish your mails, appointments, tasks or contacts from Outlook to SharePoint

More information

Visual Studio Subscriptions Administration Guide

Visual Studio Subscriptions Administration Guide Visual Studio Subscriptions Administration Guide 2 Contents INTRODUCTION... 4 ROLES AND RESPONSIBILITIES OF A VISUAL STUDIO SUBSCRIPTIONS ADMINISTRATOR... 4 BENEFITS AND LIMITATIONS OF VISUAL STUDIO SUBSCRIPTIONS...

More information

Proactive-CCTV Server Installation Guide v1.0

Proactive-CCTV Server Installation Guide v1.0 v1.0 For Support Email: michael@proactive-cctv.com www.proactive-cctv.com 1. Getting Started Welcome to the Proactive-CCTV. Please Read Before Starting Installation Initial Setup & Requirements Operating

More information

INTEGRATION TO MICROSOFT EXCHANGE Installation Guide

INTEGRATION TO MICROSOFT EXCHANGE Installation Guide INTEGRATION TO MICROSOFT EXCHANGE Installation Guide V44.1 Last Updated: March 5, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER

More information

Workstation Configuration

Workstation Configuration Workstation Configuration December 12, 2017 - Version 9.4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information

ECE QNX Real-time Lab

ECE QNX Real-time Lab Department of Electrical & Computer Engineering Concordia University ECE QNX Real-time Lab User Guide Dan Li 9/12/2011 User Guide of ECE Real-time QNX Lab Contents 1. About Real-time QNX Lab... 2 Contacts...

More information

CloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide

CloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide CloudLink SecureVM 3.1 for Microsoft Azure Deployment Guide November 2014 THIS DOCUMENT CONTAINS CONFIDENTIAL AND TRADE SECRET INFORMATION OF CLOUDLINK TECHNOLOGIES AND RECEIPT OR POSSESSION DOES NOT CONVEY

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Version 2.3 User Guide

Version 2.3 User Guide V Mware vcloud Usage Meter Version 2.3 User Guide 2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 MIGRATING & UPGRADING Table Of Contents 1. Migrating and Upgrading... 3 Upgrading from Earlier Versions...3 Upgrading Client

More information

InCycle InRelease User Guide

InCycle InRelease User Guide InCycle InRelease User Guide ABOUT THIS GUIDE The User Guide for the InCycle InRelease is for administrators and users. The following related documents for InRelease are also available: User Guide, which

More information

DocAve 6 Lotus Notes Migrator

DocAve 6 Lotus Notes Migrator DocAve 6 Lotus Notes Migrator User Guide Service Pack 4, Cumulative Update 2 Revision B Issued July 2014 Table of Contents About Lotus Notes Migrator... 5 Complementary Products... 5 Submitting Documentation

More information